Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Utilizing Laptops Is a Solid Strategy

Tip of the Week: Utilizing Laptops Is a Solid Strategy

Nowadays, it’s odder not to utilize technology in the office environment. This, if anything, only makes it more important for you to embrace the proper technology that matches your office’s approach to the responsibilities and tasks of every day. For this week’s tip, we’ll look at a few reasons why you may want to make laptops the office’s standardized device.

0 Comments
Continue reading

The Top 5 Smartphones On the Market Heading Into 2019

The Top 5 Smartphones On the Market Heading Into 2019

The smartphone market is kind of a paradox. Here you have quite a few major manufacturers producing phones in a market that has seen a seven percent decline over the past year and a decline for each of the past four fiscal quarters. It’s true that some of the companies that we’ve all been used to: HTC, Nokia, and Blackberry are bit players in a market that is dominated largely by Samsung, Apple, and companies that sell their products to developing mobile markets.

0 Comments
Continue reading

Considering the Future of Wireless Charging

Considering the Future of Wireless Charging

There is a lot of demand for perfected wireless charging. If this could happen, it’s possible to think about a world where no devices ever ran out of juice. Though there is a major push to make this happen, it’s clear that there are some people out there who don’t think that wireless charging will have as drastic an effect as it would seem.

0 Comments
Continue reading

Tip of the Week: How to Cut Back on Your Mobile Data Use

Tip of the Week: How to Cut Back on Your Mobile Data Use

One of the biggest benefits of mobile data is how useful it is to business users for networking and productivity while they’re on-the-go. However, one of the biggest drawbacks to mobile data is how easy it is to use up while networking and being productive, and how expensive this can be. Fortunately, there are some ways to reduce the amount of data an Android device uses, as we’ll discuss in this tip.

0 Comments
Continue reading

A QR Code Could Be your New Wi-Fi Password

A QR Code Could Be your New Wi-Fi Password

There is no understating the importance of strong, reliable passwords to your organization’s network security, especially to protect its wireless connection. However, this can create some friction with your staff when they try to connect to Wi-Fi using their mobile device. To make accessing the Internet easier, scannable QR codes can be used to connect to the Internet.

0 Comments
Continue reading

BYOD is Only Helpful If the Devices Are Secure

BYOD is Only Helpful If the Devices Are Secure

Mobile devices are so common nowadays that you’ll likely encounter your employees bringing multiple devices to the office on a regular basis. Little do they know that everything they bring with them, from their Fitbit to their laptop, poses a security threat. Of course, the threat level from each individual device will depend on what it is exactly, but the point stands that the less you do about mobile device security now, the more danger your organization will be in down the road.

0 Comments
Continue reading

HIPAA and Wearables May Clash in the Near Future

HIPAA and Wearables May Clash in the Near Future

Today, perhaps now more than ever before, technology is making strides toward making its users consider ways to stay healthier. Wearables are one of the primary examples of how technology is aiming to make users both more active and more interested about their own health. At 2018’s Consumer Electronics Show in Las Vegas, Nevada, this technology was front and center, showcasing how far it has come in just a year’s time.

0 Comments
Continue reading

Tip of the Week: Putting Your Old Android Device to Good Use

Tip of the Week: Putting Your Old Android Device to Good Use

Considering how often smartphones are replaced, you’re bound to have a couple of them stashed away for a rainy day. These devices are particularly helpful in the event that your smartphone breaks unexpectedly, but there are other purposes that you might want to keep in mind. Here are three ways you might be able to use your old mobile devices around the office.

0 Comments
Continue reading

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

0 Comments
Continue reading

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

Ask Yourself, Does My Smartphone Have Malware Preinstalled?

You might take extreme measures to keep your business’s devices from contracting the odd virus or malware, but what if all of your efforts are for nothing? You could have the greatest preventative solutions out there, but you can still get infected by some nasty threats, the reason being that the device was infected before you even started using it. You might be surprised by how often this happens, even to wary business owners.

0 Comments
Continue reading

Should We Be Scared, Skeptical, or Hopeful about the Near Future of Technology?

b2ap3_thumbnail_internet_of_things_ubiquity_400.jpgThe introduction of new and exciting technologies keeps changing the ways people interact. Innovations such as email, instant messaging, and the development of mobile devices are now turning out to be just fundamental steps to a more connected planet. The Internet of Things is set to turn human civilization on its head. What does this shift mean for the immediate future?

0 Comments
Continue reading

AR Technology May Be an Adequate Substitute to “Fancy Book Learnin’” [VIDEO]

b2ap3_thumbnail_ar_applications_400.jpgHow smart are smartphones really making us? If we’re honest with ourselves, most of us would admit that our mobile phones are more for entertainment and efficient communications, and less about actually being used to make ourselves smarter. Thanks to augmented reality technology becoming more accessible, perhaps smartphones will one day live up to their name.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers Malware User Tips Microsoft Computer Business Computing Internet Productivity Hosted Solutions Google Network Security Tech Term Software Mobile Devices Efficiency Communication IT Services Hardware Data Small Business Backup Workplace Tips Windows 10 Smartphone Ransomware IT Support Android Saving Money Productivity Microsoft Office Managed IT Services Data Management Cloud Computing Browser Business Continuity Data Recovery Internet of Things Word Managed IT Services Innovation Gmail Windows Data Backup Facebook Server Office 365 Users Upgrade Disaster Recovery Phishing Smartphones Social Media Outsourced IT App Passwords Windows 10 Managed Service Provider Remote Monitoring VoIP Employer-Employee Relationship Mobile Device Encryption Network Chrome Vulnerability Cybersecurity Artificial Intelligence communications Business Management Infrastructure BYOD Applications Save Money Office Tips Apple Hacker Analytics Tip of the week Content Filtering IT Support Managed Service Big Data Spam Website Miscellaneous Information Government Money Printing Risk Management Automation Wireless Access Control Router IT Management Firewall Customer Service Maintenance Virtual Reality WiFi Settings Avoiding Downtime Data storage Tablet Paperless Office The Internet of Things Two-factor Authentication Display Employee-Employer Relationship Virtualization Antivirus Bandwidth YouTube Robot Education Data loss Business Technology IBM Development Virtual Private Network Operating System Chromebook Administration Apps End of Support Mobile Device Management Customer Relationship Management Server Management Computing HIPAA Hacking Document Management Google Drive Touchscreen Password Wi-Fi Vendor Management Laptop Mouse Telephone Systems Augmented Reality LiFi Business Intelligence Quick Tips Presentation Mobile Security Computers Safety Scam Storage Office Retail Downtime Hosted Solution Company Culture SaaS Wireless Technology Solid State Drive Gadgets Networking Recovery Outlook Hard Disk Drive VPN Holiday Unified Threat Management Monitors Data Security Search Hard Drives Deep Learning Digital Payment Net Neutrality Humor Screen Reader Migration BDR Servers Printer Wearable Technology LED Politics Smart Technology Motherboard Experience Unified Communications Cables Laptops Network Management Hacks Computing Infrastructure Dongle Onboarding Continuity Mobility Techology Collaboration Cryptocurrency Permissions Assessment Running Cable Slack Managed IT Legislation Budget Identity Smart Office Co-Managed IT Digital Lenovo Refrigeration Bring Your Own Device FCC sip Smart Tech Charging Google Maps User How To Virtual Desktop Mail Merge Tech Support Distributed Denial of Service Wires Software as a Service Public Speaking Alerts Service Level Agreement Buisness Digital Signage IT solutions Solar Print Toner Unified Threat Management File Sharing Competition Bitcoin Fraud Network Congestion Internet Exlporer Lithium-ion battery Monitoring Disaster Shortcut Computer Care Comparison Work Content Spyware Superfish Best Practice Title II telephony Connectivity Messaging Statistics Samsung SharePoint Information Technology Address Websites Identity Theft Managed IT Service Google Docs Modem Voice over Internet Protocol Entertainment Licensing Writing 5G Desktop Compliance Cortana Shortcuts User Error Windows 8 Value Halloween Spying Uninterrupted Power Supply Patch Management Training Specifications Optimization Streaming Automobile Undo Business Growth Online IoT Analysis Employee-Employer Relationships Bluetooth G Suite Downloads Google Wallet IT Technicians Fun Corporate Profile Marketing Break Fix Cookies FinTech iOS Current Events Cooperation Troubleshooting Application Black Friday Legal Regulations Security Cameras VoIP Hotspot Professional Services Scary Stories Recycling Human Error How To Alt Codes Microsoft Excel Dark Data Star Wars IP Address Cybercrime Students Multi-Factor Security Drones Mirgation WannaCry Dark Web Nanotechnology MSP Scalability IT service Heating/Cooling Remote Computing Going Green Staff Social Engineering Cyber Monday Social Networking Knowledge Managing Stress Managed Services Time Management Update Social Language USB Sports PowerPoint eWaste Device Firefox Typing Blockchain Cost Management Mobile Office Cabling Google Calendar Chatbots Relocation Processors Cameras Tracking Meetings Domains Health Cleaning Mobile Data Private Cloud Windows 7 Alert CCTV Emoji Webcam Electronic Medical Records Work/Life Balance Error Regulation Black Market Point of Sale Mobile Computing Physical Security Travel Law Enforcement CrashOverride Notifications Upgrades Botnet Supercomputer Twitter Gadget Staffing Motion Sickness Personal Information Administrator Crowdsourcing Taxes 3D Printing Emergency Machine Learning IT Budget Web Server Printers GPS Computer Repair IT Consultant Unsupported Software