• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Important Aspects of Cybersecurity

March 5, 2018

Evan Schendel is a help desk specialist for Tech Experts.

In this age where dangers lie around every digital corner on your computer, what could possibly keep everyone safe and secure?

Cybersecurity experts are the first line of defense and are quite good at holding that line. These experts protect many fields ranging from hardware and software to sensitive data and financial information, even users themselves.

Hardware and Software

The maliciousness of viruses can cripple whole systems and a countless number of links or applications can deliver dangerous viruses or malware. These viruses and dangers evolve every day.

Hardware can be manipulated by vulnerabilities and exploitations as well. Without intention of frightening you, each part of your computer could be of interest to the right person, as the recent Meltdown and Spectre issues have shown. It isn’t simply your operating system or data that can be affected.

This constant cycle of attacker-and-defender leaves thousands of unfilled jobs for cybersecurity and the protection of devices. If these jobs were not filled or properly trained, computer systems across the world would fall prey to hackers. However, your device itself is not the only thing that can be harmed.

Sensitive Data and Users

When unauthorized hands gain access to personal information, it can lead to disaster. A person’s financial and personal data is important and the people who protect that data are far fewer than those seeking it out.

Anti-virus programs are made by people who know viruses well, often those who had created viruses or malware prior to their more noble ventures.

These should always stay updated and definitions for these pieces of software tend to be updated with frightening frequency. Staying up-to-date on malicious software and code is the only real method of stopping it, after all.

Systems administrators also have the need for people who can spot discrepancies or potentially malicious actions in their networks and keep standards up to snuff. Passwords and safety precautions must be set to a standard that is important to follow and uphold.

Information over the phone can also be an issue, as many users have trouble distinguishing a scammer from a legitimate caller. This is where education and prevention come in.

Educating people about how potential scammers may work is one of the most important aspects in preventing unsuspecting folks from giving their credit card information away, or worse.

Preventing these scammers from calling thousands of people a day is also of utmost importance, but requires experts and trained technicians (even the government, in some cases) to crack down on these cyber criminals.

Lastly, the most vulnerable aspect of a computer’s security is, unfortunately, the user. Tricky emails and legitimate-looking sites can be incredibly tough to distinguish from the original product. Most wouldn’t even suspect such an uncanny replication.

This is where user error molds with a criminal’s savvy nature. If this sounds unrealistic to fall for, then it’s even better, but more times than not, someone will fall for it – even the experts can be fooled by sophisticated trickery or maybe a simple lack of awareness. Luckily, if this is the first issue, the other sections can come into play and protect your systems and yourself from being subject to data loss or cyber-thievery.

Eleven Benefits Of Having Managed IT Support

January 1, 2018

Chris Myers is a field service technician for Tech Experts.
There are many perks to enlisting a managed service provider to handle all of your technology needs. Here are just a few:

Knowledge Base
You get access to a whole team of experienced professionals who spend all day every day fixing the same problems you are running into. When an issue pops up, chances are we have seen it before and know how to quickly resolve it.

Proactive Support
With our advanced monitoring software, we are immediately alerted to a variety of issues. Often, by the time you notice a problem, we’re already working to resolve it. Detecting and fixing issues early prevents them from escalating into major outages with long down times and expensive repairs. [Read more…] about Eleven Benefits Of Having Managed IT Support

How Your Old PC Is Costing You Money

January 1, 2018

Ron Cochran is Help Desk supervisor for Tech Experts.
We all know that electronics become outdated almost as fast as you can purchase them, but what if I told you that holding onto that six to ten-year-old machine could be costing you just as much money as upgrading to a newer model?

Just like with any technology, the parts get smaller, more efficient, cheaper to buy, and cheaper to run. It could cost you real money in several ways: machine downtime, a sudden replacement when it crashes, paying an employee to redo their work after a failure.

Additionally, if a machine is extremely slow, tasks can be unnecessarily drawn out while employees wait for the computer to respond.

Then consider energy efficiency. That computer from 2008 could be using a 300w power supply that isn’t very energy efficient. Add an older, larger processor that is power-hungry to the mix and that 300w power supply is working at half capacity at 60% efficiency.

The use of other hardware – like your DVD ROM drive, USB, and video cards – can pull more power too, raising electricity costs.

Most computer manufacturers today plan on customers upgrading their technology within 3-6 years to keep up pace with the ever-changing software industry. Let’s say that, six years ago, you built your own machine with an almost top of the line CPU, more RAM than you needed, and a nice, fast hard drive.

That same machine will now have trouble keeping up with a machine of lesser quality.

This is partly due to the way software coding has changed, but also how electronic architecture has improved. The processors have gotten smaller and take less power, but work harder, faster, and more efficiently.

This shift in technology efficiency directly translates into more money left in your business account due to your employees being able to work more efficiently.

You also have to factor in data security once computers stop accepting essential critical operating system updates due to the lack of storage space.

Or how about that new graphic design software or CAD software you need to run that you can’t install because you don’t have enough RAM or a 64 bit operating system?

Once you need the 64-bit operating system, your RAM should be upgraded to run the operating system more efficiently.

The upgrades needed for older machines can pile up quickly.

The above principles apply to your company servers as well. Maybe even more so because of the amount of work they do and the data they store. In a server, the hard drives never stop spinning, the processors never stop processing.

You may have purchased an $8,000 server for your business, but if it was 12 years ago, it’s probably doing you more harm than good now. That server could be costing you more money in service calls for the issues that pop up or frequent, disruptive power cycles.

When buying IT equipment for your business or personal use, you should never buy something that is “just enough.” Not because it can’t do it, but because it will work harder to do the work, using more power to do it.

Think of it like a truck: a small truck CAN pull that new camper you bought, but a bigger truck will pull it more safely while costing you less money in fuel in the long run.

Mobile Efficiency: Laptop Versus Tablet

January 1, 2018

Jason Cooley is Support Services Manager for Tech Experts.
We are an increasingly mobile society. Whether for work or personal, you’d be hard-pressed to find too many people without an Internet-connected device somewhere nearby. Smart phones are everywhere and basic Internet usage is at your fingertips.

When you need to work on the go or work while actually moving, there are device options that can help you really increase your productivity.

There are obviously many factors that can come into play when talking about meeting your mobile and professional needs.

What kind of tasks do you need to perform? What sort of software do you need access to? Are you going to be switching between applications and run multiple tasks at once? How frequently and how far are you moving?

I know, so many questions! So where can we even begin?

Just like any other job in the world, having the right tools can make things so much easier. If you work at a restaurant as a server for instance, using a laptop is very impractical. Carrying it around typing orders on a keyboard would prove to be difficult, just as writing a novel on a tablet touchscreen keyboard would be. These are some clear-cut scenarios, but most of us fall somewhere in the middle.

So let’s talk about some of those questions.

What kind of tasks do you need to run? If you are just replying to email, stick to your smart phone. That is where you’ll end up anyway.

For everyone else? What kind of programs and applications are you using? The first thing you should check, if you don’t already know, is if there are mobile versions of the programs you use. Some programs may not be user friendly on a touchscreen if you use the standard version.

Use your smartphone to see if these applications are user friendly in a new setting. The app may not perform as well as it would on a tablet, but maybe you can decide if it’s something you can work with. If the programs are available and you are comfortable using them with a touchscreen interface, you may be ready to use a tablet for work.

When it comes to laptops specifically, the first thing I would consider is how much you’ll be moving around. If you travel from place to place, but typically sit to work at different locations, a laptop is always going to be an option.

The difference is the limitations of the device. A laptop has more capability when compared to a tablet. After all, it is a computer.

If you are switching between many programs and applications frequently and use multiple programs at one time, then a laptop will have more capable processing power to allow you to work unbothered by slow system response time.

The best summary I can give is, if you move around while working, get a tablet. If you sit, just in different locations, you’ll be happier with a laptop.

If you can’t find yourself leaning one way or another, the third option would be a Surface type of machine. With the processing power and speed of a laptop but the mobility of a tablet, you will spend more money for the ultimate solution in mobile versatility and efficiency, but won’t feel the constraints of either other option.

It’s all about you and how you want to get your work done.

How To Keep Your Computer Speedy As It Gets Older

January 1, 2018

Evan Schendel is a help desk specialist for Tech Experts.
As a computer ages, it inevitably becomes slower. Applications and files can slow down a PC as quickly as dated hardware or too much heat or dust can. Preventive maintenance is the first and most important step to keeping a computer running as swiftly as it did on day one.

Extraneous Files

A computer’s storage can only hold so much and leaving it to sit and rot – especially if you browse the Internet frequently – can slow the system down to a snail’s pace.

Simply by using the programs on a machine, a computer can amass files that, if not removed, can add up to multiple gigabytes of unused and unneeded data. These do, however, tend to clean themselves up in time.

Unused applications, however, can take up space and slow down a system. Keeping in mind what applications you do and don’t use, and deleting the latter, can really help a workstation run much faster.

Dated Hardware

Bar none, the hardware parts of a PC are the most important pieces of a system. After all, it’s the system itself.

So, what do you do when hard drives begin failing and other mechanical nightmares begin plaguing your workstation? Replacing a system is easier than upgrading pieces of it at a time, but what are the benefits of replacing over upgrading and vice versa?

A PC tends to last five to seven years if well-maintained, or three to four if left in disrepair. Replacing a computer every five years may be easier in the short term, but computers aren’t free and the costs can add up if you are replacing more than one system.

Upgrading pieces of the computer cost only the part, but you would end up having to replace it yourself or have another person do it for you.

Additionally, you may run into limitations on how much you can upgrade based on your other hardware’s or software’s compatibility.

Upkeep of these parts is also important, so keeping the hardware installed cool and free of dust will extend the lifespan of the workstation quite noticeably.

Viruses

Malicious files are an obvious culprit when a computer is running slowly and, most of the time, it’s a fair assumption. There are any number of viruses that could slow a computer down drastically, but in turn, there are many programs that help defend against them too.

Suspicious links and files received in emails or from sites you should be dubious of can, and likely will, infect your computer. Steer clear of these sites and ensure all links you click on are trustworthy.

Certain applications also may contain trojans, which lurk in your system for an extended period of time, only to reveal themselves when a certain application or service runs. Other applications can help spot and remove these before they even have a chance to set in.

Many things can slow a computer down, but proper maintenance can keep it running like new for years. If you haven’t kept decent care of your computer and it’s running slowly, some of these causes, or even all, may be the reason, giving a starting base in fixing the issues at hand.

Five Ways To Take Your Business Paper Free

December 1, 2017

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

If you’re a small business owner, chances are you always have one eyes on your operating costs and the best way to reduce or eliminate extra expenses and improve staff efficiency.

One great way in which you can gain some great cost savings is by eliminating paper.

Paper-based tasks increase storage, postage, and compliance costs and can be a major overhead for modern-day businesses.

Here are five ways you can reduce paper usage and save yourself some cash in the process.

Smart Project Management

Traditionally, the process of managing company projects that involve different departments and multiple people generates massive amounts of paperwork.

More contemporary organizations are taking the smart project management approach through the use of cloud-based solutions, such as Basecamp, Asana or Trello, which allow you to ditch the paper while running a project online with unlimited users.

Electronic Payroll

Rectifying payroll issues costs half of all small business an average of $850 annually. Using decent payroll software reduces the errors and facilitates paperless processing. An electronic payroll system automates all the manual calculations such as tracking hours worked, calculating salaries, and filing taxes.

Salaries can also be paid electronically rather than printing checks or visiting the bank.

The additional benefits of electronic payroll include self-service functionality, and allowing staff to view their payroll data, such as personal details, tax deductions and pay slips online from any device.

Receipts and Invoices

Eliminate paper (and postage costs) by offering customers the option to receive electronic receipts either by email or text.

Your customer will then have it for future reference. Ask suppliers to issue and email digital invoices, which you can save into your accounting software.

Cloud Storage

Small businesses spend a lot of money to purchase, fill and maintain filing cabinets!

Switching to cloud storage can reduce most of this cost as many services, like Dropbox, offer a free allowance.

Most cloud-based options also allow you to organize documents into separate folders.

Customer Relationship Management (CRM) Software

CRM software can reduce the extent to which you rely on paper to store and track customer details, purchase orders, quotes and other correspondence.

Features include the ability to store customer data and interactions, manage staff details and vendors, and store documents.

The Risks And Benefits Of A Guest WiFi Connection

December 1, 2017

Ron Cochran is Help Desk supervisor for Tech Experts.
In today’s day and age, everyone wants or needs to be connected to the Internet. Whether a person is at your place of business for a teeth whitening session or eating their favorite club sandwich, the need to be connected is ever present. Here is where innovative thinking comes into play.

Giving your customers or clients a WiFi connection can increase satisfaction. It can be aggravating to wait around because the doctor is running late, the repair is taking longer than expected, or any other unexpected inconvenience that eats into your personal time.

However, if they can work, surf the Internet, poke around on Facebook, or catch up on their favorite TV shows, they’ll be less likely to track the passage of time or complain about the wait.

By offering your visitors WiFi, you can also gather data about them. If you require customers to sign in via a social media service to access your WiFi, you can get customer information that will allow you to interact with them and promote your business.

Setting up a WiFi connection doesn’t mean that the users have access to your company’s main network. You can keep all of your business data safe and secure.

First, you’ll want a separate router or WAP so that you can isolate their connections from your business network.

While setting up Internet for your customers might seem like a breeze, it’s important to be aware of the potential risks. Sometimes, customers may abuse public WiFi and use it to download inappropriate images or pirated software and media. This will slow down your Internet and network connection.

Fortunately, these issues and concerns can be addressed if you use the right kind of hardware-software combination and you have a knowledgeable IT company set it up for you.

The cost of setting up a guest WiFi connection doesn’t have to cost an arm and a leg either.  Another plus to offering free WiFi to your customers is that it costs almost nothing to supply it. You’ll want to have an additional router to keep customer WiFi separate from your business Internet to prevent any security issues, but a $50 router will easily allow you to provide customer connectivity.

Depending on customer usage, you may need to increase bandwidth or add a separate Internet account, but you can address that when the need arises.

Now that you’re getting ready to offer free WiFi to your customers, you need to consider how much bandwidth you’ll need. Bandwidth determines the speed of the Internet, so it is important to have enough of it for customers to be able to browse without frustration.

Offering free WiFi is great, but it means nothing if the connection is too slow to be useful.

You can also control the speed of their connection which will also keep your Internet connection from becoming slow. I would plan on giving each user 1.5 megabits of speed.

You can also limit usage to a certain radius, restrict the times of day it’s available, and limit their time on it to a certain number of minutes before they have to reconnect.

Overall, the thought of offering a WiFi connection at your place of business is an easy, cheap investment to stay up on the changing times. Just remember to keep the client/customer connections separate from your business network, lock down the security, and restrict bandwidth hogging applications — and you’ll be right on track.

Cyber Security: How Safe Are You?

December 1, 2017

Jason Cooley is Support Services Manager for Tech Experts.
In 2017, Equifax, one of the largest credit bureaus in the US, suffered a data breach that exposed the names, Social Security numbers, date of birth, and some driver’s license numbers for 143 million people. An additional 209,000 people also had their credit card information exposed.

The attack was discovered on July 29th, but according to Equifax, the breach began sometime in May.

Let that sink in. One of the companies that rates credit scores and stores tons of financial information, had their data stolen for months.

Some would think that the larger the company (especially with sensitive data), the better the security. That isn’t always how it works out.

eBay, the online giant, is not immune. In 2014, 145 million user accounts were compromised.

The list goes on, and it contains some pretty big names. Target (2013), JP Morgan Chase (2014), The Home Depot, VeriSign, and even Sony’s Playstation Network (2011) have all suffered at the hands of hackers.

Don’t panic just yet, though. There are many things to consider when it comes to data security. From businesses to your personal data at home, we all obviously want to keep our private information private. While there is no foolproof way to keep yourself safe, there are some things that you should know.

 This isn’t a movie.

The Hollywood portrayal of hackers is over-the-top for many reasons. Having one person just sitting around and deciding, “Well, I think I will hack the government or this bank,” isn’t a realistic vision of reality. Most of these data breaches come due to an unknown security vulnerability. Then groups of people will try to exploit this vulnerability.

There are different needs for everyone.

While cyber security can affect everyone, you shouldn’t be overly afraid as an everyday consumer. Most well-known websites are secure and checking out with personal information is often doubled down with extra security.

Still, if you are uncomfortable, use a wallet site, such as Paypal. More and more websites offer these types of payment options, putting down yet another layer of safety to keep your financial information safe.

What about my business?

 That greatly depends on what kind of business you have. If you have a convenience store, there’s a pretty good chance your credit card processing is the only issue with data you’d ever have. Since this is typically handled by a vendor, you don’t have nearly as much to worry about.

Now, if your company stores any sensitive data (especially the personal information of others), you are going to need to step up the security.

How much do you have to lose?

 This isn’t a trick question. Really, how much do you have to lose? Financial information? Client information? As bad as it is to have your data compromised, if you run a business that deals with any sensitive customer or client information, you should not only be careful, but you should be protected.

A managed service provider, like Tech Experts, can help maintain your network and data security. This may include firewalls, blocking specific websites, and running routine checks of the security. Sensitive data, like data that can be used in identity theft, should be protected proactively. You can’t save it once it’s been taken.

Browsing The Internet In Safety

December 1, 2017

Evan Schendel is a help desk specialist for Tech Experts.
Browsing the Internet safely comes with many hurdles. Not all of them are obvious, however. These hurdles are numerous and potentially dangerous, but with the proper knowledge and mindfulness, they can be avoided quite easily.

Viruses and Spyware

The Internet is a minefield of harmful applications and criminals trying to take anything they can, but these attempts can be counteracted.

A user must always watch out for suspicious links or websites. Some websites, though legitimate-looking enough, may be spoofed or fake, hiding malicious code or something equally devious.

Hints to these websites being fake can lie in any aspect of the page, but most commonly, it is a slightly different URL or domain name, typically off by only a letter or two.

The viruses dwelling in pop-ups usually attempt to scare users into clicking their product and downloading the malware or spyware-stuffed application linked in the pop-up.

Spyware can not only steal information input while loaded onto a system, but also slows the system to a crawl and tends to be easy to pick up. Simply navigating to a poisoned web page or opening a suspicious e-mail can infect a workstation with spyware.

The real dangers lie in file-sharing sites, where any file could be dangerous. When downloading any application, evaluate it carefully and make fully sure that not only the site is legitimate, but also that the application is safe too.

Preventative measures do exist, and any workstation should have an anti-virus and anti-spyware application installed and running to prevent most malicious applications from doing any serious damage.

Phishing and Scams

Viruses aren’t the only dangers that come with browsing the Internet. Many scams plague the Internet, preying on people uneducated about their existences.

Older scams were typically through e-mail, with scammers posing as long-lost relatives or people who could offer the victim a large sum of money, but only if they helped them out with a fraction of what they claimed they could pay the victim.

While it seems silly that these scams could work, many fall prey to the empathetic connection one might have when speaking a person in apparent need. These scams, while still common, occur less and less while newer and more sophisticated traps are being developed.

Phishing attempts also come in a method previously discussed – pop-ups. These can have dangerous-looking warnings, alerting you that your machine is infected with a petrifying number of viruses and scaring the user into clicking their links or graphics.

These links or graphics can lead down a dangerous path, including giving the scammers your credit card information or worse.

In the event a pop-up like this occurs, do not panic or give in.

If it is a pop-up, close the window and make certain you click nothing else on the page. If it is a re-direct to a suspicious page, close that as well, and immediately scan the system for any viruses or spyware just to be safe.

No computer is untouchable, but best practices and well-implemented safety measures can make a computer system much more secure, letting you browse the Internet without fear.

In addition to anti-virus programs, constant system updates and application patches can keep any potentially dangerous backdoors or vulnerabilities covered and safe.

With all of this information kept in mind, falling prey to viruses, spyware, and scams will be far less likely and sites will seem much safer.

Five Keys For Small Business Preventive Security Measures

November 1, 2017

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

We continually mention the importance of network and password security for small businesses for good reason. The increasing security threats and cases of security breaches in both large and small enterprises show that we are more at risk than ever before of suffering a security violation.

Regulated entities such as medical offices (HIPAA) and financial institutions (FINRA) are especially susceptible to breachs and security incidents.

Prevention is always better than cure. To this end, here are five security measures you should start putting in place today.

Limit lateral data transfers
One of the biggest contributors to internal data breaches is a lack of employee knowledge of security issues. It’s important to protect strategically important information and data by limiting who has access to it.

Furthermore, you can employ network segmentation to reduce any unnecessary communication between internal and external networks.

Ensure machines and devices are updated
Internal breaches can result from the use of unprotected machines. Without being aware, employees may download malware or ransomware.

However, this may not be a problem if the software and operating systems on the machines are up to date.

Keeping all devices and the accompanying software and security structures up to date will make a significant contribution to protecting your systems.

Monitor activity to identify suspicious activity
Sometimes, a security breach may not involve any employees. Network administrators should ensure the latest monitoring software is in use to monitor behaviors and immediately detect anything that looks amiss.

Cyber criminals are aware of these types of activities and often conceal themselves deep in the network to exploit the system over a prolonged period of time.

Even if you miss the threat the first time, the monitoring system will provide meaningful insights that will help you recognize foul play.

Ensure robust passwords are in place
When it comes to system passwords and login procedures, you can always improve. In addition to the more traditional text-based password access, you should also ensure you have more up-to-date security mechanisms in place such as fingerprint access and smartcards. These are much more challenging for cyber criminals to replicate.

Embrace cyber insurance policies
No system can be completely safe from a cyber attack. Criminals are getting smarter and smarter, and what appears to be an impenetrable system one day can be infiltrated the next.

For this reason, you may wish to take out cyber insurance to cover any costs you incur if things do go seriously wrong.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.