• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

How To Keep Your Computer Speedy As It Gets Older

January 1, 2018

Evan Schendel is a help desk specialist for Tech Experts.
As a computer ages, it inevitably becomes slower. Applications and files can slow down a PC as quickly as dated hardware or too much heat or dust can. Preventive maintenance is the first and most important step to keeping a computer running as swiftly as it did on day one.

Extraneous Files

A computer’s storage can only hold so much and leaving it to sit and rot – especially if you browse the Internet frequently – can slow the system down to a snail’s pace.

Simply by using the programs on a machine, a computer can amass files that, if not removed, can add up to multiple gigabytes of unused and unneeded data. These do, however, tend to clean themselves up in time.

Unused applications, however, can take up space and slow down a system. Keeping in mind what applications you do and don’t use, and deleting the latter, can really help a workstation run much faster.

Dated Hardware

Bar none, the hardware parts of a PC are the most important pieces of a system. After all, it’s the system itself.

So, what do you do when hard drives begin failing and other mechanical nightmares begin plaguing your workstation? Replacing a system is easier than upgrading pieces of it at a time, but what are the benefits of replacing over upgrading and vice versa?

A PC tends to last five to seven years if well-maintained, or three to four if left in disrepair. Replacing a computer every five years may be easier in the short term, but computers aren’t free and the costs can add up if you are replacing more than one system.

Upgrading pieces of the computer cost only the part, but you would end up having to replace it yourself or have another person do it for you.

Additionally, you may run into limitations on how much you can upgrade based on your other hardware’s or software’s compatibility.

Upkeep of these parts is also important, so keeping the hardware installed cool and free of dust will extend the lifespan of the workstation quite noticeably.

Viruses

Malicious files are an obvious culprit when a computer is running slowly and, most of the time, it’s a fair assumption. There are any number of viruses that could slow a computer down drastically, but in turn, there are many programs that help defend against them too.

Suspicious links and files received in emails or from sites you should be dubious of can, and likely will, infect your computer. Steer clear of these sites and ensure all links you click on are trustworthy.

Certain applications also may contain trojans, which lurk in your system for an extended period of time, only to reveal themselves when a certain application or service runs. Other applications can help spot and remove these before they even have a chance to set in.

Many things can slow a computer down, but proper maintenance can keep it running like new for years. If you haven’t kept decent care of your computer and it’s running slowly, some of these causes, or even all, may be the reason, giving a starting base in fixing the issues at hand.

Five Ways To Take Your Business Paper Free

December 1, 2017

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

If you’re a small business owner, chances are you always have one eyes on your operating costs and the best way to reduce or eliminate extra expenses and improve staff efficiency.

One great way in which you can gain some great cost savings is by eliminating paper.

Paper-based tasks increase storage, postage, and compliance costs and can be a major overhead for modern-day businesses.

Here are five ways you can reduce paper usage and save yourself some cash in the process.

Smart Project Management

Traditionally, the process of managing company projects that involve different departments and multiple people generates massive amounts of paperwork.

More contemporary organizations are taking the smart project management approach through the use of cloud-based solutions, such as Basecamp, Asana or Trello, which allow you to ditch the paper while running a project online with unlimited users.

Electronic Payroll

Rectifying payroll issues costs half of all small business an average of $850 annually. Using decent payroll software reduces the errors and facilitates paperless processing. An electronic payroll system automates all the manual calculations such as tracking hours worked, calculating salaries, and filing taxes.

Salaries can also be paid electronically rather than printing checks or visiting the bank.

The additional benefits of electronic payroll include self-service functionality, and allowing staff to view their payroll data, such as personal details, tax deductions and pay slips online from any device.

Receipts and Invoices

Eliminate paper (and postage costs) by offering customers the option to receive electronic receipts either by email or text.

Your customer will then have it for future reference. Ask suppliers to issue and email digital invoices, which you can save into your accounting software.

Cloud Storage

Small businesses spend a lot of money to purchase, fill and maintain filing cabinets!

Switching to cloud storage can reduce most of this cost as many services, like Dropbox, offer a free allowance.

Most cloud-based options also allow you to organize documents into separate folders.

Customer Relationship Management (CRM) Software

CRM software can reduce the extent to which you rely on paper to store and track customer details, purchase orders, quotes and other correspondence.

Features include the ability to store customer data and interactions, manage staff details and vendors, and store documents.

The Risks And Benefits Of A Guest WiFi Connection

December 1, 2017

Ron Cochran is Help Desk supervisor for Tech Experts.
In today’s day and age, everyone wants or needs to be connected to the Internet. Whether a person is at your place of business for a teeth whitening session or eating their favorite club sandwich, the need to be connected is ever present. Here is where innovative thinking comes into play.

Giving your customers or clients a WiFi connection can increase satisfaction. It can be aggravating to wait around because the doctor is running late, the repair is taking longer than expected, or any other unexpected inconvenience that eats into your personal time.

However, if they can work, surf the Internet, poke around on Facebook, or catch up on their favorite TV shows, they’ll be less likely to track the passage of time or complain about the wait.

By offering your visitors WiFi, you can also gather data about them. If you require customers to sign in via a social media service to access your WiFi, you can get customer information that will allow you to interact with them and promote your business.

Setting up a WiFi connection doesn’t mean that the users have access to your company’s main network. You can keep all of your business data safe and secure.

First, you’ll want a separate router or WAP so that you can isolate their connections from your business network.

While setting up Internet for your customers might seem like a breeze, it’s important to be aware of the potential risks. Sometimes, customers may abuse public WiFi and use it to download inappropriate images or pirated software and media. This will slow down your Internet and network connection.

Fortunately, these issues and concerns can be addressed if you use the right kind of hardware-software combination and you have a knowledgeable IT company set it up for you.

The cost of setting up a guest WiFi connection doesn’t have to cost an arm and a leg either.  Another plus to offering free WiFi to your customers is that it costs almost nothing to supply it. You’ll want to have an additional router to keep customer WiFi separate from your business Internet to prevent any security issues, but a $50 router will easily allow you to provide customer connectivity.

Depending on customer usage, you may need to increase bandwidth or add a separate Internet account, but you can address that when the need arises.

Now that you’re getting ready to offer free WiFi to your customers, you need to consider how much bandwidth you’ll need. Bandwidth determines the speed of the Internet, so it is important to have enough of it for customers to be able to browse without frustration.

Offering free WiFi is great, but it means nothing if the connection is too slow to be useful.

You can also control the speed of their connection which will also keep your Internet connection from becoming slow. I would plan on giving each user 1.5 megabits of speed.

You can also limit usage to a certain radius, restrict the times of day it’s available, and limit their time on it to a certain number of minutes before they have to reconnect.

Overall, the thought of offering a WiFi connection at your place of business is an easy, cheap investment to stay up on the changing times. Just remember to keep the client/customer connections separate from your business network, lock down the security, and restrict bandwidth hogging applications — and you’ll be right on track.

Cyber Security: How Safe Are You?

December 1, 2017

Jason Cooley is Support Services Manager for Tech Experts.
In 2017, Equifax, one of the largest credit bureaus in the US, suffered a data breach that exposed the names, Social Security numbers, date of birth, and some driver’s license numbers for 143 million people. An additional 209,000 people also had their credit card information exposed.

The attack was discovered on July 29th, but according to Equifax, the breach began sometime in May.

Let that sink in. One of the companies that rates credit scores and stores tons of financial information, had their data stolen for months.

Some would think that the larger the company (especially with sensitive data), the better the security. That isn’t always how it works out.

eBay, the online giant, is not immune. In 2014, 145 million user accounts were compromised.

The list goes on, and it contains some pretty big names. Target (2013), JP Morgan Chase (2014), The Home Depot, VeriSign, and even Sony’s Playstation Network (2011) have all suffered at the hands of hackers.

Don’t panic just yet, though. There are many things to consider when it comes to data security. From businesses to your personal data at home, we all obviously want to keep our private information private. While there is no foolproof way to keep yourself safe, there are some things that you should know.

 This isn’t a movie.

The Hollywood portrayal of hackers is over-the-top for many reasons. Having one person just sitting around and deciding, “Well, I think I will hack the government or this bank,” isn’t a realistic vision of reality. Most of these data breaches come due to an unknown security vulnerability. Then groups of people will try to exploit this vulnerability.

There are different needs for everyone.

While cyber security can affect everyone, you shouldn’t be overly afraid as an everyday consumer. Most well-known websites are secure and checking out with personal information is often doubled down with extra security.

Still, if you are uncomfortable, use a wallet site, such as Paypal. More and more websites offer these types of payment options, putting down yet another layer of safety to keep your financial information safe.

What about my business?

 That greatly depends on what kind of business you have. If you have a convenience store, there’s a pretty good chance your credit card processing is the only issue with data you’d ever have. Since this is typically handled by a vendor, you don’t have nearly as much to worry about.

Now, if your company stores any sensitive data (especially the personal information of others), you are going to need to step up the security.

How much do you have to lose?

 This isn’t a trick question. Really, how much do you have to lose? Financial information? Client information? As bad as it is to have your data compromised, if you run a business that deals with any sensitive customer or client information, you should not only be careful, but you should be protected.

A managed service provider, like Tech Experts, can help maintain your network and data security. This may include firewalls, blocking specific websites, and running routine checks of the security. Sensitive data, like data that can be used in identity theft, should be protected proactively. You can’t save it once it’s been taken.

Browsing The Internet In Safety

December 1, 2017

Evan Schendel is a help desk specialist for Tech Experts.
Browsing the Internet safely comes with many hurdles. Not all of them are obvious, however. These hurdles are numerous and potentially dangerous, but with the proper knowledge and mindfulness, they can be avoided quite easily.

Viruses and Spyware

The Internet is a minefield of harmful applications and criminals trying to take anything they can, but these attempts can be counteracted.

A user must always watch out for suspicious links or websites. Some websites, though legitimate-looking enough, may be spoofed or fake, hiding malicious code or something equally devious.

Hints to these websites being fake can lie in any aspect of the page, but most commonly, it is a slightly different URL or domain name, typically off by only a letter or two.

The viruses dwelling in pop-ups usually attempt to scare users into clicking their product and downloading the malware or spyware-stuffed application linked in the pop-up.

Spyware can not only steal information input while loaded onto a system, but also slows the system to a crawl and tends to be easy to pick up. Simply navigating to a poisoned web page or opening a suspicious e-mail can infect a workstation with spyware.

The real dangers lie in file-sharing sites, where any file could be dangerous. When downloading any application, evaluate it carefully and make fully sure that not only the site is legitimate, but also that the application is safe too.

Preventative measures do exist, and any workstation should have an anti-virus and anti-spyware application installed and running to prevent most malicious applications from doing any serious damage.

Phishing and Scams

Viruses aren’t the only dangers that come with browsing the Internet. Many scams plague the Internet, preying on people uneducated about their existences.

Older scams were typically through e-mail, with scammers posing as long-lost relatives or people who could offer the victim a large sum of money, but only if they helped them out with a fraction of what they claimed they could pay the victim.

While it seems silly that these scams could work, many fall prey to the empathetic connection one might have when speaking a person in apparent need. These scams, while still common, occur less and less while newer and more sophisticated traps are being developed.

Phishing attempts also come in a method previously discussed – pop-ups. These can have dangerous-looking warnings, alerting you that your machine is infected with a petrifying number of viruses and scaring the user into clicking their links or graphics.

These links or graphics can lead down a dangerous path, including giving the scammers your credit card information or worse.

In the event a pop-up like this occurs, do not panic or give in.

If it is a pop-up, close the window and make certain you click nothing else on the page. If it is a re-direct to a suspicious page, close that as well, and immediately scan the system for any viruses or spyware just to be safe.

No computer is untouchable, but best practices and well-implemented safety measures can make a computer system much more secure, letting you browse the Internet without fear.

In addition to anti-virus programs, constant system updates and application patches can keep any potentially dangerous backdoors or vulnerabilities covered and safe.

With all of this information kept in mind, falling prey to viruses, spyware, and scams will be far less likely and sites will seem much safer.

Five Keys For Small Business Preventive Security Measures

November 1, 2017

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

We continually mention the importance of network and password security for small businesses for good reason. The increasing security threats and cases of security breaches in both large and small enterprises show that we are more at risk than ever before of suffering a security violation.

Regulated entities such as medical offices (HIPAA) and financial institutions (FINRA) are especially susceptible to breachs and security incidents.

Prevention is always better than cure. To this end, here are five security measures you should start putting in place today.

Limit lateral data transfers
One of the biggest contributors to internal data breaches is a lack of employee knowledge of security issues. It’s important to protect strategically important information and data by limiting who has access to it.

Furthermore, you can employ network segmentation to reduce any unnecessary communication between internal and external networks.

Ensure machines and devices are updated
Internal breaches can result from the use of unprotected machines. Without being aware, employees may download malware or ransomware.

However, this may not be a problem if the software and operating systems on the machines are up to date.

Keeping all devices and the accompanying software and security structures up to date will make a significant contribution to protecting your systems.

Monitor activity to identify suspicious activity
Sometimes, a security breach may not involve any employees. Network administrators should ensure the latest monitoring software is in use to monitor behaviors and immediately detect anything that looks amiss.

Cyber criminals are aware of these types of activities and often conceal themselves deep in the network to exploit the system over a prolonged period of time.

Even if you miss the threat the first time, the monitoring system will provide meaningful insights that will help you recognize foul play.

Ensure robust passwords are in place
When it comes to system passwords and login procedures, you can always improve. In addition to the more traditional text-based password access, you should also ensure you have more up-to-date security mechanisms in place such as fingerprint access and smartcards. These are much more challenging for cyber criminals to replicate.

Embrace cyber insurance policies
No system can be completely safe from a cyber attack. Criminals are getting smarter and smarter, and what appears to be an impenetrable system one day can be infiltrated the next.

For this reason, you may wish to take out cyber insurance to cover any costs you incur if things do go seriously wrong.

Digital Display Boards: For You Or Your Clients

November 1, 2017

Ron Cochran is Help Desk supervisor for Tech Experts.
With the advancement of technology, magazine racks and fish tanks have been replaced with phones and tablets. But what if I told you that, instead of your clients or customers paying attention to their phones, they could watch content that you would benefit from them watching while waiting for service?

Wireless connectivity has sprouted a new way to connect devices of all types.

Take, for instance, an HDMI dongle that can connect wirelessly to any PC or Mac that is also connected to the same network. After a few short minutes, it is set up and ready to start displaying what you want it to.

Your display board could show anything from a movie to informational slides, videos, or promotional pricing. You could even have customer reviews streaming on the board to let new customers know that you are a well-respected addition to the community.

You can also set them up for internal business use by utilizing the display board and wireless connection for conference room meetings, employee training sessions, or displaying productivity/metric reports.

The days of pulling the TV cart out of the closet with that cumbersome CRT TV and dealing with all of the wires and connections are a thing of the past.

There are a few different ways you can set up a display board. You can have as many display boards as you want and each one would have their own assigned ID.

You could then start the streaming process by launching an application from your computer, company server, or even have a small form factor computer dedicated to each display board.

Let’s say you want to have your server control the display boards because you want to have four display boards throughout your place of business.

You can have the server send, in example, a slideshow of reviews. You would launch the application, select which display boards you want to stream to, and now you’re connected.

In order to start streaming the slideshow, you would open up the program that you use for the slideshow or picture viewer and press play. Once you press play, the slideshow will play on the display boards you previously selected.

Now, let’s say you wanted to use the display boards for company productivity and metrics reports. You would first set up your KPI dashboard software the way you want it displayed.

Once you have that set up, you would open up the connection to the HDMI dongle or display board connection and connect to the desired display boards’ IDs. Just like magic, everyone in the building that is in view of the display boards can see why everyone is getting that quarterly bonus and why.

So, if the thought has crossed your mind that you might want to have a couple TV’s replace your magazine rack or that fish tank that requires expensive monthly maintenance, then give us a call today and we will discuss your options after hearing your concerns and business needs.

Is It Time You Had A Failover ISP?

November 1, 2017

Jason Cooley is Support Services Manager for Tech Experts.
So, you may want to ask – what is a failover ISP? Let’s not over complicate it: it is exactly what it sounds like. A failover ISP is a backup Internet connection through a secondary Internet service provider.

This means paying two monthly bills, for two Internet connections. Strong selling point? Probably not for most people. So what is the appeal? Is it something that will be that useful? First, we would need to know a few things.

How much of your business relies on the Internet? Sure, a quick 10 minute outage is an inconvenience, but most businesses will survive, albeit with different levels of comfort and success.

What happens if there is an extended outage? Can you operate an entire day without an Internet connection? How much money would you lose from being offline for an entire business day?

While the answers to these questions will vary, the fact is there are a growing number of daily business operations that utilize an Internet connection.

VoIP phones? No Internet, no phones. Credit card processing? Unless you use an analog telephone line, that’s out too. Rely on email?

Your phone may be capable, but is that something you want to be stuck doing for an extended period? The fact is, more and more, we really on a stable Internet connection.

What impact does lost time have on your daily operation? While I touched on some of the basics here, think about how you could function without a connection. For some people, it just isn’t possible.

If you are a financial institution that utilizes an offsite financial database, you rely on a connection to service your customers. If you are an insurance company that sends and receives quote information over the Internet and take payments through online processing, you can’t operate.

If you have an office with all VoIP phones and every employee utilizes online tools and services, you can’t operate. Or maybe you are a healthcare provider that needs a connection for patient insurance?

You will have to make some choices about losing a day if any of these apply to you. This is a reality and, in some cases, a gamble.

This just isn’t something we need right now.

Understandable for a lot of businesses out there. There are different needs for different business types.

Restaurants, for instance, probably couldn’t accept credit or debit cards if they lost connection. During a temporary outage, you can relay to your customers that you can only accept cash.

If you have a few users and work from a laptop, you can tether your mobile connection. Whatever the case, it isn’t something everyone needs.

Isn’t it just wasted money if my connection never drops out? Not necessarily. With some good IT work, you can route different Internet traffic through your two ISPs.

Consider it like load-balancing. You can also have it set up that if one of your two networks drop, the other one connects automatically. Again, lots of options are available to you.

Think you need a failover ISP?

There are places where you may not have the option of multiple providers, but in most business areas, there are different options available.

So what happens if you do have a second connection? How do you connect to your backup? Is it automatic?

Your IT department or managed service provider, like Tech Experts, can set that up for you. There are many options depending on your specific setup, but being covered against Internet service outages is universal.

Yahoo! And The Hack Heard ‘Round The World

November 1, 2017

Evan Schendel is a help desk specialist for Tech Experts.
In the age of Russian super-hackers and nationwide credit reporting agencies with pitiful security, what could be safe? One thing is for sure – not Yahoo!.

In September of 2016, Yahoo! released the news that 500 million accounts were hacked in the latter half of 2014. That news severely impacted Verizon’s business deal to buy them out, but they only lowered the price by $350 million USD to a total of $4.48 billion USD.

Three months after this business deal was done and the prior hack had been announced, Yahoo! let the nation know that approximately 1 billion accounts had been hacked in 2013. Verizon was not pleased, to say the least.

Just recently, Yahoo! released even more grave information.

In the earlier part of October, Yahoo! bumped the number of affected accounts up to 3 billion. This estimate encompasses every single Yahoo! account, including its subsidiaries like Tumblr and Flickr. That is a lot of data – and if you had any accounts (even unused) linked to these websites dating back to 2014, you could have even had the information sold.

The cybersecurity firm InfoArmor has reported some of this information has been sold on the dark web, a small part of the web not indexed by search engines.

The group selling this information has sold the data to three sources, two of which are known spammers. All paid upwards of $300,000 USD.

With this information, reused passwords from past accounts can be the largest risk, as many people recycle the same password(s) for all of their various online accounts. While no financial information was stolen, security questions, dates of birth, and backup emails were taken.

All of this can be used for not only breaking into the Yahoo! account in question, but also any other accounts with similar information.

A good course of action from here on would be to, as you should, never reuse passwords, and change any existing passwords you feel might be in danger. Ensure that no shady happenings have occurred with any accounts, up to and including bank accounts.

The information sold was reportedly utilized to spy on a range of US White House and military officials, alongside Russian business executives and government officials.

With this information kept in mind, a document was released stating that four men were indicted, two of whom were Russian intelligence officers working for the Russian Federal Security Service. Which is, ironically enough, an agency dedicated to aiding foreign intelligence agencies track cybercriminals.

To finalize, remember to keep safety measures on all your accounts and protect yourself from email fraud or spam to the best of your ability. Only sign up for accounts on legitimate websites and, when you do create an account, use a unique password for that site. For sites with sensitive information, elect to use two-factor authentication when possible.

That way, when a company’s security is pushed back in lieu of other things, you can serve as a second defense for yourself.

Wiperware: New Malware That Shouldn’t Be Taken Lightly

October 12, 2017

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Any business can be a target for hackers who use ransomware. However, in recent months, a major new threat has emerged. The recent Petya attack was initially perceived to be another form of ransomware.

However, as the firms involved took stock in the aftermath of the events, it became apparent that the attack took the form of “wipeware,” code that is designed to completely destroy the files stored on any system.

What is wiperware?

Wiperware is designed with one goal in mind: total destruction. The malware asks users to install a software update and then it immediately takes control of the device. Once it has gained admin access, it completely overwrites all files on the device and in some cases the entire network. Any attached storage is also vulnerable, included USB external drives, memory sticks and network shared drives.

While the motivations behind Petya remain unknown, what is abundantly clear is that wiperware is a threat that needs to be taken very seriously. Here are a couple of things you can do right now. [Read more…] about Wiperware: New Malware That Shouldn’t Be Taken Lightly

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2026 Issues
  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Hackers Aren’t Hacking – They’re Just Logging In

February 17, 2026

The “Deepfake CEO” Scam: Voice Cloning Is The Next Cyber Threat

February 17, 2026

Why “It Hasn’t Happened To Us (Yet!)” Is The Most Expensive IT Strategy

February 17, 2026

You Absolutely Need To Back Up Your Cloud Services Like Office 365

January 20, 2026

Tags

AI Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2026 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.