• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Tips

How Strategic Business Continuity Planning Can Prevent Losing Money And Customers

January 20, 2012

The concept of business continuity planning is nothing new to conscientious business owners.

Without a doubt, the ability of an enterprise, large or small, to recover from catastrophic events and continue to provide an acceptable level of service to its customers  while maintaining a satisfactory level of profits is a basic requirement of good business practice.

Although such awareness has always been a feature of good management, the startling events of September 11 2001 has brought the world into a heightened state of preparedness for disaster.

Why the need for continuity and disaster planning?

Increasingly, natural disasters continue to surface in one place after another.

Consider recent major floods, earthquakes, tsunamis, hurricanes, corporate crimes and malicious attacks upon computer systems in nation after nation and you will sense the pressing need for sound business continuity planning to avoid disruptions due to technology and other failure.

Another factor which contributes to this need is the changing business climate in view of the expansion and increasing accessibility of the Internet over the past decade.

So organizations which formerly rendered services to their customers during fixed hours of business, now find themselves offering their services on an extended schedule, even 24 hours a day, seven days a week.

This means that customers have grown accustomed to this ready access to their suppliers and vendors. And now the reality is that consumers have become less and less tolerant of interruptions in a company’s service and availability.

Business continuity planning – is it just for big business?

Business continuity planning now takes on an increasingly important role, not just for larger enterprises, but for small businesses alike.

In fact for small businesses it is even more critical to be ready to respond to the needs of its customers.

Customers expect this and have no problem locating alternate suppliers who stand ready to take your place in the market!

This is true whether you are in the manufacturing or service business, marketing and sales or any other facet of business.

Your network – a key  component in business continuity 

Nowadays a company’s IT System with its network of computers has become the backbone of many businesses.

Vital functions such as Data Processing, inventory and  payroll management, Internet based operations including online sales, human resource and training systems, project management and an almost endless variety of other business functions are critically dependent on the efficacy of your computer system.

Clearly then, any technology disruption can have disastrous consequences.

Therefore business continuity planning often deals  extensively with maintaining a dependable IT system.

This brings into focus not only the hardware components of the system and its application programs, but also the data contained in the system.

Ways to ensure continuity

Some of the key components that determine system reliability include Data Storage Devices, UPS systems, power generator systems and so on.

And nowadays, Cloud Computing is being relied upon to extend the reliability of Computer Systems and ensure business  continuity in the event of major failure.

There seems to be a tendency to use the expressions ‘business disaster recovery’, and ‘business continuity’ interchangeably.

However upon closer examination it becomes clear that the two concepts are quite distinct.

Continuity of service is the desired state we want to maintain while recovering from any unexpected calamity whether an extended power outage, Computer System failure or other problem.

Such continued operation calls for a comprehensive plan that covers the most probable occurrences.

From this information it can be seen that ensuring business continuity calls for a strategy regardless of the size of the business.

As disasters continue to increase in frequency and magnitude, more and more careful thought must be given to your company’s preparedness to respond in the event of any business threat.

The increasingly prominent role of computers in business calls for highly reliable data backups, hardware redundancy, and keen, effective planning as a way to ensure business continuity in the event of any catastrophe.

Does VOIP Phone Service Make Sense For Your Business?

December 19, 2011

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.
When we moved our office last month, part of the process included reviewing things like our telephone and Internet services.

Voice-over-Internet Protocol (VoIP) telephone service is basically technology that allows you to make and receive calls over data networks.

Instead of traditional phone services which channel analog signals such as the sound of your voice over copper wires, VoIP converts these sounds to digital form first—so that they can be sliced, diced, packaged, and routed over a digital network.

Because VoIP technology uses the same ideas behind data networking, and allows the use of the same networks used by computers, voice traffic can also be routed through the Internet as well.

Suddenly you can now dramatically reduce the cost of voice communications, as well as achieve creative combinations of both services to create new applications for use.

VOIP (voice over IP) services have really evolved over the past few years. In the past, I’ve been hesitant to use it because the service could be flaky – and since 90%+ of our business comes in by telephone, I wasn’t comfortable with something that wasn’t reliable.

Fortunately for small business owners, that’s changed. The service is now as reliable as service from the phone  company. And with the ubiquity of high speed Internet service, call quality has improved to the point of being indistinguishable from the old telephone network.

Our switch to VOIP provided two significant improvements over the service we used before.

First, we increased our telephone line capacity and coverage. We’ve added telephone numbers for our client’s in Toledo, Dundee, and the downriver area to be able to call us locally.

Second – and perhaps more importantly – we’ve cut our  telephone costs in half.

Cost and coverage were my primary concerns when looking at a move to VoIP services. Here are a few reasons you may want  to consider switching to VoIP for your office:

You can make and receive calls from multiple devices – for instance, on a dedicated phone, your PC via a software-based phone, or even a mobile phone with VoIP capabilities.

It’s easier to add extensions to your phone. You can provide a local number or extension for all your staff without  additional costs or cabling.

VoIP allows your employees to be more productive and  efficient by giving them the ability to receive and make  calls anywhere with a data connection.

You can use VoIP as a tool for real-time collaboration along with video conferencing, screen sharing, and digital white boarding.

You can potentially unify your communication channels,  streamlining communications and information management—for instance, marrying email with fax and voice in one inbox.

You can employ presence technologies that come standard with VoIP phones and VoIP communication systems. This technology can tell colleagues about your presence or give you info on the status and whereabouts of your staff.

Beware: Online Banking Phishing Schemes Are On the Rise

December 19, 2011

Banking online is a convenient and time saving way of managing and keeping track of your company’s finances.

Weak security practices, though, can make it more possible for cyber-thieves and hackers to steal your hard-earned money. It is important to make sure that all possible steps are taken to safeguard your company’s finances.

Online banking is a tool that many businesses utilize because of the ease, efficiency, and convenience it offers.

It’s a great way to manage finances in your day-to-day operations. Unforunately, as more businesses turn to online banking, cyberthieves and hackers who target small companies are becoming more adept at stealing from companies online.

Security experts are urging companies to beef up their security systems to keep them safe from cyber and identity theft.

The more companies rely on the Internet, especially when it comes to managing finances through online banking, the more prudent it is to take steps to prevent that hardearned money from being stolen or diverted to someone else’s account.

One tip experts give is to establish proper protocols for transacting with the bank, such as requiring two people to verify a transaction before it is approved.

This helps create a checks-and-balance system that hackers can’t bypass.

Having a dedicated workstation used for only online financial transactions is also recommended, as this lessens the likelihood of it being infiltrated by Trojans, viruses, spyware, and other malware that may come from the machine being used for other purposes.

Having the right anti-virus and antimalware software – and keeping it updated – also goes a long way in keeping your online banking transactions safe from unfriendly eyes.

Your finances are the lifeblood of your business. If you’re interested in how you can make your online banking experience more safe and secure, we’d be happy to sit down with you to discuss security solutions that are tailor-fit to your specific requirements and needs.

Give us a call at the office, (734) 457-5001.

Top 5 Reasons To Be Thankful For Technology

December 19, 2011

When you’re looking back over the last year at what helped make for a good year, technology will definitely make the list!

Giving credit where credit is due, here are the top 5 reasons why we should be thankful for all the new technology we used this past year:

1. It allows us all to be more “earth-friendly.”
Thanks to e-mail and the Internet, as well as document imaging, we can all communicate with each other without having to waste paper and ink, not to mention stamps!

2. We can instantly access information on practically any topic we want, whenever we want.
If you need to find a Mexican restaurant within a mile of your location, you can not only find one, but also check out the menu and order online so your food is waiting for you when you get there!

3. It keeps us in touch.
Although it can easily be argued we’ve gone too far in this department, cell phones, blackberries, and even online forums (blogs, Facebook, MySpace) have enabled us to find and stay in touch with more people more frequently.

4. It saves us time and money.
Nothing has done more for the consumer than the Internet. In minutes, you can search and compare various products and services without having to make a phone call or get in your car. Plus, you can order just about anything online and have it shipped to your door.

5. It’s a great scapegoat for any number of mistakes you’ve made.
Missed an appointment? Blame your system being down. Don’t want to talk to someone? Use the old, “I have no bars in this area,” excuse. Overlooked an important client’s request? Just tell them you never got the email!

What are WE most grateful for? Those of you that trust us to make all the computers and gadgets work the way they are supposed to!

Thank you for a fantastic 2011 – here’s wishing you and your family the very best for 2012!

How To Shop Online More Safely And Securely

November 30, 2011

These tips can help you determine that you’re shopping at a secure and trustworthy website.

Look for signs that the business is legitimate. Buy only from reputable stores and sellers. Here are some ways to check.

Find out what other shoppers say. Sites like Epinions.com or BizRate have customer evaluations which can help you determine a company’s legitimacy.

Look for third-party seals of approval. Companies can put these seals on their sites if they abide by a set of rigorous standards such as how personal information can be used. Two seals to look for are the Better Business Bureau seal, and the TrustE certified privacy seal.  If you see the seals, click them to make sure they link to the organization that created them. Some unscrupulous merchants will put these logos on their websites without permission.

Look for signs that the website protects your data. On the web page where you enter your credit card or other personal information, look for an “s” after http in the web address of that page. This shows that the web page is encrypted. Encryption is a security measure that scrambles data as it traverses the Internet.

Also make sure there is a tiny closed padlock in the address bar, or on the lower right corner of the window.

Use a filter that warns you of suspicious websites. Find a filter that warns you of suspicious websites and blocks visits to reported phishing sites. For example, try the SmartScreen Filter included in Internet Explorer.

Keep your web browser updated.

It helps protect you when you shop online.

Internet Security: What Are They Surfing At Work?

September 28, 2011

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

A recent survey of business owners and IT managers found that employees are using company computers, Internet access, e-mail, and other resources to conduct hours of non-work related activities.  And the problem is on the rise.

Some of these activities simply waste time, like day trading and monitoring eBay bids. However, some of the activities are malicious and can cause serious issues with a company’s server and network.

Here are a few incidents that were reported by the IT managers that were surveyed:

• One employee was caught running a gambling website and acting as a bookie for his co-workers.

• To bypass the company’s web filter, one employee was caught using his desktop computer as an FTP server for the other employees. He had downloaded and saved over 300GB of material, all on his work computer, using his company’s Internet connection and undoubtedly slowing down their systems.

• One employee was caught giving away confidential information such as price lists, contracts, and software code for application development.

• Another employee had a pretty lucrative side business stealing and selling company inventory on eBay.

• One woman was caught running an online “outcall” service from her desk.

• One employee was caught renting the corporate IP address to hacker friends to attack other company’s computers and networks.

While these scenarios seem outrageous, they are not uncommon. Of the 300 companies surveyed, almost one-third have fired an employee in the last 12 months for violating e-mail policies, and 52 percent of companies said they have disciplined an employee for violating e-mail rules in the past year.

Educating your employees through an acceptable use policy is simply not enough. If the requirements are not enforced, employees will accidentally or intentionally violate your rules.

That’s why every company needs to invest in good e-mail and web filtering software. Just having it in place will act as a deterrent for such activities. If something really is going on – like an employee leaking confidential information to a competitor or sending racial or sexist jokes through your company’s e-mail – you’ll be able to catch it and resolve the issue proactively, instead of reacting to it after the fact.

Additionally, a good web filter will prevent employees from accessing inappropriate material online, wasting time on non-work activities, downloading viruses and spyware, and using up company bandwidth to download photos and music.

Networking Equipment: What’s It All Do?

September 28, 2011

There are many times when explaining to clients what piece of hardware needs rebooted or reset that they do not know what we are talking about when we reference the piece of networking equipment by name.

Even if you do know what is meant by router, modem, switch, hub, etc., you might not know what the equipment does, and why you need it.

Today is your lucky day! Below is a brief explanation of what the various types of networking equipment is, what it does, and why you need it.

Let’s start from your Internet service providers (ISP) main line into your house or business and work our way up to your computer. It all begins with your modem – this is how you initially connect to your ISP’s main line into your building.

The modem is what connects you to your Internet provider, and secures an IP address for your computer or network to connect to the Internet.

The next piece of hardware in line is normally your router.

Some network installations don’t have a router, usually because the modem supplied by the Internet provider has one built in, or the computer connects directly to  the modem.

A router allows you to have your own network IP scheme and communicate from your network to your ISP’s network.

Routers allow you to expand your network beyond the one device that most ISP’s modems allow by creating a larger subset of IP addresses for your computers to connect to which is then “routed” to your ISP’s IP address and out to the Internet.

This is why they are called routers, they route network traffic. Some routers also offer the ability to connect wirelessly to your network.

These connections act exactly the same way except for the fact that they do not have an Ethernet cable plugged into the computer you are using to connect with and there is increased security on the wireless connection to prevent unauthorized connections to your network. Some routers also offer a high grade built in firewall.

So as you can see routers can come in many different flavors and configurations.

The final piece of hardware in the chain of networking hardware is your switch.

In general switches are designed to be connected to your router and offer more Ethernet ports for you to connect devices to your network.

Most routers offer on average five Ethernet ports – a switch gives you the ability to expand on the number of available Ethernet ports that can connect to your router.

If you want to have multiple devices connected to your Internet connection while keeping your network secure give us a call and we can guide you on selecting the proper equipment as well as getting it setup properly for you.

If this kind of equipment is not configured properly you may not be able to connect to the Internet at all.

Featured Article Written By:
Tech Experts

Five Ways to Manage Your Company’s Social Media And Online Reputation

June 27, 2011

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Your company’s online reputation is one of your most valuable assets. A good reputation instills confidence in clients and prospects, and gives you the upper hand when competing for business.

In large part, social media has taken the control of a company’s brand and placed it in the hands of the consumer. It doesn’t matter how you define your brand, it all comes down to what your audience says.

One negative comment on a social networking site can spread like wildfire. To help prevent that, here are five tips on managing your company’s social media and online reputation.

Set up e-mail alerts
An e-mail alert will send you links to any new web activity around a keyword or search phrase. Use variations of your company’s name and the names of key employees. While alerts won’t show you everything on the web about your company, it provides an excellent daily snapshot.

Keep an eye on industry forums
Discussion forums are a combination of blogging and social networking. If there are forum sites for companies in your industry, they bear close monitoring. They are a breeding ground for oftentimes anonymous and unfounded consumer complaints.

Consumers will often turn to a forum when they have troubleshooting questions about a product. They are looking to their peers for the solution to their problem.

By becoming an active member of the popular forums in your industry, you’ll be able to directly respond to customer questions or complaints, building a stronger reputation and customer service program in the process.

Social media silence = death
If you find your company on the defense, make sure you respond quickly and efficiently. Companies no longer have the luxury of waiting a week, a day, or even a few hours to issue a press release to tell their side of the story.

When bad news breaks, respond quickly. Social media is all about instant connections, so clients have little patience for a company that takes their time responding to a bad situation.

Build strong relationships with industry leaders
Almost every industry has a blog (or blogs) dedicated to it. Popular and well respected bloggers have quite a bit of power when it comes to a business’s online reputation. A popular blog reaches thousands of people a day, so what they say has a far-reaching effect. Having a popular blog author on your side means you have their unspoken endorsement.

It also means that you have a strong support network if someone starts attacking your company online. Having a community of industry leaders on your side is a great way to defend your company’s online reputation.

Keep communication lines open
One of the easiest ways to hurt your online reputation is to shut yourself off from clients and prospects. If you don’t allow them to communicate with you (for better AND for worse), you are removing yourself from the conversation.

Encourage your customers to write online reviews about your company. Thank the ones who write a good review, and definitely reach out to the ones who weren’t as positive.

Customers are the lifeblood of any business, and communicating with them quickly and honestly will build a strong and positive online reputation.

The best way to manage your online reputation? Be proactive. Invest the time to build a solid social media reputation and before you need to defend your company from attacks or criticism.

Five Microsoft Office Add-ins Help Improve Productivity

May 27, 2011

If your company does any type of word processing, data spreadsheets, or even use email then you probably know the benefits of having Microsoft Office.

Did you know that you can enhance your experience by using third party add-ins? An add-in is a mini program which runs in conjunction with a web browser or other application that enhances the functionality of that program.

Here is a list of add-ins for the Microsoft Office Suite. Keep reading to learn about some of the add-ins available to make your everyday tasks easier!

Duplicates Remover for Microsoft Outlook
Duplicates Remover is a powerful and flexible plug-in for Microsoft Outlook intended for the search and deletion of duplicated items in Microsoft Outlook folders.

Duplicates Remover can search in single folders as well as different folders for any duplicates. Duplicated items can then be set to automatically be copied or moved to another folder of your choice, marked with a flag letting you know that item already exists somewhere in another folder, or simply deleted.

Microsoft Mathematics Add-In for Word and OneNote
Microsoft Mathematics Add-in for Word and OneNote makes it easy to plot graphs in 2D and 3D, calculate numerical results, solve equations or inequalities, and simplify algebraic expressions in your Word documents and OneNote notebooks.

Microsoft Mathematics Add-in can add a little extra help when planning your budget for next year, or simply create great visuals using its graphing feature.

SendLater for Microsoft Outlook
SendLater is an easy-to-use and convenient email scheduler with a recurring email option. It allows you to schedule automatic email, follow up and handle your email correspondence in a timely manner even if you are away from your computer.

It also allows you to send a delayed group message as a single email to all recipients or use the “Send personally” feature to conceal any information about other recipients of the same group message.

In this case the recipient will only see his/her name and address in the To, CC or BCC fields, as if the message has been sent to the recipient personally.

Ultimate Add-in for Microsoft Excel
The ultimate Add-in for Microsoft Excel includes a general collection of over 90 different utilities and more than 30 custom written functions to help make life with Excel a little easier. Ultimate Add-in will allow you to customize the menu to bring all of the menu settings in one place to easily show/hide the items you want.

Ultimate Add-in can also optimize your workbooks, rebuilding the whole data spreadsheets and saving the components to a series of files and reloading them into a blank sheet. Serious file space can be saved by using this utility.

Attachments Forget Reminder for Microsoft Outlook
Attachments Forget Reminder is a powerful Microsoft Office Outlook Add-In. It scans each outgoing email and if it finds any of the specified key phrases (e.g., “see attachment” or “in the attached file”).

If no file is attached to the message, the program will give out a notification. It then asks you if you meant to attach a fi le before sending the email, giving you a chance to insert the attachment. The add-in works with Plain Text, RTF, or HTML based email formats.

There is many more add-ins that you can install to improve functionality within the Office suite programs, these are just some of the few I like.

Go ahead and search online for yourself and see if you can find some good add-ins that makes your job simpler!

Twitter 101: A Beginner’s Guide To Tweeting Responsibly

May 27, 2011

Thanks to Charlie Sheen, everyone is talking about Twitter. Whether you love him or hate him, you have to admire his uncanny social networking skills and ability to generate some buzz.

In a nutshell, Twitter is a social media oriented microblogging site. A typical Twitter update – known as a “tweet” – might provide a quick update on what you’re doing or request help with a problem. All in 140 characters or less.

That’s “micro-blogging.” You can send updates from your PC, a cell phone, PDAs, tablets. How can Twitter be useful and how to sign up?

Twitter for fun and family
To use Twitter in your personal life…Keep your friends and family updated on your life when you don’t have the time or inclination to call or e-mail. You might tweet, “We arrived home safely from our trip” or “the car’s running again. It was just a fuse.”

Real life tweet: A passenger on a plane that skidded off a Denver runway last winter used his cell phone to tweet about the event moments after it occurred.

His friends never had to worry about his safety, because they got his tweet and learned that he was unharmed before the incident was reported in the media.

Arrange social activities, even at the last minute. Rather than place dozens of calls to find someone who is free, send out a single tweet. This tweet might read, “I’m going fishing. Anyone want to join me?”

Real life tweet: Basketball Star Shaquille O’Neal used Twitter to inform his friends and fans that he was sitting down to dinner alone in Phoenix. A pair of local basketball fans drove to the diner and hung out with him.

Solicit opinions, advice or assistance on short notice. You could tweet, “Can anyone suggest a good place for dinner in Albany?” or “My car broke down in Portland. Can anyone recommend a good mechanic?”

Twitter for business
To use Twitter in your professional life… Keep colleagues and clients up-to-date about schedules and plans. You could tweet, “Any customer expecting a service call today will receive one by 5:00 p.m. despite the snow” or “My flight was delayed. Can someone stand in for me at this afternoon’s meeting?”

Search for tweets about your company, industry, or products written by other Twitter users, and then provide fast feedback.

A plumber might offer responses to plumbing-related questions to build goodwill with customers. A manufacturer might respond to a complaint about a product with troubleshooting tips, turning negative buzz about the company’s customer service.

For example, cable company Comcast has a customer service employee monitor Twitter for mentions of Comcast and respond quickly.

The website TweetBeep (http://tweetbeep.com) and Twitter’s own search page (http://search.twitter.com) can help find relevant tweets.

Show clients and potential clients the person behind the business. Customers are more likely to trust you if they believe that they know you and like you as a person.

To build this human connection, tweet about your hobbies, your charitable work, or your company’s softball game, in addition to your business and products.

How to sign up
Twitter is easy to use. Visit www.twitter.com, click “Get Started-Join!” and follow the simple directions. E-mail a link to your twitter web page to keep friends, family, colleagues and clients posted on your life or business.

You can find people to follow by clicking on “Find people” from your Twitter home page.

Warning: Click “setting” then check the box by “Protect my updates” on your Twitter account page if you want to maintain control over who reads your tweets.

Leave this unchecked only if you do not expect to share sensitive information and would like to reach strangers as well as friends.

Always be careful. If you are going to be out of town for a few weeks, you may not want to tweet about that everyone can read your posts.

You can also choose to receive tweets from individuals on your cell phone. Though Twitter is free, your service provider may charge you when you send or receive messages from your phone depending on your plan.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.