• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

admin

Grow Your Business With Influencer Marketing

April 28, 2022

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Traditional influencer marketing means relying on celebrities and famous bloggers to generate traction about your brand. However, as time changes with the boom of social media, the number of influencers in the market is rising.

The influencer marketing technique involves affiliating with famous social media celebrities and bloggers for the purpose of promoting product or services to their followers.

While collaborating with influencers, identify their audience reach and engagement. This marketing tool’s main purpose is to drive sales and build your brand’s credibility.

Campaign surrounding KPIs
Influencer campaigns are exciting and attractive because of numerous ideas and sparks in the campaigns. [Read more…] about Grow Your Business With Influencer Marketing

How To Choose The Best POS System For Your Business

April 28, 2022

A good POS system will not only help you manage the transaction, it also enhances your cash flow system. With these two factors in play, you can easily grow your business.

By implementing an advanced POS system, you can provide numerous payment options to your customers. These options include online payments, card payments, and cash payments. Furthermore, it also simplifies your business. An effective all-in-one point-of-sale system will help you efficiently perform administrative tasks.

While selecting a point of sale system, you need to consider various factors, including your business type. For instance, if you have a restaurant, your business process will be different than a retail business. Therefore, you need to choose a system specific to your business needs.

How to Choose a POS System: Identify your needs
First, you need to understand your business requirements. Your goal is to find the best solutions to your problems. However, you cannot make a better decision without identifying and considering your problems. Therefore, you need to ask some questions. The answers to these questions will lead you to pick the right solution:

  • What type of product do you sell?
  • How do you accept the payments?
  • How many people do you have on your team?
  • What payment method do your customers prefer?
  • How will you interact with your audience?
  • What type of solution are you currently using?

Perform market research
After answering all the above questions, you can use a search engine to list down the best options according to your needs. However, with so many options, you might feel overwhelmed. Below, you will find some best tips that will lead you in the right direction:

  • Check the system that your competitors are using.
  • Communicate with the POS system provider and seek help from professionals
  • Visit tech websites

Check the features of service providers
After shortlisting your options and narrowing it to two to three POS systems, you can investigate the services they are offering. Here are some factors that you should consider while evaluating your options:

  • What features are they offering?
  • How will their system work for your business?
  • What is the price of the tool?

Download the trial version
Once you complete your research about the best POS system for your system, you should download and install the trial version. When you perform the actions on a trial version, you can understand if this tool will benefit your business or not and how well it fits your company.

Why Protecting Your Printers From Cybercrime Is A Must (And Eight Tips For Improving Printer Security)

April 28, 2022

Printing devices are often overlooked when it comes to security. But the reality is, cybercriminals can hack your printer to get confidential information. Your printer is probably the last piece of computer equipment you thought needed protection from cybercriminals. But the truth is very different.

Attackers actively try to locate the weakest links in security to gain access to and exploit valuable data. And among the weakest links is the printer.

Printers have access to your devices, network, and the Internet. This new open-access functionality makes them an ideal target for cyberattacks.

Unfortunately, many business owners overlook the importance of securing their printers and mainly focus on computers and mobile phones.

Most people still perceive printers as internal devices that serve basic functions. For this very reason, they are an easy target for cybercriminals.

Other than performing unauthorized print jobs, hackers can access confidential information as well as all connected computers and networks all through a printer.

You may also not be aware of the amount of valuable data your printer can store about you – tax files, bank details, financial records, employee information, personal information, etc. All a hacker needs to do is get into the operating system of your printer, and they can collect this sensitive data.

If you’ve just realized the importance of securing your printer, keep reading. This article shares eight tips to help you do just that.

Tip #1. Make Sure Your Printers Are Configured Correctly
Many things can make a printer vulnerable to cyber threats and security breaches. So, you want to get the basics right to ensure the attacks don’t happen to you. To start with, make sure to change the default password on your printer. Since anyone can access a printer remotely, a simple “123456” code won’t suffice.

Second, make sure you’re using your own router to print files remotely. Never connect to “Guest” networks.

Tip #2. Inspect Print Trays Regularly
This one is a no-brainer, but everyone could use it as a reminder. Make sure to check your print trays and get rid of unused pages carrying sensitive information. There’s no easier way to prevent data leaks than this.

Alternatively, you can get a shredder for your office and shred the papers you don’t want anyone to see.

Tip #3. Install Malware and Firmware Updates
Invest time and effort to ensure that your malware and firmware protection are up to date and can handle all types of hacks.

The good news is that many printers come with pre-built malware protection.

HP, for example, installs the HP “SureStart” software in their printers that monitors approaching targets when the printer is on. The software can shut down the device if an attack comes its way. This is a great way to prevent attacks from spreading further within the network.

Tip #4. Limit Access to the Network
Unprotected printers in a network are an extremely easy target for cybercriminals. Sure, businesses and offices require printers to access networks to perform remote prints. But if you can do the job by disabling the network access, make sure you do that.

If not, tweak the printer and network settings to only allow the device to take print jobs from the network you trust. This will help avoid outside interference and security breaches.

Tip #5. Update Your Printers
Updating a printer is equally as important as updating your phone to the latest software. Much in the way iOS developers look for bugs and fix them in a new update, printer manufacturers work toward known device vulnerabilities and update the software for added protection.

Look for printer updates so you can easily overcome known threats to the printer. Ideally, update your printers every quarter to get the most out of the security benefits.

Tip #6. Install a Firewall
If you run an office, chances are you already have a firewall. But in case you missed this requirement, now’s the time to do it.

Using a reliable firewall helps keep printers safe from cybercriminals. Your computers most likely come with pre-built firewalls, and all you need to do is keep them enabled. But there are also specialized firewalls for homes and offices that offer advanced security and make it virtually impossible for anyone to break in.

Tip #7. Encrypt Your Storage
Printers with shared networks can perform distance printing. And when a print job is in transit and travels from a computer to a printer, hackers can intercept the data and exploit it.

To keep this from happening, encrypt your print jobs. Also, make sure the sensitive data on your printer’s hard or internal drive is encrypted as well.

Keep in mind that when you print a document, that file is often stored as an image within the printer and makes it an easy target for hackers. It’s why you should use an encryption tool to protect your data. Luckily, many modern printers have this tool pre-built.

Tip #8. Educate Your Employees
If you work in an office, chances are you aren’t the only person using the printer. Everyone that has access to it needs to be aware of the responsibilities that come with its usage. Make sure to talk to your employees about ways to ensure both the physical and virtual safety of the printers.

Your staff should also be careful when using their mobile devices to print, as smartphones are easier to hack than standard computers. Explain to them what phishing scams are and how they can avoid being the victim.

Finally, make sure it’s clear to them how they can use confidential information in your company.

Whether you use printers in your office or at home, take a moment to see how you can enhance its security before your next printing job.

Which Type of Hacker Is Endangering Your Business Data?

April 28, 2022

Your data is pivotal to running a successful company. If you don’t have proper security measures in place, hackers can easily steal your data and take you out of business. Cybercriminals might be the biggest threat facing your company. Besides gaining access to your money and accounts, they can also take over critical software, preventing you from collaborating with clients.

Any organization can fall victim to hacking. However, small and medium businesses are particularly at risk. Why?

Too often, their owners don’t always address cybersecurity when launching their company. Sometimes, they even just hire the first IT service provider they see. They also don’t know how to shield themselves from online attackers, making them low-risk targets.

As a result, these organizations often go under due to the loss of sensitive data. It isn’t a risk you can take.

The 5 types of hackers to watch out for

Here’s a quick list of potential hackers, depending on what they’re after:

#1. Hackers Who Are After Personal Information. Many hackers are dying to get their hands on the personal information of your clients and employees. It includes birth dates, financial data, and social security numbers.

Social security numbers might be the most valuable asset they want to get ahold of since cybercriminals can use them for various purposes. For instance, they can perform tax fraud, open credit accounts, and make other significant identity breaches. In addition, financial data can be utilized for fraudulent activities and purchases, especially if it lacks robust digital security systems.

#2. Hackers Who Want to Get Into the Digital Infrastructure. Storage and data servers are expensive – and hackers know that.

In order for them to cut costs, hackers may aim to store their applications and data on your infrastructure instead. The better your infrastructure, the more likely cybercriminals are to target it. This can strain your network to the limits and have devastating effects on your business.

Unsurprisingly, tech companies are some of the most common victims of this type of hacking.

The common indicators that a hacker has tapped into your digital infrastructure include:

  • Running out of storage faster than usual
  • Your network suffers slowdowns
  • You may have unknown devices on your network.

#3. Hackers Who Are After Confidential Information. Few business aspects are as important as your intellectual property (IP). Your products and services enable you to stand out from the competition and strike a chord with the target audience.

A huge problem arises if hackers steal the design of your upcoming product before you launch it or submit your patent. A competitor may obtain the information, allowing them to hit the market first and undercut your sales.

#4. Hackers Who Want to Get Account Data. Sure, you and your IT service provider might have done enough so that hackers might not be able to obtain financial data. But are your employees’ accounts secure?

If hackers compromise them, they may let them run scams and gain information to disrupt your operations.

For example, losing CEO login credentials can be devastating. Besides granting hackers access to sensitive information, it also helps them impersonate the CEO. In return, they can solicit information from employees or clients and halt your operations. This data breach can lead to widespread confusion, tarnishing your reputation.

#5. Hackers Who Aim to Have Network Control. In some cases, hackers aren’t after data. Instead, they want to gain control of the entire network. And to make it happen, they launch ransomware attacks.

These activities enable them to lock you out of the system and make data inaccessible until you pay a ransom. They’re typically initiated through spam, phishing emails, and online ads.

The average ransom amount stands at approximately $30,000, but the loss caused by business disruption is much more significant.

What Are The Five Perspectives In Business Analytics

March 25, 2022

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Business analytics is an approach to identify the challenges faced by an organization and finding solutions to them. In other words, business analytics help you implement changes in the business to streamline tasks and activities.

Your role as business analysts is to bring efficiency to the working process. To analyze business activities and bring change, you need to understand how your business works. Depending on how it works, you need to consider the change you can bring to the organization to boost productivity.

Agile
Agility is an effective perspective to compare your traditional business analytics with new and advanced innovations.

The reason why this tool is effective is it provides you data considering your user stories and product backlog. Here are some benefits of using agility:

[Read more…] about What Are The Five Perspectives In Business Analytics

Benefits Of Transforming Into A Paper-free Office

March 25, 2022

Going paperless at your office by digitalizing your documentation is a huge step.

Although it’s not easy for many businesses to transfer the entirety of their paperwork electronically, you can start small and shift slowly. It involves numerous benefits, such as lower costs and higher efficiency after digitalization.

In a competitive market, cutting down on expenses and enhancing productivity is an arduous task. You can accomplish these tasks easily by going paperless.

The availability of advanced technological tools is making it easy to move your documentation online. If you are still confused about going paperless at your office, consider these benefits.

Better organization
Tracking and maintaining papers manually is a time-consuming task. Your employees may find it intimidating to handle all clutter and mess when it comes to documents. This becomes even tougher when you are running a large-scale operation. Paper documents increase the risk of huge errors and blunders.

Going paperless will streamline your management and organizing tasks so your employees can channel concentration towards high-priority tasks. This avoids tedious paper hunts. You will face a lower chance of human errors and mistakes by introducing coherence and proficiency in the workplace.

Transfer information easily
Numerous available tools enable you to generate digital invoices and quotations. Hence, your employees can instantly share relevant details without incurring printing and postage expenses.

Marketing and accounting teams can communicate information in realtime and make adjustments according to their clients’ needs. Employees can easily search through old documents with a few clicks. They can arrange documents by date, clients, serial number, and nature of documents.

Enhance security
Even though cyber-attacks are frequent, digital documents have become more secure. Electronic records are easier to render through encryption.

You can control access to specific documents and manage security levels. Printed documents require a lot of space, and controlling access is not possible. Documents are also prone to fire and water damage. You can double up digital efforts with backups and cybersecurity.

Lower costs
When you transform documents digitally, you improve the process’s efficiency and lower expenses.

Digital transformation offers you to store a large volume of paperwork, saving a lot of storage space. Moreover, digitalization will reduce the cost of ink, printers, paper, employee time, and space to store the documents.

The most important benefit of going digital with your paperwork is that you save employee time. They can perform additional tasks instead of storing, managing, and searching for documents.

Tech Tip: How’s Your Video Call Etiquette?

March 25, 2022

Two years on, we’re all Video Call Champions now. Bet that’s a skill you never thought you’d master.

It’s so convenient to hop on a video chat with a colleague to discuss a problem or clear up details on a project. You don’t really think twice about it anymore, do you?

There’s always room for improvement. So here are our suggested rules for good video call etiquette:

Create and share a meeting agenda
If you schedule a meeting with several others, let everyone know what the meeting is about and give them chance to prepare. If you use Teams, there’s a text box at the bottom of the New Meeting invitation where you can add in details.

Make sure your background is suitable
Cameras on, everyone. Seeing people is the big benefit of video calls. While people may be intrigued about where you are, blurring your background or working in front of a plain wall will make sure the focus is on you and not your house.

Don’t overshare
Ever been caught out when screen sharing? Maybe you’ve received a notification for a personal message, or even forgotten to close down a website before joining your meeting?

You can share only the application you want to show by clicking ‘Share’ and choosing the thumbnail shown in the ‘Window’ category.

Stand up
Want to keep your video calls focused and productive? Then get everyone to stand up for them. This might seem strange, but guess what? It works really well for in-person meetings you want to keep short and to the point.

Should You Monitor Your Remote Workers?

March 25, 2022

At the end of last year, Microsoft announced it would be adding increased employee surveillance to Microsoft Edge.

The changes mean admins can access compliance monitoring through the browser, such as seeing which files have been printed or copied to USB devices.

Machine learning is being used to increase this visibility of what’s happening to sensitive files. But how will this impact employees? Will they feel that their privacy is being invaded? Will it cause trust issues? And do you think this is an appropriate level of monitoring when people have proved that remote work can be just as productive – if not more – than working from the office?

Our advice would be not to buy into this increased employee surveillance, unless you want to damage the delicate trust you’ve no doubt worked hard to build with your team.

There are other, more open ways to help your people get their work done. For example, there are plenty of tools that help limit distractions like notifications or temporarily block apps and websites to allow better focus. Your employees can choose to activate these to aid their productivity when they need a boost.

You’ll find some within your Microsoft 365 subscription – that means more tools at no extra cost.

If you want some suggestions personalized to your business, give us a call.

Five Things You Should Never Do On A Work Computer

March 25, 2022

Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your company computer. If you’re in front of a computer for most of your time during work, then it’s not unusual to get attached to your desktop PC.

Over time, this can lead to doing personal things on a work computer. At first, it might just be checking personal email while on a lunch break. But as the line continues to get crossed, it can end up with someone using their work computer just as much for personal reasons as work tasks.

In a survey of over 900 employees, it was found that only 30% said they never used their work PC for personal activities. The other 70% admitted to using their work computer for various personal reasons.

Some of the non-work-related things that people do on a work computer include:

  • Reading and sending personal email
  • Scanning news headlines
  • Shopping online
  • Online banking
  • Checking social media
  • Streaming music
  • Streaming videos/movies

It’s a bad idea to mix work and personal, no matter how much more convenient it is to use your work PC for a personal task during the day. You can end up getting reprimanded, causing a data breach at your company, or possibly losing your job. Here are several things you should never do on your work PC.

Save personal passwords in the browser
Many people manage their passwords by allowing their browser to save and then auto-fill them. This can be convenient, but it’s not very secure should you lose access to that PC.

When the computer you use isn’t yours, it can be taken away at any time for a number of reasons, such as an upgrade, repair, or during an unexpected termination.

If someone else accesses that device and you never signed out of the browser, that means they can leverage your passwords to access your cloud accounts.

Store personal data
It’s easy to get in the habit of storing personal data on your work computer, especially if your home PC doesn’t have a lot of storage space. But this is a bad habit and leaves you wide open to a couple of major problems:

Loss of your files: If you lose access to the PC for any reason, your files can be lost forever.

Your personal files being company-accessible: Many companies have backups of employee devices to protect against data loss. So, those beach photos stored on your work PC that you’d rather not have anyone else see could be accessible company-wide because they’re captured in a backup process.

Visit sketchy websites
You should assume that any activity you are doing on a work device is being monitored and is accessible by your boss. Companies often have cybersecurity measures in place like DNS filtering that is designed to protect against phishing websites.

This same type of software can also send an alert should an employee be frequenting a sketchy website deemed dangerous to security (which many sketchy websites are).

You should never visit any website on your work computer that you wouldn’t be comfortable visiting with your boss looking over your shoulder.

Allow friends or family to use it
When you work remotely and your work computer is a permanent fixture in your home, it can be tempting to allow a friend or family member to use it if asked. Often, work PCs are more powerful than a typical home computer and may even have company-supplied software that someone wouldn’t purchase on their own.

But allowing anyone else to use your work computer could constitute a compliance breach of data protection regulations that your company needs to adhere to.

Just the fact that the personal data of your customers or other employees could be accessed by someone not authorized to do so can mean a stiff penalty.

Additionally, a child or friend not well-versed in cybersecurity could end up visiting a phishing site and infecting your work device, which in turn infects your company cloud storage, leaving you responsible for a breach.

At least 20% of companies have experienced a data breach during the pandemic due to a remote worker.

Turn off company-installed apps like backups and antivirus
If you’re trying to get work done and a backup kicks in and slows your PC down to a crawl, it can be tempting to turn off the backup process. But this can leave the data on your computer unprotected and unrecoverable in the case of a hard drive crash or ransomware infection.

Company-installed apps are there for a reason and it’s usually for cybersecurity and business continuity. These should not be turned off unless given express permission by your supervisor or company’s IT team.

The Security Problem Of John’s “Other” Laptop

February 23, 2022

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Love it or hate it, Working From Home is huge and here to stay.

As a nation, we’ve really embraced the changes forced upon us by the pandemic. Many businesses have become more flexible with a mixture of office-based workers, hybrid workers and fully remote workers.

We had no idea that we could change so much, so quickly, did we? Work just doesn’t look the same as it did in 2019.

And because of that, cyber security in 2022 doesn’t look the same either. When you have people working away from your office, you need to take additional security measures to keep your data safe.

Even before we’d heard the word “Coronavirus,” many of us were working from home now and then. Checking emails on the weekend. Finishing up a project in the evening. Getting a head start on your week.

Now, Working From Home has to be taken more seriously. If any of your staff works anywhere away from the office, there’s a chance they’re taking unnecessary risks with your data. [Read more…] about The Security Problem Of John’s “Other” Laptop

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Could Social Engineering Bring Down Your Business?

August 25, 2025

Don’t Let Outdated Tech Slow You Down: Build A Smart IT Refresh Plan

August 25, 2025

Biometrics Are the New Password – But What Happens If Yours Gets Stolen?

August 25, 2025

The Clock Is Ticking: Preparing Your Business For Windows 10 End-of-Life

July 22, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.