• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Tips

Creating Guest Accounts for Visiting Relatives

December 29, 2007

The holidays are right upon us and there’s a good chance some of your relatives will want to use your computer while visiting. If you want to give them access but don’t want them viewing your personal files, then you’ll need to set up a guest account. This will give them access to your programs, but not to your personal files. Here’s how…

Click the “Start” button then “Control Panel.” Double-click “User Accounts,” then click the “Guest Account” button. On the next window, click “Turn on the Guest Account.” That’s it! The next time you log on, you’ll be given a choice of your regular accounts or the Guest Account. Just have the in-laws select the Guest Account and your files are safe from their prying eyes.

If they’re really nosy, put a password on your account. Simply go back to the “User Accounts” window and click “Change an Account.” Choose your account, then click “Create a Password.” Enter the password twice, and a hint if you like. Finish by clicking “Create a Password” and repeat the steps for the accounts you want protected.

How To Make Your Business Website Pop!

November 29, 2007

5 Simple Tips Explain How To Distinguish Your Business Online

Untangling the mystery of the World Wide Web can be a lot like walking into quicksand: The more you get into it, the harder it is to get where you want.

Credit the sheer number of sites that populate the Web, creating clutter that makes it hard for small businesses to distinguish themselves.

Ultimately, it’s the business owners who devote time to their websites that reap the greatest rewards online.

Business websites are a lot like a car: If you don’t put gas in it and get regular oil changes, it won’t perform for you. The same goes for the Web, where sites that aren’t useful or current do little good for their owners.

One way to maximize your Web investment is through a process known as “search engine optimization” or SEO. This combines design elements, text, and keywords to ensure that the site gets the best recognition from the major search engines.

To maximize their SEO strategies, companies should define their niche market, then decide how they want that customer base to find them on the Internet.

Since it’s getting harder and harder to distinguish yourself online, here are five tips to make a splash on the Web:

1: Wow them from the first page. First impressions mean everything on the Web, so your site’s front page must shine in order to be effective.

A company’s front page should forgo bandwidth-heavy graphics and instead feature a bulleted list of services and a simple, readily accessible way to contact the company for an estimate or more information.

Subsequent pages can showcase your portfolio, testimonials from satisfied customers, and links to free e-newsletters.

2: Make it user-friendly. It’s age-old advice, but companies still aren’t adhering. Ease of use equates to both a pleasant visiting experience and marketing effectiveness. Use clear language, useful links, and navigation bars to steer customers in the right direction.

3: Make them eager to return soon. Attracting visitors is important, but persuading them to return is even more important.

Create long-term online customers by incorporating relevant self-assessment tests, surveys, and other tools with related products and services your business provides. This ensures an educational, interactive experience for the client and is a great marketing tool for your company.

Start with a simple biweekly newsletter, a blog, or a chat forum on a topic of interest to your customers.

4: Get back to basics. Browse through a few sites and you’ll quickly discover that accessing basic information can be a challenge.

To make sure your visitors don’t get turned off by poor navigation, broken links, and irrelevant information, be sure to give them a clear explanation of your product or service, making sure to highlight exactly what makes your firm and its offerings unique.

5: Give them the royal treatment. When designing your site, put yourself in your customers’ shoes. What do they want to see or know? What format most suitably presents this information? How can you keep them interested and make the experience fun?

Do You Make These Mistakes When Sending E-Mail?

October 26, 2007

In this day and age, it is amazing how many businesses and professionals still violate basic e-mail etiquette rules. Almost everyone uses e-mail to communicate with their clients and friends yet very few give any thought to the importance of those communications.

If you want to make sure you are not offending your clients and friends when sending e-mail, here are 6 basic rules to live by:

1. Never send e-mails to people who have not requested to receive them.
This is also known as spamming and federal laws are getting much tougher in the rules and penalties for sending unwanted e-mail messages. Many businesses make the mistake of thinking that they are free and clear to send e-mail promotions to their clients, even if the client has not specifically requested to get those promotions. When in doubt, it’s always smarter to err on the side of caution and NOT include them in your broadcast; doing so could cause you to lose favor with your clients, or worse yet, lose their business altogether.

2. Don’t attach files unless you’ve gotten permission to from the recipient.
With the looming threat of viruses, it’s considered bad net-etiquette to send file attachments.

3. DO NOT USE ALL CAPS.
Using all caps in an e-mail is the online equivalent of screaming at the top of your lungs. Unless that is what you intended to do, make sure you use lowercase letters.

4. When sending to a large list of people, use the BCC (blind carbon copy) feature.
Otherwise, you are exposing every recipient’s e-mail address to everyone else on the list. Since most people like to keep their personal e-mail addresses private, exposing your entire list will cause you to lose quite a few brownie points.

Here’s another point to consider: I wish I had a nickel for every sales person that sent out a broadcast e-mail to all their clients and prospects and accidentally copied everyone on the list. This is an EASY way for your competition to get their hands on one of your most precious assets.

5. Never send information you wouldn’t want the entire world to know about.
E-mails can quickly spread around the Internet. Never send confidential information, off-color jokes, political opinions, pictures, or gossip that you wouldn’t want made public. This goes double if you are using a business e-mail address. And if you are a business owner, you want to make sure your employees know that it is against company policy to send this type of information through your company e-mail. Even a well-meaning joke can land you in a lot of hot water if taken the wrong way. Always take a minute to think before you hit the “send” button.

6. Avoid fancy formatting, background graphics, and other “cute” pictures and fonts.
What looks great on your monitor may be impossible to read on someone else’s; it also may annoy the reader who has to weed through the fluff to find the content.

Survey: Success Tethered To IT Strategy

September 26, 2007

If you’re not a tech advocate, or realize the value of information technology (IT)  to your small business, it’s very likely your company will not expand as fast as you’d like or expect.

In fact a new survey of entrepreneurial mid-sized businesses, in which respondents shared insight on what moved their business ahead, notes that while recruitment, staff retention and meeting new regs are big business challenges, the top barrier is not understanding the importance of an IT strategy.

The “Business Rearview Mirror” survey ranks “managing IT to the best advantage” as the second key element in entrepreneurial success.

Small and medium sized businesses (SMB) and their tech leaders should integrate IT into the corporate strategy as early as possible. About 18 percent of respondents note that “not integrating technology into business strategy sooner” was the biggest mistake made.

And not only should SMB leaders endorse and support IT, but they should strive to be a techie and learn as much as they can—from what tech is available to what’s being used in the enterprise.

An SMB owner’s technology savvy seems to correlate directly to business success -73 percent of respondents who rate themselves as “total geeks” reported double-digit average annual growth in their businesses over the past five years.

Close to half (48 percent) of “total geeks” reported that their businesses reached the 100-employee milestone with in five years of launch, compared to just one-third of all survey respondents.

Seventy-four percent of respondents were “totally involved” in IT decision making during their companies’ early growth.

However, among the fastest growing firms (those reporting more than 20 percent average annual growth over the past five years) 49 percent reported they had a dedicated IT person or department on the payroll before they reached 100 employees in size, compared to just 24 percent for the entire survey population.

So by now can you guess the biggest business stumble SMBs make when it comes to IT?

The answer: “Not taking advantage of the technology acquired,” despite the fact that a majority ranked major technology applications for having the most significant impact to the bottom line.

That’s why it is so important for small and medium sized companies to have a trusted IT advisor, like Tech Experts.

(Special thanks to Judi Mottl of the Small Business Resource Blog, located at www.smallbizresource.com  for this article. )

Five Steps To Integrating Your Small Business’ Computer Systems

August 26, 2007

Your small business is growing fast. Your technology needs are changing just as rapidly. But starting over with a totally new system isn’t an option – who can afford the downtime? Sometimes it can feel like needing to change a tire, but not being able to afford to stop your car.

A better solution is to replace components you’ve outgrown – such as software or a lower-end printer – and add them to the existing computer system.

Tech Experts relies on a methodical approach to integrating new technology for our clients – a five-step process that any small business can follow when adding PCs or software:

1: Identify the problem 
When your business sees its customer satisfaction, efficiency and employee satisfaction levels plummeting, you know it is time to make a change.

But even if your company isn’t experiencing bottlenecks, there may still be opportunities to improve overall efficiency.

We suggest companies start by looking at whatever they do repeatedly for customers. Then, seek out technology that can help the business do that work faster or better. Remember, inefficiency is expensive!

2: Determine What You Need
Once you’ve zeroed in on things needing improvement, the next step is finding the best technology for the situation. In most cases, small business owners shouldn’t be making such choices themselves, but many still try to “cobble it together.”

Whether you hire our firm, or another technology expert, we strongly advocate hiring an tech consultant to recommend equipment and a plan for the future.

We also advise sticking with name-brand hardware and software to avoid most major problems. Ninety percent of a small business’s needs can be handled by off-the-shelf products, many of which are already seamlessly integrated. Basically, this means that they’ll “play nice with other equipment.”

3: Develop a plan 
After selecting (us) as your computer experts, the next step is creating a plan for getting from where you are to where you need to be tech-wise. A timeline, equipment list and critical steps should be part of that plan, including how employees will be brought into the loop.

One of the key things business owners overlook is their personnel. While many employees may be ahead of the curve in their familiarity with different technologies, don’t assume everyone is. Some may actually be tech-averse. Don’t jump too far ahead with the technology. Take incremental steps and everyone can use the new features and benefit from them, rather than being frustrated.

4: Install the Equipment
Likewise, the fewer systems the better. Sixty percent of enterprise software sits on a shelf unused. Only invest in computers and software that will improve your company’s performance. Don’t implement technology for technology’s sake – do it to make more money.

Training should also be a part of your roll-out plan, as well as access to consultants for post support and maintenance.

5: Keep It Maintained 
Contracting with a professional computer company like Tech Experts and keeping software and hardware up-to-date will assure that your technology and your business run smoothly – and continue to grow together.
Give us a call today at (734) 457-5000, or send us an email at: sales@expertsmi.com.

Thank you!

5 Simple Ways To Avoid Getting An Avalanche Of Spam

July 26, 2007

As you probably already know from firsthand experience, once you’re on a spammer’s list, it’s next to impossible to get off. And changing your e-mail address can be a major inconvenience especially if you rely on it to stay in touch with important business and personal contacts.

To reduce the chances of your e-mail address getting spammed, here are 5 simple preventive measures you can take that will go a long way in keeping not-so-delicious spam out of your in-box.

Use a disposable e-mail address
If you buy products online or occasionally subscribe to websites that interest you, chances are you’re going to get spammed.

To avoid your main e-mail address from ending up on their broadcast list, set up a free Internet e-mail address with Hotmail or Juno and use it when buying or opting in to online newsletters. You can also use a throwaway e-mail address when making purchases or subscribing to newsletters.

Pay attention to check boxes that automatically opt you in
Whenever you subscribe to a website or make a purchase online, be very watchful of small, pre-checked boxes that say, “Yes! I want to receive offers from third party companies.”

If you do not un-check the box to opt-out, your e-mail address can (and will) be sold to every online advertiser.  To avoid this from happening, simply take a closer look at every online form you fill out.

Don’t use your main e-mail address on your website or forums
Spammers have special programs that can glean e-mail addresses from websites without your permission. If you are posting to a web forum or newsgroup, use your disposable e-mail address instead of your main e-mail address.

If you want to post an e-mail address on your home page, use “info@” and have all replies forwarded to a folder in your in-box that won’t interfere with your main address.

Create throwaway e-mail accounts
If you own a web domain, all mail going to an address at your domain is probably set up to come directly to you by default.  For example, an e-mail addressed to anything@yourdomain will be delivered to your in-box.

This is a great way to fight spam without missing out on important e-mails you want to get. The next time you sign up for a newsletter, use the title of the website in your e-mail address. For example, if the website is titled “successsecrets.com,” enter “successsecrets@yourdomain.com” as your e-mail address. If you get spammed, look at what address the spam was sent to.

If successsecrets shows up as the original recipient, you know the source since that e-mail address was unique to that web site. Now you can easily stop the spam by making any e-mail sent to that address bounce back to the sender.

Don’t open, reply to or try to opt-out of obvious spam e-mails
Opening, replying to, or even clicking a bogus opt-out link in an obvious spam e-mail signals that your e-mail address is active, and more spam will follow.

The only time it is safe to click on the opt-out link or reply to the e-mail is when the message was sent from a company you know or do business with (for example, a company that you purchase from or a newsletter you subscribed to).

Take Advantage Of These Microsoft Incentives

June 26, 2007

As your local Gold Certified Microsoft Partner, and a Microsoft Small Business Specialist, Tech Experts has access to special promotion and incentives direct from Microsoft.

Microsoft Financing 6/50 Promotion, Ends: July 31, 2007

Use Microsoft Financing for any IT solution including Microsoft software and we will finance not only the hardware portion, but also the software and your services as part of the total solution.

You pay only $50 per month for six months, followed by 36 regular monthly payments. When you use Microsoft Financing, you conserve your capital, preserve your corporate credit lines, and own the hardware you purchase outright. Plus, you can add IT solutions to your contract at any time during the term of the loan.

Windows Server Partner Subsidy Program, Ends: June 29, 2007

Your business is growing, and Windows Server® 2003 R2 provides a winning platform for small and medium businesses. Now until June 29, 2007, Microsoft is offering partner subsidy dollars worth up to $10,000 to customers purchasing between three and twenty-five Windows Server® 2003 R2 Open licenses that include Software Assurance. That adds up to great growth investment!

Participate In Microsoft’s Business and Technology Assessment Program (Ongoing Promotion)

Spend 30 to 45 minutes working with a Tech Experts professional completing your small business technology assessment, and be entered in a monthly drawing for a $100 cash prize.

The assessment program consists of a series of questions designed to get an overall picture of how you use IT in your day to day business operations.

 

Finally! A Way To Stop Spam, Spyware And Pop-Ups From Taking Over Your Computer

June 26, 2007

If you are absolutely fed up with the number of spam e-mails you get every day, the annoying pop-ups being shoved in your face when you surf the net, and advertisers installing spyware on your computer to monitor your every move and serve up unwanted ads, then please read on.

We’re Waging War Against Spam, Spyware, and Pop-Ups!
Just recently we polled our clients to find out what their biggest frustration currently is with their computer networks.

Not too surprisingly, an overwhelming number of you said “SPAM” with pop-ups running a close second on the list of things that make you crazy.

That’s why we’ve decided to launch a war against spammers and unethical online advertisers for our clients by offering a FREE “Stop The Ads” audit.

We’ll Show You How To Stop Spammers And Unethical Advertisers In Their Tracks
During this free audit, one of our senior technicians will come onsite to review your network and uncover loopholes that allow spammers and advertisers to penetrate your network and install unwanted spyware on your computer.

Note: Spyware is a small program that online advertisers download to your computer without your permission or knowledge so they can monitor your web surfing and steal your confidential information. Sometimes they can even read your credit card information!

During this FREE “Stop The Ads” audit we’ll show you how to:

  •  Eliminate pop-ups finally and forever.
  •  Quarantine virus-riddled spam before it ever gets to your in-box.
  •  Filter spam without blocking important e-mails from clients and associates.
  •  Clean out any spyware installed on your individual PCs or network.
  •  Bulletproof your network from viruses and other cyber criminals.

And If You Are Not Currently Hosting Your Own E-mail In House, We’ll Also Show You How To:

  • Save hundreds or even thousands of dollars on costly bandwidth and ISP fees by bringing your e-mail in house.
  • Prevent your ISP’s spam filter from blocking important, non-spam e-mails you need to receive.
  • Make it easier to set up new e-mail accounts.
  • Stop employees from accidentally (or intentionally!) sending illegal, inappropriate, or confidential information via e-mail.
  • Set up a safe and secure filing system to store all of your important e-mail.
  • Eliminate the file size limitations on your in-box.

Here’s How It Works:
To request your free “Stop The Ads” Audit, simply call our offices or fill in and fax back the enclosed form.

If you have three or more computers in your office, we will send one of our senior, professional technicians to your office. If you have less than three computers, we’ll make arrangements for you to bring your machine into our professional repair shop.

Our technician will be on time, guaranteed. He will evaluate your network for FREE and give you a straightforward situation analysis, and explain the options you have available for eliminating spam, spyware, and pop-ups.

We will also give you a guaranteed price in writing – not an estimate – for the options you want to try. If you agree to allow us to do the work (you are under no obligation), we can usually start right away!

EVERY job is backed by our exclusive Peace of Mind Guarantee: if you are not happy with the work or the technician doing the job, simply say to the technician “this is not what I had in mind.”

That will be his cue to stop the work, restore your network, and leave your office – AND YOU WON’T PAY ONE PENNY!  No questions, No argument, No guilt, No payment. You can consider the job cancelled and the work ON US.

As you can see, we don’t think you should take a chance on hiring ANY computer support company – even us. We strongly feel that the client is number one and to prove our commitment to you, we are willing to put ourselves on the line.

It’s that simple and you have nothing to lose!

Give us a call at (734) 457-5000. You’ll be glad you did!

Michigan Man Fined For Using Free Wi-Fi

June 26, 2007

A Michigan man has been fined $400 and must work 40 hours of community service for using a local café’s Wi-Fi connection from his parked car to check his e-mail and surf the Web.

He got off easy, according to the local TV station that reported the case: under Michigan computer access law, using a Wi-Fi connection without authorization is a felony, punishable by as much a $10,000 fine and five years in prison.

But the story raises more questions than it answers, including whether the café’s Wi-Fi connection was a fee-based service, which would imply authorization was required, or a free service that, without any security restrictions, could be accessed by anyone within range, including someone outside the restaurant.

The story also doesn’t say whether the defendant, Sam Peterson II, of Sparta, Michigan was convicted of the crime or pled to the charge.

Peterson routinely drove to Sparta’s Re-Union Street Caf, to check his e-mail but never went into the coffee shop.

His regular routine drew the attention of Sparta Police Chief Andrew Milanowski, who asked Peterson what he was doing. Peterson told him.

After checking the Michigan statutes, the chief swore out a complaint of fraudulent computer access, and Peterson was charged.

Should You Be Concerned About Internet Cookies That Give Advertisers Unauthorized Access To Your Computer?

May 26, 2007

With the endless number of online hoaxes, viruses, phishing scams, and other threats, many people are suspicious of any online program that shares their personal information with the rest of the world – and rightfully so.

However, cookies aren’t always the menacing tools of surveillance many people believe them to be, and in most cases, they do more good than evil.

Unlike viruses and spyware, cookies are not programs that allow unauthorized access to your computer. Rather, they are simple text files that, on their own, can’t do much of anything.

Most cookies are designed to enhance web browsing. On a shopping site, for example, they can store a list of items you’ve selected to buy as you browse through an online catalog. They can also remember your web browsing preferences whenever you visit a particular site.

Most web browsers allow cookies to be read only by the web site to which they belong. This prevents other sites from tracking your online activities. However, some advertisers will put cookies on your computer as a way to recognize your computer at other web sites associated with that advertiser. These are called “third-party-cookies” and they allow advertisers to track your online activities across multiple and different sites.

These are the type of cookies that are good to block. Fortunately, blocking third-party cookies is easy. In Internet Explorer, click the “Tools” menu, and then choose “Internet Options.”

Then click the “Privacy” tab and then the “Advanced” button. Make sure the checkbox “Override automatic cookie handling” is checked. You’ll see options for first-party and third-party cookies. In the third-party cookie options, click “Block.” Then, click “Ok.”

Of course, you should always use a firewall, an up-to-date anti-virus program, and anti-spyware software to protect yourself from real online threats.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.