• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Internet

Beware Of These Tax Return Scams

March 26, 2015

In the online world, it seems that there is always a new threat cropping up on the horizon. There is one, however, that has been returning year after year following the onset of online tax filing.

This is the prime time for tax phishing scams, and it is important to recognize the signs of a cyber-criminal going after your identity and holdings.

Since tax season is often a mystifying time financially with ever-changing laws that directly affect your pocketbook, it isn’t far-fetched to believe the IRS or a related government agency may need to double-check your data or ask for additional information via email or text.

This is a situation that sophisticated thieves are well aware of, and they do not hesitate to exploit citizens’ lack of knowledge of how the revenue service actually conducts its business.

In fact, approximately 25,000 phishing emails (messages asking for personal data like Social Security numbers and the like) and 611 scam websites were shut down during the last tax season. It is probable that far more efforts went unreported.

Fortunately, it is easy to thwart criminals’ efforts to gain access to your personal information and financial holdings when you are on the alert.

First, no government agency will ask for such information through an unsecured email or text. If the tax agency, tax-preparation company, or related organization needs additional sensitive information from you, you will be contacted by mail, phone, or directed to a secure website.

In the case you are suspicious of a particular communication, double check that the email or physical address matches that of the legitimate organization.

Also, beware of messages that do not use your full name with something generic, such as “Dear valued customer,” or warn that there will be dire consequences if you do not reply right away.

If there is any doubt whether an email or text is a scam, report it to the organization in question or law enforcement agencies.

Five Great Google Search Tips

January 20, 2015

If you have ever felt discouraged when trying to find something specific on the web but Google search lists a ton of sites that aren’t relevant, you’re not alone.

Try these handy tips to hone your search terms and help Google locate precisely the information you need:

Tabs
Sometimes, the most obvious things are the most overlooked, and tabs at the top of search results are no exception. Get closer to your desired results simply by clicking the tab that best describes what you want.

If you need a picture, for example, select Images, and you will see nothing but images. The same holds true for news and more.

Quotes
Word order is often crucial to finding the right information, but Google search doesn’t naturally take this into account.

For example, you may want to locate information about the movie Simon Birch, but your search turns up results for a guy named Simon talking about birch trees. Simply put quotation marks around your term to search for a precise phrase.

Hyphens
There also may be words or phrases you wish to exclude from your search results. In this case, put a hyphen in front of the term to indicate you don’t want to see information that contains that term.

For example, if you wish to learn about antique dolls but are not interested in Barbie dolls, input antique dolls -Barbie.

Colons to Search Specific Sites
If you need to restrict your search results to a specific site, add a colon followed by the site address after your search terms to let Google show results only from that particular website. When you want to read news about the ebola virus just on CNN, for example, type in ebola virus: cnn.com.

This is also useful to search your company’s website. Simply use the word site, a colon, followed by your company’s website address. This will display all pages Google has indexed from your website.

Related Sites Search
Sometimes, you want to discover similar sites to ones you already enjoy. Let’s say you like the types of articles on Elephant Journal but have already read everything there. You can find new and similar reading material by searching related: elephantjournal.com.

Most Employees Use Work Computers For Outside Activities

December 12, 2014

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

GFI Software, a leading software tool provider for companies like Tech Experts, recently released a report that found the personal use of company computers and other devices is leading to major downtime and loss of confidential data in many businesses.

The study of about 1,000 small business employees who used a company-provided desktop or laptop computer found that 39 percent of them said their businesses have suffered a major IT disruption caused by staff members visiting non-work related websites with work-issued hardware, resulting in malware infections and other related issues.

Even more alarming, the study showed nearly 36 percent of staff members said they would not hesitate to take company property, including email archives, confidential documents and other valuable intellectual materials, from their work-owned computer before they returned the device if they were to leave their company.

[Read more…] about Most Employees Use Work Computers For Outside Activities

The Human Factor In Network Security

December 12, 2014

Scott Blake is a Senior Network Engineer with Tech Experts.

As you’re aware, disaster can manifest in many forms. In the past, we have included articles about weather-related events and how to best prepare your business against disasters.

However, there is another type of disaster that’s unlike flooding or fires that can also have devastating effects on your business.

The Human Factor
When it comes to safeguarding your business both physically and virtually, you have the power and controls available to give the edge against company espionage, cyber-attacks, or absent-minded employees.

It comes down to three basic areas: Software, Hardware and People. Once you have a firm grasp and control over these areas, you will have reduced your risk level considerably.

Software
Make sure all of your company’s electronic devices – from company-owned smart phones, tablets, laptops, workstations and servers – are running anti-virus and have a firewall in place.

While some devices are easier to secure and manage than others, this is a critical area, so be sure to make the best attempt to cover all your devices.

Be certain that your data storage devices are running backups and the backups are indeed good. As an added form of protection, encrypt your data being stored, making sure you save the key offsite as well.

Business_People_Group_laughing backupThat way, if your data is comprised either through internal access or external, it will become very difficult to use the data that was stolen.

The size of your company and the amount of sensitive data you have will dictate the frequency of your backup schedule. Remember, it never hurts to be overprotective when it comes to your data.

Hardware
Have security/firewall devices in place. Make sure they are fully configured for your business and that the firmware is up to date.

A lot of security devices add increased measures through the firmware updates.

They often have the ability to fully lock down your internal network as well. Restrict Internet access to only websites necessary for your business operations.

If your business offers Wi-Fi access for either internal use or guest use, make sure that controls are in place to limit access to your company’s internal network. The best precaution is to place the guest Wi-Fi on a completely separate network.

While Exchange mail servers can increase overhead, they will also add a level of increased security to combat against viral infections being delivered via email and attachments.

I’m sure everyone is well aware of Crypto-Locker and its variants. The majority of Crypto-Locker infections were delivered through infected PDF files sent as attachments.

People
By nature, humans are (and will always be) the most random aspect to safeguard your business from. It is vital that you run full background checks on any employee that will be given access to sensitive data or hardware.

Restrict the use of portable media such as flash drives and external hard drives while employees are working on or in the server room. Some companies may go as far as banning all portable media devices entirely.

Be proactive in actively monitoring your employees and watch for any changes in behavior, appearance, attitude and tone of speech. These can all be signs something is wrong.

If you have questions or you’re looking for suggestions, call Tech Experts at 734-457-5000, or email us at info@mytechexperts.com.

(Image Source: iCLIPART)

My Laptop’s Ethernet Port Isn’t Working. What Can I Do?

December 12, 2014

If the Ethernet port is damaged, purchase a USB to Ethernet converter.
The laptop Ethernet port is integrated into the motherboard, which makes it hard to replace only that part without swapping out the entire motherboard.

Since it just doesn’t make sense to throw the proverbial baby out with the bath water, just make it possible to plug into another port that is undamaged with a USB to Ethernet converter.

Fortunately, these converters are relatively inexpensive, so there’s no need to despair. Converters are available at virtually any store with an electronics section and there isn’t much difference between converters.

One thing you may wish to consider is to purchase the latest model of adapter, even if your current laptop is not new.

These converters are backward compatible, so the latest USB 3.0 to Gigabit Ethernet adapter works with even the oldest computers with older USB ports.

With the latest version as part of your arsenal, you can still use it in the future with a newer laptop.
These adapters have another great feature which is that they don’t require any technical knowledge, saving you time and money for installation and troubleshooting in case of problems.

Simply plug it in the USB port, and it’s ready to deploy your Ethernet connection, getting you back online without any hassle.

Windows automatically detects the adapter and the operating system installs the appropriate drivers for you.

Remember to use an in-line surge protector on your Ethernet cable, particularly if you travel frequently.

Tips To Protect Your Business PC From Malware

October 31, 2014

Michael Menor is Vice President of Support Services for Tech Experts.

In today’s online world, technology users are essentially in a state of near-constant attack. Almost every day, there’s a new data breach in the news involving a well-known company and, quite often, fresh rules for protecting personal information are circulated.

Because of malware in email, phishing messages, and malicious websites with URLs that are one letter different from popular sites, employees need to maintain a high level of awareness and diligence to protect themselves and their organizations.

Phishing activities are especially pervasive, including attempts to steal users’ credentials or get them to install malicious software on their system. The astonishing success rate of phishing attacks makes them a favorite.

Why? More than 70% of people will follow the link to a phony website and, of those that followed the link, 30%-50% will routinely give up their usernames and passwords.

Many like to think of the network perimeter with all its firewalls and other fancy technologies as the front line in the cyber war, but the truth is there’s a whole other front.

Every single member of a company’s staff who uses email or the Internet is also on the front line and these people are generally considered a softer target than hardware or software. It’s simple: if the bad guys can get an employee to give up his or her user credentials or download some malware, they can likely waltz right past the technological controls, basically appearing as if they belong there.

When using a computer for personal functions, a user generally has to have the ability to install software and modify the system configurations. Typically, such administrative functions are not available to all users in a corporate environment.

c471994_mAs a result, even if an organization has made an effort to improve a system’s security, a user doing work on a personal computer has the ability to disable and circumvent protections and has the privileges to allow for the installation of malware.

As companies migrate toward a world of bring-your-own-device policies, some companies are developing strategies to help address these risks. But, as a rule, using a work computer for personal reasons or doing work on a personal computer (or tablet or smartphone) can significantly increase the threat level that an employer has to protect itself against.

To help their organization protect systems and data, employees need to implement some smart web browsing habits. Smart web browsing means engaging in the following activities:

Beware of downloads
Malware can be hidden, not just in applications or installation programs, but in what appear to be image and video files also. To limit the likelihood of downloading content that contains malware, only download from reputable sites. With sites that are not a household name, take the time to do a little research and see if other people have had issues.

Additionally, be sure that antivirus software is set up to automatically scan downloads. Or scan downloads manually, even when receiving them from name-brand sites, as it is not unheard of for infected files to make their way onto otherwise legitimate web sites.

This is especially true for file-sharing sites where the site owner cannot control every piece of content a user may place there.

Be wary of deceitful sites
Those running sites already breaking the law by illegally distributing copyrighted materials — like pirated music, movies or software — probably have no qualms about including malicious content in their downloads or stealing information.

Many popular web browsers today have built-in functionality that provides an alert when visiting a website that is known to be dangerous.

And if the browser doesn’t give a notice, the antivirus software may provide that function. Heed the alerts!

Employees need to protect their devices from online and in-person threats. Start by keeping the company’s system patched. Configure it to automatically apply updates or issue notifications when there are updates and then apply them as soon as possible. This doesn’t just apply to the operating system.

Keep all installed applications updated; sometimes this takes a little extra work.

Remember, the challenge of security is that the bad guy needs to find only one hole in a security system to get past it, so fix them all. Think of it as putting dead bolts on doors, but leaving the basement window wide open.

To that end, security professionals like to debate the usefulness of today’s antivirus software. And it’s true that malware continues to become more sophisticated and harder to detect. But it always amazes me how old some of the malware running around is. As a result, use antivirus software and keep it up-to-date.

Also, use a software firewall, either the Windows firewall or one provided in an antivirus package. This is especially true for laptops connected to public wireless access points at hotels or coffee shops, but it also applies to home systems. It just provides that extra layer of defense.

And finally, please, don’t ever give passwords to anyone. Be vigilant and question anything new, especially emails and forms in the web browser that request work credentials, no matter how nicely the request is made.

(Image Source: iCLIPART)

Considerations When Buying A Home Wireless Router

October 31, 2014

Wi-Fi Router vectorChoosing and buying a router for your wireless internet at home can be a frustrating experience; you want speed, performance and coverage as well as longevity in the life of your upgraded router.

It’s not an easy task if you add to it the complexity of all those numbers attached to the router and the knowledge required to install it.

So, here are few considerations that will help you choose your next wireless router:

What’s the end goal?
Ask yourself: why am I buying a router? If it’s simply to build a wireless network at home and have access to the Internet, you could probably get away with a router at under $200.

However, if you want extra features, such as added security, parental controls, the ability to connect USB printers, and added external storage drives for data sharing, you need to search for a higher end router.

Also, you may not even need to have a wireless router in your house, especially if you use a PC or laptop that is already connected to a cable or DSL modem and there are no other devices that need to be connected wirelessly to the internet.

Should you go for a single or dual band?
Bands are the frequencies in which wireless communications operate. A single-band is geared toward simple wireless networks and a dual-band router operates on both the 2.4 and 5 GHz frequencies.

Although a router that sustains the 5 GHz frequency will work great for gaming and online streaming, it is not as good as the 2.4 when it comes to distance. So, consider the distance you need to cover when choosing the required band.

Further considerations
When buying your next router, remember that soon enough the 6th version of the Internet Protocol (IPv6) will be here, so you will need a router that supports this transition.

Another consideration is extra features that a router may offer, such as SD card slots and USB ports for printers for example.

If you want to future-proof your investment, make sure you get an 802.11 AC router, which is fast becoming the standard in wireless networking.

Finally, even with home networks, the more security, the better!

(Image Source: iCLIPART)

Effective Ways To Increase Your Privacy Online

May 30, 2014

c610923_mWith the increased hacking and account infiltration attempts, protecting people’s privacy has become extremely important.

While online, you can minimize your exposure by browsing privately or completely anonymously.

Private Browsing
You can browse the internet privately, by turning on the private browsing feature. It will prevent the history tracking of pages you visit. The feature is found in the main browser menu.

In Internet Explorer, the feature is called ‘Private Browsing,’ in Firefox, it is called ‘Private Window’ and in Google Chrome, it is called ‘Incognito mode.’

However, there are limits to private browsing: Any files you save or websites you visit will have your IP address as well as unencrypted data you send.

For greater privacy, there is Sandboxie, an application which prevents other programs from saving any data to your disk.

Protect Personal Data
It is good practice to use unique usernames and passwords for each computer user, including guests.

This will help to reduce unwanted access to your files. You could also encrypt your hard drive by enabling Bitlocker which will encrypt your entire drive, making it inaccessible to anyone without your Windows user password.

In case you don’t have Bitlocker built into your OS, TrueCrypt is another free alternative that will secure your files. When you need to completely delete your files, use a utility like Eraser which will ensure they can never be recovered.

Use a Private OS
The best way to ensure complete anonymity and privacy, you could work in an entirely different operating system from your regular OS through virtualization.

A wall is set up around the virtual computer to prevent anything you do from leaving files on your normal Windows file system.

This is an entire operating system devoted to privacy, and is installed on a DVD or USB to run on any computer.

Nothing is written to the computer’s main drives and your browsing activity is completely anonymous.

(Image Source: iCLIPART)

The Hidden Cost Of Internet Misuse At Work

April 29, 2014

Using the Internet for personal purposes in the workplace is causing a dip in employee productivity and costing money for the business owner.

Internet abuse constitutes an issue due to the fact that the browsed content raises ethical questions and often the sites visited are not allowed through office policies.

This is in addition to the fact that the time and frequency of accessing the Internet compromises productivity.

What constitutes Internet abuse?
Workplace Internet abuse is a significant risk factor for employer liability, costing employers’ valuable hours of work.

Internet abuse ranges from viewing pornography in private c472520_moffices to spending hours on social sites, playing online games, shopping online and paying bills through the company Internet.

Other consequences of improper Internet use include litigation, such as sexual harassment, hostile work environments and discrimination.

Revoking privileges
One way to deal with this problem is to entirely remove Internet access. Unfortunately, such a decision has the negative effect of punishing those who don’t abuse the privilege.

In addition, it’s impossible to completely banish personal Internet usage when the business relies heavily on Internet for communication, research and up-to-date information.

Monitoring usage
One way to reduce employer liability is to monitor and filter employee Internet use.
Although there are disagreements about the principle behind Internet monitoring, many employers agree that it is a necessary ‘evil.’

This solution requires some investment and changes in the networking infrastructure but can provide an almost immediate Return on Investment (ROI).

A phased implementation approach works best. Let your employees know you’re making a change, implement, and then give them a few days to adjust.

It is also necessary to draft an Acceptable Use Policy (AUP), implementing rules of personal Internet use before implementing such a change.

If you want to discuss internet monitoring solutions for your business, please give us a call for a free assessment.

(Image Source: iCLIPART)

Browser Wars: Which Browser Should You Use?

March 18, 2014

colorful Internet browserby Lino Perna,Technician

Since its public release in 2008, Google Chrome has been taking its place in people’s hearts and minds, replacing the commonly used Internet Explorer.

Ever since then, these two browsers have been at constant war. The public loved the fresh, simplistic, elegance of Chrome which left Internet Explorer in its dust.

Now, after all these updates and changes, which of the two has made the most positive progress? Which browser is better?

Internet Explorer
Internet Explorer was the most widely used browser up until 2008. It had the internet navigation world in the palm of its hands, and because of its massive success Microsoft decided not to change anything.

Internet Explorer came standard with every new Microsoft computer, so to the general public, that was the only option. Yes there were other web navigators, but this was the best.

In its current state, Internet Explorer 11 is faster and more efficient than any other previous versions. The security and privacy features are phenomenal and coveted by other browsers.

In a general sense, the interface is usable, but may be too complicated for some users. While it doesn’t have site prediction or voice search, it is still faster and better than ever for everyday tasks.

Chrome
When Chrome was first released, it had low usage percentage because it was an unknown browser, but at that point, Firefox had become prominent and had passed up Internet Explorer.

Slowly but surely, Chrome became more widely known and used. It took until 2011, but finally overcame the competition and became the most used browser in the world.

Today, Chrome reigns over the other browsers. Its usage surpasses any of the other browsers, but the question is: Why? The reasoning for the era of Chrome is its design.

It’s easy enough for an individual of any age to use. It simultaneously possesses the ability to give you luxuries such as: a drop-down box with thumbnails to easily access your favorite websites or the integration of Gmail and Youtube.

The simplicity of it contributes to the unparalleled speed that it possesses. Speed, efficiency and quality are the necessary staples of success.

Google Chrome possesses all three of these essential attributes that helped it achieve and sustain dominance over its predecessors.

The built in flash player and PDF support put Chrome ahead of the competition because both tools are used quite frequently in both a business and scholastic setting.

Wrapping Up
It all comes down to this: When it comes to efficiency, speed, and quality, Chrome takes the cake.

Its facile interface, outstanding quality, and unmatched speed rocket it past Internet Explorer, and any other browser at that.

Though Internet Explorer may be easier to access, if you want a browser that can do all you ever needed and more, while also being considerably faster than its competition, Google Chrome is the browser for you.

(Image Source: iCLIPART)

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.