• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Planning

Staying Connected When You Travel

July 30, 2012

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Summertime is vacation time for a lot of business owners, and keeping in touch with the office can be a challenge while you’re on the road. Here are some tips to stay in touch and connected – but only if you want to!

Cellular and mobile broadband
The single biggest change in mobile technology is the ubiquity of relatively high speed data service. Coverage has increased significantly, and speeds rival that of low-end landline connections.

Phones themselves have evolved – many are now small, powerful computers that are constantly connected to the Internet.

Tethering
Tethering is the act of connecting your phone to your computer so the computer can use the phone’s Internet connection. Sometimes inaccurately described as a “modem” in these situations, the phone simply acts as a gateway connecting your PC to the mobile data network.

Not all phones or providers support tethering. When available, it usually uses a USB cable to connect the computer to the mobile phone.

An option that’s becoming more popular recently is the ability of some phones to act as a Wifi hotspot. When enabled, the phone itself becomes a Wifi access point, and laptops and other Wifi-enabled devices can connect to the Internet just as they would via any other hotspot.

Cellular Hardware
If you don’t have a phone capable of sharing its Internet connection, another option are devices dedicated to providing Internet connectivity to your computer.

Many mobile providers offer USB devices that act as dedicated interfaces to the Internet using the mobile network.

Drawbacks of mobile broadband
There are two primary drawbacks to mobile broadband: Coverage, speed and cost. While decent voice service is nearly universal in all but the most remote locations in the US, good data coverage is a gamble.

It isn’t uncommon for one carrier to have “four bars” of coverage in an area, and another to have barely any, so if you travel much, particularly to more rural or remote areas, coverage matters. You can easily try out different carriers by purchasing “reloadable” service on that carrier – if the service doesn’t work, simply cancel without penalty.

Cost is another limiting factor to mobile connectivity. Most smartphones include some kind of base connectivity charge in their monthly fee, adding $20, $30, or more per month to the basic cost of the phone.

Free Wifi hotspots
At the other end of the cost spectrum are the networks of free open Wifi hotspots that you can find across the country.

Be it Starbucks, McDonald’s, local coffee houses, restaurants, bookstores, and more, many retail businesses provide Wifi as perk of doing business with them.

If your travels take you along routes populated with these types of establishments, you can travel from one to the other, taking advantage of their connectivity as you go. While technically free, the assumption is that you’re a customer – so at least buy a cup of coffee.

The drawbacks here include security and possibly speed. Depending on how heavily used the location is, your speed of access may depend on how many other users you’re sharing the connection with.

Work/Life Balance: The Issue Of Technology

March 20, 2012

Technology and easy Internet access can be both a blessing and a curse, giving us remote access to email, smartphones, Skype and other tools.

In theory at least, this gives us the ability to be able to work from home and achieve a better work/life balance, and yet in some cases all it has actually done is increase the number of hours that we spend working.

One way to win back some work/life balance is to negotiate the time spent working from home.

Not only does working from home save a lot of time you would otherwise spend commuting back and forth to work, it also means you save money on both transportation and food, and it gives you more time to develop an exercise routine. There can be problems with working from home, however, such as lack of discipline and motivation as well as overwork.

The solution is to make certain that your work stays within the time period of a normal working day and does not add further hours to that workload.

Some time-management techniques include creating to-do lists, managing your expectations, prioritizing your workload, learning to delegate, and making sure that you have regular meetings and catch-up sessions with colleagues.

It is also important to set boundaries with colleagues to respect your personal time. Set an expectation that you’re “not available” during non-work hours. Switching off your cell phone and not checking emails during non-working hours is also a good idea.

How Strategic Business Continuity Planning Can Prevent Losing Money And Customers

January 20, 2012

The concept of business continuity planning is nothing new to conscientious business owners.

Without a doubt, the ability of an enterprise, large or small, to recover from catastrophic events and continue to provide an acceptable level of service to its customers  while maintaining a satisfactory level of profits is a basic requirement of good business practice.

Although such awareness has always been a feature of good management, the startling events of September 11 2001 has brought the world into a heightened state of preparedness for disaster.

Why the need for continuity and disaster planning?

Increasingly, natural disasters continue to surface in one place after another.

Consider recent major floods, earthquakes, tsunamis, hurricanes, corporate crimes and malicious attacks upon computer systems in nation after nation and you will sense the pressing need for sound business continuity planning to avoid disruptions due to technology and other failure.

Another factor which contributes to this need is the changing business climate in view of the expansion and increasing accessibility of the Internet over the past decade.

So organizations which formerly rendered services to their customers during fixed hours of business, now find themselves offering their services on an extended schedule, even 24 hours a day, seven days a week.

This means that customers have grown accustomed to this ready access to their suppliers and vendors. And now the reality is that consumers have become less and less tolerant of interruptions in a company’s service and availability.

Business continuity planning – is it just for big business?

Business continuity planning now takes on an increasingly important role, not just for larger enterprises, but for small businesses alike.

In fact for small businesses it is even more critical to be ready to respond to the needs of its customers.

Customers expect this and have no problem locating alternate suppliers who stand ready to take your place in the market!

This is true whether you are in the manufacturing or service business, marketing and sales or any other facet of business.

Your network – a key  component in business continuity 

Nowadays a company’s IT System with its network of computers has become the backbone of many businesses.

Vital functions such as Data Processing, inventory and  payroll management, Internet based operations including online sales, human resource and training systems, project management and an almost endless variety of other business functions are critically dependent on the efficacy of your computer system.

Clearly then, any technology disruption can have disastrous consequences.

Therefore business continuity planning often deals  extensively with maintaining a dependable IT system.

This brings into focus not only the hardware components of the system and its application programs, but also the data contained in the system.

Ways to ensure continuity

Some of the key components that determine system reliability include Data Storage Devices, UPS systems, power generator systems and so on.

And nowadays, Cloud Computing is being relied upon to extend the reliability of Computer Systems and ensure business  continuity in the event of major failure.

There seems to be a tendency to use the expressions ‘business disaster recovery’, and ‘business continuity’ interchangeably.

However upon closer examination it becomes clear that the two concepts are quite distinct.

Continuity of service is the desired state we want to maintain while recovering from any unexpected calamity whether an extended power outage, Computer System failure or other problem.

Such continued operation calls for a comprehensive plan that covers the most probable occurrences.

From this information it can be seen that ensuring business continuity calls for a strategy regardless of the size of the business.

As disasters continue to increase in frequency and magnitude, more and more careful thought must be given to your company’s preparedness to respond in the event of any business threat.

The increasingly prominent role of computers in business calls for highly reliable data backups, hardware redundancy, and keen, effective planning as a way to ensure business continuity in the event of any catastrophe.

It’s Severe Weather Season… Do You Have A Disaster Plan?

May 27, 2011

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Perhaps it’s just me, but this spring has been one of the worst I can remember in terms of severe weather. The flooding and tornadoes we’re seeing around the country should serve as a wake-up call for small business owners to review their business continuity plan.

A disaster recovery plan prepares a business to deal with disaster scenarios such as fi res or tornadoes that disrupt the business’s operations.

Although larger companies create such plans as a standard operating procedure, small businesses tend not to do this type of planning.

In fact, according to Symantec’s 2011 SMB Disaster Preparedness Survey, only 50% of small businesses have a plan in place for a disaster or data loss.

Your disaster plan serves two purposes. First, the plan should limit the financial impact a manmade or natural disaster has on your company.

Second, the plan should establish the steps you will take to begin operating again quickly following a disaster. Developing the plan and making employees aware of it helps protect your business and mitigate risk.

Plans should name specific employees that will play key roles in the event of a disaster, and identify critical assignments that each employee must complete in a disaster scenario.

Finally, the plan should focus on keeping your company’s irreplaceable data safe. That data includes customer information, email correspondence, sales information and accounting and financial records.

Most businesses our size don’t have the resources to implement redundant office locations, but the plan should include a strategy operating at an alternate location.

The resources needed to resume operations within 24 hours of a disaster may differ from those needed to resume operations within three to four days. The plan should call for the minimum set of resources possible to meet the established targets.

We’ve put together in a free report that will help guide you through the planning process – from assessing the risks to setting up in a new location. The report is free – simply call the office at (734) 457-5000, or email info@MyTechExperts.com for your copy.

Looking Ahead: What’s In Store For Your Company?

December 22, 2008

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Our clients are typically small and medium sized companies, and while some of them are putting the brakes on and slowing down, most are still going strong.

We’re feverishly working with many clients to plan out their IT projects for 2009. Several clients are looking to upgrade their infrastructure with new servers, workstations and higher speed networking equipment. Even more will be enhancing their Internet speed and security and upgrading their websites (look for an incredible web and e-mail service promotion from us next month!).

These clients understand the importance of keeping their network and critical business systems update to date and in great operating condition.

What Is Your 2009 Plan?
By now, you’ve undoubtedly got the framework of your 2009 plan put together. What’s on the agenda?

From our corner of the world, as your computer guys, we’re seeing many companies looking for ways to decrease expenses and increase sales. We think some of the key technologies you’ll see helping with that include virtualization, unified communications, and cloud computing.

Virtualization
Virtualization technologies go back all the way to the 1960s and IBM’s M44 mainframe systems. In essence, virtualization lets you create and run more than one server “system” on a single piece of server “hardware.” The obvious benefit is that you’re able to run distinct servers on one piece of hardware.

An example application for small business would be a company that uses a specialized piece of software that requires a dedicated server. If the company is smaller, chances are a lot of that server’s horsepower is going to sit idle – because not a lot of people are using it. With virtualization, we would simply create another virtual server and install the special business software on that virtual server, saving the cost of an additional server.

Unified Communications
During the next few years, you’ll see the number of different communications vendors you work with reduced considerably. The technology already exists to check your e-mail from your cell phone, and to receive voice mails in your e-mail.

Cloud Computing
“The cloud” is a metaphor for the Internet. In general terms, cloud computing is the concept that your computing resources are no longer located in your office, or on your server, but rather, purchased as a service and delivered via the Internet. More and more, the services your company relies on every day will move to cloud computing applications, eliminating the need for hardware at your office.

The initial cost savings of cloud computing are obvious; the longer term cost savings will come from reduced operating expenses (employees can work from home, or anywhere, lowering the need for expensive office space) and access to higher quality services that are traditionally too expensive for small companies to implement. Salesforce.com is the perfect example of an enterprise-class application made available to small companies through the use of cloud computing.

Thank You!
As we wind down 2008, I’d like to thank the clients and friends that support Tech Experts. The trust and confidence you place in us as your IT company is invaluable, and everyone here is very thankful for your business. Happy new year!

A Great Book To Read
Panic: The Story of Modern Financial Insanity (edited by Michael Lewis) is a brilliant book and a good start to our new “Recommended Reading” list.

Panic covers five modern financial crashes: The Crash of 1987, The Russian Default / Collapse of Long Term Capital Management, The Asian Currency Crisis of 1999, The Internet Bubble and The Subprime Mortgage Disaster.

Each section has a perfect setup – a few articles preceding the actual crash followed by articles that are written as the crash is happening. Lewis finishes off each section with at least one post crash article.

There are some interesting characters throughout the book, but my favorite example is from The Internet Bubble section: Bernard Madoff – yes, the one that’s been in the news lately.

 

 

Eight Steps To Prepare For Business Disruptions

August 23, 2008

Summer Storms, Crazy Weather Highlight Need To Be Prepared

With the crazy weather we’ve been experiencing the past few weeks, now is the perfect time for your business to put together a basic disaster planning and recovery plan.

Here are some key points to consider:

1. Prevention costs less than recovery, and it’s faster.

When a disaster occurs, one of the first questions asked after the smoke clears (or the debris is cleared) is how it could have been avoided. That’s the prevention component – and the issue for most businesses is when they want to answer that question, and how much they are willing to spend to avoid a major disruption to their business.

2. Don’t put all your eggs in one basket.

Our professional recommendation is to spread “vital” operations across more than one location if at all possible. Full backups should be performed every business day, and stored off site. The key thing here is, backups must be tested – this means you need to frequently pick random backup sets and attempt to restore from them.  In far too many cases, data that was thought to be securely backed up couldn’t be accessed when the chips were down.

3. When disaster strikes, the first thing to go haywire is the plan.

Your business should review the disaster plan for adequacy (are you covering all the bases) and currency (has the plan been updated to match your new technology?). Special attention should be paid to new systems and processes that weren’t in place in the business when the initial plan was developed.

4. When disaster strikes, your competitors will notice.

If your company doesn’t maintain market presence and reputation after a disaster, the absence can create a vacuum in the market place. This being the case, competitors will step up to fill that void.

5. Remember the four “P”s of disaster planning – People, property, priorities and planning!

Your company’s security plans should be up to date, including how to contact local fire, police and rescue departments. Some examples of questions to answer in your disaster document: Do you have a written crisis management plan? Has it been tested recently? Do you know when to call in authorities, and who has the authority to make the decision? How are visitors and vendors controlled in your building? Do your security procedures reflect what you really expect employees will do?

6. Tailor your business continuity spending to real threats and key priorities.

Recent events have made us think of terrorism as a major threat, but for small businesses like ours, there are more pressing and diverse threats. Things such as employee or non-employee workplace violence, cyber threats (including computer viruses and denial of service attacks), electrical disruptions, tornadoes or other storm related damages are, for most businesses, much more appropriate threats to invest in remediation efforts against.

7. Successful recovery is like a recipe – everything has to come together at the right time.

Your business should also consider asking critical vendors about their plans and capabilities to deal with emergencies. Relying on one or more critical vendors to keep your business going could be dangerous because a crisis that affects them could spill over to your company if they’re unable to provide goods or services.

8. Regional disasters have a way of mandating priorities you weren’t even aware of.

It is a good idea for your business to look at the immediate area surrounding your facility and perform a risk assessment. Are you near a river, stream, dam or lake?

Focusing on employee safety will pay off during a disaster, since knowledgeable employees are an important key to your company’s recovery plans.

« Previous Page

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.