Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Terminology: Cookies

Tech Terminology: Cookies

Everyone loves cookies, but browser cookies take on a whole other definition in the computing environment. Do you know what browser cookies do, as well as what their purpose is? Today’s tech term is dedicated to cookies--they might not be delicious, but they do serve an important role within your organization.

0 Comments
Continue reading

Can You Tell if Your Browsing is Secured?

Can You Tell if Your Browsing is Secured?

Your choice of browser can easily impact your security, as each handles how it informs you whether or not your connection is encrypted differently. This is especially important to recognize, especially when the Chrome browser will soon run counter to the advice users have received for quite some time.

0 Comments
Continue reading

Tech Term: Bandwidth Defined

Tech Term: Bandwidth Defined

The Internet has become an irreplaceable part of many business’ operations, which brings the thought into question of how much you rely on it for your daily duties. Technology has changed the way that the Internet works for the better, but there is one part of its operations that still lies at the heart of it: bandwidth.

0 Comments
Continue reading

Tip of the Week: What to Do When the Internet Goes Out

Tip of the Week: What to Do When the Internet Goes Out

Losing Internet can be a large problem in the business world, as we all become more and more reliant on it. Downtime of this kind can be immensely frustrating. However, not all hope is lost, as there are ways to troubleshoot the cause of an Internet outage.

0 Comments
Continue reading

Net Neutrality Still Needs Your Help!

Net Neutrality Still Needs Your Help!

December 14th is the last day that our government representatives can vote whether or not to continue the Internet’s protection under the net neutrality rules established in 2015. Without these rules in place, your data can be analyzed by your Internet service provider, and they are free to act on that knowledge and manipulate your Internet in support of their own interests.

0 Comments
Continue reading

Tip of the Week: Tricks for Better Internet Browsing

Tip of the Week: Tricks for Better Internet Browsing

If you use the Internet every single day, you’ll start to realize that you can use it more effectively for achieving your goals. In cases like this, it’s important to look at ways you can improve your overall use of the Internet, as it’s the key way you access important information, applications, and contacts. Here are some day-to-day tips that you can use to help improve your mastery of the Internet.

0 Comments
Continue reading

Here’s How to Make the Internet Far Less Distracting for Your Team

Here’s How to Make the Internet Far Less Distracting for Your Team

The average office worker needs to access the Internet in order to do their job. What they don’t need to access is cat videos, memes, social media, online games, and malware-ridden websites. How can a business owner clamp down on Internet activity in their office? By equipping their network with a content filtering solution, of course.

0 Comments
Continue reading

Tip of the Week: Unsure if an Email Address is Valid? Here’s How to Check!

b2ap3_thumbnail_email_verification_400.jpgSometimes you might write an email to someone who you’ve never emailed before (perhaps you scrawled down their email while on the phone or at an event), and questioned the authenticity of your recipient’s email address. Those who use email frequently know all too well what this feels like. It makes the most sense to first make sure that you have the right email address before sending a message.

0 Comments
Continue reading

The Rise, and Fall, and Rise of Bitcoin

b2ap3_thumbnail_bitcoin_resurgence_400.jpgYou might remember Bitcoin, the cryptocurrency known for increasing the anonymity and privacy of transactions on the web. Bitcoin was gaining ground for a while, but a couple of key events left it in the dust, sinking to seeing use only as a currency used by hackers and criminals in online black markets. Now, however, it seems that Bitcoin is being used again, and with a few key innovations in how it’s spent, Bitcoin will continue to grow more popular as a payment option.

0 Comments
Continue reading

Tip of the Week: 4 Reasons Your WiFi May Be Slow

b2ap3_thumbnail_wifi_interuption_400.jpgWireless Internet access is a luxury that seems commonplace, but there are many who experience trouble with their connections on a daily basis. Sometimes the problem stems from familiar issues that could happen at any minute, but other times the issues might not be so obvious. Either way, you should be aware of the most common disruptions to your WiFi signal, even those that you might not consider problems.

0 Comments
Continue reading

Malvertising: Hackers are Paying For Ad Space on Popular Websites

b2ap3_thumbnail_click_on_malware_ad_400.jpgA good business practices extreme caution when using the Internet, thanks to hackers using any means possible to unleash threats against organizations of all sizes. You teach your employees how to avoid threats and to avoid suspicious websites, but what if that’s not enough to keep hackers out of your network infrastructure?

0 Comments
Continue reading

21 Million US Students Lack High Speed Internet Access at Their Schools

b2ap3_thumbnail_superhighway_400.jpgThe Internet is an absolutely essential part of today’s workplace. It helps businesses get the upper hand on their competition by offering practically limitless access to tools, resources, and contacts that can be used for the betterment of their organizations. However, classrooms can reap the benefits of Internet too, and it’s surprising that it’s taken so long for all schools to hop on board with this concept.

0 Comments
Continue reading

YouTube Red Will Cost You Some Green

b2ap3_thumbnail_youtube_red_400.jpgFor all of you YouTubers out there, you probably already know that the video-playback website is offering a premium service that launched last month. Now you can watch cat videos and other nonsense in an entirely new way. But what do you get with a subscription to YouTube Red? Is it worth the money? Well, let’s find out.

0 Comments
Continue reading

The Internet of Things Takes Cyber Security to a Whole New Level

b2ap3_thumbnail_internet_of_things_400.jpgWith the Internet of Things continuing to gain popularity, we’re seeing more devices that connect to the Internet than ever before. However, what the users of these devices might be failing to take into consideration is the fact that the Internet is a dangerous place full of threats and other miscreants. What happens if these criminals decide to attack any of your connected devices? This is a relevant question to ask since October is Cyber Security Month, and The Internet of Things represents the next frontier of cyberspace.

0 Comments
Continue reading

Tip of the Week: Spot a Hacker By Investigating Their IP Address

b2ap3_thumbnail_ip_addresses_400.jpgHave you ever wondered how your PC is identified from the billions of devices out there in the world today? Just like every human being has specific physiological traits that make up who they are, your computer’s IP address is somewhat unique to your machine, and it can say a lot about you. Therefore, it’s important that you are able to identify your own IP address when you need to.

0 Comments
Continue reading

What’s Your Competition Up to? Use these 6 Apps to Find Out!

b2ap3_thumbnail_track_your_competitors_400.jpgAs a business owner, you might have the sudden and inexplicable urge to creep on (track) your competitors to get a feel for their prices and services. With these six apps, you can make this job a little bit easier by seeing what others have to say about your competitors, including what they are saying about you.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business User Tips Malware Business Computing Network Security Microsoft Computer Google Software Hosted Solutions Productivity Internet Tech Term Data Small Business Ransomware Mobile Devices Efficiency Communication IT Services Backup Workplace Tips Hardware Windows 10 Smartphone Data Recovery Android IT Support Microsoft Office Cloud Computing Saving Money Productivity Social Media Browser Business Continuity Gmail Data Management Managed IT Services Facebook Windows Upgrade Word Information Office 365 Internet of Things Managed IT Services Innovation Mobile Device Server Users Data Backup Phishing Passwords Disaster Recovery Smartphones Outsourced IT Windows 10 App Vulnerability Cybersecurity Employer-Employee Relationship Business Management Artificial Intelligence Miscellaneous communications Remote Monitoring Managed Service Provider VoIP Encryption Network Chrome Analytics Apps Content Filtering IT Support Big Data Applications Government Money Infrastructure BYOD Gadgets Spam Office Tips Virtual Reality Website Save Money Tip of the week Hacker Managed Service Apple Two-factor Authentication Data storage Access Control Antivirus Display Router Bandwidth Unified Threat Management VPN YouTube Development Firewall Education Robot Risk Management WiFi Wireless Printing Automation Avoiding Downtime The Internet of Things IT Management Virtualization Customer Service Maintenance Augmented Reality Employee-Employer Relationship Tablet Settings Paperless Office SaaS Storage Solid State Drive Downtime HIPAA Retail Networking Hosted Solution Hacking Hard Disk Drive Holiday Outlook Data Security Monitors Data loss Business Technology Search IBM Chromebook Virtual Private Network Mobile Security Presentation Operating System Server Management Mobile Device Management Administration Touchscreen Customer Relationship Management Office End of Support Document Management Bring Your Own Device Wi-Fi Wireless Technology Computing Google Drive Telephone Systems Laptop Business Intelligence Password Recovery Mouse Vendor Management Quick Tips LiFi Safety Company Culture Scam Computers Business Growth Legislation Identity MSP Scalability Google Wallet Permissions VoIP Assessment Scary Stories Managing Stress Managed Services Current Events FCC How To Smart Tech PowerPoint Updates IT service Alerts Heating/Cooling Service Level Agreement IP Address Cybercrime eWaste Refrigeration Device Remote Computing Distributed Denial of Service WannaCry User Mixed Reality Legal LED Update Alt Codes Dark Data Comparison Public Speaking Migration Drones Fraud Time Management Internet Exlporer SharePoint Cabling Sports Cables Competition Laptops Going Green Social Engineering Title II Firefox Connectivity Knowledge Onboarding BDR Licensing Servers Mobile Office Continuity Mobility Social Managed IT Service Modem Slack Data Breach Digital Payment Smart Office Co-Managed IT Typing Specifications Compliance Charging Politics Network Management Value Unified Communications Digital Signage Collaboration Deep Learning Humor Downloads IT Technicians Managed IT Wires Software as a Service Online IoT Techology Experience Google Maps Cooperation Running Cable Solar Undo Print Toner Hacks Break Fix Digital Cookies Lenovo Monitoring Hard Disk Drives Private Cloud Professional Services Marketing Work Content Cryptocurrency Black Friday Regulations Mail Merge Virtual Desktop Messaging Tech Support Budget Hotspot Application Desktop File Sharing sip Multi-Factor Security Disaster Mirgation Shortcut Buisness Voice over Internet Protocol Entertainment Computer Care How To Microsoft Excel Star Wars Unified Threat Management Staff Statistics Lithium-ion battery Shortcuts Samsung Dark Web Spyware Nanotechnology Superfish IT solutions Spying Solid State Drives Language USB Optimization Streaming Bitcoin Network Congestion Cyber Monday Social Networking Address Analysis Employee-Employer Relationships Websites Identity Theft Troubleshooting Best Practice telephony Google Calendar Uninterrupted Power Supply Chatbots Patch Management 5G FinTech iOS Training Information Technology Blockchain Cost Management User Error Automobile Google Docs Printer Wearable Technology Bluetooth Halloween Security Cameras G Suite Writing Net Neutrality Screen Reader Cortana National Security Computing Infrastructure Dongle Recycling Hard Drives Human Error Windows 8 Smart Technology Corporate Profile Motherboard Fun Students Printers Motion Sickness Domains Gadget Staffing Upgrades Personal Information Administrator Crowdsourcing Taxes Web Server Emergency Machine Learning IT Budget GPS 3D Printing Computer Repair IT Consultant Processors Cameras Relocation Meetings Windows 7 Tracking Unsupported Software Health Cleaning Alert CCTV Emoji Webcam Regulation Mobile Data Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Travel Law Enforcement Notifications Mobile Computing CrashOverride Twitter Botnet Supercomputer Physical Security