• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Productivity

Documenting Business Processes

June 30, 2015

Scott Blake is a Senior Network Engineer with Tech Experts.

Documentation is quite possibly the most important aspect of a business, but it can also be workers’ least favorite task to do. The average person doesn’t want to spend time writing down how they do something — they just want to do it and move on.

Can you guess the biggest reason for documenting your business processes? It may come as a surprise, but it’s also the most fluid part of your business: your employees.

Employees come and employees go and some just take vacations. It’s what they do in between that’s important. Every employee is responsible for some part of your daily business.

Whether an employee quits or just needs time off, having documentation that lists the software used with usernames and passwords, step-by-step instructions on how to use the business software, client and vendor contact information, and credit card information makes their absences that much easier to deal with.

Well-documented processes will cut down on the time it takes to train a new employee.
Give the related information to the new employee and let them use it as a guide for their daily activities. This will allow your other employees to spend more time on their tasks and assignments instead of spending the majority of their time answering routine questions that a documented process could answer.

Order-of-operation questions and disputes can be minimized as well. If there ever comes a time when your employees are unsure of the next step or there is a dispute between departments on how to proceed, they will only need to look over the documented processes in question to resolve the issue.

Having documentation that shows in detail how long it takes to produce a product will also help your sales force deliver your product to your customers.

It allows your sales and marketing departments to understand the timelines of production.

This knowledge will let them know when a product order can be delivered and if the amount can be fulfilled in the timeline requested by the customer. There will be no more over or under promising of delivery dates to customers.

Put trust in the documents, not the person. No one person should be trusted with remembering processes without documenting them. What if this employee quits or becomes ill and is unable to return to work?

For example: You have an employee that works in your IT department. This employee’s job is to monitor and resolve any network related issues. While doing his daily tasks, he discovers it’s time to change the passwords on the business networking equipment such as the router, managed switches and domain admin password.

While the employee doesn’t think twice about it and may have mentioned it to his manager, there was nothing ever documented. Now, four months later, the employee falls very ill and is unable to return to work. What do you do?

The best way to document your business processes is to document them in such a way that all contributing employees have access.

You could use online tools such as Google Docs or Microsoft SharePoint. This way, whenever a process is changed, amended, or removed, the documentation is instant and available for all to see.

After a while, you will have an impressive collection of documented procedures. Having documented information available for employees to read can also start the flow of constructive questions and comments why things are done a certain way and how they can be improved.

If you have questions or you’re looking for suggestions on documenting your processes, call Tech Experts at (734) 457-5000.

Is Skype For Business Right For Your Company?

April 30, 2015

Last month, Microsoft released its vision video preview for Skype for Business, which suggested some major changes to ways we currently conduct business.

The video shows a wrist-worn communication device that allows you to contact colleagues on the fly. It also illustrates how Skype can help people be virtually present in the office while actually working in the field.

Skype-powered technology can integrate data into one space and share it on a big screen to facilitate brainstorming, can instantly translate speech into a number of languages, and even simulate a doctor’s house call – if what is depicted in the preview becomes a reality.

Really, nothing in Microsoft’s Skype for Business preview is all that far-fetched. Skype has already drastically changed how people keep in touch on both business and personal levels.

Presently, you can video chat with anyone, anywhere to conduct interviews or meetings. It’s not that big of a leap to envision using Skype to do these same things in the great outdoors or to integrate it with web searches and data files. The basic technology is already there; the vision video just shows some tweaks and new exciting applications.

The possibilities illustrated in the preview video highlight Microsoft’s mission to develop cross-platform technology that increases productivity.

While Skype for Business may not initially perform as seamlessly as the video leads us to believe – especially when real-time translation has yet to be perfected – there are products already advertised that do similar things.

Microsoft’s Surface Hub combines Skype with an 84-inch touchscreen display, and the HoloLens promises to take holograms and headsets to the next level.

Remote Access And Security For Your Business

March 26, 2015

Working remotely is on the rise and is revolutionizing how business is conducted as a whole. As companies make the switch from centralized networks that require being physically present in the office to expansive virtual environments, it is possible to access corporate data from just about anywhere. Those companies that resist embracing remote access risk being left behind technologically and miss out on all of the benefits using things like clouds or application virtualization can bring.

Just by providing remote access to corporate files and programs, employees can work from anywhere on the fly. This allows your team to work on projects while at home or out of town, greatly increasing productivity and reducing the stress of trying to meet deadlines when life gets in the way and prevents being physically in the office. Remote access also lets employees view or share important documents from other devices, such as smartphones or tablets, to quickly verify information on the fly or perform last-minute tasks with ease.

With remote access, new security concerns also arise. With the transfer of sensitive data, there is the risk of it being intercepted by a third party that isn’t committed to your company’s success or has the intent of doing harm.

Consequently, it crucial to secure your remote access system. Secure remote access will ensure that files are encrypted during transfer, scan for malware, authenticate user identity, and control who has access to particular information.

In these ways, proper security measures not only prevent those outside the company from gaining access to private data, but also manage who can view and use data internally.

With the proper security, a business can thrive beyond expectation. Employee performance can skyrocket by having access to work data 24/7 and from any location because physical presence in the office is no longer a prerequisite to getting work done.

Business continuity is also greatly improved because inclement weather or natural disasters don’t shut down operations and the meeting of deadlines. Secure remote access can even boost employee morale and productivity by facilitating work in varied locations using multiple access mechanisms.

If you require assistance setting up or securing remote access to your business, let us know and we will show you what works best for your situation.

Risks When Employees Use Their Own Mobile Devices

February 12, 2015

Michael Menor is Vice President of Support Services for Tech Experts.

BYOD (Bring Your Own Device) is an exciting development for increasingly mobile and interconnected employees, but also a new challenge for IT security teams.

Gone are the days where security professionals can lock down a finite set of machines and facilities; instead, they must manage an ever-growing, ever-changing landscape of employees, devices and applications, many of which have access to information that needs to be protected.

According to an article on eWeek, a survey was done on organizations with mobile devices connecting to their networks: only 33 percent have any official BYOD policy governing the use of personal portable devices, 67 percent do not.

The security risks are inherent in BYOD between viruses, hacking, improper security, and more. Flat-out thefts of smartphones, laptops, and tablets are also an issue.

In New York City alone, police data show that Apple products were stolen in a total of 11,447 incidents in the first nine months of 2012. That is an increase of 40 percent compared to the previous year.

Of course, employee education and awareness are important as informed users are more likely to act responsibly and take fewer risks with company data. Unfortunately, employees can be careless and criminals crafty, which is why network security defenses and policies are so critical.

Although implementing a restrictive device policy may feel like the most secure approach for your company, it can easily backfire.

Your craftiest employees are going to find a way to connect their devices to your network no matter what. And employees who do obey your “no iPhones” message will probably resent the policy and experience lower productivity.

Bring Your Own Device conceptToday’s workers expect to have 24/7 access to their information. They want to be able to catch up on emails on the evening train ride home or access information while away from the office.

BYOD lets IT staffs eliminate the hassle and expense of provisioning, distributing, and maintaining hundreds of corporate-owned mobile devices.

But setting up a BYOD program isn’t without its challenges. For starters, when you give employees free rein to bring in their own devices, you put your corporate documents and data at the mercy of the native security on these devices.

When you consider that many of your employees probably have “1234” as the PIN on their iPhones, that’s a pretty sobering thought.

Another major concern is your network. When you allow today’s increasingly powerful smartphones and tablets to request resources from your network, you really put your infrastructure to the test.

Are you ready to serve data instantly to hundreds of increasingly powerful hand-held mobile devices?

What if your mobile employees want to watch training videos, play back webinars, or listen to conference call recordings on their devices – can you deliver this kind of bandwidth?

Like most things, there are upsides and downsides, but a decision should be made on what best suits you, your employees, and your business.

When it comes down to it, BYOD isn’t a completely ridiculous idea. In fact, the benefits of BYOD may be worth the extra security precautions required to implement it.

(Image Source: iCLIPART)

Remote Employees And Network Connections

February 12, 2015

Scott Blake is a Senior Network Engineer with Tech Experts.

As businesses begin to downsize their ecological footprint, the need for remote or satellite employees grows. Business leaders and owners are now faced with the daunting question on how to allow remote employees access to their existing network without compromising network security.

One of the best ways to accomplish this is through the use of VPN.

VPNs allow secure access to business resources by creating encrypted pass-throughs via the Internet. The Internet, combined with present-day VPN technology, allows businesses a low cost and secure means to extend their networks to their remote employees.

The two most common methods in which to set up remote access are IPsec (IP Security) or SSL (Secure Sockets Layer). Both methods work well and both have their advantages depending on the needs and size of your business.

VPNs created using SSL technology provide remote-access connection from almost any Internet-enabled location or device using a web browser interface.

No special client software needs to be preinstalled on either device. This makes SSL VPNs a true “anytime, anywhere” connection to company-managed desktops.

There are two different SSL VPN connections to choose from: clientless and full network access.

Clientless requires no special software. All traffic is transmitted and delivered through a web browser.

There is no need to install or download any unique software to establish the connection. With clientless access, only web-enabled programs and apps are able to be accessed, such as email, network file servers and local intranet sites.

Even with such limited access to network resources, this style of connection is well-suited for most businesses.c868266_m

Additionally, because there is no need for special software to be supported by the IT department, businesses can cut down on managed overhead.

A full network access VPN allows access to almost any program, application, network server, and resource connected to your business network. Unlike clientless access, full network access connection is made through the use of VPN client software. Because the client access software is dynamically downloaded and updated, it requires little or no desktop support.

As with clientless access, you have the ability to customize each connection based on employee access privileges. If your remote employees require the full functionality of installed programs and applications as if they were sitting inside the office building, utilizing a full network VPN connection is the obvious choice.

IPsec based VPNs are the staple of remote-access connection technology. IPsec VPN connections are created by using installed VPN client software on the user’s workstation and connecting device.

Client software allows for greater customizability by modifying the VPN client software. Businesses are able to configure and maintain the appearance and function of the VPN client, which allows for easier implementation for connections with other desktops, kiosks, and other special need cases.

Many businesses find that IPsec connections meet their requirements for the users, but the advantages of self-updating desktop software, accessibility from non-company managed devices, and customizable user access make SSL VPNs a front runner for remote-access connections to your office.

If you have any questions or would like more information about how a VPN can help your company, you can reach Tech Experts at (734) 457-5000.

(Image Source: iCLIPART)

Most Employees Use Work Computers For Outside Activities

December 12, 2014

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

GFI Software, a leading software tool provider for companies like Tech Experts, recently released a report that found the personal use of company computers and other devices is leading to major downtime and loss of confidential data in many businesses.

The study of about 1,000 small business employees who used a company-provided desktop or laptop computer found that 39 percent of them said their businesses have suffered a major IT disruption caused by staff members visiting non-work related websites with work-issued hardware, resulting in malware infections and other related issues.

Even more alarming, the study showed nearly 36 percent of staff members said they would not hesitate to take company property, including email archives, confidential documents and other valuable intellectual materials, from their work-owned computer before they returned the device if they were to leave their company.

[Read more…] about Most Employees Use Work Computers For Outside Activities

The Real Risks Of Running Outdated Software

December 12, 2014

Michael Menor is Vice President of Support Services for Tech Experts.

Are you still holding onto your trusty old server that’s aging towards uselessness?

Or perhaps you are still running important applications on older servers with old operating systems because they’re “good enough” or “doing the job just fine.”

In many ways, your old server is like a trusty old car. You know where the kinks are and it gets you where you need to go.

But lurking below the surface of that trusty old car, and your old server, can be hidden risks that can result in very big problems, even dangers. Usually, when least expected.

Security risks are the number one danger of older technology. The older your operating system or application, the longer the bad guys have to find and exploit vulnerabilities.

This is especially true when the manufacturer is no longer actively maintaining support. Dangers can lurk across the entire aging application platform.

Your older versions of SQL Server are at risk. Perhaps you are still using an old FTP server that’s innocently sitting in the corner. Or you have some older network equipment and appliances.

The bottom line is anything that listens on the network is a potential threat to the server, and therefore your business.

If that software or firmware isn’t up to date, you’re doubly at risk of a major security incident.

Here are the top 5 risks you’re taking with running outdated software:

Crashes and system downtimec505825_m
Aging systems are more vulnerable to failure, crashes and corruption causing significant downtime.

Targeted technology upgrades can reduce total annual outage risk and reduce downtime.

Increased costs
Outdated software is more expensive to maintain than newer versions. Failing software increases costs by overloading IT personnel. The process of applying patches is also costly and time consuming.

Updated software portfolios not only decrease maintenance costs but also free up IT budgets for more strategic and innovative programs.

Decreased productivity
Aging software applications that crash or require maintenance result in reduced employee productivity.

Modernizing software increases productivity by improving the efficiency and quality of work.

Security holes
Mission critical software is more vulnerable to security breaches as it ages. A security breach can compromise sensitive customer and employee information, and proprietary company data.

Legal and regulatory compliance risks
Updated software ensures compliance to governance, regulation and policy as regulatory bodies continue to mandate new global requirements.

This is especially important for healthcare professionals that need to comply with new HIPAA regulations.

With older technology, any of the above risks can strike you at any time. The consequences can be loss of productivity, or worse, loss of critical data that negatively impacts your business.

Perhaps “good enough” isn’t really good enough after all.

(Image Source: iCLIPART)

Benefits Of Going Paperless

August 22, 2014

Michael Menor is Vice President of Support Services for Tech Experts.

The “paperless office” has been a concept in American business culture since 1979, when it was first coined in Newsweek. As the technology improves and becomes more cost effective for small businesses, the paperless office is becoming a reality for more and more small companies. If you are considering going paperless or adopting a document management system, consider these five benefits.

Increased Productivity
Call it a variant of Murphy’s Law — when you need a paper file, it is inevitably located at the bottom of a large stack of files on the floor in the corner of somebody’s office.

For example, law firm personnel can spend literally hours every year looking for paper files. In an industry that typically charges by the hour, that’s not a productive use of time.

By contrast, you can immediately retrieve a scanned file from your document management system. With a document management system, multiple people can retrieve a given document at the same time, improving efficiency.

When you scan a document, you get an image of that file. To convert the image of the text into searchable text, you can use optical character recognition (OCR ) software — often included with a scanner.

Once you’ve made scanned files searchable, it becomes even easier to find them because you can search for any phrase in the document, such as a client name, not just the name of the document itself. This makes it incredibly easy to find invoice numbers or any other information that is usually hidden deep within a document.

Improved Customer Service
At one time or another, everyone has been on the receiving end of the dreaded phrase “I’ll have to check the documents and get back to you.” Consider how much happier your customers would be if you could say, “Let me pull up the document now and check for you,” resolving their question during a single phone call?

As an added bonus, the ability to search documents makes it less likely that you’ll overlook that key piece of information. More efficient service means happier clients who pay their bills faster.

Even better, improving your client relations will make your clients more likely to hire your firm for other services and make it easier for them to refer your business!

Reduce Operating Costs
Storage costs represent a major expense. Typically, office space is second only to salaries in terms of cost, especially in large cities. As the piles of paper grow, so do your storage costs.

Scanning documents can substantially reduce storage costs by eliminating a significant portion of your paper files and the storage space required to store them. You can then put the space once used for storage to more productive use.
c852522_m
Before you call a shredding company, read your state rules on the retention of physical files, especially in practice areas such as Real Estate or Financial Services.

Even if you have to keep the files for a specified period of time, scanning them will enable you to store them off-site as cheaply as possible. Scanning documents also reduces time spent requesting documents from the file room or even warehouse.

Finally, since you can easily email scanned documents, you can reduce your phone bill by faxing documents less often. Some paperless law firms have even eliminated their fax machines entirely and switched to online fax services.

With a paperless office, you can almost entirely eliminate the costs of printing, such as copy paper, ink and toner. With toner being one of the most expensive liquids on the planet, this can equal huge cost savings for your small business.

Better Security
Paper documents are subject to two risks — physical theft and destruction from a variety of disasters (fire, flood, etc.). When you scan confidential documents, you can restrict access to your eyes only. For example, you can limit the access of sensitive information or specific case files to select people.

Law firms subject to federal and state regulations regarding the protection of client information will find compliance significantly easier with scanned documents. Also, replacing a digital file is much easier than trying to replace a file cabinet destroyed by fire or flood.

Environmentally Sound
If environmental issues are important to you and your business or you have clientele that care about these issues, going paperless can boost your status in the community.
For example, digitization of your files will result in fewer photocopies, reducing company paper consumption.

The less we use today means the more we leave behind for future generations. If you are part of the Green Revolution, making your business paperless is a great place to start.

Going paperless will save your firm time and money – but be wary of anyone selling you a magic software product that will fix all your problems. Like anything else, you get out of it what you put into it.

There are many organizations that can help with this type of solution, but make sure their company culture matches you own. After all, the last thing you want is to try and go paperless with the help of Xerox or any copier company whose main interest is in hardware and consumables.

(Image Source: iCLIPART)

Ten Ways To Minimize Workplace Interruptions

July 31, 2014

Time Concept on Striped Background.You may be trying hard to practice your organizing techniques but still manage to complete only a few of your tasks at the end of the day. It may be due to uncontrolled workplace interruptions.

We suggest ten ways to minimize interruptions in the workplace without sacrificing your role of being accessible and available to co-workers and clients:

1. Use your voicemail when you are doing something important that needs your uninterrupted attention and concentration especially with a deadline. Schedule a time to respond to your messages.

2. Instead of checking your email every few minutes and responding immediately to each email, set a schedule on which times of the day you should read and respond to email messages.

3. If you are someone whom your co-workers often ask for company policies or procedures, create an FAQ and make it accessible to co-workers.

4. When you are in charge of certain processes in the workplace such as reservations, create a procedure for the process in making requests such as an online form.

5. Clearly communicate information needs and turnaround times especially for job order requests in order to avoid unnecessary follow-ups.

6. Block out time on office calendars so you can work without interruption.

7. If you are on a tight deadline or working on something extremely important, make yourself unavailable for interruptions by working outside your office – even if it is just the empty conference room.

8. If you are able to adjust your schedule, take advantage of this opportunity such as working earlier than usual, or having a different day off and work when everyone’s off. This way, you will have less interruptions and you can get more work done.

9. Set certain hours of the day when you will be available to answer questions from co-workers.

10. If you are working on a project with different departments or co-workers, create a regular update meeting in order for everyone to be clearly updated with information and avoid wasting time updating each other individually.

(Image Source: iCLIPART)

Spring Cleaning Tips for Your Home and Office Computers

May 30, 2014

ПечатьSpring is a good time to get some cleaning done in your home as well as your office. Here are few tasks and tips you should check off your list, if you own a small business or if you simply are a computer user:

Back up your files
You should make it a routine and regularly back up your important files to the cloud or into an external hard drive. Delete old unnecessary emails and archive important ones. This will make it easier to locate specific email chains and will open up the storage space in your computer.

Update your security settings
You may assume that your home or small business or PC is too small a target for hackers, but that is simply not the case.
Internet security statistics show that hackers are targeting businesses with fewer than 250 employees due to the fact that it’s generally easier to hack into small businesses and home users.

As a rule, assume that any valuable information you have is at risk, and ensure you install the latest security patches and updates whenever they become available.

Take advantage of mobile technology
Research indicates that small businesses that do not accept mobile payments could be losing up to 1 trillion dollars annually. Many small business owners realize the potential of mobile technology, but 91% of them still don’t have mobile-optimized websites. If your business is not yet mobile friendly, it is important to start thinking about upgrading your services.

Go paperless
Going paperless will significantly reduce paper clutter and will minimize the time needed for spring cleaning. There are many affordable solutions you could adopt which allow you to maintain and organize critical business documents.

Manual clean-up
Your hardware and peripherals also need to be cleaned, so take some time to clean your keyboards, screen monitors and to check the batteries in your mouse or wireless keyboards. Also, remember to clean your printer and check whether or not you have installed all the required updates from the manufacturer and that all its parts work seamlessly.

(Image Source: iCLIPART)

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.