Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unpatched Windows is Like Leaving Your Car Door Open in a Sketchy Parking Garage at Night with Wads of Cash in the Driver’s Seat

Unpatched Windows is Like Leaving Your Car Door Open in a Sketchy Parking Garage at Night with Wads of Cash in the Driver’s Seat

I recently read a statement from the National Security Agency (NSA) expressing concerns over the risks and vulnerabilities that come with running unpatched versions of older Windows operating systems. First, you know it’s serious if the NSA, an entity in the US who depends on the collection and processing of information, is worried that your personal information is at risk. Second, it’s another in a long line of reasons to not allow your network to fall into such disarray that you can no longer protect it.

0 Comments
Continue reading

Your Search Bar Is Now More Secure

Your Search Bar Is Now More Secure

August saw yet another Patch Tuesday designed to resolve security issues in Microsoft products. Out of the 48 vulnerabilities resolved, 15 affected Windows, while 25 were rated as critical, 21 as important, and 27 that allowed for remote code execution. This might sound a little overwhelming, so we’ll try to simplify it a bit--a lot of flaws were fixed, and the majority of them can be considered dangerous for your organization.

0 Comments
Continue reading

Tip of the Week: How to Encrypt Windows Files

Tip of the Week: How to Encrypt Windows Files

Looking for a way to protect sensitive files on your PC? For Windows users, one easy safeguard you can take is to encrypt the files and file folders containing your sensitive information.

0 Comments
Continue reading

Tip of the Week: Use Windows Start Menu to Search Your PC and the Web

Tip of the Week: Use Windows Start Menu to Search Your PC and the Web

It’s no secret that finding a particular program or file on your computer can be a pain, especially when you don’t have the time to hunt it down by clicking through folders. However, there is a much easier way to locate your desired data. All you need to do is use the search option found in the Start menu, which is the subject of this week’s tip.

0 Comments
Continue reading

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

0 Comments
Continue reading

Sorry, Windows XP Users: No More Google Chrome Updates for You

b2ap3_thumbnail_chrome_support_ending_400.jpgIt’s been quite some time since Microsoft cut the cord on Windows XP support, rendering it insecure and incredibly risky to run in a professional setting. This was quite a blow to both PC users and business professionals, but it’s about to get even worse for the antiquated operating system. Now, even Google is cutting support for their web browser, Google Chrome, for older operating systems from both Microsoft and Apple.

0 Comments
Continue reading

Tip of the Week: How to Uninstall Unwanted Apps and Programs in Windows 10

b2ap3_thumbnail_uninstall_programs_in_windows_400.jpgOne of the most basic functions that the average Windows user should understand is how to get rid of applications and programs that are unnecessary or potentially threatening. Previous versions of Windows made users jump through hoops to get rid of their unwanted apps and programs, but Windows 10 makes it much easier to do so. In fact, there are three easy ways to eliminate your unnecessary apps and programs.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Malware Business Computing Computer Network Security Microsoft Google Productivity Software Hosted Solutions Internet Tech Term Data Small Business Ransomware Backup Mobile Devices Efficiency Communication IT Services Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Microsoft Office Saving Money Android Data Recovery IT Support Productivity Facebook Browser Business Continuity Upgrade Social Media Managed IT Services Gmail Windows Data Management Data Backup Server Office 365 Users Information Phishing Internet of Things Word Managed IT Services Innovation Mobile Device Smartphones Disaster Recovery Outsourced IT Passwords App Windows 10 Vulnerability Cybersecurity Miscellaneous communications Artificial Intelligence Business Management Managed Service Provider Remote Monitoring Employer-Employee Relationship VoIP Encryption Network Chrome Gadgets Managed Service Content Filtering Tip of the week Analytics IT Support Spam Website Big Data Government Money Applications Apps BYOD Infrastructure Save Money Office Tips Apple Virtual Reality Hacker Two-factor Authentication Employee-Employer Relationship Virtualization Tablet Data storage Paperless Office Display Bandwidth YouTube Antivirus Access Control Router VPN Development Education Unified Threat Management Risk Management Robot Wireless Printing Automation Firewall Augmented Reality IT Management Customer Service WiFi Maintenance Avoiding Downtime The Internet of Things Settings Company Culture Downtime Scam Wireless Technology Storage Retail Hosted Solution Recovery SaaS Solid State Drive Networking HIPAA Outlook Hard Disk Drive Monitors Holiday Search Data Security IBM Data loss Business Technology Virtual Private Network Administration Operating System Mobile Security Chromebook Mobile Device Management Hacking Customer Relationship Management End of Support Wi-Fi Computing Server Management Bring Your Own Device Password Document Management Touchscreen Google Drive Laptop Mouse Vendor Management Business Intelligence Presentation Telephone Systems LiFi Safety Computers Office Quick Tips G Suite Security Cameras Google Wallet Net Neutrality Screen Reader Automobile National Security Bluetooth Business Growth Printer Wearable Technology Application Scary Stories Corporate Profile Current Events Smart Technology Motherboard Students Computing Infrastructure Dongle Recycling Human Error Legislation Identity MSP Scalability VoIP Legal Permissions Assessment IP Address Cybercrime Managing Stress Managed Services How To Drones FCC Smart Tech PowerPoint Updates Alt Codes Dark Data Sports WannaCry Going Green Distributed Denial of Service Social Engineering Mixed Reality Knowledge IT service Heating/Cooling Alerts Service Level Agreement Remote Computing eWaste Device Social Comparison Hard Drives Migration Time Management Fraud Internet Exlporer Update LED Mobile Office Cables Laptops Firefox Title II Connectivity Onboarding Cabling Typing SharePoint Mobility Managed IT Service Modem Slack Digital Payment Data Breach Experience Unified Communications BDR Servers Deep Learning Humor Licensing Continuity Hacks Specifications Compliance Refrigeration Politics Charging Network Management Value User Smart Office Co-Managed IT Running Cable Wires Software as a Service Virtual Desktop Techology Budget Online IoT Public Speaking Collaboration Digital Signage Managed IT Cryptocurrency Downloads IT Technicians Solar Print Toner Buisness Digital Lenovo Break Fix How To Cookies Competition Private Cloud Monitoring Hard Disk Drives Google Maps sip Cooperation Mail Merge Black Friday Regulations Tech Support Messaging IT solutions Hotspot Professional Services Work Content Lithium-ion battery Mirgation Voice over Internet Protocol Computer Care Entertainment Unified Threat Management Microsoft Excel Star Wars File Sharing Desktop Disaster Shortcut Bitcoin Multi-Factor Security Network Congestion Samsung Shortcuts 5G Spyware Superfish Information Technology Dark Web Nanotechnology Spying Solid State Drives Statistics Best Practice telephony Staff Address Cyber Monday Writing Social Networking Undo Websites Analysis Identity Theft Employee-Employer Relationships Cortana Google Docs Language USB Optimization Streaming Halloween Windows 8 Google Calendar Chatbots Marketing FinTech Training iOS Fun User Error Blockchain Cost Management Troubleshooting Uninterrupted Power Supply Patch Management Notifications CrashOverride Upgrades Botnet Supercomputer Twitter Gadget Staffing Motion Sickness Printers Crowdsourcing Taxes 3D Printing Personal Information Administrator Emergency Machine Learning IT Budget Web Server GPS IT Consultant Unsupported Software Domains Computer Repair Relocation Processors Cameras Tracking Windows 7 Meetings Cleaning Mobile Data Health Alert CCTV Regulation Emoji Webcam Work/Life Balance Electronic Medical Records Error Mobile Computing Black Market Point of Sale Law Enforcement Physical Security Travel