• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Digital Display Boards: For You Or Your Clients

November 1, 2017

Ron Cochran is Help Desk supervisor for Tech Experts.
With the advancement of technology, magazine racks and fish tanks have been replaced with phones and tablets. But what if I told you that, instead of your clients or customers paying attention to their phones, they could watch content that you would benefit from them watching while waiting for service?

Wireless connectivity has sprouted a new way to connect devices of all types.

Take, for instance, an HDMI dongle that can connect wirelessly to any PC or Mac that is also connected to the same network. After a few short minutes, it is set up and ready to start displaying what you want it to.

Your display board could show anything from a movie to informational slides, videos, or promotional pricing. You could even have customer reviews streaming on the board to let new customers know that you are a well-respected addition to the community.

You can also set them up for internal business use by utilizing the display board and wireless connection for conference room meetings, employee training sessions, or displaying productivity/metric reports.

The days of pulling the TV cart out of the closet with that cumbersome CRT TV and dealing with all of the wires and connections are a thing of the past.

There are a few different ways you can set up a display board. You can have as many display boards as you want and each one would have their own assigned ID.

You could then start the streaming process by launching an application from your computer, company server, or even have a small form factor computer dedicated to each display board.

Let’s say you want to have your server control the display boards because you want to have four display boards throughout your place of business.

You can have the server send, in example, a slideshow of reviews. You would launch the application, select which display boards you want to stream to, and now you’re connected.

In order to start streaming the slideshow, you would open up the program that you use for the slideshow or picture viewer and press play. Once you press play, the slideshow will play on the display boards you previously selected.

Now, let’s say you wanted to use the display boards for company productivity and metrics reports. You would first set up your KPI dashboard software the way you want it displayed.

Once you have that set up, you would open up the connection to the HDMI dongle or display board connection and connect to the desired display boards’ IDs. Just like magic, everyone in the building that is in view of the display boards can see why everyone is getting that quarterly bonus and why.

So, if the thought has crossed your mind that you might want to have a couple TV’s replace your magazine rack or that fish tank that requires expensive monthly maintenance, then give us a call today and we will discuss your options after hearing your concerns and business needs.

Is It Time You Had A Failover ISP?

November 1, 2017

Jason Cooley is Support Services Manager for Tech Experts.
So, you may want to ask – what is a failover ISP? Let’s not over complicate it: it is exactly what it sounds like. A failover ISP is a backup Internet connection through a secondary Internet service provider.

This means paying two monthly bills, for two Internet connections. Strong selling point? Probably not for most people. So what is the appeal? Is it something that will be that useful? First, we would need to know a few things.

How much of your business relies on the Internet? Sure, a quick 10 minute outage is an inconvenience, but most businesses will survive, albeit with different levels of comfort and success.

What happens if there is an extended outage? Can you operate an entire day without an Internet connection? How much money would you lose from being offline for an entire business day?

While the answers to these questions will vary, the fact is there are a growing number of daily business operations that utilize an Internet connection.

VoIP phones? No Internet, no phones. Credit card processing? Unless you use an analog telephone line, that’s out too. Rely on email?

Your phone may be capable, but is that something you want to be stuck doing for an extended period? The fact is, more and more, we really on a stable Internet connection.

What impact does lost time have on your daily operation? While I touched on some of the basics here, think about how you could function without a connection. For some people, it just isn’t possible.

If you are a financial institution that utilizes an offsite financial database, you rely on a connection to service your customers. If you are an insurance company that sends and receives quote information over the Internet and take payments through online processing, you can’t operate.

If you have an office with all VoIP phones and every employee utilizes online tools and services, you can’t operate. Or maybe you are a healthcare provider that needs a connection for patient insurance?

You will have to make some choices about losing a day if any of these apply to you. This is a reality and, in some cases, a gamble.

This just isn’t something we need right now.

Understandable for a lot of businesses out there. There are different needs for different business types.

Restaurants, for instance, probably couldn’t accept credit or debit cards if they lost connection. During a temporary outage, you can relay to your customers that you can only accept cash.

If you have a few users and work from a laptop, you can tether your mobile connection. Whatever the case, it isn’t something everyone needs.

Isn’t it just wasted money if my connection never drops out? Not necessarily. With some good IT work, you can route different Internet traffic through your two ISPs.

Consider it like load-balancing. You can also have it set up that if one of your two networks drop, the other one connects automatically. Again, lots of options are available to you.

Think you need a failover ISP?

There are places where you may not have the option of multiple providers, but in most business areas, there are different options available.

So what happens if you do have a second connection? How do you connect to your backup? Is it automatic?

Your IT department or managed service provider, like Tech Experts, can set that up for you. There are many options depending on your specific setup, but being covered against Internet service outages is universal.

Yahoo! And The Hack Heard ‘Round The World

November 1, 2017

Evan Schendel is a help desk specialist for Tech Experts.
In the age of Russian super-hackers and nationwide credit reporting agencies with pitiful security, what could be safe? One thing is for sure – not Yahoo!.

In September of 2016, Yahoo! released the news that 500 million accounts were hacked in the latter half of 2014. That news severely impacted Verizon’s business deal to buy them out, but they only lowered the price by $350 million USD to a total of $4.48 billion USD.

Three months after this business deal was done and the prior hack had been announced, Yahoo! let the nation know that approximately 1 billion accounts had been hacked in 2013. Verizon was not pleased, to say the least.

Just recently, Yahoo! released even more grave information.

In the earlier part of October, Yahoo! bumped the number of affected accounts up to 3 billion. This estimate encompasses every single Yahoo! account, including its subsidiaries like Tumblr and Flickr. That is a lot of data – and if you had any accounts (even unused) linked to these websites dating back to 2014, you could have even had the information sold.

The cybersecurity firm InfoArmor has reported some of this information has been sold on the dark web, a small part of the web not indexed by search engines.

The group selling this information has sold the data to three sources, two of which are known spammers. All paid upwards of $300,000 USD.

With this information, reused passwords from past accounts can be the largest risk, as many people recycle the same password(s) for all of their various online accounts. While no financial information was stolen, security questions, dates of birth, and backup emails were taken.

All of this can be used for not only breaking into the Yahoo! account in question, but also any other accounts with similar information.

A good course of action from here on would be to, as you should, never reuse passwords, and change any existing passwords you feel might be in danger. Ensure that no shady happenings have occurred with any accounts, up to and including bank accounts.

The information sold was reportedly utilized to spy on a range of US White House and military officials, alongside Russian business executives and government officials.

With this information kept in mind, a document was released stating that four men were indicted, two of whom were Russian intelligence officers working for the Russian Federal Security Service. Which is, ironically enough, an agency dedicated to aiding foreign intelligence agencies track cybercriminals.

To finalize, remember to keep safety measures on all your accounts and protect yourself from email fraud or spam to the best of your ability. Only sign up for accounts on legitimate websites and, when you do create an account, use a unique password for that site. For sites with sensitive information, elect to use two-factor authentication when possible.

That way, when a company’s security is pushed back in lieu of other things, you can serve as a second defense for yourself.

Wiperware: New Malware That Shouldn’t Be Taken Lightly

October 12, 2017

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Any business can be a target for hackers who use ransomware. However, in recent months, a major new threat has emerged. The recent Petya attack was initially perceived to be another form of ransomware.

However, as the firms involved took stock in the aftermath of the events, it became apparent that the attack took the form of “wipeware,” code that is designed to completely destroy the files stored on any system.

What is wiperware?

Wiperware is designed with one goal in mind: total destruction. The malware asks users to install a software update and then it immediately takes control of the device. Once it has gained admin access, it completely overwrites all files on the device and in some cases the entire network. Any attached storage is also vulnerable, included USB external drives, memory sticks and network shared drives.

While the motivations behind Petya remain unknown, what is abundantly clear is that wiperware is a threat that needs to be taken very seriously. Here are a couple of things you can do right now. [Read more…] about Wiperware: New Malware That Shouldn’t Be Taken Lightly

Do I Really Need A Firewall For My Business?

October 12, 2017

Ron Cochran is a senior help desk technician for Tech Experts.

Before we answer that, let’s look at what a firewall actually is. No, no actual flames of any kind are involved whatsoever.

A firewall is a barrier or “shield” intended to protect your PC, tablet, or phone from the data-based malware dangers that exist on the Internet. Data is exchanged between your computer and servers and routers in cyberspace, and firewalls monitor this data (sent in packets) to check whether they’re safe or not.

This is done by establishing whether the packets meet the rules that have been set up. Based on these rules, packets of data are accepted or rejected.

While most operating systems (desktop and mobile) feature a basic built-in firewall, the best results can usually be gained from using a dedicated firewall application, unless you know how to set up the built-in firewall properly and have the time to do so.

Firewall applications in security suites feature a host of automated tools that use whitelisting to check which of your applications should accept and reject data from the Internet — something that most users might find far too time consuming to do manually.

So it makes sense, now that it’s clear what a firewall is for, to have one installed and active. But just in case you’re still doubtful of the benefits…

Everyone who accesses the Internet needs a firewall of some kind. Without one, your computer will allow access to anyone who requests it and will open up your data to hackers more easily. The good news is that both Windows and Apple computers now come with built-in software firewalls (although the Mac’s firewall is turned off by default).

But businesses, especially those with multiple users or those that keep sensitive data, typically need firewalls that are more robust, more customizable, and offer better reporting than these consumer-grade alternatives.

Even a relatively small business engages in exponentially more interactions than an individual, with multiple users and workstations, and customers and suppliers. These days, most of those interactions are online and pose risks.

Not only are businesses exposed to riskier online interactions, the potential damage from each interaction is also greater. Businesses frequently keep everything from competitive bids and marketing plans to sensitive banking and customer data on their computers. When unprotected, the exposure is enormous.

Firewalls also allow computers outside of your network to securely connect to the servers that are inside your network. This is critical for employees who work remotely. It gives you the control to let the “good” connections in and keep the “bad” connections out.

Hardware firewalls must be compatible with your system and must be able to handle the throughput your business requires. They must be configured properly or they won’t work and can even stop your network from functioning entirely. You can use multiple hardware firewalls to take advantage of differing strengths and weaknesses.

Some industries (like medical and financial services) have specific regulatory requirements, so it’s important to consult your IT professional before choosing a firewall to make sure you’re not exposing your business to unnecessary liability.

It’s also important for you, or your IT service company, to constantly monitor the firewall to ensure it is up and working, as well as to ensure that it is regularly updated with security patches and virus definitions.

If you currently are not protected by a firewall or would like to inquire about an upgrade to your network infrastructure, please feel free to email (info@mytechexperts.com) or call (734-457-5000).

VoIP Phones: Is It Time You Made The Switch?

October 12, 2017

It’s 2017 and, in case you didn’t know, VoIP phone systems just keep getting better. Yes, the landline is losing ground to yet another competitor: VoIP. Cell phones have made home phones much less prominent, but for businesses, there is and likely always will be a need for dedicated multi-line phone systems.

What is VOIP?

For those less tech savvy folks out there, you may not have heard of a VoIP phone before. Even if you have, you may not know what it means. VoIP stands for “Voice over Internet Protocol.” Very simply put: by using software or sometimes a physical converter, phone calls are made over the Internet.

Cell phones may be the reigning champion, but the need for dedicated phone systems will never go away. Many home users that do have home phones have VoIP and may not even know it.

If you are bundling phone service with your Internet and even cable television, then you most likely are using a VoIP system. In most home applications, it is common for your modem to have phone ports which can tie your existing phone jacks into the modem, allowing calls to be made.

For businesses, a VoIP system can be configured like you are used to. User extensions, call holds or parking, and line transfers – they’re all there, including other features your business may find useful.

Hold music, call directory, and even call recording are all easily put in place, too. There are many different solutions for businesses of different sizes, but the use of desktop multi-line phones works better for just about everyone.

Using a phone that connects directly to an Ethernet line provides great reliability. Most of these phones come with a second port allowing you to use your existing wired connection for your computer to connect the phone, which then sends the connection through to the computer.

This also allows for options of integration with your computer, such as software that can display incoming calls and outgoing calls, service queues, and the ability to call extensions or transfer calls with the click of your mouse.

So what’s better about it?

There are a number of advantages to using a VoIP system. The call clarity is better. The quality is better. Conference calls are easier and more reliable.

The many features provided by using an Internet-based product are surely more than you’d think. There are so many things that make a VoIP system attractive, but none of those will speak to you like the sound of cutting your phone bill down by up to 40-50% a month.

The number of simultaneous phone calls available to your business can be one of the biggest contributors to high costs. Long-distance on landlines can also add up whereas VoIP calling is cheaper per call than landlines, whether it’s local or long-distance calling.

Many businesses can see phone bills over $2,000 a month with a traditional landline system. Imagine cutting that in half. That is $12,000 a year in savings versus landlines. Maybe you’re a smaller business and have 10 employees. Your landline with multiple lines ringing in can cost you as much as $400 a month. Why not save yourself $2,400 a year?

Don’t let the initial cost of potentially buying new phones scare you away. When you are saving 40% a month, you will recoup the initial investment faster than you think. After that, all you have to do is sit back and enjoy better quality, better clarity, and all that extra money in your pockets.

Helpful Tech Tips To Prevent Phishing

October 12, 2017

jared-stemeye
Jared Stemeye is a Help Desk Technician at Tech Experts.

Many of us have clicked on an email that appeared authentic, but was not. Those fortunate enough to identify any suspicious elements before an attachment is opened or a link is clicked are the lucky ones. But, sometimes, we don’t notice those little things and click things we shouldn’t.

These trick emails are one method of an effective scheme called phishing, run by cybercriminals to get information about you or your company. Even worse, this information is then bought and sold to the highest bidder to do with it as they wish.

At best, an ad agency might send some extra spam emails your way. At worst, your identity may be stolen or your company’s network may be left exposed for all sorts of trouble.

Fortunately, there are many things you and your workplace can do to avoid these phishing attempts.

Tips for Employers

Just asking employees to watch out for suspicious-looking emails doesn’t drive home the urgency of phishing.

Find recent news reports to share with your workforce. When an organization makes the front page for a data breach (usually because an employee opened an infected email), you can explain how something like that could happen to your organization. It’s well-timed, newsworthy, and will be on forefront your employee’s mind.

The best thing to do as an employer is to implement a program that encourages security awareness, education, and behavior modification.

Changing up how you deliver that message to employees can be quite helpful. Start with a monthly email, memo, or bulletin. Switch it up with in-person, individualized meetings. Using different approaches will help your message resonate with more employees. It is common to need to communicate a message multiple times for it to stick with everyone.

Tips for Employees

Social media can be your worst enemy. Social networks are abundant with personal information, putting it right at the fingertips of cybercriminals.

Do not post any birthdays, addresses, or any other personal information on these websites. We know many domain and personal accounts use these for passwords despite the easy availability. Even with privacy settings maxed, there is always a way for cyber criminals to obtain the information.

Additionally, cybercriminals are getting more creative, especially with phone numbers. It is becoming very common for criminals to call high-risk employees and ask for information. For example, some of these “phishers” will call and pretend they are from their company’s help desk and need to reset account credentials or “require verification” from the user.

When in doubt, don’t give anything out. If something seems off or you don’t know the person, ask for their contact information and look into it. In these cases, it’s better to be cautious than courteous.

Overall, phishing isn’t going anywhere and it should be incorporated into all online security training for workplaces. As long as people use social networks and email continues to be a primary workplace communication channel, phishing will be a top choice for cybercriminal’s data theft. Protect your business and your employees. You can always contact Tech Experts at (734) 457-5000 if you’d like an in-depth review of any suspicious email you may have received.

Improve Your Staff’s Productivity Using These Five Tips

August 24, 2017

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Increasing employee productivity is a positive approach for companies, regardless of the industry; however, the concept can be rather vague.

Productivity means more than just working to meet a given quality standard, therefore, it isn’t always immediately clear how to achieve optimum outcomes while maintaining standards and keeping your employees happy.

Here are a few concrete methods that can help your staff be more productive:

Block Certain Internet Sites

With the rise of social media, online gaming, and entertainment websites, there are many potential distractions on the web. Even if an employee is well-intentioned, there are plenty of well-designed trappings to keep them there, wasting your company’s time, Internet bandwidth, and, ultimately, money. [Read more…] about Improve Your Staff’s Productivity Using These Five Tips

What Is Credential Management And Should I Have It?

August 24, 2017

Ron Cochran is a senior help desk technician for Tech Experts.

In the world today, we have many things to remember and passwords are one of those. We have alarm codes, website logins, usernames, passwords, passphrases, bank account information, and everything in between. However, if you’re on top of your password game, then none of your passwords match and that can be quite the chore to keep up on.

This brings me to a product called Passportal.

Passportal eliminates the need to remember all those different passwords, websites, and passphrases. With Passportal, once you have your account set up – and have entered your websites, usernames, passwords, and passphrases – you will only need to remember one password to sign into anything. There is also an extension for one of the most popular web browsers.

Once you create your account with Passportal, you’ll be able to enter your website of choice, username, and password; then, when you revisit that site, you will be notified that Passportal has saved your credentials for that site. You’ll click one button and Passportal will automatically enter your information in, then you’re logged in to your favorite websites, social media, or message boards.

While it may sound like you’re putting all of your eggs in one basket, Passportal’s main focus is password security. The website, application, and process was created with military-grade password data security in mind while maintaining ease of use for the end user.

In the event of a mugging or break-in, you can lock your Passportal account and disable your usernames and passwords, instead of trying to remember everything you need to change. It’s one less thing to worry about when recovering from identity theft.

Let’s say your credit card and bank information have been compromised. Once you receive your new card and password, you revisit the website. Passportal remembers your password, but it doesn’t work. You will be able to seamlessly add the new password to the Passportal extension with just a couple clicks and keystrokes. Passportal has saved many users countless extra clicks, time, and hassle by keeping their valuable personal information secure.

If you are the owner of a company, you can utilize Passportal and have control over the passwords and when/if they expire. If you have an employee that quits or is terminated, you can lock that username out of your company information with just ONE click of a button. This feature saves valuable time that a human resource manager would have used to track down all the user information, gain access to their workstation or laptop, and remove their profile, or gain access to the server to remove their Active Directory profile.

Passportal also has two-way syncing with Active Directory for Windows Server. With Passportal, there is even a mobile app and phone number you can text to get a password reset. This feature will save employees who are locked out of their accounts – and allow your IT department to focus on more in-depth issues.

If you’re the human resource manager, general manager, or owner of a company, your company will most likely be able to benefit. Ask your IT department or managed service provider about Passportal and how you can implement it within your company.

Gone Phishing! How To Spot A Phishing Scam

August 24, 2017

If you are a user that has been around for a while, there is a pretty good chance you’ve been targeted with a phishing scam. You may have a long lost relative in another country who left you millions – and all the executor of the estate needs is your banking information to send you your inheritance! Or a prince of a small country is trying to move some of his fortune and escape to America – and if you can help, you will be rewarded!

These are some oldies-but-goodies, however phishing scams have and will continue to get better and smarter.

There was a time when phishing scams almost always came filled with poor grammar, spelling errors, and writing that just seemed a little off. While these still exist, things have become harder to detect.

These scammers are always looking for your personal information. There are a few ways they can do this, but most of them begin with email spoofing, where a sender will mask their actual email address with a familiar one.

If it isn’t a spoofed email, it may come from an address that is very close to that of a known and trusted sender. This could have an extra letter or even just a period to try to trick you into completing whatever task they are using in an attempt to get your information. This could be something as simple as a link to “family photo” or video and it could very well open your system to different vulnerabilities.

Something like a keylogger, a program that tracks your keystrokes, can be almost undetected while also gathering your online banking or credit card information.

Lately, phishers and scammers have pulled out all the stops. There have been cases where phishers will not only spoof an email, but also documents. These can look pretty real, so take a close look.

A new long-shot, big-payoff scam is to spoof an email address of a financial institution to try to intercept money from home purchases. This is done with forged documents and a fake email. While it’s a long shot for something that big to happen, do big business in-person or through trusted secure communications.

What to watch for:

When you have email communication from a known sender that doesn’t quite add up (or doesn’t sound like them), don’t assume they’re just having an off day. One example: if you know your family member shares all of their photos on Facebook, would they really email you a link with little to no writing in the email?

Any “company” asking for any personal information or passwords through email should also raise red flags. While this might seem obvious if the email address doesn’t match, a spoofed email address can make this trick easier to fall victim to.

Also, be wary of anyone asking for your bank account number via email. Even if it is legitimate, there are other ways to send this information. Protect yourself by choosing a more secure method of communication.

What to do:

If something seems off, research it. If you get a weird email requesting something or asking you to click on a link, don’t assume it’s safe. If it’s from someone you know, ask them if they did send it.

If you are the one “sending,” check your Outbox or Sent folder. This is a good indication if the email came from you or someone you know.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.