Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Search Bar Is Now More Secure

Your Search Bar Is Now More Secure

August saw yet another Patch Tuesday designed to resolve security issues in Microsoft products. Out of the 48 vulnerabilities resolved, 15 affected Windows, while 25 were rated as critical, 21 as important, and 27 that allowed for remote code execution. This might sound a little overwhelming, so we’ll try to simplify it a bit--a lot of flaws were fixed, and the majority of them can be considered dangerous for your organization.

0 Comments
Continue reading

Tip of the Week: How to Encrypt Windows Files

Tip of the Week: How to Encrypt Windows Files

Looking for a way to protect sensitive files on your PC? For Windows users, one easy safeguard you can take is to encrypt the files and file folders containing your sensitive information.

0 Comments
Continue reading

Tip of the Week: Use Windows Start Menu to Search Your PC and the Web

Tip of the Week: Use Windows Start Menu to Search Your PC and the Web

It’s no secret that finding a particular program or file on your computer can be a pain, especially when you don’t have the time to hunt it down by clicking through folders. However, there is a much easier way to locate your desired data. All you need to do is use the search option found in the Start menu, which is the subject of this week’s tip.

0 Comments
Continue reading

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

0 Comments
Continue reading

Sorry, Windows XP Users: No More Google Chrome Updates for You

b2ap3_thumbnail_chrome_support_ending_400.jpgIt’s been quite some time since Microsoft cut the cord on Windows XP support, rendering it insecure and incredibly risky to run in a professional setting. This was quite a blow to both PC users and business professionals, but it’s about to get even worse for the antiquated operating system. Now, even Google is cutting support for their web browser, Google Chrome, for older operating systems from both Microsoft and Apple.

0 Comments
Continue reading

Tip of the Week: How to Uninstall Unwanted Apps and Programs in Windows 10

b2ap3_thumbnail_uninstall_programs_in_windows_400.jpgOne of the most basic functions that the average Windows user should understand is how to get rid of applications and programs that are unnecessary or potentially threatening. Previous versions of Windows made users jump through hoops to get rid of their unwanted apps and programs, but Windows 10 makes it much easier to do so. In fact, there are three easy ways to eliminate your unnecessary apps and programs.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Internet Network Security Google Productivity Microsoft Software Tech Term Hosted Solutions Mobile Devices Efficiency IT Services Small Business Ransomware Communication Backup Windows 10 Hardware Android Smartphone Data Saving Money Workplace Tips Productivity IT Support Browser Microsoft Office Data Management Managed IT Services Facebook Managed IT Services Server Business Continuity Upgrade Cloud Computing Internet of Things Gmail Data Recovery Windows Innovation Office 365 Phishing Disaster Recovery Data Backup Word App Passwords Outsourced IT Mobile Device Windows 10 Smartphones Managed Service Provider Employer-Employee Relationship VoIP Cybersecurity Artificial Intelligence Business Management Encryption Remote Monitoring Content Filtering Spam Website Big Data Users communications Miscellaneous Information Social Media Tip of the week Analytics Vulnerability IT Support Money Government Office Tips Network Applications Infrastructure BYOD Chrome Two-factor Authentication Employee-Employer Relationship IT Management Managed Service Bandwidth YouTube Save Money Maintenance Apple Virtual Reality Risk Management Tablet Data storage Paperless Office Wireless Display Antivirus Firewall Access Control Customer Service Robot WiFi Router Printing Avoiding Downtime Automation The Internet of Things Hacker Settings Wireless Technology Server Management Gadgets Downtime Computing Document Management Hosted Solution Touchscreen Google Drive Recovery Company Culture Password Virtualization Mobile Security Mouse Vendor Management Telephone Systems LiFi Education Quick Tips Computers Search IBM Storage Development Scam Retail Apps Administration SaaS Mobile Device Management Customer Relationship Management Hacking Networking Outlook Wi-Fi Unified Threat Management Laptop VPN Monitors Holiday Data Security HIPAA Augmented Reality Presentation Data loss Business Technology Operating System Business Intelligence Safety Virtual Private Network End of Support Office Licensing Troubleshooting Google Maps Bring Your Own Device sip Application Managed IT Service Modem FinTech Digital Lenovo How To Specifications Compliance Security Cameras Scary Stories Mail Merge Value Tech Support Unified Threat Management Downloads IT Technicians File Sharing Recycling Human Error IP Address Cybercrime Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Cooperation Statistics Best Practice telephony Break Fix Cookies Samsung MSP Spyware Superfish Information Technology Websites Identity Theft PowerPoint Knowledge Google Docs Black Friday Regulations Managing Stress Managed Services Sports Address Writing Hotspot Professional Services User Error Multi-Factor Security Mirgation eWaste Device Mobile Office Uninterrupted Power Supply Patch Management Windows 8 Hard Drives Microsoft Excel Star Wars Training Staff Automobile LED Bluetooth Business Growth Dark Web Nanotechnology G Suite Google Wallet USB Onboarding Experience Unified Communications Cyber Monday Social Networking Cables Laptops Corporate Profile Current Events Language VoIP Legal User Google Calendar Chatbots Continuity Mobility Running Cable Solid State Drive Refrigeration Blockchain Cost Management Slack Drones Printer Public Speaking Wearable Technology Smart Office Co-Managed IT Alt Codes Dark Data Net Neutrality Screen Reader Charging Virtual Desktop How To Competition Computing Infrastructure Dongle Digital Signage IT service Heating/Cooling Smart Technology Motherboard Remote Computing Wires Software as a Service Buisness WannaCry Going Green Social Engineering Monitoring IT solutions Time Management Legislation Identity Update Solar Print Toner Lithium-ion battery Hard Disk Drive Social Permissions Assessment Work Content Cabling Typing FCC Smart Tech Firefox Alerts Service Level Agreement Digital Payment Desktop BDR Servers Deep Learning Humor Distributed Denial of Service Voice over Internet Protocol 5G Spying Cortana Network Management Comparison Chromebook Shortcuts Halloween Hacks Undo Fraud Internet Exlporer Politics Techology Budget SharePoint Collaboration Optimization Streaming Managed IT Cryptocurrency Marketing Title II Connectivity Analysis Fun Private Cloud Alert CCTV Emoji Webcam Electronic Medical Records Work/Life Balance Error Printers Black Market Point of Sale Mobile Computing Physical Security Travel Law Enforcement Upgrades Domains Notifications CrashOverride Botnet Supercomputer Twitter Motion Sickness Gadget Staffing 3D Printing Personal Information Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server Emergency GPS Unsupported Software Computer Repair IT Consultant Regulation Relocation Processors Cameras Entertainment Meetings Tracking Mobile Data Health Cleaning