Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Deepfakes Make It Hard to Believe Your Eyes or Ears

Deepfakes Make It Hard to Believe Your Eyes or Ears

How would you feel if a video of you appeared online, saying things that you never actually said? While you may not be the one targeted by this kind of action, this situation is very real, thanks to a relatively recent development in machine learning and artificial intelligence. Known as “deepfakes,” these videos have made it crucial to examine media from a place of skepticism.

0 Comments
Continue reading

How Employment Levels are Balancing Out

How Employment Levels are Balancing Out

For many years, there have been occupations and careers that are largely occupied by either males or females. These discrepancies have been declining, thanks in part to the greater adoption of technology solutions in businesses. As a result, today’s workforce has shown a greater level of inclusivity than has been demonstrated in the past.

0 Comments
Continue reading

Clarifying a Few IT Stereotypes

Clarifying a Few IT Stereotypes

We’ve long accepted that, as an IT provider, there are a lot of stereotypes about what we can do and how we do it. Yet, just because we’ve accepted it, doesn’t mean we aren’t going to do anything about it. That’s why we wanted to use this blog post to clear up a few misconceptions about the nature of IT services.

0 Comments
Continue reading

Tip of the Week: How to Hide Yourself from Skype

Tip of the Week: How to Hide Yourself from Skype

In a recent update, Microsoft added Skype to the taskbars of many PCs. While many may believe that they don’t use Skype, they actually have an account because it is tied to their Microsoft account. If you don’t want people to be able to find you on the video chatting service, you’re going to want to follow the instructions we’ve outlined here.

0 Comments
Continue reading

Have You Adopted Messaging in Your Business Processes?

Have You Adopted Messaging in Your Business Processes?

It has become more evident than ever: any business that wants to be successful needs to have the proper means of communication established. For many years, this meant utilizing email for business correspondence. Now, while email still has a valuable place in business operations, users rely on messaging platforms that almost ensure that they get their point across instantly.

0 Comments
Continue reading

Tech Terminology: Mobile Device Management

Tech Terminology: Mobile Device Management

Smartphones and tablets are a double-edged sword for businesses: on one hand, they are a great money saver if an employee is willing to use their own for business purposes, but this does leave your business vulnerable in a few ways. Fortunately, if the benefits are something you’re interested in, these vulnerabilities are simple enough to shore up with something called mobile device management.

0 Comments
Continue reading

Getting a Better Understanding of Human Resources

Getting a Better Understanding of Human Resources

The Human Resources department is now a critical part of any workplace’s success, but there are most likely misconceptions about this department’s mission. Where did the idea of Human Resources come from, and how can technology be leveraged to assist in their duties?

0 Comments
Continue reading

It May Take a While For Windows 10 to Overtake Windows 7

b2ap3_thumbnail_windows_10_now_400.jpgThe hype is still strong for Windows 10, and it’s easy to see why. It’s a great operating system that has the potential to change the way your business performs its daily duties. However, the monthly desktop operating system usage statistics released by NetMarketShare hint that Windows 10 adoption is starting to slow down and that many users are simply opting to keep using Windows 7, Windows 8, and Windows 8.1. What gives?

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Microsoft Business Computing Malware Computer Network Security Software Hosted Solutions Google Productivity Internet Tech Term Communication Data Small Business Ransomware Backup Mobile Devices Efficiency IT Services Workplace Tips Hardware Windows 10 Cloud Computing Smartphone IT Support Microsoft Office Saving Money Android Data Recovery Upgrade Office 365 Productivity Facebook Information Browser Users Business Continuity Social Media Managed IT Services Gmail Windows Data Management Server Managed IT Services Phishing Mobile Device Word Internet of Things Data Backup Innovation Outsourced IT Miscellaneous Windows 10 Disaster Recovery Smartphones Passwords App Chrome Remote Monitoring communications Artificial Intelligence Business Management Managed Service Provider Employer-Employee Relationship VoIP Vulnerability Cybersecurity Encryption Network Apple Virtual Reality Hacker Gadgets Applications Content Filtering Spam Analytics Infrastructure Website IT Support Big Data Money Government Apps Tip of the week BYOD Managed Service Save Money Office Tips Router Settings Development Two-factor Authentication Virtualization Data storage Paperless Office Bandwidth Display YouTube IT Management Education Unified Threat Management Robot Maintenance Risk Management Wireless Printing Automation Tablet Firewall Antivirus Employee-Employer Relationship Customer Service WiFi Augmented Reality Avoiding Downtime VPN Access Control The Internet of Things Wireless Technology Computers Data loss Business Technology Recovery Storage Virtual Private Network Downtime Hosted Solution OneNote Retail Server Management SaaS Touchscreen Mobile Security Outlook Search Telephone Systems Monitors Holiday IBM Quick Tips Administration Business Intelligence Operating System Chromebook Mobile Device Management Hacking Scam Collaboration Customer Relationship Management End of Support Bring Your Own Device Solid State Drive Wi-Fi Computing Document Management Company Culture Google Drive Laptop Password Networking Mouse Vendor Management Presentation Hard Disk Drive HIPAA LiFi Safety Office Data Security eWaste Device BDR Servers Distributed Denial of Service Application Mixed Reality Windows 8 Training Alerts Service Level Agreement Fun Google Wallet Network Management Automobile Comparison Migration Business Growth G Suite Fraud Internet Exlporer LED SharePoint Cables Laptops Managed IT Title II Connectivity Scary Stories Onboarding Current Events Techology Continuity Mobility Legal Google Maps Managed IT Service Modem IP Address Cybercrime Slack Data Breach Digital Lenovo Licensing Co-Managed IT Drones Specifications Compliance Charging Alt Codes Dark Data Mail Merge Value Smart Office Downloads IT Technicians Knowledge Wires Software as a Service Disaster Shortcut Remote Computing Online IoT Sports Hard Drives Digital Signage GDPR Going Green Social Engineering Unified Threat Management Solar Print Toner Statistics Update Break Fix Cookies Mobile Office Monitoring Hard Disk Drives Social Spyware Superfish Cooperation Work Content Black Friday Regulations Messaging Typing Address Hotspot Professional Services Multi-Factor Security Digital Payment Mirgation Experience Unified Communications User Voice over Internet Protocol Entertainment Deep Learning Humor Uninterrupted Power Supply Patch Management Microsoft Excel Star Wars Refrigeration Desktop Data Warehouse User Error Business Analysis Staff Public Speaking Shortcuts Bluetooth Dark Web Nanotechnology Running Cable Spying Solid State Drives Hacks Politics Optimization Streaming Budget Cyber Monday Social Networking Analysis Employee-Employer Relationships Cryptocurrency Corporate Profile Language USB Virtual Desktop Competition Private Cloud Google Calendar Chatbots FinTech iOS sip Blockchain Cost Management Buisness Troubleshooting How To VoIP Tech Support Printer Wearable Technology IT solutions Security Cameras Net Neutrality Screen Reader Lithium-ion battery National Security How To Recycling Human Error IT service Heating/Cooling File Sharing Smart Technology Motherboard Students Bitcoin Network Congestion WannaCry Computer Care Computing Infrastructure Dongle Time Management Legislation Identity MSP Scalability Best Practice telephony Samsung Permissions Assessment 5G Undo Information Technology Websites Identity Theft Cortana Managing Stress Managed Services Google Docs Cabling FCC Smart Tech Halloween Marketing PowerPoint Updates Writing Firefox Physical Security Travel Law Enforcement Upgrades Notifications Botnet Supercomputer Twitter Motion Sickness Gadget Staffing 3D Printing Personal Information Administrator Windows 7 Crowdsourcing Taxes Machine Learning IT Budget Web Server Domains GPS Unsupported Software Computer Repair Regulation IT Consultant Relocation Processors Cameras Tracking Meetings CrashOverride Mobile Data Health Cleaning Alert CCTV Emoji Webcam Electronic Medical Records Emergency Work/Life Balance Error Printers Black Market Point of Sale Mobile Computing