Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Would One of These Social Media Scams Bamboozle You?

Would One of These Social Media Scams Bamboozle You?

Social media plays an increasing role in both the professional and personal sides of our lives. Unfortunately, this means that we all experience an increase in exposure to the many scam attempts that will appear on our screens. Like any kind of scam, the best defense against those that appear on social media is good, old-fashioned awareness and vigilance.

0 Comments
Continue reading

Tip of the Week: How to Keep Your Facebook Clean

Tip of the Week: How to Keep Your Facebook Clean

Facebook has become a highly effective networking tool in both our professional and personal lives. As I’m sure I don’t need to tell you, a business page on Facebook can bring a lot of attention to your company. Unfortunately, if someone were to use the wrong kind of language on your page, this attention likely wouldn’t be the kind you want your business to get. For this week’s tip, we’ll go over how you can get rid of this kind of content to protect your business’ reputation.

0 Comments
Continue reading

Privacy Concerns Hang Over Social Media

Privacy Concerns Hang Over Social Media

Social media has brought about a massive shift in the way people interact. Today we share our opinions, photos, and videos; and, we can even choose our dates by swiping right or left. With social media, people share moments, opinions, and other information, but is all this sharing actually setting people, and the organizations they interact with, up for failure? We’ll take a look at social media privacy concerns and potentially hazardous practices that could exacerbate the problems further.

0 Comments
Continue reading

Social Media Can Be a Great Business Tool, So Long as It’s Secured

Social Media Can Be a Great Business Tool, So Long as It’s Secured

There is no denying that social media is one of the most powerful communication tools of our time, especially for businesses trying to communicate with their clients and customers. However, while you will want to have an account for your business on social media, you might not want a presence of your own. Today, we’ll discuss this quandary, and how you can resolve it.

0 Comments
Continue reading

Are You Making Yourself Vulnerable Over Social Media?

Are You Making Yourself Vulnerable Over Social Media?

Social media might make it easy to stay connected, but it comes with a lot of negative side-effects--particularly in regard to security for both personal and professional use. If social media isn’t used properly, it could spell trouble for your organization. How can you foster proper social media usage so that your organization doesn’t suffer from poor security practices? It all starts by spreading awareness.

0 Comments
Continue reading

The Cause of Social Media Addiction and How to Stop It

b2ap3_thumbnail_social_media_blocking_400.jpgSocial media addiction is a problem that plagues most modern businesses. Even though it’s a best practice to leverage social media to your business’s advantage, it’s a well-known fact that social media addiction can lead to wasted time and distractions in the office. In order to beat social media addiction in the office, it’s best to understand how it comes about, and what you can do to help your workers leave it alone, rather than locking everything down completely.

0 Comments
Continue reading

3 Modern Technologies Used By Every Political Campaign

b2ap3_thumbnail_campaign_it_400.jpgIn 19th century America, the hottest innovation for political campaigns was the exposed stump from a fallen tree, thus the stump speech. This technology revolutionized politics by allowing the candidate to elevate himself above the crowd for greater visibility and to better project one’s voice. Today, the political stump speech is obsolete, having its usefulness far surpassed by the technologies of the modern age.

0 Comments
Continue reading

Fans of Facebook Now Have a Facebook Business App

b2ap3_thumbnail_facebook_at_work_400.jpgFacebook has come a long way. Originally designed as a networking tool to be exclusively used by college students, Facebook now has 1.44 billion active users, making it the world’s largest social network. Today, businesses take Facebook seriously and utilize it for their marketing initiatives. However, it’s still viewed as a time-waster by many office managers who restrict or ban employees from accessing it.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Microsoft Business Computing Malware Hosted Solutions Computer Network Security Productivity Google Software Internet Tech Term Communication Data Small Business Backup Mobile Devices Efficiency IT Services Ransomware Workplace Tips Hardware Cloud Computing Windows 10 Smartphone Android Microsoft Office Saving Money Data Recovery IT Support Upgrade Productivity Office 365 Facebook Users Social Media Managed IT Services Windows Information Gmail Browser Data Management Business Continuity Data Backup Server Internet of Things Phishing Word Managed IT Services Innovation Mobile Device Miscellaneous Disaster Recovery Smartphones App Outsourced IT Passwords Windows 10 communications Vulnerability Managed Service Provider Cybersecurity Artificial Intelligence VoIP Encryption Network Remote Monitoring Employer-Employee Relationship Chrome Business Management Apple Gadgets Analytics Tip of the week IT Support Spam Website Virtual Reality Managed Service Money Applications Apps Office Tips Infrastructure Hacker Government Content Filtering Save Money BYOD Big Data The Internet of Things Education Data storage Virtualization Tablet Risk Management Display Wireless Antivirus Access Control Router Employee-Employer Relationship VPN Robot Paperless Office Customer Service Printing Augmented Reality Automation Development Firewall Settings Unified Threat Management Two-factor Authentication IT Management Bandwidth WiFi Avoiding Downtime YouTube Maintenance Office Quick Tips Computers Search Scam Document Management Storage Wireless Technology IBM Retail Recovery Business Intelligence Solid State Drive Administration Networking Mobile Device Management HIPAA Outlook Customer Relationship Management Company Culture Monitors Wi-Fi Hard Disk Drive Data Security Laptop Data loss Business Technology SaaS Mobile Security Virtual Private Network Operating System Hacking End of Support Safety Holiday Bring Your Own Device OneNote Server Management Computing Google Drive Touchscreen Password Downtime Hosted Solution Mouse Vendor Management Presentation Telephone Systems Chromebook LiFi Collaboration Chatbots Marketing Messaging Knowledge User Error Private Cloud Windows 8 Blockchain Cost Management Work Content Sports Uninterrupted Power Supply Patch Management Google Calendar Voice over Internet Protocol Entertainment Tech Support Business Growth Net Neutrality Screen Reader Desktop Mobile Office Bluetooth Google Wallet Printer Wearable Technology Application Computer Care Smart Technology Motherboard Spying Solid State Drives File Sharing Current Events Computing Infrastructure Dongle Shortcuts Corporate Profile Legislation Identity Analysis Employee-Employer Relationships Experience Unified Communications VoIP Permissions Assessment Optimization Streaming Samsung Legal FinTech iOS How To Websites Alt Codes Identity Theft Dark Data FCC Smart Tech Troubleshooting Running Cable Drones WannaCry Training Distributed Denial of Service National Security IT service Heating/Cooling Going Green Social Engineering Alerts Service Level Agreement Security Cameras Virtual Desktop Comparison Hard Drives Students Time Management Automobile Social Fraud Internet Exlporer Recycling Human Error Buisness G Suite MSP Scalability IT solutions Firefox Typing Title II Connectivity Lithium-ion battery Cabling SharePoint Deep Learning Humor Managed IT Service Modem PowerPoint Updates BDR Servers Licensing Managing Stress Managed Services Specifications Compliance Refrigeration Mixed Reality Network Management Hacks Value User eWaste Device 5G Migration Cortana Techology Cryptocurrency Online IoT Public Speaking LED Halloween Managed IT Remote Computing Budget Downloads IT Technicians Fun Digital Lenovo sip Break Fix Cookies Competition Onboarding Google Maps Update How To Cooperation Cables Laptops Black Friday Regulations Slack Data Breach Hotspot Professional Services Continuity Mobility Mail Merge Charging Unified Threat Management Bitcoin Digital Payment Network Congestion Microsoft Excel Star Wars Smart Office Co-Managed IT Scary Stories Disaster Shortcut Multi-Factor Security Mirgation Software as a Service Spyware Superfish Politics Best Practice telephony Dark Web Nanotechnology Digital Signage GDPR IP Address Cybercrime Statistics Information Technology Staff Wires Google Docs Cyber Monday Social Networking Undo Monitoring Hard Disk Drives Writing Language USB Solar Print Toner Address Regulation Alert CCTV Physical Security CrashOverride Data Warehouse Emoji Webcam Upgrades Work/Life Balance Electronic Medical Records Error Black Market Point of Sale 3D Printing Emergency Law Enforcement Travel Business Analysis Notifications Botnet Supercomputer Domains Printers Twitter Unsupported Software Gadget Staffing Motion Sickness Personal Information Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server Mobile Data GPS Computer Repair IT Consultant Windows 7 Relocation Processors Cameras Tracking Meetings Cleaning Health Mobile Computing