• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Don’t Forget Your Phone’s Security Settings

May 23, 2023

It’s common for people to rely on their personal phones to keep in touch at work.

That’s not always the best idea, and there are lots of good reasons to provide company phones to your team (would you want to own the number and block access to sensitive data if somebody left?)

But whoever owns the device, you need to make security your top priority. Cyber criminals know how much valuable information lives on our mobiles, and they’re making phones a target.

If you don’t already have a mobile security and management strategy in place, it’s time you did. Here are our top 5 ways to keep phones secure:

Set minimum upgrade requirements

Cyber crooks and device manufacturers both work in three-year cycles. That means that, as threats evolve, so do the protections that address them. Upgrade devices to follow this cycle, and even if you’re using BYOD (bring your own device), enforce this rule if employees want to use their personal phone for work.

Implement mobile device management

MDM allows you to track the location of devices, lock/wipe their data remotely, and can help you access remote support for any issues. That means your data stays safe, even in cases of a lost or stolen phone. You can also create a list of apps that are to be blocked for security reasons.

Set up MFA (Multi-Factor Authentication)

Make sure all devices have biometric locks requiring facial or fingerprint ID to open them, and that all apps require MFA to log in. Only allow employees access to the software and files they need for their job.

Always update everything

Like all your devices, phones need to have the latest updates installed as soon as they become available.

If you have MDM in place, it’s possible to schedule updates across the entire team at the same time – ask us for more info.

Regular awareness training

You should hold regular cyber security training for your team that includes mobile devices. Your people are your weakest link when it comes to security. Keeping them up to speed on security risks can improve compliance.

It’s easy to overlook mobile devices when it comes to keeping your data secure, but it’s a vital step in protecting yourself against cyber attacks.

These Everyday Objects Can Lead To Identity Theft

May 23, 2023

You wouldn’t think a child’s toy could lead to a breach of your personal data. But this happens all the time.

What about your trash can sitting outside? Is it a treasure trove for an identity thief?

Many everyday objects can lead to identity theft.

Old smart phones

Our smartphones and tablets have become extensions of ourselves, storing a vast amount of personal information. If lost, stolen, or compromised, these devices can provide unauthorized access to sensitive data, including emails, contacts, financial apps, and social media accounts.

Make sure you clean any old phones by erasing all data or destroying the device.

Wireless printers

Protect wireless printers by ensuring you keep their firmware updated. You should also turn it off when you don’t need it.

Trash can

Identity theft criminals aren’t only online. They can also be trolling the neighborhood on trash day. Discarded items in your trash can reveal personal information that identity thieves can exploit. Dumpster diving is a common tactic used to extract valuable data, such as bank statements, credit card receipts, or pre-approved credit offers.

Always shred or destroy any documents before disposing of them, even those that may not seem sensitive at first glance.

It’s also wise to invest in a cross-cut shredder, which provides better protection compared to strip-cut shredders.

USB sticks

You should never plug a USB device of unknown origin into your computer. This is an old trick in the hacker’s book. They plant malware on these sticks and then leave them around as bait.

Old hard drives

When you are disposing of an old computer or old removable drive, make sure it’s clean. Just deleting your files isn’t enough. It’s best to get help from an IT professional to properly destroy your old computer hard drive.

We have a special drive crushing tool at Tech Experts – just let us know if you need some drives recycled.

Physical documents

Physical documents, such as bank statements, bills, medical records, and tax documents, contain a wealth of personal information. Disposing of them carelessly or leaving them unattended can be an open invitation to identity thieves.

Always shred sensitive documents before discarding them, especially those containing financial or personally identifiable information. Furthermore, consider digitizing important documents and securely storing them on encrypted devices or cloud platforms with strong authentication measures.

Children’s IoT devices

You should be wary of any new internet-connected kids’ devices you bring into your home. Install all firmware updates and do your homework.

ATMs

This is called skimming. Malicious actors can use hidden devices on ATMs or card readers to steal your card information during transactions.

Identity theft can have devastating consequences, impacting both your personal and financial well-being.

Safeguarding physical documents, securing mail, keeping wallets and purses safe, protecting mobile devices, and properly disposing of personal trash are essential steps in minimizing the risk of identity theft. Remember, vigilance and informed decision-making are key.

Data Backup Alone Is No Longer Enough

April 21, 2023

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Small businesses are increasingly relying on digital data to manage their operations. From financial records to customer information, digital data is the lifeblood of small businesses in today’s digital age. However, with the growing amount of data comes the need for increased data protection measures.

Backups are essential for protecting data in the event of a system failure or other unexpected event. But it’s important to understand that backups alone are not enough to ensure the safety and security of your business’s data. In addition to backups, businesses need to implement data protection measures to prevent data breaches, cyber attacks, and other forms of data loss.

Here are a few reasons why data protection is essential for small businesses: [Read more…] about Data Backup Alone Is No Longer Enough

Protecting Your Small Business: IT Security Tips

April 21, 2023

Small businesses are increasingly reliant on technology to manage their operations. From storing customer data to conducting financial transactions, businesses of all sizes rely on information technology (IT) to keep their operations running smoothly.

However, this reliance on technology also makes small businesses vulnerable to cyber attacks and data breaches. In this article, we’ll discuss some key IT security tips that small business owners can use to protect their companies from cyber threats.

Keep software up-to-date

One of the simplest ways to improve IT security is to ensure that all software is kept up-to-date. Software updates often include security patches that address vulnerabilities and other issues that could be exploited by cybercriminals. By keeping software up-to-date, you can help to reduce the risk of cyber attacks and protect your company’s data.

Use strong passwords

Passwords are the first line of defense against unauthorized access to your business’s digital assets. It’s important to use strong passwords that are difficult to guess or crack.

Passwords should be at least twelve to 16 characters long and include a mix of uppercase and lowercase letters, numbers, and symbols. To help remember passwords, consider using a password manager, which can generate and store strong passwords for you.

Limit access to sensitive data

Not all employees need access to all data. Limiting access to sensitive data can help to reduce the risk of data breaches.

Consider implementing a least privilege access model, where employees only have access to the data they need to perform their jobs. Additionally, consider implementing two-factor authentication, which requires a second form of identification beyond a password to access sensitive data.

Train employees on IT security best practices

Human error is a leading cause of cyber attacks and data breaches. Employees who are unaware of IT security best practices can inadvertently put your business at risk.

It’s important to train employees on IT security best practices, such as how to identify phishing scams, how to create strong passwords, and how to safely use company devices.

Implement a firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic. Firewalls can help to prevent unauthorized access to your company’s network and data. Consider implementing a firewall to help protect your business from cyber threats.

Back up data regularly

Data backups are essential for protecting your business’s data in the event of a cyber attack or hardware failure.

Backups should be performed regularly and stored securely, preferably off-site or in the cloud. This can help to ensure that your business can quickly recover from a cyber attack or other data loss event.

Consider cyber insurance

Cyber insurance can help to protect your business in the event of a data breach or cyber attack. Cyber insurance policies can help to cover the costs associated with data recovery, legal fees, and other expenses related to cyber attacks. Consider consulting with an insurance professional to determine if cyber insurance is right for your business.

IT security is a critical component of small business operations. By implementing these IT security tips, you can help to protect your business from cyber threats and data breaches.

Protecting your business’s data is an ongoing process that requires vigilance and attention to detail. By staying up-to-date on IT security best practices and implementing robust security measures, you can help to ensure the long-term success of your small business.

If you have any questions about IT security or would like to discuss your business’s IT security needs, please don’t hesitate to contact us.

Office 365: Protect Your Business From Data Loss And Cyber Attacks With These Backup Solutions

April 21, 2023

As more businesses shift to cloud-based productivity tools like Office 365, the need to backup these accounts becomes increasingly important. While many businesses assume that cloud providers automatically backup data stored in their accounts, this is not always the case.

In fact, Microsoft Office 365 recommends that businesses regularly backup their data to ensure that it is protected and easily recoverable in the event of a data loss.

Here are a few reasons why backing up Office 365 accounts is essential for businesses:

Protection against user error

Human error is one of the leading causes of data loss. Whether it’s accidentally deleting a file or overwriting an important document, mistakes can happen.

By regularly backing up Office 365 accounts, businesses can quickly recover lost or deleted data, minimizing the impact of user error on their operations.

Protection against cyber attacks

Cyber attacks are a growing threat to businesses of all sizes. Ransomware, phishing, and other cyber attacks can cause significant damage to businesses, including data loss, financial damage, and reputational harm. By regularly backing up Office 365 accounts, businesses can quickly recover from a cyber attack and reduce the risk of data loss.

Compliance with regulatory requirements

Many industries and jurisdictions have specific data retention requirements that businesses must adhere to. Failure to comply with these requirements can result in fines, legal action, and damage to the business’s reputation.

By regularly backing up Office 365 accounts, businesses can ensure compliance with regulatory requirements and avoid costly penalties.

Simplify migration

Backing up Office 365 accounts can also simplify the process of migrating to a new cloud provider or on-premise solution. With a backup of their data, businesses can quickly and easily move their data to a new platform without worrying about data loss or compatibility issues.

So, what are the options for backing up Office 365 accounts? Here are a few:

Native Office 365 backup tools

Microsoft provides a set of basic backup tools within Office 365. These tools can be used to backup emails, contacts, calendars, and other data within Office 365 accounts.

However, these tools have limitations, including limited retention periods and the inability to backup some types of data, such as SharePoint sites.

Third-party backup solutions

There are a variety of third-party backup solutions available that can backup Office 365 accounts. These solutions provide more advanced features than the native Office 365 backup tools, including longer retention periods, the ability to backup SharePoint sites, and more granular backup and restore options.

Hybrid backup solutions

Hybrid backup solutions combine the benefits of both on-premise and cloud backup solutions. With a hybrid backup solution, businesses can backup Office 365 accounts to both an on-premise location and the cloud, providing an extra layer of protection against data loss.

In conclusion, backing up Office 365 accounts is essential for businesses of all sizes. By doing so, businesses can protect against user error, cyber attacks, comply with regulatory requirements, and simplify migration.

While Microsoft provides some basic backup tools within Office 365, third-party backup solutions offer more advanced features and greater flexibility.

If you’re unsure about the best backup solution for your business, consider consulting with a trusted IT advisor or cloud backup specialist. We can help you assess your risks and develop a comprehensive backup plan that meets your business’s unique needs.

At Tech Experts, we offer a range of backup solutions for Office 365 accounts, including native Office 365 backup tools, third-party backup solutions, and hybrid backup solutions. We understand the importance of protecting your business’s data and are here to help you develop a backup plan that meets your unique needs. Don’t leave your business’s data to chance – backup your Office 365 accounts today.

Smartphones Are Now The Preferred Device For Mobile Work

April 21, 2023

Smartphones have taken over from laptops as most people’s preferred portable work tool.

They enjoy the flexibility and, perhaps obviously, they’re easier to carry around than a laptop or a tablet.

It means that mobile connectivity and reliable broadband have become two of the largest IT considerations. In turn, that creates a different set of security risks.

If a number of your people need a phone to do their job, here’s a big thought: Would they be better off using a work-issued phone instead?

If an employee has contact with customers, would you want to own their phone number in case they left?

And there are security considerations that might be best handled on company-issued phones. That includes rolling out security updates, managing secure mobile gateways, and administering passwords.

You should make sure data on the device is encrypted, not only to protect data from cyber criminals, but to make sure your information is safe should the phone be lost or stolen. Can the phone be remotely wiped?

The software installed on the phone should be policed too. You may need a policy that limits or blocks the use of third-party software. This can also help establish a boundary between work and personal tasks.

As with most tech, this isn’t a case of set it and forget it. You need to make sure updates are run on time, and remotely audit company-issued devices to ensure they’re secure, protected and don’t contain any malicious applications.

Is this something we can help with? Your technology headaches are exciting for us! Get in touch, we’d be glad to help out.

What’s All The Fuss About AI And ChatGPT?

April 21, 2023

ChatGPT is a chatbot that uses artificial intelligence, allowing you to talk to it in a very human way. It’s been making the news around the world for some of the remarkable possibilities it seems to be creating. But what exactly is it, and why is it making such waves?

ChatGPT is trained on real human language. It can answer questions, and even compose documents, like emails, essays and computer code. The exciting thing is the way it allows you to have a natural-feeling conversation with it to generate different responses – perhaps adding more detail, or asking it to use less technical language.

It was created by research company OpenAI, which is funded and managed by some of the most influential names in tech. And while it’s still in its research and feedback-collection phase, it’s currently free to use (with limitations).

It’s different to a search engine because it’s designed with conversation in mind. While it can answer questions, it doesn’t search the internet for information. Everything is learned from training data (it has no knowledge past 2021). So, while many people have started using ChatGPT to write essays and articles, the facts may not be accurate. In fact, tech media website CNET recently had to issue multiple major corrections after it created 78 articles using the chatbot.

Because it’s trained on huge amounts of text published online by humans, it’s had trouble telling fact from fiction, and has also been found to reproduce some unwanted biases – for instance against women and people of color.

It’s not changing the world just yet. But it’s already clear that there is huge potential for both individuals and businesses alike.

Have you tried ChatGPT yet? What are your feelings about using AI in your business? We’d love to hear your thoughts. (P.S. A human wrote this article!)

Small Companies Can Benefit From Redundant Power And Internet

March 20, 2023

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

As a small business owner, you may not have given much thought to the importance of redundant power and Internet connections. After all, you have bills to pay, customers to serve, and employees to manage.

However, if you rely on technology to run your business, it’s crucial to understand why having backup systems in place is so essential.

As we’ve seen recently, power outages can happen at any time, and they can have devastating effects on your business. Not only can they interrupt your operations and cause costly downtime, but they can also damage your equipment and lead to data loss.

That’s why it’s crucial to have a backup power source in place, such as a generator or uninterruptible power supply (UPS).

A generator is an excellent option for businesses that need to keep critical systems running during a power outage. It can provide continuous power for hours, or even days, depending on the size and capacity of the unit. A UPS, on the other hand, is a device that provides backup power for a short period, usually a few minutes, to allow for a graceful shutdown of your systems.

Regardless of which backup power option you choose, it’s essential to test it regularly to ensure it’s working correctly. You don’t want to wait until a power outage occurs to find out that your backup power system is faulty or not powerful enough to handle your business’s needs. [Read more…] about Small Companies Can Benefit From Redundant Power And Internet

Make Your Chrome Browser Work Harder For You

March 20, 2023

Chrome is a popular web browser that many people use for browsing the internet. However, did you know that there are many ways to make your Chrome browser work harder for you? Here are some tips and tricks to help you get the most out of your Chrome experience.

Use extensions

Chrome has a vast library of extensions that can help you do everything from blocking ads to managing your tabs. You can find extensions for almost anything you need to do, and many of them are free. Some popular extensions include Adblock Plus, LastPass, and Google Translate.

To use an extension, simply download it from the Chrome Web Store and add it to your browser. Once it’s installed, you can access it by clicking on the extension icon in the top right corner of your browser.

Sync your data

Chrome has a handy feature that allows you to sync your data across multiple devices. This means that you can access your bookmarks, browsing history, and saved passwords from any device with Chrome installed.

To enable syncing, click on the three dots in the top right corner of your browser and select “Settings.” From there, click on “Sync and Google services” and turn on the toggle switch for “Sync.” You’ll then need to sign in to your Google account to enable syncing.

Use keyboard shortcuts

Keyboard shortcuts can save you a lot of time and make your browsing experience more efficient. Some common Chrome shortcuts include:

  • Ctrl + T to open a new tab
  • Ctrl + W to close the current tab
  • Ctrl + Shift + T to reopen the last closed tab
  • Ctrl + Shift + N to open a new incognito window

You can find a full list of Chrome shortcuts by clicking on the three dots in the top right corner of your browser and selecting “More tools” > “Extensions” > “Keyboard shortcuts.”

Customize your homepage

By default, Chrome opens with a blank page or the Google search page. However, you can customize your homepage to show your favorite websites or a specific webpage.

To set a custom homepage, click on the three dots in the top right corner of your browser and select “Settings.” From there, scroll down to the “On startup” section and select “Open a specific page or set of pages.” Click on “Add a new page” and enter the URL of the page you want to set as your homepage.

Use the Omnibox

The Omnibox is the search bar at the top of your Chrome browser. It can also be used to enter URLs, search your bookmarks and history, and even perform calculations.

To perform a search in the Omnibox, simply type your search term and hit enter. To search your history or bookmarks, type “history” or “bookmarks” followed by your search term. To perform a calculation, simply type the equation in the Omnibox.

Manage your tabs

If you’re like most people, you probably have multiple tabs open at once. Chrome has several features that can help you manage your tabs, including:

  • Pinning tabs to keep them open and organized: To pin a tab, right-click on the tab and select “Pin.”
  • Using tab groups to group related tabs together: To use tab groups, right-click on a tab and select “Add to new group.”
  • Muting tabs that are playing audio: To mute a tab, click on the audio icon in the tab.

By using extensions, syncing your data, using keyboard shortcuts, customizing your homepage, using the Omnibox, and managing your tabs, you can improve your browsing experience and become more productive.

Try out these tips and see how they can make your Chrome experience even better.

Proven Ways To Mitigate The Cost Of A Data Breach

March 20, 2023

Cybersecurity is an essential aspect of running a business. In today’s digital world, it’s crucial to have a plan in place to respond to incidents, adopt a zero trust approach to security, and use tools with security AI and automation.

By taking these measures, you can help reduce the cost of a data breach and lower the risk of cyberattacks.

Putting in place an incident response plan is crucial for any organization. In the event of a cyberattack, having a well-planned and executed response can help contain the breach and prevent further damage.

In fact, a practiced incident response plan can greatly reduce the cost of a data breach, by an average of $2.66 million per incident. It’s important to regularly practice and update this plan to ensure that your organization is prepared for any potential cyber threats.

Another effective cybersecurity measure is to adopt a zero trust approach. This means that instead of trusting everything within your network, you should verify everything and everyone.

By adopting a zero trust approach, you can significantly reduce the cost of a data breach. Organizations that don’t deploy zero trust tactics pay about $1 million more per breach.

It’s important to carefully evaluate the access levels of your employees and partners, and ensure that they only have access to the information and systems they need to do their jobs.

Using tools with security AI and automation is also an effective way to reduce the cost of a data breach. These tools use machine learning and artificial intelligence to detect and respond to cyberattacks. By automating your cybersecurity processes, you can free up your IT team to focus on other tasks while ensuring that your organization is protected against cyber threats.

Advanced Threat Protection (ATP) is an example of a tool that uses security AI and automation to detect and respond to cyberattacks. By using these types of tools, you can reduce the cost of a data breach by 65.2%.

If you’re feeling overwhelmed by the thought of improving your organization’s cybersecurity, working with a trusted IT partner can help.

A trusted IT partner can help you develop a cybersecurity roadmap, implement best practices, and ensure that your organization is protected against cyber threats. They can also provide regular security assessments and help you stay up-to-date with the latest threats and vulnerabilities.

Cybersecurity is a critical aspect of running a business in today’s digital world. By putting in place an incident response plan, adopting a zero trust approach, and using tools with security AI and automation, you can greatly reduce the cost of a data breach and lower the risk of cyberattacks.

If you need help improving your organization’s cybersecurity, consider working with a trusted IT partner like Tech Experts who can guide you through the process and ensure that your organization is protected against cyber threats.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.