• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Are You Using Multi-factor Authentication Yet?

August 28, 2020

Robust security is key for storing data. Cyber-criminals are targeting all businesses all the time, using clever automated tools to sniff out weaknesses they can exploit. Don’t make it easy for them.

Multi-factor authentication gives you another level of security when logging into apps.

What is it? You’ve probably used it when you log into your bank account. You enter your password, then on the next screen, you click to have a code texted to your phone, which you enter as a second, single-use password.

The thing is, it’s not just for your bank. You can use it to access many applications.

It’s simple to set up, and you can use it for any account that holds data you’d rather not fall into the wrong hands.

There are lots of different ways to do multi-factor authentication to protect your business’s data:

• The text message approach: That’s lots better than nothing, but is the least secure multi-factor authentication
• Generate a code on your cell phone: This is better
• Have a special small USB device that must be plugged into your laptop

If you’re unsure how to set this up, please give us a call at (734) 457-5000. We’d love to help.

Buyer Beware: New Phishing Scams Appearing On Craigslist

August 28, 2020

Craigslist email scams come in many shapes and forms, but in general, a Craigslist email scammer is known to do at least one of the following things:

● Ask for your real email address for any reason at all.
● Insist on communicating by email only (using either your Craigslist email or your real email).
● Send you fake purchase protection emails that appear to be from Craigslist itself.

Asking for your real email address
Scammers might ask you for your real email address for any of the following reasons:

The scammer claims they want to send payment via PayPal. Scammers posing as buyers might try to talk you into accepting online payments, such as those via PayPal.

Once you give your PayPal email address to the scammer, however, they can easily send you a fake PayPal confirmation email to make you think that they paid when they really didn’t.

The scammer claims they use a third-party to securely handle the payment. Similar to the PayPal scenario above, a scammer (posing as either a buyer or a seller) might ask for your real address so that they can send a fake email that appears to come from an official third party.

These types of emails typically are cleverly designed to look like they offer a guarantee on your transaction, certify the seller, or inform you that the payment will be securely handled by the third party.

The scammer intends to send you multiple scam and spam messages. A scammer who asks for your real email address might be creating a list of victims they’re targeting to hack their personal information.

They could be planning to send you phishing scams, money or lottery scams, survey scams or even social network scams.

Insisting on communicating entirely by email
Scammers might insist on talking exclusively by email for any of the following reasons:

The scammer can’t speak to you by phone or meet up in person. Many Craigslist scammers operate overseas and don’t speak English as their first language, which is why they prefer to do everything via email. If they’re posing as a seller, they almost definitely don’t have the item you’re trying to buy and are just trying to get your money.

The scammer is following a script and has an elaborate personal story to share. Scammers use scripts so that they can scam multiple people. If they’re posing as a buyer, they might refer to “the item” instead of saying what the item actually is.

Since English is typically not most scammers’ first language and they operate around the world, it’s very common for them to misspell words or use improper grammar. And finally, to back up why they can’t meet up or need payment immediately, they’ll describe in detail all the problems they’re currently facing/have faced in order to get you to sympathize with them.

The scammer is looking to pressure you to make a payment, or wants to send a cashier’s check. Using their elaborate story, the scammer who’s posing as a seller might ask you to make a deposit via a third party such as PayPal, Western Union, MoneyGram, an escrow service, or something else.

They might even convince you to make multiple payments over a period of time, looking to extract as much money from you as possible before you realize you’re not getting what you’re paying for.

On the other hand, the scammer who’s posing as a buyer might offer to send a cashier’s check, which will likely be discovered as fraudulent days or weeks later.

Beware of anyone who tells you they’re in the military. This is a strong sign of a scam.

Sending fake purchase protection emails
Scammers have been known to send protection plan emails that appear to be from Craigslist. Of course, Craigslist doesn’t back any transactions that occur through its site, so any emails you receive claiming to verify or protect your purchases via Craigslist are completely fake.

The most important thing you can do to avoid getting involved in a Craigslist email scam is to never give away your real email address to anyone you’re speaking to from Craigslist.

Three Ways To Avoid Work From Home Burnout

August 28, 2020

The lines between work and non-work have blurred for so many people. For those who are still working from home (WFH), they may now be in their sixth consecutive month where there’s little balance between what they do professionally and personally.

Because when the work is sitting there in your personal space, it’s far too easy to work early or late – or both. Accidentally spotting that “urgent” email just before you’re about to go to bed really is incredibly damaging.

Added pressures of childcare have made this worse. Some parents feel that working all hours is the only way they can make up for the perceived reduced quality in their work.

The stress of constantly working (or constantly thinking about work) is dangerous. Our bodies and minds simply aren’t designed to be “on” all the time.

This is bad for our mental health. Which can easily have a negative effect on our physical health too. As IT specialists, we’ve been working remotely for years. Here are our top 3 suggestions to avoid WFH burnout.

1) Have physical ways to transition from personal you to work you, and back again. The easiest way to do this is with a dedicated workspace that’s strictly only used for work.

Even a specific seat at a table can be dedicated to work, even if you sit in other seats to do other things, like eat or play games. Some people dress for work each day, so they can change their clothes to mark the end of the working day.

2) Set strict work hours and stick to them. 9 to 5 might be impossible, but you can still have set work times, even if they’re scattered throughout the day. Make sure your family knows when you’re working. This is where having a set physical space can really help. In your non-work hours, make sure you only do non-work things. And do not check your email!

3) Prioritize what really matters: The other downside of sitting surrounded by work all the time is that there’s always something else that can be done. There’s no point working on minor tasks at 11pm at night, because the chances are, you’re not actually achieving anything meaningful. Assume you have 3-4 hours of truly productive time each day. And make sure you get and stay organized to achieve the most important things in this time.

Emerging: A New Version Of Business In 2020

July 23, 2020

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Signs of hope are emerging across the globe as economies slowly begin to reopen, but the sad reality is there will never be a return to the “old normal.”

Re-opening phases will look different for each industry and business type. B2C will have different challenges in reopening than B2B. Different regions have been affected in different ways and some more than others.

There is no cookie cutter model to reopening
McKinsey and Company has developed the CEO’s guide to reopening (https://www.mckinsey.com/business-functions/strategy-and-corporate-finance/our-insights/the-restart) based on research they have done across the globe, specifically in Europe and Asia. One of the biggest differentiators will be if you are B2B or B2C.
[Read more…] about Emerging: A New Version Of Business In 2020

Remote Workforce Or Not – You Can Securely Protect And Back Up Your Corporate Information

July 23, 2020

Jason Cooley is Support Services Manager for Tech Experts.
One of the most common objections heard when talking with businesses about moving towards a remote work strategy is the supposed security risks posed by not having all data contained within the physical confines of the office building.

While this has widely been debunked, the myth still remains. But the tide may be moving in the other direction now that many businesses were forced to move to an entirely remote workforce during the COVID-19 shutdown.

CNBC has reported that 85% of businesses are now operating 50% of their workforce remotely, and with tech giants Twitter and Facebook both reporting plans to move towards a continued remote strategy, the reality is that remote work in a larger capacity is going to become the norm instead of the exception.

Now is the time to prepare for the “new normal” that will become our reality.

Sadly, along with the threat of COVID-19, cyberattacks have grown as attackers realize that home networks are not as secure as corporate networks. However, security and back up firm Acronis shares 5 things that you can do to protect your business data moving forward with a remote work strategy.

Five “must do’s” according to Acronis
Acronis is a leading cloud backup and security provider and one that we recommend widely to all of our customers. They list 5 “must do’s” as you set up your remote workforce, and as always, we are here to help you put these processes in place.

Must-Do #1: VPN – or Virtual Private Network
You have most likely heard of this technology as it has been around for a while. But if not, a VPN will encrypt all data while in transit to protect it from cyberattackers.

Must-Do #2: Keep an eye out for phishing
Hackers are known for taking advantage of highly stressful events and we have seen an increase of COVID-19 themed phishing attempts and we expect this number to continue to rise as businesses reopen.

The best and most reliable way to prevent a phishing attack from affecting your business is through effective employee training. As another protective measure, you can install URL filtering software on your employees laptop or home computer to further reduce the risks of falling victim.

Acronis says, however, that you should always ask yourself if you were really expecting that email before opening or clicking any links contained in the message.

Must-Do #3: Anti-Malware
Virus and malware protection has always been a standard recommendation, but with the wide net that is cast with remote work, it has become even more important that every endpoint that touches your corporate data has this protection installed on it.

Must-Do #4: Patch, patch, and patch
Regardless of your operating system, whether it be Microsoft or Apple, you need to ensure that you are operating under the most recent operating system. Many attacks occur by taking advantage of unpatched vulnerabilities.

Must-Do #5: Keep your password, and your workspace, to yourself
Just because the office location is at home does not automatically mean people can’t access sensitive information when you step away. Limit access to your computer even when you are at home and do not tell anyone your passwords.

Prepare for the future now
There is no question that the future we anticipated at the close of 2019 is different than the one that will ultimately surface.

By making the assumption that remote work will continue to be the norm instead of a return to the standard office environment will help your business be agile and meet challenges head-on.

Top Reasons To Record Your Business Calls

July 23, 2020

The 3cx Phone System, the voice over Internet protocol (VoIP) phone system that Tech Experts sells and services, has a call recording feature that’s quite popular. The service has been available for quite a while now.

However, many small- and medium-sized businesses don’t take advantage of the technology that lets them prioritize customer interaction. When used properly, call recording can strengthen your company’s reputation and boost customer satisfaction.

Here are a few reasons to consider a 3cx Phone System with call recording:

Improve customer service
One of the most important reasons why businesses should always record their calls, no matter its significance, is to ensure high-quality customer service. By reviewing calls, managers can understand how their agents have been dealing with customers, find out whether or not they’ve followed company protocol, and pinpoint any aspects that can be improved on.

Without call recording, managers would have to listen to each call in real time, which is a time-consuming process. By recording each call, not only will your managers save time, but your employees will also be motivated to perform at their best every time they’re on the phone because they know their calls can always be reviewed.

Upgrade employee performance
According to Edgar Dale’s Cone of Learning, people only remember 10% of what they’ve read, 50% of what they’ve seen and heard, and 90% of what they’ve done. By providing your agents with actual recordings of good and bad calling examples during training sessions, and have them simulate calls afterwards, they’ll be able to learn better and provide high-quality customer service faster.

Retrieve missed details and prevent litigation
With hundreds of phone calls daily, it’s understandable if your employees don’t catch every single detail. And for companies that require their agents to manually input information during calls, there’s always a possibility that they’ll forget or miss certain information. Needless to say, this could lead to disgruntled customers. If not properly handled, this can harm your reputation, reduce work opportunities, and if things escalate, proceed to litigation.

VoIP’s call recording feature lets you replay saved audio files to make sure you haven’t missed any details, ensuring that all customer demands are met. And if you ever get into a dispute with your clients regarding who said what, you can always retrieve the exact audio file and have both sides listen to it, saving you thousands of dollars in legal fees.

Understand customer preferences
Have you ever received an inquiry about a product or service that’s not included in your offerings? While your agents usually jot these requests down and pass them on to the relevant personnel, they may end up forgetting some if numerous calls are being made that day. Tiny issues like this can lead to potentially huge losses. With call recording, you can review all your calls at the end of the day. You’ll have a better picture of what certain customers are looking for so you can address them better.

VoIP allows businesses to make on-demand calls affordably, and its call recording feature helps companies improve their customer service and prevent litigation. If you think business VoIP is right for you, or if you have any questions, give us a call at (734) 457-5000.

The Latest Small Business Security SNAFU? Zoom

June 23, 2020

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.
With everyone now working from home and finding new ways to collaborate and get things done, Zoom has become one of the most popular video conferencing applications, reporting growth of 378% over just one year ago.

As its popularity has grown, so has the allure for hackers. The FBI in Boston reported that two online high school classes had been interrupted by individuals who began yelling obscenities and the address of the teacher to another which displayed swastika tattoos. So how does this happen?

To start, most recurring meetings use the same meeting IDs. Someone, in an effort to make sure other attendees were aware of the event, would share it in an unsecured way, such as on Facebook or other social media.

Hackers can pick up this information, and even after the event was over, they could use the same information to gain access to the next meeting. Fortune Magazine has reported that dark web dedicated forums have popped up on popular sites like Reddit, and all a hacker would need to do on Facebook is search for “zoom.us” to find any public post containing the targeted words.

So what is a business to do to secure their meetings and avoid the potential sharing of sensitive corporate information during this time of extensive virtual meetings? First, and foremost, set your meeting to private. This means that there is a password required for each participant to enter. Although Zoom has now changed this setting to be the default setting, some users are still opting to make the meeting public for the sake of convenience.

As inconvenient as it is to have invitees enter a password to get into their meeting, it’s even more inconvenient to have sensitive corporate information released. Also… and this might seem to be stating the obvious but do not share your meeting invite over social media.

No matter our security settings on social media profiles, it’s best to assume that nothing you say on there will stay private. Another way to ensure the security of your zoom meeting is to use the feature of the waiting room. This means that each invitee who logs in will first be placed into a room where the meeting host then has to approve their entry and allowing the host to assess each attendee before they enter the room.

Also, never use your personal ID. Each zoom user has a personal virtual meeting room assigned when they create an account. Defaulting to using your assigned virtual meeting room can make it easier for hackers to enter in from old meeting announcements.

You know the phrase, what happens in Vegas stays in Vegas? Yeah. When it comes to Zoom (and any virtual meeting for that matter) assume what happens in Zoom does not stay in Zoom. If the information that is going to be shared is of such critical nature, you should find another medium where you have no chance of being overheard.

Covid-19’s Effects On The Tech We Use Every Day

June 23, 2020

Jason Cooley is Support Services Manager for Tech Experts.
As we all know, most of the world was basically shut down earlier this year. There was no planning or infrastructure in place to help ease the burden of entire populations staying home. Consequently, the domino effect hit hard.

People rushed out to stock up on essentials like toilet paper and sanitizer. Overbuying then created a new issue as supply chains struggled to keep up with demand. Shipping times overall started to slow.

Amazon, whose Prime subscription service is famous for its 1-2 day shipping time, prioritized essential items for their guaranteed delivery. From personal experience, I had an Amazon item that did not ship for two weeks after ordering. This was solely due to the de-prioritization of nonessential goods.

The United States Post Office has had severe delays as well, specifically in their larger Metropolitan areas, and have been buried under a Christmas season-like load with a much smaller workforce.

Manufacturing as a whole took an almost immediate hit. Most manufacturing facilities have a large number of employees in an enclosed area. This presented a huge risk for the spread of the disease, causing automobile manufacturers, food processing plants, and computer manufacturers to send their employees home and shut their doors.

Why does manufacturing being put on hold matter so much? Once again, it’s due to the struggle to meet demands.

While many industries did put a hold on their business, many others made a quick transition to remote work. Many companies, both big and small, scrambled to obtain laptops for their employees to allow them to work from home.

While companies worked out remote solutions for their employees, schools had also closed down all over the country.

Some schools had existing devices for their students, such as Chromebooks, but many schools did not. To continue the learning process during the pandemic, more computers were needed for students to do their work. All of these new needs for computers – primarily from online retailers – created a huge surge in PC sales, but also created a real issue. Inventory was running out all over the United States and a computer shortage began.

With no manufacturing, there was no inventory being created, including PC parts. This affected the entire sector and the shortage is on-going.

All faces of technology – from the big guys like Amazon to smaller companies – have felt the effects of the pandemic. They have also done their part to help.

Auto plants changed their lines over from making cars to making respirators. Amazon put a high priority on essential items and medical supplies. Many other industries and businesses have shifted their production to meet immediate needs such as masks.

There is some silver lining in all of this. Seeing companies band together for the good of people without thinking of profit has been reassuring. The phrase “unprecedented times” has been used more times than we can count, but now that we have that precedent, let’s hope we can learn from it.

Should I Go, Or Should I Wait? Re-opening Tips

June 23, 2020

Stay at home orders are being lifted, businesses are beginning to reopen. Our world is being turned on its head again, and normal will never be the same again.

As we begin to reopen our doors and essentially relaunch our businesses, here are some things to think about to get you started.

Be very careful about what and where you make cost cuts
Uncertainty naturally causes us to restrict, and this is by no means bad. You may have to make cuts in order to get things back on their feet. But Inc Magazine contributor, Graham Winfrey, cautions to you make those cuts wisely.

In his interview with Manny Cosme, the CEO and President of a CFO and Bookkeeping business, he was advised to make projections before you make cuts. Cosme said that businesses need to think about growing their way out of the crisis.

He said, “Every cut that you make is going to cut your ability to generate revenue or keep your business going, which is not something you want to be doing right now.” So think very carefully about what, and even if, you are going to make any cuts as you reopen.

Look closely at your business model
No matter how much we wish we could just go back to the way things were, we have all experienced significant changes over the last few weeks. Nothing feels better than returning to some sort of normalcy.

But one thing we have learned over this global health crisis is the ability of the entrepreneur and the business owner to pivot and meet their consumers’ needs where they are. Changing your business model in light of the pandemic just might be what saves your business.

Graham Winfrey suggests you ask yourself 3 questions:

● What should your business model be when you come out of this?
● Is your current business model viable? If so, how can you hang on until it’s viable again?
● Are there ways you can pivot all of your expertise into a better revenue stream?

Along with his panelist in the article on Inc, Cosme believes that it comes down to changing one or more of the following within your business model:

● What you sell
● Whom you sell it to
● How you deliver it

Evaluate local support options
Throughout this crisis, many federal and local supports have been extended to small business and their employees. Graham suggests that you look to your local chamber of commerce to see what local support programs may have been crafted to help you as you reopen your doors.

Create policies to ensure the safety of both your employees and customers
After you have completed the above steps, now you should create your communication plan for letting your customers know you will be open for business.

George Brandt in his article in Forbes suggests you approach it in three steps: Emotional, rational, and inspirational.

Be authentic
George suggests that you connect with your audience in an authentic, relatable and compassionate way.

Empathize with your consumer that you know this was difficult for them as well as for you. George quotes PrimeGenesis’ saying, “No one cares how much you know until they know how much you care.”

Lay out the facts
With calm composure, polite and authoritative, lay out the hard facts of the current situation. For them and for you.

George defines the facts as “things that any rational person would agree are true no matter what bias or perspective they bring to the situation – objective, scientific truths as opposed to subjective, personal, cultural or political truths, opinions or conclusions.”

Think ahead and paint an optimistic view
George recommends that you ground all your communication with Mayfield and Mayfield’s meaning-making and direction-giving language, meaning providing purpose and value: be – do – say.

The New Normal COVID-19 Office Security

June 23, 2020

With continued WFH policies and multiplied COVID-19 scams and threats, the importance of good cyber security stands out. Indeed, with a workforce that is highly dependent on digital services for the foreseeable future, the new normal COVID-19 office security is necessarily stronger, more vigilant, and more dispersed.

Yet, a lot of questions remain unanswered. For example, will behavioral surveillance be part of the new normal? As organizations plan to implement contact tracing, privacy advocates voice their concerns.

Given the uncertainty, we expect to see these non-intrusive measures with clearly defined benefits coming to the new normal.

Thermal cameras for passive temperature checking
The advantages of temperature detection for a business COVID-19 strategy include early discovery and reporting leading to early isolation and treatment.

Advanced temperature detection technology is not a substitute for medical grade FDA approved thermometers. The advantage of an advanced thermal camera system is that it can pick out personnel with abnormal body temperatures in heavy traffic areas to be assessed later by a professional with medically approved equipment.

These systems use an HD video camera and thermal camera side by side looking at the same field of view. The resulting video and metadata output, when combined with advanced artificial intelligence, gives sensible temperature data on multiple objects simultaneously.

Some systems employ facial detection technology paired with a face database and a high temperature detection alarm. They can identify up to 16 targets with a temperature accuracy of .54° F and come with an easy to use interface.

In-office security cameras
Also likely to become more common, in-office security cameras provide a video record of events. They function as a tool to answer concerns about what happened if a COVID-19 behavioral complaint surfaces. The societal resistance to surveillance will likely be counter-balanced by the desire to maintain a safe work environment.

Plexiglas barriers
Plexiglas® extruded acrylic sheets promote both worker and consumer safety to help control the spread of the virus.

Sneeze guards made from Plexiglas make sense. So, it is logical to see their use extended in the office to create barriers between closely seated workers. We’ll see them in other areas to promote social distancing.

Health questions
The CDC recently issued guidance recommending that employers actively encourage sick employees to stay home. Interpreting this guidance, the EEOC confirmed that the rules of the ADA and the Rehabilitation Act continue to apply but do not prevent employers from following guidelines from the CDC and other public health authorities regarding COVID-19.

Per the EEOC’s guidance, employers may ask employees who report feeling ill at work, or who call in sick, questions about their symptoms to determine if they may have COVID-19. In addition, they may require employees to stay home if they have COVID-19 symptoms, screen applicants for symptoms of COVID-19, delay the start date or withdraw the offer of an applicant with symptoms.

Thus, employers may find it necessary to ask employees about their symptoms. They might require notification of high body temperatures, and request disclosure of recent proximity to individuals who have tested positive for COVID-19. In doing so, they must be mindful to do it consistently and avoid discriminatory use of the results.

To simplify the process and avoid collecting unnecessary information, employers may simply ask employees to stay home if they show certain symptoms, rather than asking them about the specific symptoms they have.

Work from home security
The WFH new normal creates multiple security challenges that must be addressed. From simple provisioning issues like shredders for employees handling sensitive documents to updated incident response plans, new circumstances demand new security responses.

For example, the company’s business continuity plan should be updated to address new fail-over and backup procedures. Also, the difficulty of securing and verifying credentials in a remote environment will encourage the use of multifactor authentication.

In addition, with less physical oversight of employees, organizations may need to focus more on user activity. Access logs and user behavior analysis come to mind. Increased threats require increased employee education. And, employees also need to know how to report security risks or threats through all the currently used communication channels (in addition to email).

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

The Real Cost Of A Security Breach (It’s Not Just About The Money)

July 22, 2025

How To Automate Daily Tasks And Free Up Your Time

July 22, 2025

Why Sticking With Windows 10 Could Put Your Business At Risk

July 22, 2025

AI Is Already in Your Business – Did You Notice?

June 17, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Twitter Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.