• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Protect Yourself Against The Phone “Port-Out” Scam

April 26, 2018

Chances are that you probably haven’t heard of the port-out scam. However, just because it is something that has yet to attract widespread attention doesn’t mean it’s not a threat you should take seriously. Let’s take a look at why.

What Is a Port-Out Scam?
It’s very common for people to take their existing phone numbers with them when they switch mobile provider. Recently, unscrupulous individuals have been taking advantage of the ease with which this can be done by porting other people’s numbers and essentially taking control of them.

Here’s how it works: Someone calls your carrier or visits the store and pretends to be you. They then instruct the provider to port your number to a new carrier. Without warning, you find your cellphone service has been cut off, and some stranger has complete control of your number. A variation of this is SIM hijacking, which operates in a similar way but the attacker orders a new SIM.

Why Should You Care?
Losing the ability to use your phone is the least of your worries. Once the attacker has control of your phone, they will receive all your messages. If you have set up banking security measures that involve SMS authentication, the hijacker can potentially access your bank account and many other sources of highly sensitive information.

How To Protect Yourself
Fortunately, it’s really easy to avoid the port-out scam. All you need to do is add a security PIN to your account. From that point onward, people will not be able to make any type of change to your account without citing the PIN. As such, you are protected against both the port-out and SIM hijacking scams. Most carriers will let you set a PIN quickly and easily online or via the phone.

What Are The Seven Basic Parts Of A Computer?

April 26, 2018

Chris Myers is a field service technician for Tech Experts.

People usually notice performance issues in their computers after five to six years. When that starts to be the case, a hardware upgrade can be a real boost to both performance and the computer’s lifespan. Where do you even begin when upgrading a computer, though?

Even though their inner workings can seem complicated, computers are actually made up of a few key parts.

Core Upgradable Components – RAM
Random-access memory comes in small removable cards (or “sticks”) that are inserted into the computer’s motherboard. RAM modules usually come between two and four gigabytes each, used in sets of two.

In a computer, RAM holds the code and data actively used by the CPU. Every program you have open takes up a certain amount of space in RAM. For example, using an Internet browser with 8 tabs open takes about 1 gigabyte of RAM.

Using up 95-100% of RAM capacity will usually cause the computer to crash, so it’s something you want to avoid. Adding more RAM to a computer will allow the user to have more programs running at once.

Hard Drive
The hard disk drive (HDD) stores the operating system and all user files on several small disks, called platters, stacked on top of each other. They are read by a mobile arm, much like record players.

Hard drive performance is determined by how much data the manufacturer is able to fit on each platter (areal density) and how fast the platters spin (RPM). Usually, the only public number is the RPM, either 5400 or 7200. A 7200 RPM hard drive is about 30% faster than a 5400 RPM one.

If you want real performance though, you need a solid state drive (SSD). Solid state drives are five times faster than 7200 RPM hard drives. They just have a little less storage capacity and can be more expensive.

Graphics Card
The graphics processing unit (GPU) handles graphics and image processing. Most business computers don’t have one since they just use database or word-processing applications. However, if you use any graphics intensive programs like computer-aided design (CAD), computer-generated imagery (CGI), or digital content creation (DCC), you will see a massive performance boost after installing a graphics card.

Other Parts In A Computer – CPU
The Central Processing Unit is the core of the computer. Every action taken by the user or a program is processed one-by-one in a CPU thread. Modern CPUs have multiple cores so that it can have more threads running at once. Four cores are the standard amount now.

CPUs are the main source of low performance on older PCs, especially if they were bought for a fairly low price to begin with. However, changing a CPU often requires changing the motherboard as well. Therefore, it is not a cost effective solution versus buying a new computer.

Motherboard
The motherboard is a large circuit board that all other PC components connect to. It is basically the framework that turns all of those pieces into a working computer.

Case
The case refers to the outer shell around all of the components. Most cases come with several cooling fans installed. The main thing to remember about cases is that the smaller the case, the hotter the computer will be.

Power Supply
A small box with its own fan that runs power cables to all of the other parts. More expensive computers usually come with better power supplies, which is a good thing considering the severe damage that can occur when a power supply fails.

Windows Fall Creator’s Update: Breaking More Than It’s Fixing

April 26, 2018

Jason Cooley is Support Services Manager for Tech Experts.

Microsoft dominates the world of operating systems. Windows has been a part of our lives for years and some of us can’t remember a world without it.

Each time Microsoft rolls out a new operating system, it is updated and patched for years for various reasons.

Over the lifespan of a Windows operating system, there are various security updates perhaps more than any other type of update.

There are fixes for issues, whether that’s problems with Windows itself or interaction with other hardware and software.

Then there are the outliers: Windows feature updates. These updates typically introduce new features or changes to the core function of the operating system. Feature updates can improve the user experience for many people.

Windows 10 launched in 2015 and, like all of its predecessors, did not launch with perfection. There have been numerous updates of all kinds since its launch. Those security patches, hotfixes, and even a handful of feature updates had rolled out by October of 2017.

That is when Microsoft released the Window’s Fall Creator update. This update was going to create a better user experience. Personal connections were going to be easier to make.

A new application allowing you to resume work or browsing started on a mobile device like a smartphone on your computer was introduced as well. There were a few security updates as well.

All in all, the Fall Creators Update was going to fix a few bugs and introduce some quality-of-life improvements.

In previous versions of Windows, the updates were able to be shut off and postponed.

Large scale feature updates are known to have some complications when rolled out.

That is why these updates are not “pushed” when initially launched, but available to download as an optional update at first.

Upon this introduction window, there were, as expected, reports of problems coming in. What was not expected was the range of issues and the severity of some.

The first issue arising from the release of Windows 1709, the Fall Creators Update, was the update failing to install.

Many people reported issues of an error when attempting to install the update. The initial portion would install, but the finalizing of the updates upon a restart would fail.

If that wasn’t frustrating enough, if the update did manage to install, it was reported that the applying updates portion could take two hours (and in some cases as many as ten hours).

Then, let’s assume you got that far. Maybe you want to use Microsoft Edge, the Microsoft browser of choice. With the 1709 update, many users found that Edge was essentially broken. It would crash repeatedly.

Then, bring in the numerous broken drivers. Imagine an update breaking your Ethernet adapter. It happened. Applications disappeared, began opening on their own, and in some cases just didn’t work. The problems continued to roll in.

Many of these issues were resolved in a timely fashion and some were not. In mid-January, Microsoft declared the Fall Creators Update ready for business. This means that the update would be pushed out to anyone that was not already using it.

After 3 months, many issues were still present and others would soon be discovered.

Many users of corporate software and other specialty software were surprised by software that no longer worked. In some cases, the suggested fix was to roll back the update, which will force itself to reinstall shortly after.

There have been some big patches to fix these issues since January and I’m hoping that in another three months Microsoft will have all of these issues resolved.

Five Ways To Prepare For, Respond To, And Recover From A Cyberattack

March 16, 2018

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

When we asked businesses about cybersecurity threats, breach points, policies, company readiness, and recovery, we were surprised at the responses that we received.

The most frightening response of all was the following: “We have no formal process for assessing readiness to deal with a cyberattack of any sort.”

Hindsight is always 20/20 – how many times has something happened that you could have and should have prevented?

Here are five ways to prepare every company for a cyberattack:

[Read more…] about Five Ways To Prepare For, Respond To, And Recover From A Cyberattack

How To Resolve The Most Common Tech Issues For Small Businesses

March 16, 2018

Ron Cochran is Help Desk supervisor for Tech Experts.

With the ever-growing need to be connected to your clients and business information, you have to arrange your access to be quick and secure. But would you know how to set that up to keep your data safe? Relying on that one guy or employee that can set up your computer and connect it to the Internet just might not cut it.

There comes a time in the life of a business when the higher powers within need to evaluate the complexity of their technology and decide how they want to handle their tech needs.

However, hiring an internal IT employee involves paying competitively, providing benefits and vacation time, possibly extra training, and more. Do you have enough work to bring someone on full-time?

The other option is to hire a managed service provider (MSP) that can manage all technology aspects of your business.

Managed devices and software include workstations, laptops, printers, scanners, multi-function devices, fax machines, VoIP systems, and more.

Full network management includes wired and wireless networking, installation of new lines and devices, firewalls, checkpoints, switches, and servers. Basically: everything a business would use to keep things running smoothly.

A managed service provider will even manage the quality of service on your Internet or network connection or block out access to certain webpages and content as the business owner sees fit.

If the users need to restart their machines several times a day because of reliability issues or because the devices are crashing with error codes pointing toward hardware failures, it’s time to look at upgrading or replacing your machines.

Your MSP can look at your current situation, determine what should be upgraded or replaced, provide direction, and minimize the impact on your budget.

An MSP will manage all aspects of your technology department from hardware to software. They will interface with your vendors to ensure that all bundles are up-to-date, upgraded when needed.

This will not only keep your data safe, but your clients’ or patients’ data as well.

If you are working in the health care industry, you’ll need to remain HIPPA compliant. If you are in the financial industry, then you’ll need to comply with all security restrictions to be compliant there as well. MSPs can bring you up to standards and perform necessary audits.

Additionally, an MSP can give you the ability to defend and protect against viruses, malware, and intrusions. The last thing you want to have happen is for a software bug or virus to copy all of your data and send it off to some nefarious individuals who will sell or use the data for illicit activities.

By managing your anti-virus software, changing firewall settings, and monitoring machines for odd behaviors, an MSP can keep data disasters at bay by keeping it from happening, catching it early, or taking preventive measures.

Owning and running a small business isn’t just about bringing in customers and clients to further your business: it’s about operating efficiently and securely so that your business and its reputation will be around for many years to come.

If you are considering a managed service provider or considering a switch from the provider you currently have, don’t hesitate to reach out to us, Tech Experts, at (734) 457-5000.

We would be glad to sit down with you and review how you can leave the technological aspects of your business to someone else, giving you back the freedom to focus on what you do best.

How To: Extending Your Laptop’s Battery Life

March 16, 2018

Chris Myers is a field service technician for Tech Experts.

“Do I have enough battery for this?”

It’s a question that everyone knows well these days, especially if you need to use electronic devices for work.

Fortunately, there are many ways to increase the daily charge duration and extend the overall life of your battery. You can see how much the following tips help you by using a battery life monitoring application like BatteryCare (http://batterycare.net/en/index.html).

Power Options
First, check the power settings on your laptop. In every version of Windows, you can find this by typing “power options” into the search bar in the bottom left of your screen.

In this area, you can change what happens when you press the power button or close the lid, when the display turns off, and how long the laptop will sit idle before going to sleep.

Then, most importantly, at the bottom of the power options window, there are sliders for setting the exact screen brightness on your laptop.

Lowering this is one of the easiest ways you can instantly extend your battery life. Just make sure you can still read text on the screen!

In Windows 10, Microsoft has built in even more control options. You can access these by clicking on the Windows Start Menu icon in the bottom left corner of your screen and then click on the “Settings” cog. Next, go to System, then Battery. Here, you can customize automatic battery saver mode and see exactly what programs are using up the most battery by clicking on “Battery Usage by App.”

System Maintenance
Computers get bogged down over time just like a car does. When this happens, a tune up is required to keep your PC healthy and running well.

Having professionals check it is always a great option since they have the knowledge and expertise to quickly diagnose any issues that they find. However, there are some steps that you can do yourself.

You can clean out temporary files (https://www.ccleaner.com/ccleaner) that the computer doesn’t need anymore. Unless you have a Solid State Drive (SSD), then your hard drive will need defragmented (https://www.ccleaner.com/defraggler) as well.

A fragmented hard drive makes files take much longer for the hard drive to open, which causes performance and battery life issues.

Finish out your system maintenance by checking what programs are running in the notification area in the bottom right corner of your screen.

You can also see more detailed information by bringing up the Task Manager (CTRL+SHIFT+ESCAPE) and clicking on “Show more details.”

Even for applications you use often, you should exit them as soon as you are done with them to save power and memory space.

Hardware
Heat buildup makes your computer try harder to get the same performance as before. You can mitigate this by blowing out the keyboard and air vents on your laptop with compressed air.

Take care not to work with the computer in your lap or on a soft surface that isn’t well ventilated. You can also take out the battery and wipe off the metal contacts where it plugs in.

If you are already doing most of the steps above and your laptop battery is still dying out on you far too early, then it may be time to buy a second battery.

The second battery should be identical to the first, but new from the manufacturer. This will ensure you get a healthy, compatible battery that you can swap out with your first battery whenever that one needs to charge. Make sure to label each of them.

The Best Ways To Deal With Security Threats

March 16, 2018

Jason Cooley is Support Services Manager for Tech Experts.

Only several weeks into 2018 and computer security has been a huge topic of discussion.

The Meltdown and Spectre discovery at the beginning of the year put people on notice. Any device with a modern processor could have potentially been affected.

While wide-scale vulnerabilities like Meltdown and Spectre are not common, it has brought some much needed attention to the potential of an attack.

Security vulnerabilities happen in many different ways, through different methods. There have been both hardware and software related issues that could have left a person open to an attack. Designed to steal data or infect your system, neither are hassles that anyone wants to spend time dealing with.

Hardware vulnerabilities are fewer and farther between when compared to software issues.

Software always has updates and upgrades or new programs for new uses. Because of the nature of software in a traditional Windows setting, many programs have access to file systems and other sensitive system information.

Have you ever installed software of some sort? Do you recall being prompted to allow the software to make changes to your computer? These privileges, while necessary to run the software, give the software the right to access and make changes to your system.

Typically, this is fine, especially with a trusted software company behind what you are using.

It would be nearly impossible to examine all potential areas of a program to see if there was any possible flaw or vulnerability that could be exploited.

Coding for software can get very in-depth and there are millions of characters involved.

As with all technology, it is constantly changing. A message telling you “software updates are available” is almost certainly something you have seen before. These changes can add functionality, but a lot of times, they are doing so much more.

Take Windows, for example. With millions of devices running on some version of Microsoft’s operating system, finding Windows security vulnerabilities are a priority for developers and the people behind the malicious attacks alike.

Microsoft is a tech mainstay, and one of the biggest players in business, and they are definitely not immune to having flaws that could leave you at risk.

There is good news, however.

Microsoft is constantly updating and patching their operating systems to close any potential flaws that are discovered. Those “annoying” Window’s updates? They are potentially protecting you from data theft.

Does waiting on updates when turning on your computer leave you feeling frustrated? That update may save your computer from malicious software.

Hackers and others behind malicious activities and data theft often find new ways in on existing systems, making updates necessary to fix the newly discovered flaws.

When it comes to security, the best thing for you and your computer is to stay up-to-date on those security updates and patches.

This creates a problem for older operating systems. When Microsoft stops updating an operating system, any discovered flaws remain unfixed. This has recently happened with Windows XP and Windows 7 will soon join the list.

Also keep in mind that out-of-date web browsers, such as Google Chrome and Microsoft Edge, can leave you at risk. Productivity software, like Microsoft Office, because of the way it operates and accesses both the system and network, has great attack potential when not properly updated and patched.

So, outside of the operating system, what other software should you keep up-to-date?

All of it. It is definitely better to be safe than sorry when it comes to your computer and personal data, so play it safe and keep it up-to-date.

Meltdown and Spectre: Protect Yourself With Updates

March 5, 2018

Jason Cooley is Support Services Manager for Tech Experts.

As I am writing this, it has been about a month since news broke of Meltdown and Spectre, two separate vulnerabilities affecting nearly every smartphone and PC in use today. It affects all modern processors – which encompasses a whole lot of users.

Meltdown and Spectre are different fundamentally, but they use a similar vulnerability to do different things. So what are the differences?

Meltdown breaks the isolation between user applications and the operating system. This allows a program to access the memory and, therefore, the processes and data of the software, even when it is not authorized to do so. [Read more…] about Meltdown and Spectre: Protect Yourself With Updates

Windows Updates: Allow Them, Don’t Block Them

March 5, 2018

Ron Cochran is Help Desk supervisor for Tech Experts.

One of the first things you should do when purchasing a new computer (or rehabilitating an older computer) is to make sure the operating system is up-to-date with the latest security patches. In some cases, people disable the automatic updates and this can cause a whole host of issues.

Microsoft regularly puts out security patches, as well as other patches for their software. These patches are applied through the automatic update process. When that process is disabled, this means your computer hasn’t received the latest updates from Microsoft. Because your updates are halted, the system vulnerabilities that Microsoft engineers have found have not been repaired on your system.

You may remember the WannaCry Ransomware attack or, by now, heard of the most recent news of the Intel CPU flaw with Meltdown and Spectre. These two vulnerabilities, if exploited, can wreak havoc on an affected computer.

An affected system could suffer circuit issues, data corruption, system instability, and even data theft. There are always going to be people doing nefarious things when it comes to computers and the Internet, but the engineers behind your operating system and your antivirus company will always be on top of a fix for the vulnerability as soon as it is discovered.

Did you know that Microsoft releases most Windows Update patches on “Patch Tuesday” – the second Tuesday of each month? This keeps automatic system reboots to a minimum and also assists managed service providers like Tech Experts in ensuring that all of their clients’ servers and workstations have the latest software and security patches installed.

At home, you can set your Windows Updates to the “Automatic” option. That way, your system will automatically check for Windows Updates every 24 hours or so if the computer is connected to the Internet.

If you’re thinking to yourself, “I just use my home computer for browsing DIY pages, listening to music, and sending emails. Why would anyone want to get into my computer?,” reconsider how much personal information is actually stored.

It may seem as though your computer wouldn’t hold much useful information, but a hacker only needs a few passwords, an email address, phone number, and address to potentially gain access to cell phone accounts, shopping site accounts, tax information, and even banking and credit card accounts.

Even if the hacker isn’t looking for personal information like that listed above, they could still use your computer to send spam emails to other computers all over the world, slowing down your computer and Internet and causing a whole slew of issues for other computer owners.

Keeping your operating system up-to-date with the latest updates and security patches, keeping your anti-malware and anti-virus software updated and running on a regular basis, and adding robust security settings to your router and firewall will help keep all of these vulnerabilities behind closed doors. At least, until the software engineers can create and deploy the patches and updates to block access to them.

How To Protect Your Computers From Electrical Anomalies

March 5, 2018

Chris Myers is a field service technician for Tech Experts.

Many people will recognize these as risks of a power outage that can damage computers, but did you know that there are actually many different types of power anomalies? If the power dips for even a quarter of a second (250 milliseconds), your computer will use up its reserves of power and abruptly shut down after only 17 milliseconds.

Types of electrical anomalies

Sags, also known as brownouts and undervoltage, are temporary decreases of voltage levels. This is a very common problem, making up a majority of the power disruptions your computer will encounter. When a sag happens, computers may not get enough voltage to power all of its components. This can cause unseen data corruption, power loss to fans, and a freezing keyboard or mouse.

Electric companies purposefully induce sags in order to deal with periods of high power demands, such as high usage of air conditioners on a hot day.

Blackouts are when all power is lost. They are typically caused by power grid equipment failure, lightning, ice, car accidents, and natural disasters. When a blackout occurs, all data in your RAM and hard drive caches is lost. If critical system files like the File Allocation Table are damaged, it may render your hard drive inoperable.

A spike, also called an impulse, is a sudden and dramatic increase in voltage usually lasting less than one millisecond. It can be caused by a lightning strike or a large section of network equipment coming online. Spikes can cause catastrophic damage to computers, often overloading power supplies and burning circuit boards.

A surge, also referred to as a transient, is a short period of increased voltage typically lasting between 8 milliseconds and 2.5 seconds. Depending on the voltage, surges can cause damage similar to that of spikes.

Noise refers to both Electro-Magnetic Interference (EMI) and Radio Frequency Interference (RFI). Electrical power is transmitted with sine waves, usually as an alternating current (AC). The usage of many electronic devices in close proximity to each other can alter the pattern of these waves. When this occurs, it can result in overheating, data loss, and distorted audio or video.

Frequency shifts, also known as harmonic distortion, usually happen when lighting equipment shifts the sine wave frequency to something other than the standard 60 Hertz. This can result in the overheating of electrical wiring and power supply errors leading to unscheduled shut downs.

Preventing Damage

Surge protectors are the easiest and most affordable way to provide your equipment with an immediate layer of protection. When buying a surge protector, you want a high amount of joules and low let-through voltage.

Joules are basically how much energy the device can absorb over its lifetime. Let-through voltage is how much voltage is passed on to connected devices when the surge protector is hit with a 6,000-volt surge.

The best surge protectors will even have outlets for phone, TV, and USB cables. All of those cable types can be damaged from power surges. Just make sure you aren’t getting a power strip string only, which is simply an extension of a wall outlet and offers no protection.

For the best protection you will need an uninterruptible power supply (UPS). These power supplies will provide power to your equipment whenever it sags or stops completely. Most small power supplies will keep your computer running for about 10 minutes or just network equipment for about an hour. Having enough time to properly shut down your equipment can mean all the difference when it comes to saving your data and hardware.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.