• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

The Best Ways To Deal With Security Threats

March 16, 2018

Jason Cooley is Support Services Manager for Tech Experts.

Only several weeks into 2018 and computer security has been a huge topic of discussion.

The Meltdown and Spectre discovery at the beginning of the year put people on notice. Any device with a modern processor could have potentially been affected.

While wide-scale vulnerabilities like Meltdown and Spectre are not common, it has brought some much needed attention to the potential of an attack.

Security vulnerabilities happen in many different ways, through different methods. There have been both hardware and software related issues that could have left a person open to an attack. Designed to steal data or infect your system, neither are hassles that anyone wants to spend time dealing with.

Hardware vulnerabilities are fewer and farther between when compared to software issues.

Software always has updates and upgrades or new programs for new uses. Because of the nature of software in a traditional Windows setting, many programs have access to file systems and other sensitive system information.

Have you ever installed software of some sort? Do you recall being prompted to allow the software to make changes to your computer? These privileges, while necessary to run the software, give the software the right to access and make changes to your system.

Typically, this is fine, especially with a trusted software company behind what you are using.

It would be nearly impossible to examine all potential areas of a program to see if there was any possible flaw or vulnerability that could be exploited.

Coding for software can get very in-depth and there are millions of characters involved.

As with all technology, it is constantly changing. A message telling you “software updates are available” is almost certainly something you have seen before. These changes can add functionality, but a lot of times, they are doing so much more.

Take Windows, for example. With millions of devices running on some version of Microsoft’s operating system, finding Windows security vulnerabilities are a priority for developers and the people behind the malicious attacks alike.

Microsoft is a tech mainstay, and one of the biggest players in business, and they are definitely not immune to having flaws that could leave you at risk.

There is good news, however.

Microsoft is constantly updating and patching their operating systems to close any potential flaws that are discovered. Those “annoying” Window’s updates? They are potentially protecting you from data theft.

Does waiting on updates when turning on your computer leave you feeling frustrated? That update may save your computer from malicious software.

Hackers and others behind malicious activities and data theft often find new ways in on existing systems, making updates necessary to fix the newly discovered flaws.

When it comes to security, the best thing for you and your computer is to stay up-to-date on those security updates and patches.

This creates a problem for older operating systems. When Microsoft stops updating an operating system, any discovered flaws remain unfixed. This has recently happened with Windows XP and Windows 7 will soon join the list.

Also keep in mind that out-of-date web browsers, such as Google Chrome and Microsoft Edge, can leave you at risk. Productivity software, like Microsoft Office, because of the way it operates and accesses both the system and network, has great attack potential when not properly updated and patched.

So, outside of the operating system, what other software should you keep up-to-date?

All of it. It is definitely better to be safe than sorry when it comes to your computer and personal data, so play it safe and keep it up-to-date.

Meltdown and Spectre: Protect Yourself With Updates

March 5, 2018

Jason Cooley is Support Services Manager for Tech Experts.

As I am writing this, it has been about a month since news broke of Meltdown and Spectre, two separate vulnerabilities affecting nearly every smartphone and PC in use today. It affects all modern processors – which encompasses a whole lot of users.

Meltdown and Spectre are different fundamentally, but they use a similar vulnerability to do different things. So what are the differences?

Meltdown breaks the isolation between user applications and the operating system. This allows a program to access the memory and, therefore, the processes and data of the software, even when it is not authorized to do so. [Read more…] about Meltdown and Spectre: Protect Yourself With Updates

Windows Updates: Allow Them, Don’t Block Them

March 5, 2018

Ron Cochran is Help Desk supervisor for Tech Experts.

One of the first things you should do when purchasing a new computer (or rehabilitating an older computer) is to make sure the operating system is up-to-date with the latest security patches. In some cases, people disable the automatic updates and this can cause a whole host of issues.

Microsoft regularly puts out security patches, as well as other patches for their software. These patches are applied through the automatic update process. When that process is disabled, this means your computer hasn’t received the latest updates from Microsoft. Because your updates are halted, the system vulnerabilities that Microsoft engineers have found have not been repaired on your system.

You may remember the WannaCry Ransomware attack or, by now, heard of the most recent news of the Intel CPU flaw with Meltdown and Spectre. These two vulnerabilities, if exploited, can wreak havoc on an affected computer.

An affected system could suffer circuit issues, data corruption, system instability, and even data theft. There are always going to be people doing nefarious things when it comes to computers and the Internet, but the engineers behind your operating system and your antivirus company will always be on top of a fix for the vulnerability as soon as it is discovered.

Did you know that Microsoft releases most Windows Update patches on “Patch Tuesday” – the second Tuesday of each month? This keeps automatic system reboots to a minimum and also assists managed service providers like Tech Experts in ensuring that all of their clients’ servers and workstations have the latest software and security patches installed.

At home, you can set your Windows Updates to the “Automatic” option. That way, your system will automatically check for Windows Updates every 24 hours or so if the computer is connected to the Internet.

If you’re thinking to yourself, “I just use my home computer for browsing DIY pages, listening to music, and sending emails. Why would anyone want to get into my computer?,” reconsider how much personal information is actually stored.

It may seem as though your computer wouldn’t hold much useful information, but a hacker only needs a few passwords, an email address, phone number, and address to potentially gain access to cell phone accounts, shopping site accounts, tax information, and even banking and credit card accounts.

Even if the hacker isn’t looking for personal information like that listed above, they could still use your computer to send spam emails to other computers all over the world, slowing down your computer and Internet and causing a whole slew of issues for other computer owners.

Keeping your operating system up-to-date with the latest updates and security patches, keeping your anti-malware and anti-virus software updated and running on a regular basis, and adding robust security settings to your router and firewall will help keep all of these vulnerabilities behind closed doors. At least, until the software engineers can create and deploy the patches and updates to block access to them.

How To Protect Your Computers From Electrical Anomalies

March 5, 2018

Chris Myers is a field service technician for Tech Experts.

Many people will recognize these as risks of a power outage that can damage computers, but did you know that there are actually many different types of power anomalies? If the power dips for even a quarter of a second (250 milliseconds), your computer will use up its reserves of power and abruptly shut down after only 17 milliseconds.

Types of electrical anomalies

Sags, also known as brownouts and undervoltage, are temporary decreases of voltage levels. This is a very common problem, making up a majority of the power disruptions your computer will encounter. When a sag happens, computers may not get enough voltage to power all of its components. This can cause unseen data corruption, power loss to fans, and a freezing keyboard or mouse.

Electric companies purposefully induce sags in order to deal with periods of high power demands, such as high usage of air conditioners on a hot day.

Blackouts are when all power is lost. They are typically caused by power grid equipment failure, lightning, ice, car accidents, and natural disasters. When a blackout occurs, all data in your RAM and hard drive caches is lost. If critical system files like the File Allocation Table are damaged, it may render your hard drive inoperable.

A spike, also called an impulse, is a sudden and dramatic increase in voltage usually lasting less than one millisecond. It can be caused by a lightning strike or a large section of network equipment coming online. Spikes can cause catastrophic damage to computers, often overloading power supplies and burning circuit boards.

A surge, also referred to as a transient, is a short period of increased voltage typically lasting between 8 milliseconds and 2.5 seconds. Depending on the voltage, surges can cause damage similar to that of spikes.

Noise refers to both Electro-Magnetic Interference (EMI) and Radio Frequency Interference (RFI). Electrical power is transmitted with sine waves, usually as an alternating current (AC). The usage of many electronic devices in close proximity to each other can alter the pattern of these waves. When this occurs, it can result in overheating, data loss, and distorted audio or video.

Frequency shifts, also known as harmonic distortion, usually happen when lighting equipment shifts the sine wave frequency to something other than the standard 60 Hertz. This can result in the overheating of electrical wiring and power supply errors leading to unscheduled shut downs.

Preventing Damage

Surge protectors are the easiest and most affordable way to provide your equipment with an immediate layer of protection. When buying a surge protector, you want a high amount of joules and low let-through voltage.

Joules are basically how much energy the device can absorb over its lifetime. Let-through voltage is how much voltage is passed on to connected devices when the surge protector is hit with a 6,000-volt surge.

The best surge protectors will even have outlets for phone, TV, and USB cables. All of those cable types can be damaged from power surges. Just make sure you aren’t getting a power strip string only, which is simply an extension of a wall outlet and offers no protection.

For the best protection you will need an uninterruptible power supply (UPS). These power supplies will provide power to your equipment whenever it sags or stops completely. Most small power supplies will keep your computer running for about 10 minutes or just network equipment for about an hour. Having enough time to properly shut down your equipment can mean all the difference when it comes to saving your data and hardware.

Important Aspects of Cybersecurity

March 5, 2018

Evan Schendel is a help desk specialist for Tech Experts.

In this age where dangers lie around every digital corner on your computer, what could possibly keep everyone safe and secure?

Cybersecurity experts are the first line of defense and are quite good at holding that line. These experts protect many fields ranging from hardware and software to sensitive data and financial information, even users themselves.

Hardware and Software

The maliciousness of viruses can cripple whole systems and a countless number of links or applications can deliver dangerous viruses or malware. These viruses and dangers evolve every day.

Hardware can be manipulated by vulnerabilities and exploitations as well. Without intention of frightening you, each part of your computer could be of interest to the right person, as the recent Meltdown and Spectre issues have shown. It isn’t simply your operating system or data that can be affected.

This constant cycle of attacker-and-defender leaves thousands of unfilled jobs for cybersecurity and the protection of devices. If these jobs were not filled or properly trained, computer systems across the world would fall prey to hackers. However, your device itself is not the only thing that can be harmed.

Sensitive Data and Users

When unauthorized hands gain access to personal information, it can lead to disaster. A person’s financial and personal data is important and the people who protect that data are far fewer than those seeking it out.

Anti-virus programs are made by people who know viruses well, often those who had created viruses or malware prior to their more noble ventures.

These should always stay updated and definitions for these pieces of software tend to be updated with frightening frequency. Staying up-to-date on malicious software and code is the only real method of stopping it, after all.

Systems administrators also have the need for people who can spot discrepancies or potentially malicious actions in their networks and keep standards up to snuff. Passwords and safety precautions must be set to a standard that is important to follow and uphold.

Information over the phone can also be an issue, as many users have trouble distinguishing a scammer from a legitimate caller. This is where education and prevention come in.

Educating people about how potential scammers may work is one of the most important aspects in preventing unsuspecting folks from giving their credit card information away, or worse.

Preventing these scammers from calling thousands of people a day is also of utmost importance, but requires experts and trained technicians (even the government, in some cases) to crack down on these cyber criminals.

Lastly, the most vulnerable aspect of a computer’s security is, unfortunately, the user. Tricky emails and legitimate-looking sites can be incredibly tough to distinguish from the original product. Most wouldn’t even suspect such an uncanny replication.

This is where user error molds with a criminal’s savvy nature. If this sounds unrealistic to fall for, then it’s even better, but more times than not, someone will fall for it – even the experts can be fooled by sophisticated trickery or maybe a simple lack of awareness. Luckily, if this is the first issue, the other sections can come into play and protect your systems and yourself from being subject to data loss or cyber-thievery.

Eleven Benefits Of Having Managed IT Support

January 1, 2018

Chris Myers is a field service technician for Tech Experts.
There are many perks to enlisting a managed service provider to handle all of your technology needs. Here are just a few:

Knowledge Base
You get access to a whole team of experienced professionals who spend all day every day fixing the same problems you are running into. When an issue pops up, chances are we have seen it before and know how to quickly resolve it.

Proactive Support
With our advanced monitoring software, we are immediately alerted to a variety of issues. Often, by the time you notice a problem, we’re already working to resolve it. Detecting and fixing issues early prevents them from escalating into major outages with long down times and expensive repairs. [Read more…] about Eleven Benefits Of Having Managed IT Support

How Your Old PC Is Costing You Money

January 1, 2018

Ron Cochran is Help Desk supervisor for Tech Experts.
We all know that electronics become outdated almost as fast as you can purchase them, but what if I told you that holding onto that six to ten-year-old machine could be costing you just as much money as upgrading to a newer model?

Just like with any technology, the parts get smaller, more efficient, cheaper to buy, and cheaper to run. It could cost you real money in several ways: machine downtime, a sudden replacement when it crashes, paying an employee to redo their work after a failure.

Additionally, if a machine is extremely slow, tasks can be unnecessarily drawn out while employees wait for the computer to respond.

Then consider energy efficiency. That computer from 2008 could be using a 300w power supply that isn’t very energy efficient. Add an older, larger processor that is power-hungry to the mix and that 300w power supply is working at half capacity at 60% efficiency.

The use of other hardware – like your DVD ROM drive, USB, and video cards – can pull more power too, raising electricity costs.

Most computer manufacturers today plan on customers upgrading their technology within 3-6 years to keep up pace with the ever-changing software industry. Let’s say that, six years ago, you built your own machine with an almost top of the line CPU, more RAM than you needed, and a nice, fast hard drive.

That same machine will now have trouble keeping up with a machine of lesser quality.

This is partly due to the way software coding has changed, but also how electronic architecture has improved. The processors have gotten smaller and take less power, but work harder, faster, and more efficiently.

This shift in technology efficiency directly translates into more money left in your business account due to your employees being able to work more efficiently.

You also have to factor in data security once computers stop accepting essential critical operating system updates due to the lack of storage space.

Or how about that new graphic design software or CAD software you need to run that you can’t install because you don’t have enough RAM or a 64 bit operating system?

Once you need the 64-bit operating system, your RAM should be upgraded to run the operating system more efficiently.

The upgrades needed for older machines can pile up quickly.

The above principles apply to your company servers as well. Maybe even more so because of the amount of work they do and the data they store. In a server, the hard drives never stop spinning, the processors never stop processing.

You may have purchased an $8,000 server for your business, but if it was 12 years ago, it’s probably doing you more harm than good now. That server could be costing you more money in service calls for the issues that pop up or frequent, disruptive power cycles.

When buying IT equipment for your business or personal use, you should never buy something that is “just enough.” Not because it can’t do it, but because it will work harder to do the work, using more power to do it.

Think of it like a truck: a small truck CAN pull that new camper you bought, but a bigger truck will pull it more safely while costing you less money in fuel in the long run.

Mobile Efficiency: Laptop Versus Tablet

January 1, 2018

Jason Cooley is Support Services Manager for Tech Experts.
We are an increasingly mobile society. Whether for work or personal, you’d be hard-pressed to find too many people without an Internet-connected device somewhere nearby. Smart phones are everywhere and basic Internet usage is at your fingertips.

When you need to work on the go or work while actually moving, there are device options that can help you really increase your productivity.

There are obviously many factors that can come into play when talking about meeting your mobile and professional needs.

What kind of tasks do you need to perform? What sort of software do you need access to? Are you going to be switching between applications and run multiple tasks at once? How frequently and how far are you moving?

I know, so many questions! So where can we even begin?

Just like any other job in the world, having the right tools can make things so much easier. If you work at a restaurant as a server for instance, using a laptop is very impractical. Carrying it around typing orders on a keyboard would prove to be difficult, just as writing a novel on a tablet touchscreen keyboard would be. These are some clear-cut scenarios, but most of us fall somewhere in the middle.

So let’s talk about some of those questions.

What kind of tasks do you need to run? If you are just replying to email, stick to your smart phone. That is where you’ll end up anyway.

For everyone else? What kind of programs and applications are you using? The first thing you should check, if you don’t already know, is if there are mobile versions of the programs you use. Some programs may not be user friendly on a touchscreen if you use the standard version.

Use your smartphone to see if these applications are user friendly in a new setting. The app may not perform as well as it would on a tablet, but maybe you can decide if it’s something you can work with. If the programs are available and you are comfortable using them with a touchscreen interface, you may be ready to use a tablet for work.

When it comes to laptops specifically, the first thing I would consider is how much you’ll be moving around. If you travel from place to place, but typically sit to work at different locations, a laptop is always going to be an option.

The difference is the limitations of the device. A laptop has more capability when compared to a tablet. After all, it is a computer.

If you are switching between many programs and applications frequently and use multiple programs at one time, then a laptop will have more capable processing power to allow you to work unbothered by slow system response time.

The best summary I can give is, if you move around while working, get a tablet. If you sit, just in different locations, you’ll be happier with a laptop.

If you can’t find yourself leaning one way or another, the third option would be a Surface type of machine. With the processing power and speed of a laptop but the mobility of a tablet, you will spend more money for the ultimate solution in mobile versatility and efficiency, but won’t feel the constraints of either other option.

It’s all about you and how you want to get your work done.

How To Keep Your Computer Speedy As It Gets Older

January 1, 2018

Evan Schendel is a help desk specialist for Tech Experts.
As a computer ages, it inevitably becomes slower. Applications and files can slow down a PC as quickly as dated hardware or too much heat or dust can. Preventive maintenance is the first and most important step to keeping a computer running as swiftly as it did on day one.

Extraneous Files

A computer’s storage can only hold so much and leaving it to sit and rot – especially if you browse the Internet frequently – can slow the system down to a snail’s pace.

Simply by using the programs on a machine, a computer can amass files that, if not removed, can add up to multiple gigabytes of unused and unneeded data. These do, however, tend to clean themselves up in time.

Unused applications, however, can take up space and slow down a system. Keeping in mind what applications you do and don’t use, and deleting the latter, can really help a workstation run much faster.

Dated Hardware

Bar none, the hardware parts of a PC are the most important pieces of a system. After all, it’s the system itself.

So, what do you do when hard drives begin failing and other mechanical nightmares begin plaguing your workstation? Replacing a system is easier than upgrading pieces of it at a time, but what are the benefits of replacing over upgrading and vice versa?

A PC tends to last five to seven years if well-maintained, or three to four if left in disrepair. Replacing a computer every five years may be easier in the short term, but computers aren’t free and the costs can add up if you are replacing more than one system.

Upgrading pieces of the computer cost only the part, but you would end up having to replace it yourself or have another person do it for you.

Additionally, you may run into limitations on how much you can upgrade based on your other hardware’s or software’s compatibility.

Upkeep of these parts is also important, so keeping the hardware installed cool and free of dust will extend the lifespan of the workstation quite noticeably.

Viruses

Malicious files are an obvious culprit when a computer is running slowly and, most of the time, it’s a fair assumption. There are any number of viruses that could slow a computer down drastically, but in turn, there are many programs that help defend against them too.

Suspicious links and files received in emails or from sites you should be dubious of can, and likely will, infect your computer. Steer clear of these sites and ensure all links you click on are trustworthy.

Certain applications also may contain trojans, which lurk in your system for an extended period of time, only to reveal themselves when a certain application or service runs. Other applications can help spot and remove these before they even have a chance to set in.

Many things can slow a computer down, but proper maintenance can keep it running like new for years. If you haven’t kept decent care of your computer and it’s running slowly, some of these causes, or even all, may be the reason, giving a starting base in fixing the issues at hand.

Five Ways To Take Your Business Paper Free

December 1, 2017

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

If you’re a small business owner, chances are you always have one eyes on your operating costs and the best way to reduce or eliminate extra expenses and improve staff efficiency.

One great way in which you can gain some great cost savings is by eliminating paper.

Paper-based tasks increase storage, postage, and compliance costs and can be a major overhead for modern-day businesses.

Here are five ways you can reduce paper usage and save yourself some cash in the process.

Smart Project Management

Traditionally, the process of managing company projects that involve different departments and multiple people generates massive amounts of paperwork.

More contemporary organizations are taking the smart project management approach through the use of cloud-based solutions, such as Basecamp, Asana or Trello, which allow you to ditch the paper while running a project online with unlimited users.

Electronic Payroll

Rectifying payroll issues costs half of all small business an average of $850 annually. Using decent payroll software reduces the errors and facilitates paperless processing. An electronic payroll system automates all the manual calculations such as tracking hours worked, calculating salaries, and filing taxes.

Salaries can also be paid electronically rather than printing checks or visiting the bank.

The additional benefits of electronic payroll include self-service functionality, and allowing staff to view their payroll data, such as personal details, tax deductions and pay slips online from any device.

Receipts and Invoices

Eliminate paper (and postage costs) by offering customers the option to receive electronic receipts either by email or text.

Your customer will then have it for future reference. Ask suppliers to issue and email digital invoices, which you can save into your accounting software.

Cloud Storage

Small businesses spend a lot of money to purchase, fill and maintain filing cabinets!

Switching to cloud storage can reduce most of this cost as many services, like Dropbox, offer a free allowance.

Most cloud-based options also allow you to organize documents into separate folders.

Customer Relationship Management (CRM) Software

CRM software can reduce the extent to which you rely on paper to store and track customer details, purchase orders, quotes and other correspondence.

Features include the ability to store customer data and interactions, manage staff details and vendors, and store documents.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.