Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Utilizing Laptops Is a Solid Strategy

Tip of the Week: Utilizing Laptops Is a Solid Strategy

Nowadays, it’s odder not to utilize technology in the office environment. This, if anything, only makes it more important for you to embrace the proper technology that matches your office’s approach to the responsibilities and tasks of every day. For this week’s tip, we’ll look at a few reasons why you may want to make laptops the office’s standardized device.

0 Comments
Continue reading

The Top 5 Smartphones On the Market Heading Into 2019

The Top 5 Smartphones On the Market Heading Into 2019

The smartphone market is kind of a paradox. Here you have quite a few major manufacturers producing phones in a market that has seen a seven percent decline over the past year and a decline for each of the past four fiscal quarters. It’s true that some of the companies that we’ve all been used to: HTC, Nokia, and Blackberry are bit players in a market that is dominated largely by Samsung, Apple, and companies that sell their products to developing mobile markets.

0 Comments
Continue reading

Considering the Future of Wireless Charging

Considering the Future of Wireless Charging

There is a lot of demand for perfected wireless charging. If this could happen, it’s possible to think about a world where no devices ever ran out of juice. Though there is a major push to make this happen, it’s clear that there are some people out there who don’t think that wireless charging will have as drastic an effect as it would seem.

0 Comments
Continue reading

Tip of the Week: How to Cut Back on Your Mobile Data Use

Tip of the Week: How to Cut Back on Your Mobile Data Use

One of the biggest benefits of mobile data is how useful it is to business users for networking and productivity while they’re on-the-go. However, one of the biggest drawbacks to mobile data is how easy it is to use up while networking and being productive, and how expensive this can be. Fortunately, there are some ways to reduce the amount of data an Android device uses, as we’ll discuss in this tip.

0 Comments
Continue reading

A QR Code Could Be your New Wi-Fi Password

A QR Code Could Be your New Wi-Fi Password

There is no understating the importance of strong, reliable passwords to your organization’s network security, especially to protect its wireless connection. However, this can create some friction with your staff when they try to connect to Wi-Fi using their mobile device. To make accessing the Internet easier, scannable QR codes can be used to connect to the Internet.

0 Comments
Continue reading

BYOD is Only Helpful If the Devices Are Secure

BYOD is Only Helpful If the Devices Are Secure

Mobile devices are so common nowadays that you’ll likely encounter your employees bringing multiple devices to the office on a regular basis. Little do they know that everything they bring with them, from their Fitbit to their laptop, poses a security threat. Of course, the threat level from each individual device will depend on what it is exactly, but the point stands that the less you do about mobile device security now, the more danger your organization will be in down the road.

0 Comments
Continue reading

HIPAA and Wearables May Clash in the Near Future

HIPAA and Wearables May Clash in the Near Future

Today, perhaps now more than ever before, technology is making strides toward making its users consider ways to stay healthier. Wearables are one of the primary examples of how technology is aiming to make users both more active and more interested about their own health. At 2018’s Consumer Electronics Show in Las Vegas, Nevada, this technology was front and center, showcasing how far it has come in just a year’s time.

0 Comments
Continue reading

Tip of the Week: Putting Your Old Android Device to Good Use

Tip of the Week: Putting Your Old Android Device to Good Use

Considering how often smartphones are replaced, you’re bound to have a couple of them stashed away for a rainy day. These devices are particularly helpful in the event that your smartphone breaks unexpectedly, but there are other purposes that you might want to keep in mind. Here are three ways you might be able to use your old mobile devices around the office.

0 Comments
Continue reading

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

0 Comments
Continue reading

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

0 Comments
Continue reading

Should We Be Scared, Skeptical, or Hopeful about the Near Future of Technology?

b2ap3_thumbnail_internet_of_things_ubiquity_400.jpgThe introduction of new and exciting technologies keeps changing the ways people interact. Innovations such as email, instant messaging, and the development of mobile devices are now turning out to be just fundamental steps to a more connected planet. The Internet of Things is set to turn human civilization on its head. What does this shift mean for the immediate future?

0 Comments
Continue reading

AR Technology May Be an Adequate Substitute to “Fancy Book Learnin’” [VIDEO]

b2ap3_thumbnail_ar_applications_400.jpgHow smart are smartphones really making us? If we’re honest with ourselves, most of us would admit that our mobile phones are more for entertainment and efficient communications, and less about actually being used to make ourselves smarter. Thanks to augmented reality technology becoming more accessible, perhaps smartphones will one day live up to their name.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business User Tips Malware Business Computing Network Security Microsoft Computer Google Software Hosted Solutions Productivity Internet Tech Term Data Small Business Ransomware Mobile Devices Efficiency Communication IT Services Backup Workplace Tips Hardware Windows 10 Smartphone Data Recovery Android IT Support Microsoft Office Cloud Computing Saving Money Productivity Social Media Browser Business Continuity Gmail Data Management Managed IT Services Facebook Windows Upgrade Word Information Office 365 Internet of Things Managed IT Services Innovation Mobile Device Server Users Data Backup Phishing Passwords Disaster Recovery Smartphones Outsourced IT Windows 10 App Vulnerability Cybersecurity Employer-Employee Relationship Business Management Artificial Intelligence Miscellaneous communications Remote Monitoring Managed Service Provider VoIP Encryption Network Chrome Analytics Apps Content Filtering IT Support Big Data Applications Government Money Infrastructure BYOD Gadgets Spam Office Tips Virtual Reality Website Save Money Tip of the week Hacker Managed Service Apple Two-factor Authentication Data storage Access Control Antivirus Display Router Bandwidth Unified Threat Management VPN YouTube Development Firewall Education Robot Risk Management WiFi Wireless Printing Automation Avoiding Downtime The Internet of Things IT Management Virtualization Customer Service Maintenance Augmented Reality Employee-Employer Relationship Tablet Settings Paperless Office SaaS Storage Solid State Drive Downtime HIPAA Retail Networking Hosted Solution Hacking Hard Disk Drive Holiday Outlook Data Security Monitors Data loss Business Technology Search IBM Chromebook Virtual Private Network Mobile Security Presentation Operating System Server Management Mobile Device Management Administration Touchscreen Customer Relationship Management Office End of Support Document Management Bring Your Own Device Wi-Fi Wireless Technology Computing Google Drive Telephone Systems Laptop Business Intelligence Password Recovery Mouse Vendor Management Quick Tips LiFi Safety Company Culture Scam Computers Business Growth Legislation Identity MSP Scalability Google Wallet Permissions VoIP Assessment Scary Stories Managing Stress Managed Services Current Events FCC How To Smart Tech PowerPoint Updates IT service Alerts Heating/Cooling Service Level Agreement IP Address Cybercrime eWaste Refrigeration Device Remote Computing Distributed Denial of Service WannaCry User Mixed Reality Legal LED Update Alt Codes Dark Data Comparison Public Speaking Migration Drones Fraud Time Management Internet Exlporer SharePoint Cabling Sports Cables Competition Laptops Going Green Social Engineering Title II Firefox Connectivity Knowledge Onboarding BDR Licensing Servers Mobile Office Continuity Mobility Social Managed IT Service Modem Slack Data Breach Digital Payment Smart Office Co-Managed IT Typing Specifications Compliance Charging Politics Network Management Value Unified Communications Digital Signage Collaboration Deep Learning Humor Downloads IT Technicians Managed IT Wires Software as a Service Online IoT Techology Experience Google Maps Cooperation Running Cable Solar Undo Print Toner Hacks Break Fix Digital Cookies Lenovo Monitoring Hard Disk Drives Private Cloud Professional Services Marketing Work Content Cryptocurrency Black Friday Regulations Mail Merge Virtual Desktop Messaging Tech Support Budget Hotspot Application Desktop File Sharing sip Multi-Factor Security Disaster Mirgation Shortcut Buisness Voice over Internet Protocol Entertainment Computer Care How To Microsoft Excel Star Wars Unified Threat Management Staff Statistics Lithium-ion battery Shortcuts Samsung Dark Web Spyware Nanotechnology Superfish IT solutions Spying Solid State Drives Language USB Optimization Streaming Bitcoin Network Congestion Cyber Monday Social Networking Address Analysis Employee-Employer Relationships Websites Identity Theft Troubleshooting Best Practice telephony Google Calendar Uninterrupted Power Supply Chatbots Patch Management 5G FinTech iOS Training Information Technology Blockchain Cost Management User Error Automobile Google Docs Printer Wearable Technology Bluetooth Halloween Security Cameras G Suite Writing Net Neutrality Screen Reader Cortana National Security Computing Infrastructure Dongle Recycling Hard Drives Human Error Windows 8 Smart Technology Corporate Profile Motherboard Fun Students Printers Motion Sickness Domains Gadget Staffing Upgrades Personal Information Administrator Crowdsourcing Taxes Web Server Emergency Machine Learning IT Budget GPS 3D Printing Computer Repair IT Consultant Processors Cameras Relocation Meetings Windows 7 Tracking Unsupported Software Health Cleaning Alert CCTV Emoji Webcam Regulation Mobile Data Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Travel Law Enforcement Notifications Mobile Computing CrashOverride Twitter Botnet Supercomputer Physical Security