• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Is Your Business Secure? Top Three Ways To Protect Your Company

January 31, 2022

Effective cybersecurity is not a “one size fits all” solution but needs to take into account the unique needs of your particular business.

That said, however, there are three key things you can do to immediately safeguard your business at a basic level.

Automate software updates

Let’s be real. We all forget things sometimes. Even something as important as updating the software on our devices. And sometimes it’s not even a “forget” but an “I don’t have time right now for my device to be down.” But automating updates and setting them to process during off-hours can be the difference between a successful and unsuccessful breach.

Educate your employees

Employees are the number one point of failure in any cybersecurity event. A recent report from Kaspersky Labs found that 90% of corporate data breaches occur as a result of social engineering attacks on employees – not the providers.

Use the Cloud

Many of us used to say that it was “too risky” to be in the cloud. That our data was “safer” here on-site where I can control access to every bit of the network. However, over the years, we have learned that using cloud solutions is actually more secure than on-site solutions and here’s why: cloud providers have a higher level of certification needed in order to prove the level of protection required of a cloud solution.

Cloud providers know it is imperative that their solution be the most secure solution available and any blemish can be a make or break problem for the longevity of their business. As such, they make it their business to know and keep up with the ever-changing cybersecurity world and work to implement the latest protections across their entire networks.

Last year was a record-breaking year for cyberattacks, with Colonial Oil, JBS, and even Buffalo Public Schools. The time to update your security protocols is now before you fall victim. Schedule your audit today and keep your business safe.

Flying Cars And Robot Servants? Business Tech Predictions For This Year

January 31, 2022

OK, so we still haven’t seen flying cars. But, you can get a robot to vacuum your carpet!

We’ve been busy reading the business technology predictions for this year. If you’d read these 20 years ago, they would have genuinely seemed like science fiction. But now, there’s nothing being predicted for this year that really surprises us. Here are a few we think you’ll see soon.

More automation: It’s now possible to make most software talk to most other software. And that makes it easier to automate repetitive tasks. Any time a human has to repeat a task, you can find a way to get software to automate it for you.

Health, safety, and wearable tech: These are small electronic, wireless, and autonomous devices that capture, analyze, and aggregate biofeedback or other sensory physiological functions related to health, well-being, and fitness and that can be worn on the human body (or in the human body with versions such as micro-chips or smart tattoos.)

AI being used by more businesses: Artificial Intelligence is no longer just for big businesses. It’s being used within software available to businesses of all sizes. You’re probably benefitting from AI already without being aware of it.

Work from home: Yes, the “new normal”. It’s not going away. Hybrid working is here to stay.

Next-generation remote presence (the “Metaverse”): With a nod to Facebook, incremental progress in existing VR/AR technologies, as well as new technologies involving senses beyond audiovisual, are driving better and better immersion.

Remote medicine: Remote medicine will enable patients to obtain remote medical assistance and physicians to perform procedures and consult with remote experts.

Disinformation detection and correction: Critical importance of having accurate information will trigger techniques to determine disinformation in politics, business, and social media.

Non-fungible tokens (NFTs): Blockchain technology can be used for authentication and ownership of digital assets and potentially for a new type of virtualization of the ownership of physical things.

Fraud gets more sophisticated: Fraud operations are getting increasingly sophisticated, as the typical cybercrime arms race continues between prevention experts’ efforts and criminals’ innovations to beat them.

Other predictions include better voice search, such as using Alexa to get answers. And big improvements in battery tech.

How To Effectively Apply Technology In Your Business

December 30, 2021

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Technology can help your business to become significantly more efficient, engaging, and highly successful in your industry. Implementing the right technology can greatly help transform business infrastructure.

Here are nine of the most common and groundbreaking technologies that can help your company succeed today.

Use of mobile apps
You can improve your business’s overall reputation and seek higher brand recognition by introducing a mobile app with your business logo.

This keeps your products, services, and customer support at your client’s fingertips wherever they are. And depending on the complexity of your business, it can be surprisingly affordable. [Read more…] about How To Effectively Apply Technology In Your Business

Free VPNs Are Not Your Friend

December 30, 2021

Prior to the pandemic, VPNs (Virtual Private Networks) weren’t in the toolbox of the average office worker. Many of us sat down at our desk and logged into our computer, websites, and programs, then got started on our day.

Whatever we needed was a click away, our access already nestled into a secure network. Work-from-home has changed the game and requires a security boost wherever possible.

VPNs help with that by establishing secure connections, protecting your privacy, and allowing you to access your work network from home or anywhere else.

At a glance, VPNs seem to function similarly to remote desktop connections, which many businesses are more familiar with now, however they have some key differences. A remote desktop connection allows you to control a specific computer via software while a VPN provides encrypted access to a network while away.

If you’re interested in a VPN for business or personal use, it can be tempting to go with a free option – but be careful. Some freeware (software published for free download) can be a great find, but much like work shoes or your mattress, you want to find something that does its job well, even if it costs a little more.

Cheap shoes and mattresses may leave your body sore while a free VPN could be a gigantic security risk to your company or home network.

Like many freeware programs, you can’t always trust a developer. There’s usually a catch, and for VPNs, that comes at the price of security. VPN services aren’t cheap to provide, for one, and the free ones aren’t shared out of charity; they likely have interest in selling your data, bombarding you with ads, infecting you with malware, or stealing your identity.

One of the main motivations for using a VPN in the first place is to create a secure connection. A paid service will provide that – that’s what they’re there for and that subscription is how fund their operations. A free service, however, is unlikely to have the same level of security or the same capability to patch vulnerabilities, even if they have good intentions.

Additionally, you want whatever VPN you use to actually work. Free VPN services can’t support users the same way as a paid service. At best, they can be slow, lagging, or non-functional while their resources are spread thin across their userbase. At worst, you may be roped into some shady cybercriminal practices like botnets.

If you’re a small business looking to set up a VPN, we recommend researching which of the trusted, big-name VPN providers match your needs and budget.

Many come with free trials so you can test them out before you buy. If you have a managed service provider like Tech Experts or an IT department, please reach out to your technology partner and ask about options.

A secure VPN service is worth the cost to protect yourself from cyberattacks, vulnerabilities, and identity theft. Free is nice, but it’s better to take advantage of free things that don’t have the potential to infect and bring down your company’s network. Give us a call at (734) 457-5000 to learn more.

2021 Cyber Attacks – Lessons To Apply For A More Secure 2022

December 30, 2021

Hackers have hit a wide variety of industries this year, from computer manufacturers to insurance companies, schools to the NBA. A review of prominent 2021 cyber attacks reveals a few common themes. And organizations that apply the lessons learned from these attacks can look forward to a more secure 2022.

No one gets a free pass
It would be difficult to describe the profile of a typical data breach victim in 2021. Large corporations like Volkswagen and Experian got hit. At the same time, even small, low-profile businesses suffered in the Microsoft Exchange and Kaseya attacks. Ransomware crippled hospitals, manufacturers, municipalities, retail and more.

No matter how big or how small, any organization with Internet connections can become a target of attack. Hackers continually hone their skills and add to their toolsets. Consequently, businesses cannot afford to relax their security stance. Get started early on your New Year’s resolutions by committing to invest in cybersecurity.

Apply security patches quickly
When hackers exploited vulnerabilities in the Microsoft Exchange server, they disrupted 60,000 companies and government agencies in the US. Microsoft released security patches quickly. However, many organizations delayed applying the patches. The attack group Hafnium then ran Internet scans to find and exploit unpatched servers.

Take the time to apply software and firmware updates quickly. Take it a step further and turn on automatic updates where possible. This applies not just to servers but to all devices with access to the system.

Step up endpoint security
The rapid switch to remote work completely changed the security perimeter for many organizations, and hackers took advantage. For instance, when insurance giant CNA sustained a ransomware attack, 15,000 devices were encrypted, including those used by remote employees.

When remote work takes center stage, organizations need to strengthen endpoint security. Begin by creating and updating an inventory of all devices connecting to the system.

Enforce strong authentication policies and keep endpoints encrypted. Additionally, monitor the endpoints for unusual activity when connected to the network.

Monitor those business partners
In April, the REvil gang attacked Quanta, a supplier for Apple. REvil used the attack to pressure Apple, claiming to have obtained secret blueprints for yet-to-be-released Apple products. Similarly, parking app Park Mobile suffered a breach because of a vulnerability in a third-party software app.

While strengthening inhouse security, organizations cannot forget about their business partners. Be sure to vet third parties, building security policies into vendor contracts. Then continue to monitor those relationships, including performing regular audits.

Automate the backup process
Fortunately, the list of 2021 cyber attacks includes some positive notes. Attackers hit Polish video game development firm CD Projekt, encrypting devices and accessing source code. However, because the company had quality backups in place, they were able to restore the lost data without paying the ransom.

For decades, security experts have emphasized the importance of performing regular backups. Automating the process takes the burden off IT and delivers peace of mind.

Strengthen authentication and identity management
In April, attackers used a compromised password to access the networks of Colonial Pipeline, disrupting gas supplies and causing panic.

As government officials investigated, they concluded that stronger protections, such as multi-factor authentication, could have prevented the attack.

Identity and access management form a critical component of securing valuable digital assets. Companies should assess and strengthen authentication methods and tighten access controls.

Take protective steps against phishing
According to a recent report on cybersecurity breaches, phishing remains the most common type of cyber attack. For instance, in an attack on Nebraska Medicine, hackers gained entrance to the system and planted malware, eventually exposing over 200,000 patient records.

To protect against phishing and other social engineering attacks, organizations should implement email filtering and continuous network monitoring.

But the most important safety measure remains addressing the human factor with regular, targeted security awareness training.

Treat 2021 cyber attacks as a wakeup call
Reflecting on the high-profile cyber attacks of the past year can provide both the motivation and a blueprint for addressing cybersecurity. And the cybersecurity experts at Tech Experts bring the expertise and tools you need to keep your data and networks safe.

Ten Awesome Social Media Automation Tools

December 30, 2021

In the last decade, developers from famous social media platforms have changed the way we use their applications. Social media platforms are now excellent tools for marketing products and brands—these platforms act as great sources of exposure for small, medium, and even huge businesses.

Here are 10 of the top Social Media Automation Tools, which you can utilize as the first step towards automating your business.

Workflow
Workflow helps you organize a proper system as needed and share content according to plan. It allows you to promote the right content with the right audience at the right time.

Hootsuite
Hootsuite enables you to keep an eye on your competitors and communicate with your audience and users by creating a community dedicated to your business.

Sendible
You can automate replies to the audience’s queries, collaborate with others, generate valuable reports, and schedule updates with Sendible. This multi-purpose tool will help you organize and plan posts so your marketing team can focus on important tasks and activities.

CoSchedule
This automation tool helps you schedule your posts, thereby saving a lot of time and effort. CoSchedule enables you to schedule up to 60 posts at once.

Chatfuel
Chatfuel enables you to create a chatbot that engages customers and provides accurate responses in real-time to enhance customer satisfaction.

Agorapulse
You can schedule your social media posts and track the performance of your posts to make better decisions. You can engage a larger audience using their informative reports. Their social media management features are amazing.

SEMrush
This all-in-one digital marketing automating tool is the best PPC and SEO toolkit. This tool allows you to automate posts, promote campaigns, track results, and generate valuable analytics.

Tailwind
This scheduling tool also helps with analytics. Tailwind will not only help you automate posts, but it provides posting recommendations so you can reach more potential leads.

Later
With 600,000 happy users, you can already assume this tool’s popularity. This tool allows you to manage your social media comments.

Furthermore, it lets you schedule Instagram posts and increase engagement.

Iconosquare
Iconosquare provides personalized information for social media platforms. This way, your business can progress with social media marketing campaigns using informed decisions. Save time with their in-depth analytics and reporting.

Automating your marketing process and method helps minimize errors and understand customer behavior while saving time, effort, and money. You can even schedule the entire campaign and stay ahead of competitors.

So choose the best social media automating tools from the list above and take the first step to business automation.

If You’ve Ever Reused A Password To Sign Up For Something New, You Have A Problem…

November 24, 2021

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

It’s something many people admit to doing: they reuse the same password across a few different services.

Not judging you if you’ve done it. It’s easy to see why thousands of people do this every day. It feels like an easy way to get signed up to something.

If you reuse a password, you won’t have to go through the hassle of trying to remember it and needing to reset the password in the future. However, you only have to do this once, and you’re at big risk of something called credential stuffing.

This is where hackers get hold of millions of real usernames and passwords. These typically come from the big leaks we hear about in the news.

Once leaked, information from databases from major companies like Facebook, Twitter and LinkedIn can be bought on the dark web for pennies each. [Read more…] about If You’ve Ever Reused A Password To Sign Up For Something New, You Have A Problem…

A Quick Refresher On How To Keep Your Business Safe

November 24, 2021

If you connect it, protect it

As more and more technology becomes a part of our personal and business lives, the line between our online and offline self has become increasingly blurred. Stay Safe Online reminds us that any device we connect to our home and business network needs to be protected and each has some amount of risk associated with the connection. So all of our smart thermostats, TVs, doorbells, alarm systems, and refrigerators need to have the appropriate protection policies in place.

Securing devices at home and at work

The global pandemic has removed the boundaries between “home” and “work” as much work was completed while at home. Remote work was already well on it’s way to becoming the new normal of work the adoption of the strategy was accelerated. With devices connecting from both our home and our physical workspace, this has opened the doors to a different kind of cybersecurity concern and how you can protect both.

Securing Internet-connected devices in healthcare

More and more healthcare facilities, from senior living to urgent care centers, are using Internet-connected devices in the day-to-day care of their patients. Tele-medicine has quickly emerged as a way for patients to receive care and doctors to give it as a result of COVID-19, but this opens both patients and providers to unique cybersecurity challenges. Strong passwords and encrypted Wi-fi will help to keep data secure.

Outdated Software Could Cost Much More Than An Upgrade

November 24, 2021

It’s nice when we own something and it’s completely paid for. Think of a car or large purchase you financed. Once it’s paid off, you feel great: money is freed up and it’s yours.

However, often in these situations, you’ve poured a few years of use into it by the time it’s paid off. When something finally breaks, the warranty has probably already expired. Then, you’re forced to decide if you are going to put money into this old car or appliance or if it’s time to upgrade instead.

When you don’t upgrade your car or appliances, there may be some small risks in terms of missing out on improved safety or the newest features, but the biggest risk will be monetary.

Businesses sticking it out with old software isn’t much different, but the consequences can be much worse.

Software is sometimes pricey, and often, the outdated software will still technically work. We get used to the layout and processes, and it becomes easy to use. After five or ten years, you know where all the buttons are. Your documentation for employees might be based this particular version, and you may not have the time to overhaul your reference materials.

The issue with this is, while you’re happy to run the 2015 version of a software, that software company has released a new version in 2016, 2017, 2018, etc. Usually, they will still update old versions for a short time after new ones come out.

Once these software companies stop providing updates, however, any known vulnerabilities will remain unpatched and any new vulnerabilities that are discovered will not be addressed.

If you know the software inside and out, so do the hackers. It’s far easier for them to utilize a known flaw than attempt to break a new and unknown software. The longer you wait to update, the more likely it is that your data or network will be compromised.

Yes, paying for that new version of software is not something we want to do, but in the long run, it may save you a lot of money and headaches.

Software as a Service (SaaS) also makes this a little easier to deal with. Rather than paying a huge amount one time upfront, you can often subscribe and pay a smaller amount monthly or yearly that allows you to install new versions as they come out. This usually includes security patches and updates too.

Another consequence of holding out on updating old software is the possibility that your PC may need to be suddenly replaced or updated. If it crashes or becomes too slow to reliably use, you can lose that program. A lot of software is provided via download, and it may not be available for download once it’s time for a new PC.

In addition, if you bought something that was written for Windows 7 and have not upgraded in the past six years, it may not be possible to use that program if you are stuck five versions behind. Also, since you paid the vendor long ago, they often won’t help you reinstall the old software; instead, they’ll require you to buy a current version before assisting.

We understand that staying with what you’re familiar with is easy. Since you own the software, it carries a financial benefit as well. However, the short-term financial gains risk data loss and essential parts of your business becoming unrecoverable in a disaster. Look at software updates like insurance: you are paying to keep yourself as protected as possible and working to minimize any potential risk.

Using Technology To Maximize Your Business’ Efficiency and Communication

November 24, 2021

In today’s world, we have so much technology that we barely know what half of it does, let alone how to use it. We tend to stick to what we know and forgo the rest. However, once you understand how you can optimize the relevant tech in your business, you can radically improve efficiency and communication.

One easy way to increase your business’ efficiency and keep everyone on the same page is by using a group-based calendar.

Staff can see what the plans are for the day, who’s going to be out of the office, schedule meetings and appointments, and more. Everyone can plan their day around each other’s availabilities and come in every day knowing what to expect.

Shared drives, either on a network or through a hosting service like OneDrive for Business, can also save time and increase work efficiency.

Shared folders and drives can be divided by department (like Marketing) or use (like Scanned Documents), ensuring files can be accessed instantly in their current version by all allowed parties. You can also filter out who has access to certain folders.

If it would be a right fit for your business, it might be worth looking into a customer relationship management (CRM) system.

A CRM system does what it sounds like: it tracks your relationships with your clients. It does much more than digitize your client files; these are a powerful tool that can do a lot of heavy lifting in organizing your business, managing your clients and workload, marketing, collaboration between employees, and client satisfaction.

There are many, many webpages written on the topic and many CRM options to choose from at all different price points, so some independent research will benefit you here.

We use a CRM program at Tech Experts to track all of our clients’ service tickets, manage invoicing, build marketing campaigns, monitor statistics, and more.

Back to the tech that’s easier to implement. If you use a fax line, you may be able to switch to an email-to-fax/fax-to-email service or an online fax service.

These solutions function just like a regular fax line (make sure the provider you’re considering is HIPAA compliant, if needed) and are often cheaper than a traditional fax machine when compared. These faxes can be sent from anywhere, to multiple parties at once, and save on paper and equipment costs.

Many companies, including ours, use an online library (also known as a knowledge base) to store employee training and reference materials.

This makes it easy for both new and established employees to check procedures without having to interrupt another employee; they simply log in and find the article they need to complete their task.

Additionally, if someone does need to ask for help, they can be directly linked to detailed processes, saving time for everybody involved.

These also allow you to control who has access to what spaces. Services like this are typically browser-based, but something similar could be set up on shared network drives as well.

With the amount of people that are currently working remotely or people who will be working remotely in the future, communication is key.

Not only can these help with communication inside of your business, but also assist in communication with your customers.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Malware And Ransomware: What You Need To Know

April 14, 2025

Is Your Business Hardware Holding You Back?

April 14, 2025

The Hidden Cost of Slow Internet In Your Business

April 14, 2025

Do Your Cyber Security Plans Fall Short?

March 18, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Spyware Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.