Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Look at Digital Signage for Your Business

Why You Should Look at Digital Signage for Your Business

In this day and age, it seems that everything is being digitized - even your business’ signage. This is to your benefit, as digital signage offers many capabilities that a traditional sign just can’t. If you’re on the fence about adding a digital signage strategy to your business, we have a few reasons to consider it a viable solution.

0 Comments
Continue reading

Solid Network Security Requires Vigilance

Solid Network Security Requires Vigilance

When all is said and done, your business’ success relies in no small part on how secure you keep it, and in order to be secure, you need to know what threats are apt to target your business. Below are four of the biggest concerns that you need to be sure that your security implementations address.

0 Comments
Continue reading

Small Business Backup Practices that Protect Against Data Loss

Small Business Backup Practices that Protect Against Data Loss

Data backup and disaster recovery is one of the most important parts of running a business, even if they are only used frequently, if at all, to recover from a disaster. Still, it’s crucial that your organization has it, as without data backup and disaster recovery, you’re putting your organization at risk. If you haven’t thought about data backup, start thinking about it before it’s too late. We’ll help you get started with some best practices.

0 Comments
Continue reading

Why Break/Fix Gives Business Owners Nightmares

Why Break/Fix Gives Business Owners Nightmares

Like cars and industrial equipment, computers are complex machines. To function properly they will need to be maintained, and sometimes fixed. Components inevitably fail, users (very) often make mistakes, and sometimes other people deliberately break things out of a litany of emotions. If your computer has seen better days, and you’ve done all you can, seeing if you can get it repaired will involve unhooking it and bringing to your local computer guy.

0 Comments
Continue reading

Net Neutrality Still Needs Your Help!

Net Neutrality Still Needs Your Help!

December 14th is the last day that our government representatives can vote whether or not to continue the Internet’s protection under the net neutrality rules established in 2015. Without these rules in place, your data can be analyzed by your Internet service provider, and they are free to act on that knowledge and manipulate your Internet in support of their own interests.

0 Comments
Continue reading

Unpaid Invoices are a Major Problem For SMBs

Unpaid Invoices are a Major Problem For SMBs

While many different people open businesses, the primary reason that they all do so is to make money. A positive cash flow is essential if the business is to generate funds that support a cause or provide a decent living. However, to collect this cash flow, a business must have their invoices returned. As it happens, this doesn’t often occur in a timely manner.

0 Comments
Continue reading

House of Representatives Makes Moves to Support Small Business

House of Representatives Makes Moves to Support Small Business

Without competition, there would not be businesses. However, this competition needs to be fair in order for small businesses to embrace new opportunities that arise. A U.S. bill that allows for both of these goals has passed in the House of Representatives and will be voted on in the Senate.

0 Comments
Continue reading

What Effect Could Artificial Intelligence Have On Your Business?

What Effect Could Artificial Intelligence Have On Your Business?

Artificial intelligence is becoming more and more accessible to businesses of all sizes. In fact, it is swiftly becoming apparent that businesses that aren’t actively considering how to leverage AI in their processes are doing themselves a disservice.

0 Comments
Continue reading

Why We’re Cautiously Optimistic about Using Mobile Devices at Work

b2ap3_thumbnail_mobile_device_management_400.jpgAs expected, mobile technology is a consistent part of daily business operations for many companies around the world. Employees love taking advantage of the mobility these devices offer, making their home office just as useful as their in-house workstation. However, a mobile device management solution needs to be strictly adhered to in order to optimize security and guarantee that a stray smartphone doesn’t expose your data to unexpected eyes.

0 Comments
Continue reading

5 Tips for Saving Money on your IT

Saving a little on your technology can go a long ways, but cutting too many corners can lead to additional problems and expensive downtime. Here are a few ways you can cut costs without creating long term issues.

0 Comments
Continue reading

Disaster Recovery and Why it Matters to New York City Businesses

When you mention the term 'disaster recovery,' most people think about the big ground-shattering events like earthquakes, fires, floods, tropical storms, etc. While these natural events are certainly disasters and devastating in their own right, smaller things can constitute as a disaster for your business, and they aren't seasonal.

0 Comments
Continue reading

Let's Talk Tablets

Tablets are definitely becoming a staple in the consumer electronics world. For the longest time, the tablet PC was an expensive, clunky device that just didn't wow consumers. Some businesses had adopted tablets back in the day, but they were difficult to use, hard to support, and they simply didn't perform for the price tag. However, like many consumer electronics, Apple reinvigorated the tablet market with the original iPad, and now it would seem tablets are here to stay. The question is, are they right for businesses?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Computer Business Computing Microsoft Hosted Solutions Productivity Internet Network Security Google Tech Term Software Communication Mobile Devices Efficiency IT Services Backup Hardware Data Small Business Workplace Tips Windows 10 Ransomware Smartphone IT Support Android Microsoft Office Saving Money Productivity Cloud Computing Browser Business Continuity Managed IT Services Data Management Data Recovery Facebook Innovation Internet of Things Managed IT Services Server Users Upgrade Windows Word Data Backup Gmail Office 365 Disaster Recovery Smartphones Outsourced IT Windows 10 Phishing App Social Media Passwords Remote Monitoring Managed Service Provider Business Management VoIP Mobile Device Encryption Network Chrome Employer-Employee Relationship Artificial Intelligence Vulnerability Cybersecurity communications Infrastructure Government Spam Save Money Website BYOD Apple Applications Office Tips Analytics IT Support Tip of the week Hacker Content Filtering Money Managed Service Big Data Miscellaneous Information The Internet of Things Risk Management Wireless Virtualization Access Control IT Management Router Customer Service Maintenance Data storage Display Tablet Settings Two-factor Authentication Firewall Antivirus Virtual Reality Employee-Employer Relationship Bandwidth Robot YouTube Paperless Office Printing WiFi Automation Education Avoiding Downtime IBM Development Virtual Private Network Office Computing Wireless Technology Holiday Google Drive Gadgets Unified Threat Management Password Administration Mouse Vendor Management Server Management Recovery Mobile Device Management Touchscreen Customer Relationship Management HIPAA LiFi Wi-Fi Chromebook Telephone Systems Laptop Computers Storage Augmented Reality Quick Tips Document Management Retail Scam Apps Business Intelligence Safety Mobile Security Outlook Solid State Drive Hacking Downtime Networking Company Culture Hosted Solution Monitors Hard Disk Drive VPN Data Security Presentation Operating System SaaS Search End of Support Data loss Business Technology Google Calendar Chatbots Network Management Migration Bring Your Own Device sip Blockchain Cost Management Marketing Remote Computing LED How To Printer Wearable Technology Techology Cables Experience Laptops Unified Communications Net Neutrality Screen Reader Managed IT Application Update Onboarding Continuity Mobility Smart Technology Motherboard Google Maps Slack Running Cable Bitcoin Network Congestion Computing Infrastructure Dongle Digital Lenovo Legislation Identity Charging Best Practice Digital Payment telephony Permissions Assessment Mail Merge Smart Office Co-Managed IT Virtual Desktop Information Technology Unified Threat Management Wires Politics Software as a Service Google Docs FCC Smart Tech Disaster Shortcut Digital Signage Buisness Writing Superfish Solar Print Toner IT solutions Distributed Denial of Service Statistics Lithium-ion battery Monitoring Collaboration Windows 8 Alerts Service Level Agreement Spyware Comparison Messaging Business Growth Fraud Internet Exlporer Address Hard Drives Work Content Google Wallet SharePoint User Error Voice over Internet Protocol Tech Support Entertainment Title II Connectivity Uninterrupted Power Supply Patch Management 5G Desktop Current Events Cortana Shortcuts Computer Care Legal Managed IT Service Modem Bluetooth Spying Halloween File Sharing Licensing Drones Specifications Compliance User Analysis Employee-Employer Relationships Alt Codes Dark Data Value Corporate Profile Refrigeration Optimization Fun Samsung Streaming Downloads IT Technicians VoIP Public Speaking FinTech Websites iOS Identity Theft Online IoT Troubleshooting Going Green Social Engineering How To Competition Security Cameras Training Break Fix Cookies Scary Stories Social Cooperation G Suite Black Friday Regulations IT service Heating/Cooling IP Address Cybercrime Automobile Students Typing Hotspot Professional Services WannaCry Recycling Human Error Multi-Factor Security Mirgation Time Management MSP Scalability Deep Learning Humor Microsoft Excel Star Wars Staff Firefox Managing Stress Knowledge Managed Services Dark Web Nanotechnology Cabling PowerPoint Sports Hacks Device Budget Cyber Monday Social Networking BDR Servers Mobile Office Cryptocurrency Language USB Undo eWaste Machine Learning IT Budget Web Server GPS IT Consultant Computer Repair Relocation Windows 7 Processors Cameras Tracking Meetings Mobile Computing Cleaning Physical Security Health Regulation Private Cloud Alert CCTV Upgrades Domains Emoji Webcam CrashOverride Work/Life Balance Electronic Medical Records 3D Printing Error Black Market Point of Sale Law Enforcement Travel Unsupported Software Emergency Notifications Botnet Supercomputer Twitter Printers Gadget Staffing Motion Sickness Crowdsourcing Taxes Mobile Data Personal Information Administrator