Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Privacy Concerns Hang Over Social Media

Privacy Concerns Hang Over Social Media

Social media has brought about a massive shift in the way people interact. Today we share our opinions, photos, and videos; and, we can even choose our dates by swiping right or left. With social media, people share moments, opinions, and other information, but is all this sharing actually setting people, and the organizations they interact with, up for failure? We’ll take a look at social media privacy concerns and potentially hazardous practices that could exacerbate the problems further.

0 Comments
Continue reading

Social Media Can Be a Great Business Tool, So Long as It’s Secured

Social Media Can Be a Great Business Tool, So Long as It’s Secured

There is no denying that social media is one of the most powerful communication tools of our time, especially for businesses trying to communicate with their clients and customers. However, while you will want to have an account for your business on social media, you might not want a presence of your own. Today, we’ll discuss this quandary, and how you can resolve it.

0 Comments
Continue reading

Are You Making Yourself Vulnerable Over Social Media?

Are You Making Yourself Vulnerable Over Social Media?

Social media might make it easy to stay connected, but it comes with a lot of negative side-effects--particularly in regard to security for both personal and professional use. If social media isn’t used properly, it could spell trouble for your organization. How can you foster proper social media usage so that your organization doesn’t suffer from poor security practices? It all starts by spreading awareness.

0 Comments
Continue reading

The Cause of Social Media Addiction and How to Stop It

b2ap3_thumbnail_social_media_blocking_400.jpgSocial media addiction is a problem that plagues most modern businesses. Even though it’s a best practice to leverage social media to your business’s advantage, it’s a well-known fact that social media addiction can lead to wasted time and distractions in the office. In order to beat social media addiction in the office, it’s best to understand how it comes about, and what you can do to help your workers leave it alone, rather than locking everything down completely.

0 Comments
Continue reading

3 Modern Technologies Used By Every Political Campaign

b2ap3_thumbnail_campaign_it_400.jpgIn 19th century America, the hottest innovation for political campaigns was the exposed stump from a fallen tree, thus the stump speech. This technology revolutionized politics by allowing the candidate to elevate himself above the crowd for greater visibility and to better project one’s voice. Today, the political stump speech is obsolete, having its usefulness far surpassed by the technologies of the modern age.

0 Comments
Continue reading

Fans of Facebook Now Have a Facebook Business App

b2ap3_thumbnail_facebook_at_work_400.jpgFacebook has come a long way. Originally designed as a networking tool to be exclusively used by college students, Facebook now has 1.44 billion active users, making it the world’s largest social network. Today, businesses take Facebook seriously and utilize it for their marketing initiatives. However, it’s still viewed as a time-waster by many office managers who restrict or ban employees from accessing it.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Productivity Internet Google Hosted Solutions Network Security Software Tech Term Mobile Devices Efficiency Communication IT Services Hardware Data Small Business Backup Smartphone Ransomware Workplace Tips Windows 10 Android IT Support Productivity Microsoft Office Saving Money Cloud Computing Browser Data Management Business Continuity Data Recovery Managed IT Services Windows Gmail Data Backup Office 365 Facebook Server Internet of Things Users Upgrade Managed IT Services Word Innovation App Windows 10 Passwords Smartphones Disaster Recovery Phishing Social Media Outsourced IT Encryption Employer-Employee Relationship Network Mobile Device Chrome Vulnerability Cybersecurity communications Artificial Intelligence Business Management Managed Service Provider Remote Monitoring VoIP Save Money Office Tips Managed Service Apple Hacker Content Filtering Information Tip of the week Analytics IT Support Big Data Miscellaneous Government Money Spam Website Infrastructure BYOD Applications IT Management Customer Service Employee-Employer Relationship Maintenance Firewall Virtual Reality Settings Two-factor Authentication Paperless Office WiFi Tablet Data storage Avoiding Downtime Display Bandwidth Antivirus YouTube The Internet of Things Education Virtualization Robot Risk Management Access Control Router Wireless Printing Automation Augmented Reality Mouse Vendor Management Company Culture Hacking Telephone Systems Safety LiFi Computers Quick Tips Storage Downtime Scam Retail Hosted Solution Presentation Solid State Drive Development SaaS Office Networking Gadgets Wireless Technology Outlook Recovery Hard Disk Drive VPN Monitors Holiday Search Unified Threat Management Data Security HIPAA IBM Data loss Business Technology Mobile Device Management Virtual Private Network Administration Operating System Chromebook End of Support Customer Relationship Management Wi-Fi Business Intelligence Computing Server Management Laptop Password Mobile Security Document Management Apps Touchscreen Google Drive User Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care FinTech iOS Refrigeration Unified Threat Management Downloads IT Technicians File Sharing Troubleshooting telephony Break Fix Cookies Samsung 5G Security Cameras Spyware Superfish Information Technology Cooperation Public Speaking Statistics Best Practice Regulations Halloween Recycling Human Error Address Writing Hotspot Professional Services Websites Identity Theft Cortana Students Competition Google Docs Black Friday Uninterrupted Power Supply Patch Management Windows 8 Microsoft Excel Star Wars Training Fun MSP Scalability User Error Multi-Factor Security Mirgation Business Growth Dark Web Nanotechnology G Suite Managing Stress Managed Services Google Wallet Staff Automobile PowerPoint Bluetooth Cyber Monday Social Networking Scary Stories eWaste Device Corporate Profile Current Events Language USB IP Address Cybercrime LED Blockchain Cost Management Migration Undo VoIP Legal Google Calendar Chatbots Alt Codes Dark Data Net Neutrality Screen Reader Cables Laptops Marketing How To Drones Printer Wearable Technology Onboarding Smart Technology Motherboard Remote Computing Sports Continuity Mobility Application WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Slack IT service Heating/Cooling Mobile Office Smart Office Co-Managed IT Social Permissions Assessment Charging Time Management Legislation Identity Update Cabling Typing FCC Smart Tech Wires Software as a Service Firefox Digital Signage Distributed Denial of Service Solar Print Toner Alerts Service Level Agreement Digital Payment Experience Unified Communications Monitoring BDR Servers Deep Learning Humor Running Cable Work Content Hacks Fraud Internet Exlporer Politics Messaging Network Management Comparison Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Voice over Internet Protocol Entertainment Hard Drives Techology Budget SharePoint Collaboration Desktop Managed IT Service Modem Buisness Shortcuts Digital Lenovo How To Licensing Spying Google Maps Bring Your Own Device sip Lithium-ion battery Optimization Streaming Mail Merge Value Tech Support IT solutions Analysis Employee-Employer Relationships Specifications Compliance Work/Life Balance Electronic Medical Records Error Black Market Point of Sale Mobile Computing Printers Law Enforcement Physical Security Travel Notifications CrashOverride Upgrades Twitter Botnet Supercomputer Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS Windows 7 IT Consultant Unsupported Software Computer Repair Processors Cameras Relocation Meetings Tracking Regulation Cleaning Mobile Data Health Alert CCTV Private Cloud Domains Emoji Webcam