Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Deepfakes Make It Hard to Believe Your Eyes or Ears

Deepfakes Make It Hard to Believe Your Eyes or Ears

How would you feel if a video of you appeared online, saying things that you never actually said? While you may not be the one targeted by this kind of action, this situation is very real, thanks to a relatively recent development in machine learning and artificial intelligence. Known as “deepfakes,” these videos have made it crucial to examine media from a place of skepticism.

0 Comments
Continue reading

Who Should Regulate Wearables?

Who Should Regulate Wearables?

Wearable technology, or “wearables”, have been around for decades, technically first becoming popular with Pulsar’s Calculator Wristwatch in the 1970s. Since then, our wearables have become much more capable, accumulating detailed profiles on us as we use them. This begs the question… who is in charge of regulating them?

0 Comments
Continue reading

Getting a Better Understanding of Human Resources

Getting a Better Understanding of Human Resources

The Human Resources department is now a critical part of any workplace’s success, but there are most likely misconceptions about this department’s mission. Where did the idea of Human Resources come from, and how can technology be leveraged to assist in their duties?

0 Comments
Continue reading

5 Hilarious Computing Tips From Mr. Wolfdog [VIDEO]

b2ap3_thumbnail_oh_your_wolfdog_400.jpgHappy April Fool’s Day! It’s a time to celebrate pranks, practical jokes, and laughter. Therefore, we thought we’d mix it up a bit and seek out technology advice from the funniest and the furriest CEO we know, Old Spice’s wolf-dog hybrid, Mr. Wolfdog!

0 Comments
Continue reading

What Would it Take to Disable the World’s Technology Infrastructure?

b2ap3_thumbnail_threat_of_cyberwar_400.jpgFor argument’s sake, do you think society today relies too much on technology? In the Information Age, both businesses and governments have to be more careful than ever about how they approach cybersecurity. However, what would happen if a massive cyber war were to render any and all computing systems in the United States inert? Granted, such a powerful, in-depth attack is unlikely, but it’s sometimes fun (and frightening) to examine the worst-case scenario.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Business Computing Malware Software Hosted Solutions Computer Network Security Productivity Google Internet Communication Tech Term Data Small Business Efficiency IT Services Ransomware Backup Mobile Devices Workplace Tips Hardware Smartphone Cloud Computing Windows 10 Data Recovery Microsoft Office IT Support Android Saving Money Productivity Office 365 Upgrade Gmail Windows Data Management Facebook Browser Information Business Continuity Users Social Media Managed IT Services Innovation Data Backup Server Phishing Managed IT Services Internet of Things Word Mobile Device App Passwords Miscellaneous Outsourced IT Disaster Recovery Smartphones Windows 10 Vulnerability Cybersecurity Encryption Network Chrome Remote Monitoring Artificial Intelligence communications Business Management Managed Service Provider VoIP Employer-Employee Relationship Tip of the week Office Tips Save Money Managed Service Virtual Reality Hacker Apple Gadgets Analytics Content Filtering Spam IT Support Big Data Applications Infrastructure Website Government Money Apps BYOD Firewall Tablet Customer Service Augmented Reality WiFi Antivirus Employee-Employer Relationship Avoiding Downtime The Internet of Things Settings VPN Access Control Two-factor Authentication Data storage Paperless Office Router Virtualization Display Development Bandwidth YouTube Unified Threat Management Education IT Management Robot Risk Management Wireless Printing Automation Maintenance Bring Your Own Device Business Intelligence Wi-Fi Computing Scam Google Drive Laptop Password Document Management Solid State Drive Mouse Vendor Management Networking Company Culture Presentation LiFi Safety Computers Office Hard Disk Drive Data Security Storage HIPAA Downtime Wireless Technology Recovery Retail Data loss Business Technology Hosted Solution SaaS Virtual Private Network OneNote Outlook Server Management Touchscreen Monitors Holiday Search Mobile Security IBM Telephone Systems Chromebook Mobile Device Management Administration Operating System Collaboration Customer Relationship Management Quick Tips End of Support Hacking sip Staff Shortcuts Bluetooth Buisness Dark Web How To Nanotechnology Competition Private Cloud Spying Solid State Drives Language USB Optimization Streaming Lithium-ion battery Cyber Monday Social Networking Tech Support Analysis Employee-Employer Relationships Corporate Profile IT solutions File Sharing Troubleshooting VoIP Bitcoin Google Calendar Network Congestion Chatbots FinTech Computer Care iOS Blockchain Cost Management How To Business Analysis Best Practice Printer telephony Wearable Technology Samsung Security Cameras 5G Information Technology Net Neutrality Screen Reader National Security Google Docs Computing Infrastructure Dongle Recycling Human Error IT service Heating/Cooling Halloween Smart Technology Writing Motherboard Undo Websites Identity Theft Students WannaCry Cortana Time Management Windows 8 Legislation Identity Marketing MSP Training Scalability Fun Permissions Assessment Firefox Business Growth Application Managing Stress G Suite Managed Services Cabling Google Wallet FCC Smart Tech Automobile PowerPoint Updates Alerts Service Level Agreement eWaste Device BDR Servers Scary Stories Current Events Distributed Denial of Service Mixed Reality LED IP Address Network Management Cybercrime Comparison Migration Legal Fraud Internet Exlporer Onboarding Techology Alt Codes SharePoint Dark Data Cables Laptops Managed IT Drones Title II Connectivity Licensing Remote Computing Continuity Mobility Google Maps Sports Going Green Managed IT Service Social Engineering Modem Slack Data Breach Digital Knowledge Lenovo Update Smart Office Co-Managed IT Mobile Office Social Specifications Compliance Hard Drives Charging Mail Merge Value Digital Signage GDPR Unified Threat Management Typing Downloads IT Technicians Wires Software as a Service Disaster Shortcut Online IoT Deep Learning Humor Cooperation Solar Print Toner Statistics Break Fix Cookies Monitoring Digital Payment Hard Disk Drives Spyware Experience Superfish Unified Communications Hotspot Professional Services User Work Content Running Cable Hacks Black Friday Regulations Refrigeration Politics Messaging Address Desktop Data Warehouse User Error Cryptocurrency Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Virtual Desktop Budget Microsoft Excel Star Wars Public Speaking Alert CCTV CrashOverride Emoji Webcam Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Mobile Computing Emergency Travel Printers Law Enforcement Physical Security Notifications Upgrades Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Machine Learning IT Budget GPS Windows 7 Computer Repair IT Consultant Unsupported Software Domains Processors Cameras Relocation Meetings Regulation Tracking Health Cleaning Mobile Data