• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Network

Diagnosing And Resolving Strange Network Issues

June 22, 2012

By Tech Experts Staff
Everyone’s had them, you know those weird issues where one of your computers can get online or to your server but your workstation can’t. Or, when one building can get to the Internet or other network resources and your other building can’t.

Networking issues can be a real headache as they can be very difficult to track down. Without the proper equipment and knowledge, they can plague you forever. Fortunately we have solutions to those network gremlins that we see all too often.

This month we are going to touch on the common network issues we see and how we go about getting them corrected for you so that your network runs as it should.

Starting from your workstation and heading out to your Internet Service Providers (ISP) modem, we’ll work our way through some of the commonly seen issues.

Can’t reach the Internet.
This one we see frequently. When your workstation can’t get to the Internet (and other workstations on your network can), there are actually numerous issues that can cause this problem.

Some of the items your tech would (or should) be checking are:

Does the computer have a virus?
Viruses can cause all kinds of havoc when it comes to how your computer functions. Viruses can change the way that Windows networking acts and what it does.

If some of the aspects of your computer’s operating system (OS) are changed by a virus, it’s possible you may not be able to get online.

Is the connection from the computer to the router in good working order?
Sometimes people think that the answer to this question is as simple as “is the Ethernet cable plugged in tight,” and in most cases it is.

Sometimes the cables you may have been using for years might begin to cause connectivity problems. Cables that are constantly moved can have the wires within the cable ends worked loose. Ethernet cables used with notebooks and laptops are especially prone to this.

Once the right cables work themselves loose you are likely to either see sporadic connection problems or you may not have any connection at all.

These types of issues while not as common as virus or operating system issues tend to be more difficult to track down.

While a tech could go through all of the cables on your network when you have a connection problem, doing so can take a lot of time.

This isn’t normally the first course of action unless they specifically see symptoms that indicate this type of issue.

Some of the other issues that can cause a workstation to lose connectivity are faulty routers, switches or modems.

In the case of any of these pieces of network equipment, if the ports on them begin to fail users may have a lot of issues, from dropped packets resulting in slow Internet performance, to no Internet connection at all and everywhere in between.

The last possible place for connection issues is your ISP’s modem. Generally a tech can roughly troubleshoot this piece of equipment, but because your ISP manages it, there is only so much a tech can do to correct problems on this type of equipment. We can usually isolate the trouble to the modem, but after that, the ISP takes over.

If a tech finds an issue with your modem you would need to have your ISP’s techs come out and look into the issues with their modem.

No matter what issues your workstation is having we can trace them back to the root of their cause.

Give us a call and we’ll get you back up and running ASAP.

Springtime Brings Seasonal Storms – Protect Your Network!

April 9, 2012

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

It’s a topic I touch on every year around this time – the criticality of power protection and backups for your network. The sad fact of the matter is, no matter how often I preach about it, too many of our clients still aren’t adequately protecting their systems.

Adequate power protection entails three things: Prevention, protection, and testing.

Prevention
During thunderstorms, many people leave their computers unprotected. Simply turning a computer off during a thunderstorm does nothing whatsoever to protect the computer.

Nearby lightning strikes can cause surges through the power lines or phone lines into your house or office, and these often damage your equipment.

The easiest way to prevent problems caused by lightning and power surges is to unplug your computer during a storm. Don’t forget to unplug your phone line or cable Internet from the computer too. These are the second most likely way for surges to get into your computer.

Protection
Having a good, quality surge protector is great for the day-to-day power surges that happen mostly unseen in the background. Don’t skimp on your power protection.

The $9 “surge strip” you can pick up at a hardware store simply gives you more outlets to use – it doesn’t provide protection against power problems.

A good surge protector should run you around $50 – a small investment when you consider the cost of the computer and the value of your data.

Servers and critical workstations should be protected by a battery backup system. We prefer APC because they offer an equipment insurance policy, but any good, well known brand will protect your network.

Testing
Power protection devices, whether a surge protector or battery backup, are designed to fail. They absorb the power fluctuations that could damage your server or workstation.

Your battery backup unit should be tested at least twice per year to ensure it’s functioning properly. The test can be as simple as plugging in a lamp, and disconnecting the unit from utility power. The lamp should stay lit. If it doesn’t, it’s time to replace the batteries in the UPS.

In general, surge protectors and battery backup units should be replaced every three years. This ensures your network, servers and computers are protected by the latest technology in surge supression.

 

Networking Equipment: What’s It All Do?

September 28, 2011

There are many times when explaining to clients what piece of hardware needs rebooted or reset that they do not know what we are talking about when we reference the piece of networking equipment by name.

Even if you do know what is meant by router, modem, switch, hub, etc., you might not know what the equipment does, and why you need it.

Today is your lucky day! Below is a brief explanation of what the various types of networking equipment is, what it does, and why you need it.

Let’s start from your Internet service providers (ISP) main line into your house or business and work our way up to your computer. It all begins with your modem – this is how you initially connect to your ISP’s main line into your building.

The modem is what connects you to your Internet provider, and secures an IP address for your computer or network to connect to the Internet.

The next piece of hardware in line is normally your router.

Some network installations don’t have a router, usually because the modem supplied by the Internet provider has one built in, or the computer connects directly to  the modem.

A router allows you to have your own network IP scheme and communicate from your network to your ISP’s network.

Routers allow you to expand your network beyond the one device that most ISP’s modems allow by creating a larger subset of IP addresses for your computers to connect to which is then “routed” to your ISP’s IP address and out to the Internet.

This is why they are called routers, they route network traffic. Some routers also offer the ability to connect wirelessly to your network.

These connections act exactly the same way except for the fact that they do not have an Ethernet cable plugged into the computer you are using to connect with and there is increased security on the wireless connection to prevent unauthorized connections to your network. Some routers also offer a high grade built in firewall.

So as you can see routers can come in many different flavors and configurations.

The final piece of hardware in the chain of networking hardware is your switch.

In general switches are designed to be connected to your router and offer more Ethernet ports for you to connect devices to your network.

Most routers offer on average five Ethernet ports – a switch gives you the ability to expand on the number of available Ethernet ports that can connect to your router.

If you want to have multiple devices connected to your Internet connection while keeping your network secure give us a call and we can guide you on selecting the proper equipment as well as getting it setup properly for you.

If this kind of equipment is not configured properly you may not be able to connect to the Internet at all.

Featured Article Written By:
Tech Experts

Alert: Top Four Threats Attacking Your Network

September 28, 2011

There are many threats that could be attacking your network. Here are just a few that most clients have happen to them.

Overconfidence
User overconfidence in security products is the top threat to your network.

Failure to “practice safe software” results in nuisance attacks like porn storms (unstoppable rapid fire pornographic pop-ups) and more subtle key loggers that steal passwords.

Surveys promising free stuff result in theft of information like your mother’s maiden name, high school, etc. which can be used to answer common security questions.

To avoid theft of otherwise secure data, think before you click.

Social Networking Sites
Social networking sites like Facebook are exploding in popularity. Threats range from malware (eg. viruses, worms, spyware) to scammers trying to steal your identity, information and money. Many businesses and government agencies are using these sites to communicate with clients and constituents, so simply blocking access is no longer reasonable; defending your company while allowing employee access requires social network education for your employees and the enforcement of strong acceptable use policies.

We can help you develop a policy, then monitor compliance using a Unified Threat Management device that controls and reports on network access.

Attacks On Mobile Devices
Everyone is going mobile these days, not just the “road warriors.”

Once limited to laptop computers, mobile network devices now include PDAs, handheld computers and smart phones, with new appliances appearing in the stores every month. Mobile devices often contain sensitive data yet they are easily lost or stolen.

Be sure to password protect and encrypt data on all mobile devices whenever possible. Include mobile devices in your acceptable use policy.

Cloud Computing
“The Cloud,” in its simplest form, involves using the Internet to access and store your data.

It’s actually thousands of servers all working together to provide computing power. When you access e-mail using a web browser, you are working in “the cloud.” Using the cloud for automated off-site backup is rapidly gaining popularity, but that’s just the beginning.

Companies like Microsoft, IBM, and Google envision the day when we will use inexpensive terminals instead of computers to run programs and access data located somewhere on the Internet.

You need to be sure that any data you store and access across the Internet is secure not just where it is stored, but during the trip to and from the Internet.

Pay close attention to this top threats and it will help with network security.

Firewalls: What Do They Do And Why Should You Have One?

July 29, 2011

Firewalls are network security devices that protect your internal network (your servers and PCs) from your external network (the Internet).

We’ve put together a basic guide to firewalls – what they are, when you should have one, and why.

What is a firewall?
A firewall is simply a border between the device and the firewall software is installed and running on (and devices on the LAN side of the firewall) and any other devices on the outside of it.

For example, there are many different kinds of firewalls. Windows firewall gives you very basic features, and is built into Windows.

This firewall is designed to block unwanted access to the computer itself and is not designed to protect the rest of the devices on a network.

Another form a firewall can take is a separate device all together.

Having a device that specifically functions as a firewall gives more control over what the firewall can be used to protect.

For example it is possible to buy a firewall appliance that can be attached to the perimeter of your network and block specific connections to your LAN.

When is it a good time to look into using a firewall?
On most Windows based computers Windows firewall is generally on by default so most people already run a firewall on their computers without even knowing it.

That being said, Windows firewall does not give you anywhere near the control or protection of a dedicated firewall product.

If your business requires very strict security and data compliance, or you intend to store highly confidential information (an example would be client credit card numbers), it may be in your best interest to have a third party firewall.

Third party firewalls offer much greater protection and allow the ability to configure specific rules in much greater detail than Windows firewall.

Having the ability to configure rules with more detail makes it possible for you to lock down your network and its possible security holes more tightly.

The reason this is a good idea if you are storing confidential information on a network is that having a firewall gives you control over exactly what comes in and out of your network.

Without this added security it may be possible for your valuable information to be compromised or copied to a remote location without you even knowing it is happening.

Why have a firewall or invest in a better one?
Three words: Vastly improved security. A third party firewall solutions affords you the best protection for your data and network.

If you have important data to secure, a firewall is an excellent step in protecting your network from unwanted access to your network.

If you have questions about your firewall (or lack of firewall) and would like us to evaluate your network security, please give us a call.

Whether it is security holes left open due to a weak firewall or other possible security issues we can help you secure your data!

Feature article by Tech Experts,
Service Manager for Tech Experts

Fall Is The Perfect Time For An IT And Network Checkup

September 30, 2010

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

To make the most of your IT investment,  you don’t need to be a technology whiz. However, you should have a plan in place for making the most of your company’s data. As fall approaches, now is an excellent time to examine your company’s technology to determine what’s working well and what could be improved.

Is It Time To Update?
Technology changes rapidly. While your systems may appear to be working well, you may be missing out on new ways to protect your business information, help your business run more efficiently, and better serve your customers.

For example, to run some of today’s most powerful programs, you need a fast and large hard drive with significant memory capacity.

You might consider adding newer technology – such as wireless capabilities – to older equipment; but the cost of upgrading a computer is often more than the cost of a new model.

Check Your Power Protection
Loss of electrical power and power surges are the most common causes of data loss and weaken computer components. If your business depends on computers, protecting the power source is critical.

This is especially important if your area is prone to power fluctuations or electrical storms.

An Uninterrupted Power Supply (UPS) unit offers both superior surge protection and, depending on the model, anywhere from 15 to 45 minutes of backup power-enough time to save and copy critical files.

The idea of a UPS isn’t to continue your business dealings while the lights are out. Rather, it is to ensure that your data is available when the lights come back on.

Have You Patched Windows?
Have you installed the latest version of Windows on your computer, and do you keep it updated? Do you do this automatically?

It is incredibly important that you keep Windows and your software applications current. Updates improve performance, fix bugs, and many add new features. You should also regularly update and run anti-virus software.

How’s Your Backup?
Consider storage needs in terms of both capacity and physical location. Depending on the amount of data, you can back up to USB flash drives, CDs, DVDs, tapes, or an external drive.

You might also want to look into off-site backup. Our Experts Total Backup System is an excellent backup, disaster recovery, and offsite storage service.

Integrate Your Data
Over the years, businesses tend to produce multiple silos of data. Your inventory, sales data, and marketing information need to be linked together to better serve your customers and increase your company’s productivity and profitability.

Without this integration, you may not know who your best customers are or you could end up agreeing to provide a top customer with an item you don’t have in your inventory.

Best Steps To Secure Your Wireless Network

September 30, 2010

Do you have a wireless router or wireless access point (WAP) set up in your home or business? If so, is it secured and locked down from hackers and snooping eyes?

There are three basic steps you can take to secure your wireless network.  I recommend performing all of them.

By default, most routers have no security set up right out of the box. This means that your neighbors or anyone close enough to pick up your wireless signal can connect to your wireless network without you knowing it.

They can freely browse the web and without the proper security in place, your router and any network device connected to it (computer, cell phone, etc.) becomes visible to anyone that can see your wireless signal.

From that point on, it is  easy for a hacker to connect to your computer and see your files or steal and delete your data. If you’re not comfortable making changes to your network, then have a trusted IT company such as Technology Experts to make those changes for you.

If you are computer savvy then follow these three basic steps to make your network more secure.

Change Your SSID
Your SSID (Service Set Identifier, which is simply the name of your wireless network) is what you connect to for Internet access.

You want to change the SSID from open security to “WPA2.” This is the most secure setting currently available on most routers. You’ll also need to assign a security key commonly called a pass phrase.

Do not use something common such as your name, child’s name, or any other name that is associated with you. Use a combination of uppercase and lowercase letters, numbers, and characters.

Don’t Broadcast Your SSID
Who needs to know the name of your wireless network? No one other than you. Not your neighbor next door or that guy driving down the road trying to connect to a non-secured network.

There is a setting in your router to disable the broadcast of your SSID.  Again, if you are unsure, then have a trusted IT company perform these changes.

Change Your Router’s Login Password
The last thing to do is  change your router’s management interface username and password.

All routers come with a default user name and password that is easily available on-line for anyone to find.

If you don’t change it, a hacker who gained access to your wireless network (or someone you allowed access), can simply log into your router and play havoc with your network. Be sure to change the password.

Following these three basic steps will make your wireless network much more secure from hackers and from intruders accessing your internet connection.

While a very skillful hacker can still get around even this security, they won’t bother trying.

There are too many unsecured networks out there, so hackers would not waste their time trying to break a network that is configured securely.

Remember, if you need assistance or would like a great IT company to perform these changes, give Tech Experts a call at (734) 457-5000.

Network Security: Keep Your Network Environment Secure

April 7, 2010

As more and more people rely on the Internet to get things done in their daily life, network security is more important than ever. Typically, small businesses and home network users haven’t had to worry much about security.

Poor network security exposes you to viruses, spyware, and most dangerous, cyber criminals a.k.a. hackers.

These guidelines and best practices can help eliminate, or at least mitigate, the majority of network breaches and security vulnerabilities.

Security Policy
An active security policy is always the most important item for protection of your network, whether it is in your home or in a business environment.

This is simply a statement, or guideline of the rules and how security is setup in the organization.

This role will govern the level of security users are allowed access to on the network. The roles and responsibilities of each person on the network, as they are part of the system, should be clearly defined.

Passwords
Although the most obvious, it is definitely one of the most important,and often, most neglected ttems.

Be sure to enforce strong passwords across your network – a weak password could lead to a user account being compromised.

Email
Certain email attachments can become a major problem if the wrong one is opened, and a lot of the time it is by accident.

Some of the most common file types to block would be: .bas, .bat, .vbs, and .exe.

Patches/Updates
Be sure your operating system is up to date with most recent patches, security updates, and service packs. This will close many of the vulnerabilities that can be exploited by hackers.

Inventory
Keep a good inventory of your network devices by developing and maintaining a list of all hardware and software components that are implemented on the network.

Try to understand which software applications should be installed, and which provide a weak security configuration so you can monitor those applications.

Adopt The Least Privilege Concept
The least privilege concept influences the network and/or systems administrator to create custom policies for having permissions and access to network resources.

Try to allow only what access is absolutely necessary to users, not giving them more rights to the system than they should have.

Remote Access
Certain ports can be blocked to keep unwanted users from remotely accessing your network and any of its resources.

If you’re one of the many small business owners who also works from home on occasion, there should be a security policy in place for VPN (virtual private network) access and your IT support company should assist with getting connected properly.

Keeping these simple guidelines in mind when thinking security on your network, and you’ll prevent several possible problems from happening, as well as maintaining a safe and effective performing work environment for work and for pleasure, in home or in business.

« Previous Page

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.