Data Encryption – What You Really Need To Know

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

In today’s digitally driven world, far too many personal and business devices are left unsecured. These devices don’t leverage strong passwords and fail to have the encryption needed to protect vital data.

Whether companies choose to store data in public, private, or hybrid clouds, they should always ensure that the data is encrypted before it leaves their devices or networks.

Additionally, when employees think that “this data isn’t important,” they are creating the weak links that hackers need to successfully infiltrate a device (or network) and subsequently steal unencrypted data, upload malware attacks, and otherwise wreak havoc on unsuspecting businesses.

[Continue reading]

Back At It Again: Microsoft Suspends Windows Updates

Windows 10 was released in July 2015 and there were plenty of reasons to be excited. If you have been around for the last few versions of Windows dating back to Vista, you may have a love/hate relationship with Microsoft. Windows Vista, for … [Continue reading]

Crypto Blackmail: How To Protect Yourself

A criminal contacts you over email or snail mail and insists they have a webcam video of you watching “unsavory” videos or evidence you cheated on your wife. To stop the release of this compromising information and to make the problem go away, the … [Continue reading]

Are Smartphones And Tablets Killing The Traditional PC?

In the early days of the Internet, there was only one device that enabled you to access it. That was the desktop computer. Laptop computers have existed for as long as desktops have, but due to hardware limitations, they never really became a … [Continue reading]

Colorado Company Taken Down By Ransomware And What That Means for Your Business

According to Statista, there were 184 million ransomware attacks in 2017 and the average ransomware demand is over $1,000. Individuals, organizations, and companies have fallen victim to these attacks. Most people recognize the fact that … [Continue reading]

Line Of Business Applications: Efficiency & Productivity

As someone who works with businesses of all types, I see a wide range of line of business applications in action on a regular basis. Whether it‘s tracking inventory, calculating loan payments, estimating material cost for a construction project, … [Continue reading]

Wi-Fi 6: The Next-Generation Wireless Standard

Wi-Fi 6 (also known as 802.11ax) is the next-generation wireless standard that is faster than the current king, 802.11ac. More than speed, it will provide better performance in congested areas, from stadiums to your own device-packed home. … [Continue reading]

What Type Of Workstation Is Right For Me?

The average American spends just over 1800 hours a year working. For anyone who works in an office environment, this means a lot of sitting down and typing. That type of sedentary work can lead to a number of health and comfort issues, not to … [Continue reading]

October Is National Cybersecurity Awareness Month

Online security is something that should get everyone’s attention. Threats exist all around us: ransomware, viruses, spyware, social engineering attacks and more. There’s so much you need to know to keep your personal and business information … [Continue reading]

Browser Battle: Why Chrome Continues To Take Over

Every day I see different browsers on different computers. There’s Chrome, Internet Explorer, Firefox, Vivaldi, Opera, and Apple’s Safari browser. Some people like to stick with what they know, and they use Internet Explorer or even Microsoft Edge on … [Continue reading]