• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Office 365: Protect Your Business From Data Loss And Cyber Attacks With These Backup Solutions

April 21, 2023

As more businesses shift to cloud-based productivity tools like Office 365, the need to backup these accounts becomes increasingly important. While many businesses assume that cloud providers automatically backup data stored in their accounts, this is not always the case.

In fact, Microsoft Office 365 recommends that businesses regularly backup their data to ensure that it is protected and easily recoverable in the event of a data loss.

Here are a few reasons why backing up Office 365 accounts is essential for businesses:

Protection against user error

Human error is one of the leading causes of data loss. Whether it’s accidentally deleting a file or overwriting an important document, mistakes can happen.

By regularly backing up Office 365 accounts, businesses can quickly recover lost or deleted data, minimizing the impact of user error on their operations.

Protection against cyber attacks

Cyber attacks are a growing threat to businesses of all sizes. Ransomware, phishing, and other cyber attacks can cause significant damage to businesses, including data loss, financial damage, and reputational harm. By regularly backing up Office 365 accounts, businesses can quickly recover from a cyber attack and reduce the risk of data loss.

Compliance with regulatory requirements

Many industries and jurisdictions have specific data retention requirements that businesses must adhere to. Failure to comply with these requirements can result in fines, legal action, and damage to the business’s reputation.

By regularly backing up Office 365 accounts, businesses can ensure compliance with regulatory requirements and avoid costly penalties.

Simplify migration

Backing up Office 365 accounts can also simplify the process of migrating to a new cloud provider or on-premise solution. With a backup of their data, businesses can quickly and easily move their data to a new platform without worrying about data loss or compatibility issues.

So, what are the options for backing up Office 365 accounts? Here are a few:

Native Office 365 backup tools

Microsoft provides a set of basic backup tools within Office 365. These tools can be used to backup emails, contacts, calendars, and other data within Office 365 accounts.

However, these tools have limitations, including limited retention periods and the inability to backup some types of data, such as SharePoint sites.

Third-party backup solutions

There are a variety of third-party backup solutions available that can backup Office 365 accounts. These solutions provide more advanced features than the native Office 365 backup tools, including longer retention periods, the ability to backup SharePoint sites, and more granular backup and restore options.

Hybrid backup solutions

Hybrid backup solutions combine the benefits of both on-premise and cloud backup solutions. With a hybrid backup solution, businesses can backup Office 365 accounts to both an on-premise location and the cloud, providing an extra layer of protection against data loss.

In conclusion, backing up Office 365 accounts is essential for businesses of all sizes. By doing so, businesses can protect against user error, cyber attacks, comply with regulatory requirements, and simplify migration.

While Microsoft provides some basic backup tools within Office 365, third-party backup solutions offer more advanced features and greater flexibility.

If you’re unsure about the best backup solution for your business, consider consulting with a trusted IT advisor or cloud backup specialist. We can help you assess your risks and develop a comprehensive backup plan that meets your business’s unique needs.

At Tech Experts, we offer a range of backup solutions for Office 365 accounts, including native Office 365 backup tools, third-party backup solutions, and hybrid backup solutions. We understand the importance of protecting your business’s data and are here to help you develop a backup plan that meets your unique needs. Don’t leave your business’s data to chance – backup your Office 365 accounts today.

Smartphones Are Now The Preferred Device For Mobile Work

April 21, 2023

Smartphones have taken over from laptops as most people’s preferred portable work tool.

They enjoy the flexibility and, perhaps obviously, they’re easier to carry around than a laptop or a tablet.

It means that mobile connectivity and reliable broadband have become two of the largest IT considerations. In turn, that creates a different set of security risks.

If a number of your people need a phone to do their job, here’s a big thought: Would they be better off using a work-issued phone instead?

If an employee has contact with customers, would you want to own their phone number in case they left?

And there are security considerations that might be best handled on company-issued phones. That includes rolling out security updates, managing secure mobile gateways, and administering passwords.

You should make sure data on the device is encrypted, not only to protect data from cyber criminals, but to make sure your information is safe should the phone be lost or stolen. Can the phone be remotely wiped?

The software installed on the phone should be policed too. You may need a policy that limits or blocks the use of third-party software. This can also help establish a boundary between work and personal tasks.

As with most tech, this isn’t a case of set it and forget it. You need to make sure updates are run on time, and remotely audit company-issued devices to ensure they’re secure, protected and don’t contain any malicious applications.

Is this something we can help with? Your technology headaches are exciting for us! Get in touch, we’d be glad to help out.

What’s All The Fuss About AI And ChatGPT?

April 21, 2023

ChatGPT is a chatbot that uses artificial intelligence, allowing you to talk to it in a very human way. It’s been making the news around the world for some of the remarkable possibilities it seems to be creating. But what exactly is it, and why is it making such waves?

ChatGPT is trained on real human language. It can answer questions, and even compose documents, like emails, essays and computer code. The exciting thing is the way it allows you to have a natural-feeling conversation with it to generate different responses – perhaps adding more detail, or asking it to use less technical language.

It was created by research company OpenAI, which is funded and managed by some of the most influential names in tech. And while it’s still in its research and feedback-collection phase, it’s currently free to use (with limitations).

It’s different to a search engine because it’s designed with conversation in mind. While it can answer questions, it doesn’t search the internet for information. Everything is learned from training data (it has no knowledge past 2021). So, while many people have started using ChatGPT to write essays and articles, the facts may not be accurate. In fact, tech media website CNET recently had to issue multiple major corrections after it created 78 articles using the chatbot.

Because it’s trained on huge amounts of text published online by humans, it’s had trouble telling fact from fiction, and has also been found to reproduce some unwanted biases – for instance against women and people of color.

It’s not changing the world just yet. But it’s already clear that there is huge potential for both individuals and businesses alike.

Have you tried ChatGPT yet? What are your feelings about using AI in your business? We’d love to hear your thoughts. (P.S. A human wrote this article!)

Small Companies Can Benefit From Redundant Power And Internet

March 20, 2023

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

As a small business owner, you may not have given much thought to the importance of redundant power and Internet connections. After all, you have bills to pay, customers to serve, and employees to manage.

However, if you rely on technology to run your business, it’s crucial to understand why having backup systems in place is so essential.

As we’ve seen recently, power outages can happen at any time, and they can have devastating effects on your business. Not only can they interrupt your operations and cause costly downtime, but they can also damage your equipment and lead to data loss.

That’s why it’s crucial to have a backup power source in place, such as a generator or uninterruptible power supply (UPS).

A generator is an excellent option for businesses that need to keep critical systems running during a power outage. It can provide continuous power for hours, or even days, depending on the size and capacity of the unit. A UPS, on the other hand, is a device that provides backup power for a short period, usually a few minutes, to allow for a graceful shutdown of your systems.

Regardless of which backup power option you choose, it’s essential to test it regularly to ensure it’s working correctly. You don’t want to wait until a power outage occurs to find out that your backup power system is faulty or not powerful enough to handle your business’s needs. [Read more…] about Small Companies Can Benefit From Redundant Power And Internet

Make Your Chrome Browser Work Harder For You

March 20, 2023

Chrome is a popular web browser that many people use for browsing the internet. However, did you know that there are many ways to make your Chrome browser work harder for you? Here are some tips and tricks to help you get the most out of your Chrome experience.

Use extensions

Chrome has a vast library of extensions that can help you do everything from blocking ads to managing your tabs. You can find extensions for almost anything you need to do, and many of them are free. Some popular extensions include Adblock Plus, LastPass, and Google Translate.

To use an extension, simply download it from the Chrome Web Store and add it to your browser. Once it’s installed, you can access it by clicking on the extension icon in the top right corner of your browser.

Sync your data

Chrome has a handy feature that allows you to sync your data across multiple devices. This means that you can access your bookmarks, browsing history, and saved passwords from any device with Chrome installed.

To enable syncing, click on the three dots in the top right corner of your browser and select “Settings.” From there, click on “Sync and Google services” and turn on the toggle switch for “Sync.” You’ll then need to sign in to your Google account to enable syncing.

Use keyboard shortcuts

Keyboard shortcuts can save you a lot of time and make your browsing experience more efficient. Some common Chrome shortcuts include:

  • Ctrl + T to open a new tab
  • Ctrl + W to close the current tab
  • Ctrl + Shift + T to reopen the last closed tab
  • Ctrl + Shift + N to open a new incognito window

You can find a full list of Chrome shortcuts by clicking on the three dots in the top right corner of your browser and selecting “More tools” > “Extensions” > “Keyboard shortcuts.”

Customize your homepage

By default, Chrome opens with a blank page or the Google search page. However, you can customize your homepage to show your favorite websites or a specific webpage.

To set a custom homepage, click on the three dots in the top right corner of your browser and select “Settings.” From there, scroll down to the “On startup” section and select “Open a specific page or set of pages.” Click on “Add a new page” and enter the URL of the page you want to set as your homepage.

Use the Omnibox

The Omnibox is the search bar at the top of your Chrome browser. It can also be used to enter URLs, search your bookmarks and history, and even perform calculations.

To perform a search in the Omnibox, simply type your search term and hit enter. To search your history or bookmarks, type “history” or “bookmarks” followed by your search term. To perform a calculation, simply type the equation in the Omnibox.

Manage your tabs

If you’re like most people, you probably have multiple tabs open at once. Chrome has several features that can help you manage your tabs, including:

  • Pinning tabs to keep them open and organized: To pin a tab, right-click on the tab and select “Pin.”
  • Using tab groups to group related tabs together: To use tab groups, right-click on a tab and select “Add to new group.”
  • Muting tabs that are playing audio: To mute a tab, click on the audio icon in the tab.

By using extensions, syncing your data, using keyboard shortcuts, customizing your homepage, using the Omnibox, and managing your tabs, you can improve your browsing experience and become more productive.

Try out these tips and see how they can make your Chrome experience even better.

Proven Ways To Mitigate The Cost Of A Data Breach

March 20, 2023

Cybersecurity is an essential aspect of running a business. In today’s digital world, it’s crucial to have a plan in place to respond to incidents, adopt a zero trust approach to security, and use tools with security AI and automation.

By taking these measures, you can help reduce the cost of a data breach and lower the risk of cyberattacks.

Putting in place an incident response plan is crucial for any organization. In the event of a cyberattack, having a well-planned and executed response can help contain the breach and prevent further damage.

In fact, a practiced incident response plan can greatly reduce the cost of a data breach, by an average of $2.66 million per incident. It’s important to regularly practice and update this plan to ensure that your organization is prepared for any potential cyber threats.

Another effective cybersecurity measure is to adopt a zero trust approach. This means that instead of trusting everything within your network, you should verify everything and everyone.

By adopting a zero trust approach, you can significantly reduce the cost of a data breach. Organizations that don’t deploy zero trust tactics pay about $1 million more per breach.

It’s important to carefully evaluate the access levels of your employees and partners, and ensure that they only have access to the information and systems they need to do their jobs.

Using tools with security AI and automation is also an effective way to reduce the cost of a data breach. These tools use machine learning and artificial intelligence to detect and respond to cyberattacks. By automating your cybersecurity processes, you can free up your IT team to focus on other tasks while ensuring that your organization is protected against cyber threats.

Advanced Threat Protection (ATP) is an example of a tool that uses security AI and automation to detect and respond to cyberattacks. By using these types of tools, you can reduce the cost of a data breach by 65.2%.

If you’re feeling overwhelmed by the thought of improving your organization’s cybersecurity, working with a trusted IT partner can help.

A trusted IT partner can help you develop a cybersecurity roadmap, implement best practices, and ensure that your organization is protected against cyber threats. They can also provide regular security assessments and help you stay up-to-date with the latest threats and vulnerabilities.

Cybersecurity is a critical aspect of running a business in today’s digital world. By putting in place an incident response plan, adopting a zero trust approach, and using tools with security AI and automation, you can greatly reduce the cost of a data breach and lower the risk of cyberattacks.

If you need help improving your organization’s cybersecurity, consider working with a trusted IT partner like Tech Experts who can guide you through the process and ensure that your organization is protected against cyber threats.

Why Should You Use Different Passwords For Different Accounts?

March 20, 2023

It’s common to have multiple online accounts for social media, online shopping, banking, and more. While having different accounts makes our lives more convenient, it also presents a security risk if we use the same password for all of them.

This is because if a hacker gains access to one of our accounts, they can potentially gain access to all of them if we use the same password. This is why it’s crucial to have different passwords on different accounts.

Having different passwords on different accounts is one of the most basic but important steps you can take to protect your online security.

By using unique passwords, you reduce the risk of a hacker gaining access to all of your accounts if they manage to crack one password. This is particularly important for accounts that contain sensitive information, such as online banking or medical records.

One reason why people tend to use the same password for multiple accounts is because it’s easier to remember.

However, there are ways to create strong and unique passwords without having to remember them all. One option is to use a password manager.

A password manager is a tool that generates and stores unique passwords for each of your accounts. All you have to do is remember one master password to access the password manager. Some popular password managers include BitWarden, Dashlane, and 1Password.

Another way to create strong and unique passwords is to use a passphrase instead of a single word. A passphrase is a combination of several words that are easy for you to remember, but difficult for others to guess. For example, instead of using the password “password123” you could use a passphrase like “MyDogate2BonesToday!”

It’s important to note that having different passwords is not enough to ensure complete security. It’s also important to use strong passwords that are difficult to guess or crack.

This means avoiding common words, phrases, or personal information that could be easily guessed.
Instead, use a combination of upper and lowercase letters, numbers, and symbols.

In addition to having different and strong passwords, it’s also important to update them regularly. This is because if a hacker gains access to an old password that you no longer use, they can still potentially use it to gain access to other accounts if you’ve used the same password for multiple accounts. It’s recommended to update your passwords every six months to a year.

One thing to keep in mind is that while having different passwords on different accounts is important, it’s not the only step you should take to protect your online security. It’s also important to enable two-factor authentication whenever possible.
Two-factor authentication adds an extra layer of security by requiring a second form of authentication, such as a code sent to your phone or an app.

While it may seem daunting to remember multiple passwords, password managers can help significantly.

By taking these basic steps, you can greatly reduce the risk of a security breach and protect your sensitive information online.

How Is The Metaverse Going To Change Business?

February 5, 2023

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

The new buzzword around town is “metaverse.” But what does that actually mean for businesses? Is it just something that social media companies need to be concerned about?

According to people like Apple’s CEO Tim Cook, the metaverse is coming. He stated that “Life without AR will soon be unthinkable.” Whether that’s a short-term or long-off prediction, companies need to be ready.

First comes the understanding of what the metaverse is. Metaverse is a general term – hence why it’s not capitalized like a proper name. The metaverse refers to a collective upgrade of the internet to a 3D virtual environment. This would be a world interconnected between various sites. These sites would reflect the immersive games that you see today.

Did Facebook/Meta invent the metaverse? No. The idea of connected 3D immersive worlds has been around for decades. Several online gaming companies have staked a territory in the metaverse. But their applications are less interconnected.

What’s one of the best representations of the early metaverse? It’s a short-lived software called Adobe Atmosphere. This 3D immersive experience included interconnected online worlds.

It also gave people the ability to chat with others. It was a bit before its time but shows how the concept of the metaverse has been around for a while.

The metaverse is getting attention now because technology has advanced. It has begun to catch up to the needs of such a world. This includes fast internet connections and immense processing power. It also includes a delivery method for 3D that works on most PCs.

Are we there yet? Not quite. But the metaverse is picking up steam. Recently, Microsoft announced a partnership with Meta. This partnership is to bring Microsoft 365 apps into the metaverse.

This means collaboration in an entirely new way. Microsoft notes that 50% of Gen Z and millennials expect to do some of their work in the metaverse in the next two years.

How could the metaverse impact your company?
With companies like Microsoft looking at the future of AR/VR, it could be a reality soon. You can expect the metaverse to touch your own company in some way in the next few years. Here’s a preview of what it may impact.

Where to advertise
When the internet was first introduced, companies didn’t immediately realize its potential.

Now, most companies wouldn’t consider operating without a website. It’s a necessity for driving leads and converting sales.

If the metaverse takes off as a new 3D iteration of the internet, it could be just as important.

This means exploring metaverse-type advertising in virtual worlds. Also, potentially creating your own VR site or showroom.

How to service customers
As the popularity of social media took off, companies realized customers used it to reach out.

Seventy-nine percent of consumers expect companies to respond to a social media message. And they expect that response within a day.

To address that need, many businesses have a social media presence. The metaverse may be the next step.

If people begin hanging out there, they will expect to interact with businesses in that space. Just like they do now with social networks.

This means companies need to be aware of how customers may be using the metaverse as it grows. Adding a question about metaverse use to a year-end customer survey could be a way to be proactive on this topic.

Employee training
One of the touted benefits of the metaverse is its ability to enable more immersive training. This could greatly increase training capabilities and thoroughness for everyone from doctors to forklift operators.

Mobile Malware Has Increased 500% – What Should You Do?

February 5, 2023

Cybersecurity researchers uncovered an alarming mobile statistic. During the first few months of 2022, mobile malware attacks surged by 500%.

For years, mobile phones have become more powerful. They now do many of the same functions as a computer.

Yet, people tend to secure their computers better than they do their smartphones.

This is a behavior that needs to change. Over 60% of digital fraud now occurs through mobile devices. That makes them highly risky if proper safeguards aren’t followed.

Use Mobile Anti-malware

Yes, your mobile phone needs anti-virus/anti-malware too! Malware can and does infect smartphones and tablets. Ensure that you have a reliable mobile anti-malware app installed.

Don’t download apps from unknown sources
Only download mobile apps from trusted sources. Do not download outside a main app store. Trusted app stores include places like:

• Apple App Store
• Google Play
• The Microsoft Store
• Amazon Appstore

Don’t assume email is safe
Many people prefer checking email on their phone rather than PC because it’s so handy. But they have a false sense of security about the safety of emails when viewed on a mobile device.

It’s difficult to hover over a link without clicking when on a smartphone. If you see something questionable and want to check the link, open the email on your PC where you can do that.

Beware of SMS phishing (aka “smishing”)
In March of 2022, text spam outpaced robocalls. Unwanted text messages rose by 30%, ten percent higher than robocalls. Many of those spam texts are smishing.

Be on the lookout for text messages that don’t quite make sense. For example, getting a shipping notification when you haven’t ordered anything.

Remove old apps you no longer use
Go through your device and remove old applications that you are no longer using. There is no reason to keep them around, potentially leaving your device at risk.

Keep your device updated
Speaking of updates, you also need to keep your device’s operating system updated. Are you using the current version of Android or iOS?

Not installing updates can mean your phone has vulnerabilities. These vulnerabilities allow hackers to
breach your data.

Use a VPN when on public Wi-Fi
Public Wi-Fi is dangerous. Most people understand that, but many connect to it out of necessity. Reduce your risk by using a VPN app.

Use mobile security solutions to prevent a data breach
Don’t wait until your phone is infected with malware to secure it properly. It’s only a matter of time before you are the next victim.

8 Tech Checks To Make Before You Travel

February 5, 2023

Our technology inevitably comes with us when we travel. Most of us won’t even travel to the end of the block without our smartphones. When you go on a trip, not having your technology there when you need it can ruin your day.

Travel smarter and more securely by doing several checks before you go. Use our handy tech travel checklist. It can save you from suffering from lost devices, missing chargers, or a data breach.

Check your apps
Have you ever sat at an airport gate wondering why it looked so empty? You then found out that your gate had changed, and you had no idea. You go rushing to the other end of the concourse, hoping you’re not too late.

How did everyone else know about the gate change? They most likely had the app for the airline and received a notification.

Before you leave for a trip, make sure to download any apps you may need. It’s better to download them when you’re at home on your own Wi-Fi. If you wait until you’re at the airport, reception may be an issue.

Some of the apps you may want to grab or update before your trip are:
• Airline app
• Train app
• Hotel app
• Theme park app
• Camping ground app
• Weather app
• City tourism app

Check your cords & adapters
People leave behind countless chargers and adapters every day. They litter airports, restaurants, and train stations around the world.

Make sure to bring a backup charger for your laptop, tablet, or phone. Otherwise, you may find yourself paying a premium for a new charger in a gift shop. Your device could also go black if you lose its charger and can’t quickly get a new one.

Check your power
A great way to ensure you have the power you need is to buy a small charging battery. You can find these in most major retailers or online. They are small “blocks” that hold a charge and can power up a cell phone in a pinch.

Having this extra backup also helps you avoid potential juice-jacking ports. These are fake or compromised public USB charging ports. Hackers use them to steal your data when you plug in.

Check your mobile plan
If you’re traveling out of the country, you’ll want to check your mobile plan. If you don’t have the ability to call internationally, then you may not be able to text or call home.

Carriers can add an international capability to your plan, but ask about pricing. It can get expensive if you’re on long calls or using mobile data.

An alternative is to set up a VoIP app you can use with your office, friends, or family while you’re traveling. These enable both calls and SMS, but you do need an internet connection.

Check or add a VPN
Free Wi-Fi may be a welcome site when you’re on the road, but it can also be dangerous. You don’t know who else is using that Wi-Fi. A hacker hanging out on the connection can easily steal your data if you’re not protected.

It’s better to use either your mobile carrier connection or a virtual private network (VPN) app. VPN plans are inexpensive and will keep your data encrypted, even if you’re on public Wi-Fi.

Check your backup
Unfortunately, mishaps occur when traveling. You may leave your phone behind on a boat, have your luggage lost, or get your device stolen while in a crowded area. Ten percent of all laptop thefts happen in airports.

Don’t lose all your data with the device! Back up your devices to the cloud or local storage before you travel. This ensures that you won’t lose the valuable information on your device. You also won’t need to think twice about enacting a remote “wipe my device” command if necessary.

Check your device security
Make your devices as secure as possible before you hit the road. When we’re traveling, our minds are occupied by other things. So, you may not think to check your antivirus or avoid suspicious phishing links.

Protect your devices before you go using:
• Antivirus/anti-malware
• DNS filtering
• Screen lock with passcode
• Sharing features turned off
• VPN application
• Find-My-Device feature turned on

Check your double checks
What do we mean by checking your double-checks? Use the buddy system as a backup. When the family is getting off a plane, each should check with the other that they have all their devices.

If you’re traveling alone, have a friend or family member check up by text. Did you grab your charger? Is your VPN turned on? Those little reminders can go a long way toward avoiding digital travel nightmares.

Improve the security of your devices now
Don’t leave your devices unprotected. This could mean a breach of your banking app or personal data. Contact us for device security solutions to reduce your risk.

Article used with permission from The Technology Press.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2026 Issues
  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Hackers Aren’t Hacking – They’re Just Logging In

February 17, 2026

The “Deepfake CEO” Scam: Voice Cloning Is The Next Cyber Threat

February 17, 2026

Why “It Hasn’t Happened To Us (Yet!)” Is The Most Expensive IT Strategy

February 17, 2026

You Absolutely Need To Back Up Your Cloud Services Like Office 365

January 20, 2026

Tags

AI Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2026 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.