Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Hilarious Computing Tips From Mr. Wolfdog [VIDEO]

b2ap3_thumbnail_oh_your_wolfdog_400.jpgHappy April Fool’s Day! It’s a time to celebrate pranks, practical jokes, and laughter. Therefore, we thought we’d mix it up a bit and seek out technology advice from the funniest and the furriest CEO we know, Old Spice’s wolf-dog hybrid, Mr. Wolfdog!

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Microsoft Business Computing Malware Computer Network Security Hosted Solutions Google Productivity Software Internet Communication Tech Term Data Small Business Backup Mobile Devices Efficiency IT Services Ransomware Workplace Tips Hardware Cloud Computing Windows 10 Smartphone Microsoft Office Android Saving Money Data Recovery IT Support Office 365 Upgrade Productivity Facebook Business Continuity Users Social Media Windows Gmail Information Data Management Browser Managed IT Services Mobile Device Server Innovation Data Backup Internet of Things Phishing Word Managed IT Services Windows 10 Miscellaneous Disaster Recovery Smartphones App Passwords Outsourced IT communications Business Management Vulnerability Managed Service Provider Cybersecurity VoIP Employer-Employee Relationship Encryption Remote Monitoring Network Artificial Intelligence Chrome Gadgets Big Data Spam Website Government Tip of the week Save Money BYOD Apple Apps Managed Service Analytics IT Support Office Tips Virtual Reality Infrastructure Hacker Money Content Filtering Applications Automation Bandwidth Virtualization Maintenance YouTube Unified Threat Management Education Tablet Risk Management Wireless Antivirus Employee-Employer Relationship VPN Data storage Customer Service Firewall Display Augmented Reality Access Control Development WiFi Settings Router Robot Paperless Office Two-factor Authentication Avoiding Downtime IT Management The Internet of Things Printing Operating System Telephone Systems Wireless Technology End of Support Mobile Security Recovery Holiday Quick Tips Bring Your Own Device Computing Google Drive Password Scam Search Mouse Vendor Management Business Intelligence IBM Chromebook Solid State Drive Networking Administration LiFi Collaboration Mobile Device Management Company Culture Customer Relationship Management Computers Document Management Storage Hard Disk Drive Wi-Fi Data Security Hacking Laptop Retail Data loss Business Technology Virtual Private Network HIPAA Outlook Safety Server Management Presentation Monitors OneNote Touchscreen Downtime Hosted Solution Office SaaS Licensing Application Wires Software as a Service Statistics IP Address Cybercrime Managed IT Service Modem Hacks Digital Signage GDPR Spyware Superfish Budget Solar Print Toner Specifications Compliance Cryptocurrency Monitoring Remote Computing Hard Disk Drives Address Value Work Content User Error Knowledge Downloads IT Technicians sip Update Messaging Uninterrupted Power Supply Patch Management Sports Online IoT How To Cooperation Voice over Internet Protocol Entertainment Bluetooth Mobile Office Break Fix Cookies Desktop Data Warehouse Shortcuts Digital Payment Black Friday Regulations Bitcoin Network Congestion Spying Solid State Drives Corporate Profile Hotspot Professional Services Optimization Streaming Politics VoIP Experience Unified Communications Multi-Factor Security Mirgation Hard Drives Best Practice telephony Analysis Employee-Employer Relationships Microsoft Excel Star Wars Information Technology Staff Google Docs FinTech iOS Running Cable Dark Web Nanotechnology Writing Troubleshooting How To Security Cameras Private Cloud IT service Heating/Cooling Cyber Monday Social Networking Windows 8 National Security WannaCry Virtual Desktop Language USB Recycling Human Error Tech Support Time Management Google Calendar Chatbots Refrigeration Business Growth Students Buisness Blockchain Cost Management User Google Wallet Computer Care Firefox IT solutions Printer Wearable Technology MSP Scalability File Sharing Cabling Lithium-ion battery Net Neutrality Screen Reader Public Speaking Current Events Computing Infrastructure Dongle Legal Managing Stress Managed Services BDR Servers Smart Technology Motherboard Competition PowerPoint Samsung Updates Drones eWaste Device Websites Identity Theft Network Management Legislation Identity Alt Codes Dark Data Business Analysis Mixed Reality 5G Permissions Assessment LED Training Techology Cortana Migration Managed IT Halloween FCC Smart Tech Going Green Social Engineering Alerts Service Level Agreement Cables Laptops Automobile Google Maps Distributed Denial of Service Social Onboarding G Suite Digital Lenovo Fun Continuity Mobility Comparison Undo Typing Slack Data Breach Mail Merge Fraud Internet Exlporer Smart Office Co-Managed IT Unified Threat Management SharePoint Marketing Deep Learning Humor Charging Disaster Shortcut Scary Stories Title II Connectivity Personal Information Administrator Crowdsourcing Taxes Mobile Data Machine Learning IT Budget Web Server GPS Regulation Computer Repair IT Consultant CrashOverride Relocation Processors Cameras Tracking Meetings Health Domains Mobile Computing Cleaning Physical Security Alert CCTV Emergency Upgrades Emoji Webcam Electronic Medical Records Printers Work/Life Balance Error 3D Printing Black Market Point of Sale Law Enforcement Travel Notifications Unsupported Software Botnet Supercomputer Twitter Gadget Staffing Windows 7 Motion Sickness