• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Tips

Eight Steps To Prepare For Business Disruptions

August 23, 2008

Summer Storms, Crazy Weather Highlight Need To Be Prepared

With the crazy weather we’ve been experiencing the past few weeks, now is the perfect time for your business to put together a basic disaster planning and recovery plan.

Here are some key points to consider:

1. Prevention costs less than recovery, and it’s faster.

When a disaster occurs, one of the first questions asked after the smoke clears (or the debris is cleared) is how it could have been avoided. That’s the prevention component – and the issue for most businesses is when they want to answer that question, and how much they are willing to spend to avoid a major disruption to their business.

2. Don’t put all your eggs in one basket.

Our professional recommendation is to spread “vital” operations across more than one location if at all possible. Full backups should be performed every business day, and stored off site. The key thing here is, backups must be tested – this means you need to frequently pick random backup sets and attempt to restore from them.  In far too many cases, data that was thought to be securely backed up couldn’t be accessed when the chips were down.

3. When disaster strikes, the first thing to go haywire is the plan.

Your business should review the disaster plan for adequacy (are you covering all the bases) and currency (has the plan been updated to match your new technology?). Special attention should be paid to new systems and processes that weren’t in place in the business when the initial plan was developed.

4. When disaster strikes, your competitors will notice.

If your company doesn’t maintain market presence and reputation after a disaster, the absence can create a vacuum in the market place. This being the case, competitors will step up to fill that void.

5. Remember the four “P”s of disaster planning – People, property, priorities and planning!

Your company’s security plans should be up to date, including how to contact local fire, police and rescue departments. Some examples of questions to answer in your disaster document: Do you have a written crisis management plan? Has it been tested recently? Do you know when to call in authorities, and who has the authority to make the decision? How are visitors and vendors controlled in your building? Do your security procedures reflect what you really expect employees will do?

6. Tailor your business continuity spending to real threats and key priorities.

Recent events have made us think of terrorism as a major threat, but for small businesses like ours, there are more pressing and diverse threats. Things such as employee or non-employee workplace violence, cyber threats (including computer viruses and denial of service attacks), electrical disruptions, tornadoes or other storm related damages are, for most businesses, much more appropriate threats to invest in remediation efforts against.

7. Successful recovery is like a recipe – everything has to come together at the right time.

Your business should also consider asking critical vendors about their plans and capabilities to deal with emergencies. Relying on one or more critical vendors to keep your business going could be dangerous because a crisis that affects them could spill over to your company if they’re unable to provide goods or services.

8. Regional disasters have a way of mandating priorities you weren’t even aware of.

It is a good idea for your business to look at the immediate area surrounding your facility and perform a risk assessment. Are you near a river, stream, dam or lake?

Focusing on employee safety will pay off during a disaster, since knowledgeable employees are an important key to your company’s recovery plans.

Tips For Handling, Storing, & Disposing Of Confidential Documents

August 23, 2008

In the past 10 years, over 10,000 new regulations have been placed on the books by local, state and federal agencies pertaining to the handling, storage, and disposal of confidential client, patient, and employee documents.

A few examples are:

  • SEC Rule 17a-4 Electronic Storage of Broker Dealer Records Graham-Leach-Bliley Act
  • Financial Services Modernization Act
  • Sarbanes-Oxley Act
  • DOD 5015.2 Department of Defense
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Fair Labor Standards Act
  • Occupational Safety and Health Administration (OSHA) Act
  • Payment Card Industry Data Security (PCI DSS)

No matter how small your business is, you are surely going to be affected by one or more of these new government regulations. Naturally some industries are more regulated, such as financial or medical, but all companies that hold information such as employee social security numbers, credit cards, financial statements (credit applications, bank statements, order forms) fall under these new regulations.

While we cannot cover every single aspect of protecting your company, here are a few tips that will go a long way in making sure you don’t end up fined, sued, or with a bad reputation for not securing your clients information:

Seek professional help. If you think you are holding confidential information that should be secured, ask a qualified attorney who specializes in data confidentiality in your industry about what you must do to meet new government regulations.

Shred all documents that contain confidential information. A good shredder should do a cross cut or diamond cut versus a simple strip shredder to make it more difficult for someone to piece together a shredded document.

If you have to keep a copy of contracts or other documents that contain confidential information, contact a high-security document storage facility like Iron Mountain (ironmountain.com) and they will store your documents in a high-security location.

Keep a fire-proof safe with a lock and key for employee documents you need to keep onsite.

Make sure your offsite backups have 32-bit encryption (ask your provider).

Also make sure the facility where the information is stored is under lock and key with security camera and access-controlled security.

Sam Walton’s 10 Rules for Building a Phenomenally Successful Business

July 23, 2008

Sam Walton, the founder of the Wal-Mart chain, had 10 rules for building a business that he adamantly believed in. According to the Wal-Mart website, the following are the principles that have enabled the company to experience more than 40 years of outrageous success:

1. Commit to your business. You have to believe in it more than anyone else. You have to have passion. Love your work and do it the best you can every day.

2. Share your profits with all your associates and treat them as partners. This will make the people who work for you perform beyond your wildest expectations. Behave as a servant leader.

3. Motivate your partners. You have to constantly think of new ways to motivate your partners.

4. Communicate everything you possibly can to your associates. The more they understand, the more they’ll care.

5. Appreciate everything your associates do for the business. Nothing else can quite substitute for a few well-chosen, well-timed, sincere words of praise. They’re absolutely free and worth a fortune.

6. Celebrate your success. Have fun. Find humor in your failures. Loosen up.

7. Listen to everyone in your company. And more important, try to get them talking. The ones who really talk to the customers are the ones who really know what’s going on.

8. Exceed your customers’ expectations. Give them what they want–then give ’em a little more.

9. Control your expenses better than your competitors. You can survive a lot of mistakes if you’re efficient.

10. Swim upstream. Ignore the conventional wisdom; find your niche by going another direction.

Take Caution Before Opening your Next e-greeting Card

July 23, 2008

According to a new article in PC Magazine, cyber criminals are now starting to exploit e-greeting card sites in an attempt to steal confidential information.

In 2007, nearly 1/3 of infected e-mail messages contained a phishing scam, while 7 percent of such e-mail messages masqueraded as an electronic greeting card and directed the target to a malicious site.

Here’s how it works: Hackers place a malicious hyperlink in the e-mail greeting, which first sends the user’s web browser to an exploit server that checks to see if the user’s machine has the most up-to-date security patches.

If it’s unpatched, the server silently force-downloads a rootkit and a keylogger onto the user’s computer before redirecting the web browser to an authentic Yahoo greetings card.

On the user-facing end, the victim clicks the link to view the card. However, the card does not let them know who sent it. The victim closes the card and goes about his business without realizing arootkit was delivered to his PC before he even picked up the card.

How do you avoid this from happening to you? First, never open emails from unknown sources. Second, make sure your PC/Servers always have the most up-to-date security patches. And finally, always maintain an active, up-to-date anti-virus software.

Three easy Steps to get Seven Years of Hassle Free Service From Your Laser Printer

June 11, 2008

Printers – the necessary evil of every office. From paper jams and error messages, to problems like smearing, misfeeds, and ghosting, printers can really make your blood pressure rise.

Plus, it’s easy to sink thousands of dollars into maintenance and repairs. If you want to avoid common printer problems AND save yourself a small fortune on replacements and repairs, follow these 3 easy steps:

Keep It Clean
There is no faster way to gunk up a laser printer and cause printing problems than by letting it get dirty.

On a monthly basis, use compressed air to blow out the inside of the printer. Remove the toner cartridge for better access, and don’t forget to do the back if it is accessible. It also helps to take a vacuum to the outside. If you print labels or use any other type of specialty media like transparencies, use rubbing alcohol to clean the rollers inside the printer.

Do Your Maintenance
You can almost infinitely extend your printers lifespan by doing the regular maintenance suggested by the manufacturer.

This includes replacing rollers, filters, and occasionally replacing the fuser (the printer’s internal furnace.) Here’s a little money-saving secret: you only need to do this type of maintenance at 1.5 to 2 times the manufacturer’s usage recommendation.

So, if the manufacturer says to replace rollers every 100,000 pages, you really only need to do so every 150,000 to 200,000 pages.

Use a Surge Protector
Nothing will send your printer to the bone yard faster than an electrical surge caused by lightning or other issues on the power grid.

When internal components are fried, it is often cheaper to buy a new printer than it is to fix the existing one. It is easy to protect yourself with a $25 surge protector. DO NOT plug a laser printer into a UPS or other battery backup system. The printer’s power draw is too much for a battery to handle.

Has Your Computer Been Taken Over By a Bot?

June 11, 2008

David Perry, global director of education for security software provider Trend Micro, was recently quoted in PCWorld as saying, “An unprotected [Windows] computer will become owned by a bot within 14 minutes.”

A bot is an automated program that takes over your computer and uses it as a spam machine, to copy your personal information, such as credit cards numbers, or something equally as evil.

One way to spot a bot is to be aware of network activity when you aren’t on the Internet. You can put a network status light in your system tray. If you see it blinking when you are not using the Internet, there might be a problem.

Do this: In Windows XP, choose Start, Control Panel, Network Connections. You will see an icon for your network connection. Right-click the network connection and select Properties from the popup menu. Check “Show icon in notification area when connected,” and click OK.

Remember, lots of unexplained network activity can mean your computer is “owned” by a bot.

Double check by going to one of several free scanning sites such as McAfee Free Scan or Trend Micro’s House-Call. Then buy antivirus software, install a firewall, and never open e-mail attachments from unknown sources.

What To Do When Things go Technically Wrong

June 11, 2008

It’s amazing how many things can go wrong with your computer; bad drivers, hardware malfunctions, viruses, software glitches, spyware… and this is only the beginning. Computer problems always seem to happen at the most inconvenient times and can leave you stranded for hours, even days without a computer. However, vendor “help desk” support can be frustrating and in some cases, expensive.

The next time you have a computer problem, here are six simple things you can do to try and resolve the problem yourself or to at least prepare and get the most out of your help desk support.

1. Check your connections. This may sound obvious, but check all the cables to make sure they are plugged in securely. Don’t ignore this step because USB, printer, and serial cables have a way of working themselves loose and causing problems.

2. Reboot. Windows sometimes gets into a state of confusion or overload and locks up. You can clear the memory and set things straight by simply rebooting your system. Similarly, if you’re having a problem connecting to the Internet, try rebooting your cable/DSL modem and router by unplugging them for 15 seconds to reset them.

However, this isn’t something you should have to do often. If you find yourself rebooting your router once a day, the problem is a bit deeper. If you still can’t resolve the problem yourself, then here are a few more steps to take before calling support that will save a lot of time and get your problem resolved quicker…

3. Try to narrow down the problem as much as possible. Identifying what went wrong is 90% of the journey to the solution. Try to isolate when and where the problem happened and note the last thing you installed, changed, or plugged in to your computer. You’ll also want to narrow down the error message as much as possible.

For example, if you discover your printer isn’t working from Word, try to print from another application.

Maybe you can print when you first boot up, but everything seems to go haywire after you scan a document. Does the problem occur all the time or only after the machine has been running for a while? Does the problem repeat itself or is it only occasional? Observing what situations lead up to a problem can be a great help in determining what is causing it.

4. Access crash logs. If you are using a Microsoft operating system, you can access an application called Dr. Watson that will report information about your memory and configuration to a crash log file.

In Windows XP, the default location is C:\Documents and Settings\All Users\Application Data\Microsoft\ Dr Watson. The crash log is a text file called Drwtsn32.log, which can be read in Notepad or sent via e-mail to a tech-support person.

5. Know your system. When you talk to a support technician on the phone, they are going to want to know what specific hardware, operating system, and software you’re using.

To save time, know the make and model numbers for all your hardware. You can access CPU and memory info by selecting Control Panel | System. Drill down from here into Hardware | Device Manager for information about other devices such as your sound and graphics cards.

Write down new software, no matter how small or insignificant, that you’ve downloaded and installed lately, including upgrades, screen savers, emoticon software, and web browser updates. It can also help to jot down any services running in the background.

To access a list of what is running on your Windows XP system, press Ctrl-Alt-Del and select Task Manager. You can also get very detailed info from Start | All Programs | Accessories | System Tools | System Information.

6. Back up your data. Before you start following directions over the phone from a support technician or tearing your system apart to fix it yourself, make sure you have a backup of all your important documents, e-mail, and other data.

Although many fixes will be as simple as downloading a new driver, you’ll be glad you have a backup if you find yourself reinstalling the operating system. You should also have your original CDs around in case you need to reinstall applications.

The ExpertsMobile: “What the heck is it?!”

June 11, 2008

 

What the heck is it?! Boy, do we get that question a lot!

The “ExpertsMobile” is a 2008 Smart fortwo. It is a two seat (“for two,” get it?!) gasoline-powered car manufactured by Smart, a division of Daimler. That’s right, it is a 100% gasoline engine, not electric. We’re averaging about 40 miles per gallon driving around town.

The fortwo received four out of five stars in front impact crash tests, and five out of five stars in side-impact crash tests, so it is very safe! The body panels are made out of 100% recyclable materials. And it has a lot more space for transporting sick computers than you might think!

We like the Smart for a couple of reasons, but most importantly, it is smart for the environment, and smart for our company, since it saves us so much money on gasoline and maintenance. Plus, it’s fun to drive!

The Smart is like our philosophy in supporting small business computer networks: The latest appropriate technology, delivered in an efficient and cost effective way.

If you’d like to learn more about the Tech Experts Smart car, visit: www.SmartComputerGuys.com.

For more information about Smart cars, visit www.smartusa.com.

 

Is Your Company Getting Slandered Online?

May 11, 2008

New “Online Identity Managers” Are Becoming A Must For Business Owners Who Need To Keep Their Online Reputation Clean…

A recent front-page story in the Washington Post brought to light a fast-growing trend in today’s digital world: online identity management.

According to the article, Sue Scheff, a consultant to parents of troubled teens, was getting slandered online after one of her clients turned on her, calling her “a con and a fraud,” and accusing her of taking kickbacks and destroying people’s lives. Negative comments were being posted on online bulletin boards, forums, and threatening videos were posted up on YouTube for the world to see.

Even though Scheff sued for defamation and won an $11.3 million verdict, the attacks worsened. To resolve this situation, Scheff was forced to hire ReputationDefender, a PR firm that cleaned up her reputation online.

While the costs for hiring this firm were steep (reputation management firms charge $15,000 to $100,000 for their services), the cost of her time, litigation and reputation make their fees seem like a drop in the bucket.

So what should you do if you are an average Joe small business with limited resources? Fortunately, an ounce of prevention is worth a pound of cure, and you can easily monitor your image online for free with a few simple steps.

First, the easiest way to check your online reputation is to Google your name or the name of your company and see what appears. Next, set up a Google Alert on your name and your company name. You’ll be alerted by e-mail whenever you or your organization has been mentioned in a blog, by the media, or in an online forum.

Next, make sure your website and your company is coming up first in search engines. If you own the top positions online, negative media may not show up on the first listing when your name is Googled.

To do this, create a profile of your expertise using social bookmarking tools and news aggregators such as del.icio.us and Newsvine.

Contribute to online forums and write articles for user-generated content sites such as Squidoo. You can even create book and product reviews at Amazon.com to help establish your authority on a particular topic or subject matter.

You should also create a blog for yourself and your company, and then link that to your main web site. Tech Experts can help you set up a blog using your existing domain name. Post to your blog frequently and make sure your posts are key-word relevant.

Other obvious ways to put a positive spin online about your company is to create content pages on social media sites such as YouTube, Facebook and MySpace.

Finally, be very careful about posting any incriminating evidence about you or your company or sending e-mails with incriminating information, tasteless jokes, or messages that could easily be misconstrued.

You don’t want a search on your name to bring up pictures of you in compromising situations or sexist, racist, or off-color jokes you thought were only being sent to your friends. If you wouldn’t want it posted to a billboard, don’t post it or send it via e-mail.

Rebate alert! Don’t Get Ripped Off!

May 11, 2008

The offers are irresistible but misleading; retailers advertise after-rebate prices on hardware and software to grab your attention and get you to buy. But are you really getting the bargain you expected?

They’re Counting On You To Forget
According to the NPD Group, a global market research firm, almost one-third of all computer products and twenty percent of all consumer electronics are sold with a rebate. Manufacturers use rebates as an easy way to offer discounts without actually having to take the full financial hit; that’s because thirty to fifty percent of the buyers never attempt to redeem them and therefore end up paying full price for the merchandise.

Get Ready To Jump Through Multiple Hoops
To further tip the scales in their favor of not having to pay out, some manufacturers and retailers are imposing impossible restrictions, complicating the process to request a rebate, delaying payments, and creating other barriers that make it difficult to get your money. All of these are delay tactics to get you to give up on the idea of getting your rebate out of frustration.

New Laws Protect You
With consumer complaints to the FTC and Better Business Bureau piling up, regulators have tightened the rules around advertising rebates.

Last year, the Federal Trade Commission settled its first dispute with a Dallas-based CompUSA store for knowingly advertising rebates from computer peripherals manufacturer Qps Inc., even though they knew this manufacturer wasn’t fulfilling on the rebates advertised.

After this settlement, CompUSA was not only required to advertise the time frame for securing the rebates advertised, but also had to take financial responsibility for any rebates not paid during the promised time frame.

Even though the government is on your side, getting stuck in the middle of a rebate war is very frustrating and a huge waste of time. If you are going to try to cash in on a rebate, here are some tips that will help.

5 Tips To Collecting Your Promised Rebate:

  1. Follow the rebate instructions carefully. Many manufacturers will reject a rebate over a tiny technicality. That means reading the small print and following the instructions to the letter.
  2. Make a copy of all the paperwork, receipts, and documents before mailing them off. Some manufacturers may request the original receipt; if you mail in your only copy, you could be out of luck if it gets “lost” in the mail. Which brings us to tip #3…
  3. Mail your rebate via certified mail to have proof of delivery.
  4. Schedule a reminder to yourself to call the company if your rebate doesn’t show up within the time frame promised. Most companies will have a web site or toll-free number to call to track your rebate.
  5. If the manufacturer rejects your rebate or is holding your check, let them know you plan on contacting the FTC or the BBB. Ask the people you speak to for their names and ask to speak to their supervisor.
« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.