• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

admin

The Best Ways To Protect Yourself From Malware

August 22, 2012

By Tech Experts Staff
Users who bring their computers in to repair malware infections invariably ask the same question: “Why didn’t my antivirus stop me from getting viruses?”

So, you’re probably wondering, “If having antivirus software on my computer won’t protect me from viruses, what will?”

The fact of the matter is that while computer users are told they have to have antivirus on their PCs or risk getting infection, a machine can still get a virus despite antivirus software being installed.

Antivirus not foolproof
Antivirus software is designed to help prevent your system from becoming infected, but it isn’t foolproof. Antivirus software is constantly updated, but can be out of date for hours or even a day or two when a new infection is discovered.

Virus definitions are used to detect viruses and prevent them from gaining access to your computer. Automatic updates in antivirus software like Vipre download the updated definitions to protect your computer.

It’s the time period between when a new virus or malware is released, and the software companies can update the definitions, that your system is vulnerable.

How to protect from malware
Although no antivirus software, even the most expensive versions, offers guaranteed virus protection, antivirus software is a must have. We’ve seen a number of infections where clients have said that they were on legitimate sites at the time the infection hit their computer.

Even legitimate websites have the chance of malware being coded into them by hackers, causing that website to send the malware onto your computer.

So, the absolute best thing you can do is to have antivirus software installed.

The next best step is to be cautious about what you are looking for on the Internet. Many times, users looking for “free” items on the Internet don’t suspect that they might as well be searching for free viruses.

Hackers are crafty – targeting people looking for free downloads is an easy way to spread an infection.

Some of the most common risky items to search for are “screensavers,” “free games,” “work from home,” and “taxes.”

With the search terms shown here, it’s easy to see how computer users could easily be tricked into downloading a file or application that was laced with a virus.

Cautious browsing
The second step to preventing infections on your computer is a combination of common sense and caution.

While it may not be common knowledge as to what is and is not safe to click on while on the Internet, really what it comes down to is using common sense. There’s no such thing as a free lunch, even on the Internet – if it seems to good to be true, it probably is. It’s very important while browsing the Internet that you do not click on anything that just catches your eye. Many times, people have a tendency to click on ads, and because of this, ads have a high risk of containing malware. Don’t click on ads!

The second part, be cautious refers to everything you are doing that involves the connection to the Internet.

If you are using email, make sure you were expecting an email from the person sending it. Opening forwarded emails is a bad habit.Many viruses attach themselves to email accounts and send a lot of spam and forwarded messages which unsuspecting users click on and mistakenly download a virus onto their machine.

So to sum everything up, you should always have antivirus software installed on your computer and keep it up to date.

Even if you think you are a computer pro, keyloggers and many other items can get into your computer and run in the background undetected sending away your private information.

Always use common sense and extreme caution as to what you click on. Nothing is free and you don’t ever know for sure who or what is on the other end of that email you just happened to get in your inbox.

If you think you may have a virus or malware on your computer, or just want it checked for safety’s sake, give us a call or bring your computer in and we can check it out.

It is all too common to see viruses on machines but not actually see anything different on the computer other than it “running a little slow.”

Why Should You Backup Your Data?

August 22, 2012

by Jeremy Miller,Technician
Even though it’s common knowledge, I thought I’d offer a quick refresher on data backup and why it is important.

What is a data backup?
A data backup is a copy of your data stored in a different location. This can be as simple as copying a document or picture to an external drive or disk.

It could also be a copy of your entire operating system, so if your system crashes you could recover it relatively quickly. Backups are usually not stored on the same location as the primary data.

Why should you backup your data?
You should always backup your data to at least one external source. It is best practice to have at least one on-site backup and one off-site backup.

You never know when a catastrophic event will take place. There are a number of things that can corrupt your data to the point of needing recovery.

For example, you could corrupt a file from losing power, or selecting cut instead of copy when moving files and the process errors out.

If you have files that cannot be replaced such as photos or emails that you have saved, and they become corrupt, the only way to guarantee recovery would be to have backup copies of these files in a different location.

The different location is one of the most important parts of backing up data. The reason is because if the drive your original data is on fails, and your backups are stored on the same drive there is a good chance you will not be able to recover your backups either.

If you are constantly making changes or installing and removing software then taking a backup image of your PC during a known-good configuration would be a great option.

You could set up your PC with a fresh-install of your operating system of choice that is up-to-date and just the way you like it.

Then you could take an image backup of the instance that way if you want to recover to that state it will only take the effort and time to load the image. There will be no hunting for drivers or remembering settings for printers, it will be easy to just load and go.

What is the best backup option?
Choosing the right backup is based on the kind of data you need to backup and how often it needs to be protected.

You must decide if you only need to backup some files, most files, all files, or the entire operating system.

Then you must decide how much money you want to spend on your backup solution. You must also decide where you want to store your backups such as an external hard drive or using a cloud storage service.

We offer Experts Total Backup, a cloud-based off-site storage system that’s rock solid and secure. It operates entirely in the background, encrypting your files and replicating them to an off-site storage system.

In conclusion if you have data that you cannot or do not want to lose then you must backup your data. This is the only way to guarantee that you do not lose any data. Once you have these backups you must test and safeguard them.

Keep a few copies so that if one backup gets damaged you have more to fall back on. Testing your backups is a great way to know that you will be able to restore from your backed up data.

Stay Productive (And Sane) While Working From Home

August 22, 2012

More and more, working from home has become the norm for many people. Whether you’re freelancing or telecommuting from a full-time job, you really can be just as productive, if not more, than a cubicle dweller. Just remember this advice for succeeding on the home front:

• Start your day off right. You may not have to work a rigid 9-to-5 schedule when working at home, but take your job seriously: “Report” to your desk, wherever it is, at an appropriate time ready to work. Some experts recommend showering and dressing as if you’re going to the office to get into the right frame of mind.

• Understand what your organization needs. Working from home means you won’t get as much direct feedback and instruction from your boss throughout the day. Get clear expectations from your manager so you’ll be working on the right tasks and the right schedule. Set short-term and long-range goals that align with your organization’s objectives.

• Establish firm boundaries. Family members and friends should know when you’re working and realize that you can’t be interrupted for trivial reasons. Keep your door closed (if you have one), and let the answering machine pick up the phone if your spouse or child doesn’t get to it. You’ll find out about emergencies soon enough; don’t get distracted by irrelevant chitchat.

• Stay connected with people. Don’t let them forget you back at HQ. Check in frequently with emails and phone calls to let people know you’re on top of things. Visit the office when you can, and maintain your friendships with co-workers. You want to be thought of as a full member of the team, wherever you are.

• Take breaks when you need to. Don’t work yourself to exhaustion trying to prove you’re just as productive at home as you would be in a cubicle. Although you shouldn’t start a home renovation project in the middle of writing a report, there’s nothing wrong with spending a few minutes emptying the dishwasher or putting laundry away to clear your mind and relax a little.

• Evaluate your progress regularly. Keep track of your workload and your goals so you can review how much you’re getting done and whether you need to make any adjustments. As your own supervisor, you’ll need to keep an eye on what you’re accomplishing so you don’t fall behind.

Open Your Mind To Solve Problems Creatively

August 22, 2012

Everyday problems usually respond to tried-and-true solutions. But sometimes you need to go beyond the obvious. Try these tactics when you need to take a more creative approach to problem-solving:

• Do some extra research. Don’t assume you have all the facts you need. Before trying to solve the problem, dig deep into the background and the issues surrounding it. You may uncover something new that will lead to a fresh approach when nothing else has worked.

• Set up the problem correctly. In your rush to find a solution, you might treat the symptoms and not the underlying cause. Seek perspectives from other people, and keep an open mind about what’s really going on.

• Consider the impact. Who else does the problem affect? You may gain valuable insight by including others in your analysis and solution. You’ll also build support for your solution by drawing in your co-workers and other interested parties to help you implement it.

• Try a lot of solutions. Instead of zeroing in on one approach and hoping it works, experiment with as many different options as you can. Keep track of what you’re doing so you can identify what worked or combine promising aspects of different attempts.

Staying Connected When You Travel

July 30, 2012

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Summertime is vacation time for a lot of business owners, and keeping in touch with the office can be a challenge while you’re on the road. Here are some tips to stay in touch and connected – but only if you want to!

Cellular and mobile broadband
The single biggest change in mobile technology is the ubiquity of relatively high speed data service. Coverage has increased significantly, and speeds rival that of low-end landline connections.

Phones themselves have evolved – many are now small, powerful computers that are constantly connected to the Internet.

Tethering
Tethering is the act of connecting your phone to your computer so the computer can use the phone’s Internet connection. Sometimes inaccurately described as a “modem” in these situations, the phone simply acts as a gateway connecting your PC to the mobile data network.

Not all phones or providers support tethering. When available, it usually uses a USB cable to connect the computer to the mobile phone.

An option that’s becoming more popular recently is the ability of some phones to act as a Wifi hotspot. When enabled, the phone itself becomes a Wifi access point, and laptops and other Wifi-enabled devices can connect to the Internet just as they would via any other hotspot.

Cellular Hardware
If you don’t have a phone capable of sharing its Internet connection, another option are devices dedicated to providing Internet connectivity to your computer.

Many mobile providers offer USB devices that act as dedicated interfaces to the Internet using the mobile network.

Drawbacks of mobile broadband
There are two primary drawbacks to mobile broadband: Coverage, speed and cost. While decent voice service is nearly universal in all but the most remote locations in the US, good data coverage is a gamble.

It isn’t uncommon for one carrier to have “four bars” of coverage in an area, and another to have barely any, so if you travel much, particularly to more rural or remote areas, coverage matters. You can easily try out different carriers by purchasing “reloadable” service on that carrier – if the service doesn’t work, simply cancel without penalty.

Cost is another limiting factor to mobile connectivity. Most smartphones include some kind of base connectivity charge in their monthly fee, adding $20, $30, or more per month to the basic cost of the phone.

Free Wifi hotspots
At the other end of the cost spectrum are the networks of free open Wifi hotspots that you can find across the country.

Be it Starbucks, McDonald’s, local coffee houses, restaurants, bookstores, and more, many retail businesses provide Wifi as perk of doing business with them.

If your travels take you along routes populated with these types of establishments, you can travel from one to the other, taking advantage of their connectivity as you go. While technically free, the assumption is that you’re a customer – so at least buy a cup of coffee.

The drawbacks here include security and possibly speed. Depending on how heavily used the location is, your speed of access may depend on how many other users you’re sharing the connection with.

Server Maintenance: Why We Do What We Do

July 30, 2012

By Tech Experts Staff
Most small businesses have onsite servers, which is a change from years past when small businesses didn’t see the benefit of having a server in place and instead depended on sharing within a workgroup.

With the great benefits of having a server in-place comes some additional costs to make sure your investment continues to be beneficial.

Many businesses that put a server in place are always defensive about having server maintenances done within a month after putting a server in place.

The number one phrase we hear after putting a new server in is “Are you sure that needs done, we just put that server in?”

The problem with taking this approach with your new server is that you already put a substantial investment in your new hardware and want it to run great for a long time.

Neglecting the server, even if it is for a short period of time, or even if it was “just put in,” is dangerous.There are items that can go bad or cause problems if not addressed, even on a new server.

The first item and most arguably one of the most important are the server updates. Servers have to be kept up to date especially since they physically host your important data.

Allowing a server to become outdated is highly risky and potentially allows hackers access to your server via security exploits in the operating system, Internet Explorer, Adobe, etc. If these items go without their security updates you run risk of data breach.

The second item that is one of the most important items that we check is the health of your RAID disks.

Most servers (at least the ones we install) have a RAID configuration of some sort configured to help protect your server in the event of a hard disk failure.

Hard disk failure is not a matter of if it will happen but rather when it will happen.

Since this is the case we generally set our clients up on a RAID 5 configuration which allows up to two RAID disks to fail at different times.

The redundancy provided by RAID 5 configurations allows for a large amount of protection from data loss but does not guarantee it. If a business’s server was not having regular maintenances done it is very possible to have the RAID disks fail and lose all the data because it was not caught.

We have had clients bring in computers that are brand new with failed hard drives so it can and does happen at any time, even when they are brand new.

During our maintenance we also go through the logs on the system carefully combing over the entries looking for any instances that could potentially indicate a problem or an upcoming problem if let go.

If this is not done your server could be showing that it is starting to have problems but you would never know it until it is too late.

One of the logs, the Security Log, allows us the ability to see whether or not your server has had unauthorized attempts to login to it. Yes, we mean hackers trying to get in your sever and to your private data.

These are just three of the numerous areas we check with the server maintenances to ensure that your server, whether new or old, is running properly and continues to do so for years to come.

If a server is not properly maintained, it can degrade quickly into an almost useless piece of equipment and the investment you put into becomes a waste as well – not to mention the potential data loss.

Don’t waste your company’s hard earned money! Invest in systems maintenances, every month. This is the only way to prevent major issues with your server and avoid data loss or compromise.

Mobile Devices: BYOD Deserves Special Consideration

July 30, 2012

by Jeremy Miller,Technician
A good majority of people now bring a device of their own to work and many even use their own device at work. There are many reasons that this could be good or bad or down right terrible.

There are always inherent risks when employers allow employees to use a personal device at work especially if the device attaches to the network or has confidential data stored on the device.

Allowing employees to bring their own device can be very beneficial to your organization.

If you choose to allow devices you must understand the risk and create rules that keep the device from being used maliciously.

It is best practice to create an Acceptable Use Policy for Devices. This will cover a variety of things including:
• Proper use during and after-hours.
• What types of apps are allowed to be installed?
• Which type of data will the device be allowed to use.
• How to prevent abuse.

A good AUP will allow a business to allow users to bring in their own devices and use them to increase their productivity without letting the employees abuse the privilege of being allowed to use a personal device at work.

Allowing employees to bring their own device can: increase productivity at a low-cost to the business, make employees happier, and allow users to be reached at any time.

Allowing employees to bring in their own device can be bad as well. The first reason is employees’ abuse devices all the time.

In every workplace there are employees that will use their devices in a matter that is not related to work such as checking Facebook or texting when it is not necessary.

Then there are employees that will want to use their device at work and at home, but will not want to follow the Companies Acceptable Use Policy.

This is not only disobedience but risky, because many of the stipulations in the AUP are to protect the Company’s business flow. Allowing employees to bring in a device that connects to email will sometimes require an IT person to help get the email to sync with the device.

If you do not have onsite IT this can cost you money every time there is an issue with the email not syncing. The ugly part of allowing users to bring their own device is the lack of control and security.

With the lack of standardization each device is at least a little different. On top of that each app installed is a potential risk, especially the free apps that include advertising.

Risks emerge every day, this means that in order to be sure that the device is secure you will have to continuously assess the risk for each device in use.

There is always a risk that your employees could fall victim to social engineering.This is when they either knowingly or unknowingly give away confidential information to a party that is not allowed this information.

This can be mitigated by educating users on a continuous basis, a good way to do this is a lunch and learn style of meeting. All employees with a personal device being used for work should be restricted to which applications they are allowed to download.

This is because each app has its own code and permissions that are required to run it. If the permissions for the application can compromise any data at any point it should be reviewed and then allowed or disallowed.

In conclusion many companies already allow the use of a personal device for work. Trying to implement a plan after allowing the devices is much trickier because you are further limiting a user on their own device.

A plan is absolutely necessary to protect you from legal implications, and to be up front and informative of the consequences for breaking any rules outlined in the Acceptable Use Policy for Devices.

Letting your employees know what is expected will reduce the legal and liability risk that a company may face.

Social Media Management: Think Local

July 30, 2012

Marketers seem to be hearing three words a lot more these days: “social,” “local” and “mobile.”

With more and more users relying on cell phones and tablets and the geo-location technology that accompanies them, more and more businesses are realizing they need to think locally.

One good way to use social media to appeal to a local audience is to develop a blog. Blog posts are excellent places to write about things specific to your local area – events, people, places and restaurants, for example.

When writing blog posts, make sure you optimize the post by using tags that demonstrate the local nature of your business so you will benefit from your local search strategy and will be indexed in the correct manner by search engines.

Another way to better optimize your social search is to submit your profile data to local directories such as Yellow Pages and SuperPages.

Business To Business Marketing Tips

July 30, 2012

Marketing is the life blood of any business. Staying in touch with customers, prospects, and vendors is critical to the growth of your business. Here are some tips to use the technical resources available to you to promote your business.

Business Blogging
Many B2B businesses, from the manufacturers of GPS devices for vehicle tracking to the providers of credit card processing services, are blogging today for a very good reason: blogging represents real power.

When done properly, it allows B2B businesses to generate leads, brand awareness, brand loyalty and greater interest in general. And B2B blogging is not all that difficult to get right, so long as a few simple tips are followed.

Knowing your audience is a very simple but effective tip. Make sure you have done research on your target audience, either on your own or with the assistance of an Internet marketing company, and then write appropriate content to best reach those individuals.

Another simple tip is just to have a plan. It is always important to actually plan ahead when it comes to being able to offer the best content.

Plan out ideas for blog topics for at least one month in advance, and make sure that you have a backlog of post ideas so you can fill in any gaps.

Creating Compelling Email Copy
Email marketing has evolved in a big way over the last few years, and yet the fact remains that übe-designed emails with lots of “bells and whistles” are meaningless without well-written content. The good news is that in the end, writing a great marketing email all comes down to just a few simple copywriting best practices.

Writing a genuinely compelling email subject line is one such practice. The message itself might be a work of literary genius, but no one will ever read it if the subject line does not inspire the receiver to open the message and read it in the first place. Use actionable language that makes it very clear what the reader can do with the information contained in the email message and why he or she should read it.

Wherever possible, personalized emails also work well. That means more than just including the recipient’s name; it means also knowing personal information about the person to whom you are sending your messages, including what he or she is likely to be interested in.

Social Media Strategies Are Different For Every Business

June 22, 2012

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

“One size fits all” doesn’t work as a strategy for managing your company’s social media presence.

Social media – the big three, Facebook, Twitter and LinkedIn – has become an increasingly more complex space the last few years.

Constant change
There’s a lot of activity and change across all three sites. Keeping up with the changes in policies and process, while at the same time updating your site and status, can be overwhelming.

The right way to use social media for your business depends on a number of variables, including the size of your company, the type of business you’re in, your target audience, and whether you’re a B2B (business to business) or B2C (business to consumer) company.

Many business owners don’t understand this. They think that you need to use every possible social media tactic and tool that’s available, but usually that leads to confusion and distraction with little measureable result.

Choose carefully
Not every social media promotion method works for every company.

Some businesses are successful using social media to hold contests and encourage check-ins by fans and followers.

It’s a great way to raise awareness and engage prospects and clients for a local B2C business, but probably doesn’t make sense for a B2B professional services firm.

Just because other businesses are doing it and finding success, it doesn’t mean that the tactic will work for your company.

Have a plan
Many business owners make the mistake of jumping into social media without a solid strategy, figuring it out as they go.

Just as you need a business plan, you also need a social media plan. Failure to strategize leads to poor decisions, wasted time, and confused clients and prospects.

The plan doesn’t need to be complex – one page that outlines your goals and the steps you need to take to get there will work. Once your plan is outlined, it’s time to execute!

Who’s responsible
The most important decision you’ll make when it comes to your company’s social media strategy is who will be responsible for managing it.

For smaller companies, this usually will be the owner. But for even the smallest business, a well thought out plan can be delegated to a staff member. Make sure you hold them accountable, and that you measure your results.

Not just for sales
Strategic posts on your company’s social media sites can help with customer service and public relations, too. Don’t narrow your social media focus just to sales and marketing.

Your end goal with social media should be to get clients and prospects to take an action: Visit your website or blog, ask for more information, or promote your company and brand to their friends and followers. Tracking the results of your social media strategy is the only way you’ll know what’s working, and what needs changed.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

How To Use A Password Manager And Virtual Cards For No-Risk Holiday Shopping

December 19, 2025

Help Your Team Bridge The AI Gap

December 19, 2025

Is It Time to Rethink Your Phishing Training?

December 19, 2025

Your Best Defense Against A Cyberattack

November 17, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Spyware Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.