Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Look at Digital Signage for Your Business

Why You Should Look at Digital Signage for Your Business

In this day and age, it seems that everything is being digitized - even your business’ signage. This is to your benefit, as digital signage offers many capabilities that a traditional sign just can’t. If you’re on the fence about adding a digital signage strategy to your business, we have a few reasons to consider it a viable solution.

0 Comments
Continue reading

Solid Network Security Requires Vigilance

Solid Network Security Requires Vigilance

When all is said and done, your business’ success relies in no small part on how secure you keep it, and in order to be secure, you need to know what threats are apt to target your business. Below are four of the biggest concerns that you need to be sure that your security implementations address.

0 Comments
Continue reading

Small Business Backup Practices that Protect Against Data Loss

Small Business Backup Practices that Protect Against Data Loss

Data backup and disaster recovery is one of the most important parts of running a business, even if they are only used frequently, if at all, to recover from a disaster. Still, it’s crucial that your organization has it, as without data backup and disaster recovery, you’re putting your organization at risk. If you haven’t thought about data backup, start thinking about it before it’s too late. We’ll help you get started with some best practices.

0 Comments
Continue reading

Why Break/Fix Gives Business Owners Nightmares

Why Break/Fix Gives Business Owners Nightmares

Like cars and industrial equipment, computers are complex machines. To function properly they will need to be maintained, and sometimes fixed. Components inevitably fail, users (very) often make mistakes, and sometimes other people deliberately break things out of a litany of emotions. If your computer has seen better days, and you’ve done all you can, seeing if you can get it repaired will involve unhooking it and bringing to your local computer guy.

0 Comments
Continue reading

Net Neutrality Still Needs Your Help!

Net Neutrality Still Needs Your Help!

December 14th is the last day that our government representatives can vote whether or not to continue the Internet’s protection under the net neutrality rules established in 2015. Without these rules in place, your data can be analyzed by your Internet service provider, and they are free to act on that knowledge and manipulate your Internet in support of their own interests.

0 Comments
Continue reading

Unpaid Invoices are a Major Problem For SMBs

Unpaid Invoices are a Major Problem For SMBs

While many different people open businesses, the primary reason that they all do so is to make money. A positive cash flow is essential if the business is to generate funds that support a cause or provide a decent living. However, to collect this cash flow, a business must have their invoices returned. As it happens, this doesn’t often occur in a timely manner.

0 Comments
Continue reading

House of Representatives Makes Moves to Support Small Business

House of Representatives Makes Moves to Support Small Business

Without competition, there would not be businesses. However, this competition needs to be fair in order for small businesses to embrace new opportunities that arise. A U.S. bill that allows for both of these goals has passed in the House of Representatives and will be voted on in the Senate.

0 Comments
Continue reading

What Effect Could Artificial Intelligence Have On Your Business?

What Effect Could Artificial Intelligence Have On Your Business?

Artificial intelligence is becoming more and more accessible to businesses of all sizes. In fact, it is swiftly becoming apparent that businesses that aren’t actively considering how to leverage AI in their processes are doing themselves a disservice.

0 Comments
Continue reading

Why We’re Cautiously Optimistic about Using Mobile Devices at Work

b2ap3_thumbnail_mobile_device_management_400.jpgAs expected, mobile technology is a consistent part of daily business operations for many companies around the world. Employees love taking advantage of the mobility these devices offer, making their home office just as useful as their in-house workstation. However, a mobile device management solution needs to be strictly adhered to in order to optimize security and guarantee that a stray smartphone doesn’t expose your data to unexpected eyes.

0 Comments
Continue reading

5 Tips for Saving Money on your IT

Saving a little on your technology can go a long ways, but cutting too many corners can lead to additional problems and expensive downtime. Here are a few ways you can cut costs without creating long term issues.

0 Comments
Continue reading

Disaster Recovery and Why it Matters to New York City Businesses

When you mention the term 'disaster recovery,' most people think about the big ground-shattering events like earthquakes, fires, floods, tropical storms, etc. While these natural events are certainly disasters and devastating in their own right, smaller things can constitute as a disaster for your business, and they aren't seasonal.

0 Comments
Continue reading

Let's Talk Tablets

Tablets are definitely becoming a staple in the consumer electronics world. For the longest time, the tablet PC was an expensive, clunky device that just didn't wow consumers. Some businesses had adopted tablets back in the day, but they were difficult to use, hard to support, and they simply didn't perform for the price tag. However, like many consumer electronics, Apple reinvigorated the tablet market with the original iPad, and now it would seem tablets are here to stay. The question is, are they right for businesses?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Internet Network Security Tech Term Microsoft Software Productivity Google Hosted Solutions Mobile Devices Efficiency IT Services Small Business Communication Windows 10 Hardware Ransomware Backup Android Smartphone Data Workplace Tips Productivity IT Support Saving Money Data Management Managed IT Services Microsoft Office Browser Cloud Computing Internet of Things Gmail Data Recovery Windows Facebook Server Managed IT Services Upgrade Business Continuity Word Disaster Recovery Data Backup Passwords App Innovation Phishing Office 365 Mobile Device Windows 10 Business Management Smartphones Employer-Employee Relationship Managed Service Provider VoIP Cybersecurity Artificial Intelligence Encryption Remote Monitoring Users Outsourced IT communications Social Media Miscellaneous Government Information Applications Tip of the week Vulnerability Analytics BYOD IT Support Office Tips Money Network Infrastructure Chrome Spam Content Filtering Website Big Data Access Control Maintenance Save Money Router Apple Risk Management Tablet Wireless Data storage Firewall Antivirus Display WiFi Avoiding Downtime Customer Service The Internet of Things Robot Virtual Reality Printing Hacker Settings Automation Paperless Office Two-factor Authentication Bandwidth IT Management Employee-Employer Relationship Managed Service YouTube HIPAA Unified Threat Management Holiday Search Education LiFi Quick Tips Apps IBM Scam Computers Storage Hacking Development Administration Mobile Device Management Retail Customer Relationship Management Networking Mobile Security Wi-Fi Document Management VPN Outlook Laptop Presentation Augmented Reality Data Security Monitors Data loss Business Technology Office Virtual Private Network Gadgets Safety Wireless Technology Operating System Recovery Business Intelligence Virtualization End of Support Server Management Downtime SaaS Hosted Solution Touchscreen Computing Google Drive Company Culture Password Mouse Vendor Management Telephone Systems Update Knowledge Address Best Practice telephony MSP FCC Smart Tech Sports Information Technology Uninterrupted Power Supply Patch Management Google Docs Managing Stress Managed Services Distributed Denial of Service Mobile Office User Error Writing PowerPoint Alerts Service Level Agreement Digital Payment User eWaste Device Comparison Windows 8 Refrigeration Fraud Internet Exlporer Bluetooth SharePoint Corporate Profile Chromebook Experience Unified Communications Business Growth Title II Connectivity Politics Google Wallet Public Speaking LED Solid State Drive Collaboration Cables Laptops Managed IT Service Modem VoIP Running Cable Current Events Competition Onboarding Licensing Virtual Desktop Legal Continuity Mobility Specifications Compliance How To Slack Value Co-Managed IT Downloads IT Technicians WannaCry Alt Codes Dark Data Charging Online IoT IT service Heating/Cooling Tech Support Buisness Drones Smart Office Cooperation Hard Disk Drive File Sharing IT solutions Wires Software as a Service Break Fix Cookies Lithium-ion battery Time Management Computer Care Going Green Social Engineering Digital Signage Cabling Solar Print Toner Black Friday Regulations Firefox Samsung Social Undo Monitoring Hotspot Professional Services Work Content Multi-Factor Security Mirgation Typing Marketing Microsoft Excel Star Wars BDR 5G Servers Websites Identity Theft Staff Cortana Deep Learning Humor Application Voice over Internet Protocol Dark Web Nanotechnology Network Management Halloween Training Desktop Fun Managed IT Automobile Shortcuts Cyber Monday Social Networking Techology G Suite Hacks Spying Language USB Optimization Streaming Google Calendar Chatbots Digital Lenovo Cryptocurrency Analysis Blockchain Cost Management Google Maps Budget Printer Wearable Technology Mail Merge Bring Your Own Device sip FinTech Net Neutrality Screen Reader Scary Stories How To Troubleshooting Disaster Shortcut Security Cameras Smart Technology Motherboard IP Address Cybercrime Unified Threat Management Computing Infrastructure Dongle Recycling Human Error Legislation Identity Spyware Remote Computing Superfish Bitcoin Network Congestion Hard Drives Permissions Assessment Statistics GPS Domains Printers Computer Repair IT Consultant Mobile Computing Physical Security CrashOverride Processors Cameras Relocation Meetings Tracking Upgrades Health Cleaning Private Cloud Alert CCTV Emoji Emergency Webcam 3D Printing Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Regulation Unsupported Software Travel Entertainment Law Enforcement Notifications Mobile Data Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Web Server Machine Learning IT Budget