Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Making Yourself Vulnerable Over Social Media?

Are You Making Yourself Vulnerable Over Social Media?

Social media might make it easy to stay connected, but it comes with a lot of negative side-effects--particularly in regard to security for both personal and professional use. If social media isn’t used properly, it could spell trouble for your organization. How can you foster proper social media usage so that your organization doesn’t suffer from poor security practices? It all starts by spreading awareness.

0 Comments
Continue reading

The Cause of Social Media Addiction and How to Stop It

b2ap3_thumbnail_social_media_blocking_400.jpgSocial media addiction is a problem that plagues most modern businesses. Even though it’s a best practice to leverage social media to your business’s advantage, it’s a well-known fact that social media addiction can lead to wasted time and distractions in the office. In order to beat social media addiction in the office, it’s best to understand how it comes about, and what you can do to help your workers leave it alone, rather than locking everything down completely.

0 Comments
Continue reading

3 Modern Technologies Used By Every Political Campaign

b2ap3_thumbnail_campaign_it_400.jpgIn 19th century America, the hottest innovation for political campaigns was the exposed stump from a fallen tree, thus the stump speech. This technology revolutionized politics by allowing the candidate to elevate himself above the crowd for greater visibility and to better project one’s voice. Today, the political stump speech is obsolete, having its usefulness far surpassed by the technologies of the modern age.

0 Comments
Continue reading

Fans of Facebook Now Have a Facebook Business App

b2ap3_thumbnail_facebook_at_work_400.jpgFacebook has come a long way. Originally designed as a networking tool to be exclusively used by college students, Facebook now has 1.44 billion active users, making it the world’s largest social network. Today, businesses take Facebook seriously and utilize it for their marketing initiatives. However, it’s still viewed as a time-waster by many office managers who restrict or ban employees from accessing it.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Network Security Internet Google Tech Term Microsoft Productivity Software Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Ransomware Backup Windows 10 Hardware Android Smartphone Data Saving Money Workplace Tips IT Support Productivity Browser Microsoft Office Managed IT Services Data Management Facebook Cloud Computing Server Business Continuity Upgrade Data Recovery Internet of Things Managed IT Services Gmail Windows Data Backup Office 365 Phishing Disaster Recovery Word Innovation Passwords App Cybersecurity Users Artificial Intelligence Smartphones Business Management Managed Service Provider Remote Monitoring Employer-Employee Relationship VoIP Outsourced IT Encryption Mobile Device Windows 10 Content Filtering Tip of the week Analytics Vulnerability IT Support Spam Website Big Data Miscellaneous communications Social Media Government Money Information Infrastructure BYOD Applications Office Tips Network Chrome Two-factor Authentication Paperless Office Tablet Data storage Display Bandwidth Antivirus YouTube Employee-Employer Relationship Managed Service Robot Risk Management Access Control Router Wireless Printing Automation Firewall IT Management Customer Service WiFi Save Money Maintenance Avoiding Downtime Hacker Settings Apple The Internet of Things Virtual Reality Storage Gadgets Downtime Scam Wireless Technology Business Intelligence Retail Virtualization Hosted Solution Recovery SaaS Networking Company Culture Outlook Unified Threat Management VPN Monitors Holiday Search Education Data Security HIPAA IBM Data loss Business Technology Apps Mobile Device Management Development Virtual Private Network Administration Operating System End of Support Hacking Customer Relationship Management Wi-Fi Computing Server Management Laptop Password Mobile Security Document Management Touchscreen Google Drive Augmented Reality Mouse Vendor Management Presentation Telephone Systems Safety LiFi Computers Office Quick Tips Bluetooth Business Growth Application Dark Web Nanotechnology G Suite Spying Google Wallet Staff Automobile Shortcuts Cyber Monday Social Networking Scary Stories Analysis Corporate Profile Current Events Language USB Optimization Streaming IP Address Cybercrime FinTech Solid State Drive Blockchain Cost Management Troubleshooting VoIP Legal Google Calendar Chatbots Alt Codes Dark Data Net Neutrality Screen Reader How To Drones Printer Wearable Technology Security Cameras Smart Technology Motherboard Remote Computing Sports WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Human Error IT service Heating/Cooling Mobile Office MSP Hard Disk Drive Social Hard Drives Permissions Assessment Time Management Legislation Identity Update Managed Services Cabling Typing FCC Smart Tech PowerPoint Firefox Managing Stress Distributed Denial of Service Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device BDR Servers Deep Learning Humor Chromebook Running Cable Hacks Refrigeration Fraud Internet Exlporer Politics LED Network Management User Comparison Cables Laptops Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Onboarding Techology Budget Public Speaking SharePoint Collaboration sip Managed IT Service Modem Buisness Slack Digital Lenovo How To Competition Licensing Continuity Mobility Google Maps Bring Your Own Device Compliance Lithium-ion battery Charging Mail Merge Value Tech Support IT solutions Smart Office Co-Managed IT Specifications Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Digital Signage Unified Threat Management Downloads IT Technicians File Sharing Best Practice telephony Break Fix Cookies Samsung 5G Monitoring Spyware Superfish Information Technology Cooperation Solar Print Toner Statistics Black Friday Regulations Halloween Address Writing Undo Hotspot Professional Services Websites Identity Theft Cortana Work Content Google Docs Voice over Internet Protocol Uninterrupted Power Supply Patch Management Windows 8 Marketing Microsoft Excel Star Wars Training Fun Desktop User Error Multi-Factor Security Mirgation Notifications CrashOverride Upgrades Twitter Botnet Supercomputer Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS Printers IT Consultant Unsupported Software Domains Computer Repair Processors Cameras Relocation Meetings Tracking Cleaning Mobile Data Health Alert CCTV Private Cloud Emoji Webcam Work/Life Balance Electronic Medical Records Error Black Market Point of Sale Regulation Mobile Computing Entertainment Law Enforcement Physical Security Travel