• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

DDoS Becomes A 1 Terabit Phenomenon

February 1, 2017

Back in the middle of September, some amazingly terrifying things were happening in the world of technology. A DDoS (Distributed Denial of Service) attack reached a mind-boggling 1.1 Terabits per second. Not all users are familiar with DDoS attacks, but we’ll explain how it scales to give perspective, why it affects smaller businesses, and how you can protect yourself.

First, what is a DDoS and why does it matter? A DDoS attack consists of many compromised devices targeting a single system. The compromised devices target the system by attempting to overwhelm an online service.

Once it is successfully overwhelmed, it can be temporarily unavailable or crash completely. There is generally not any irreparable damage to the system itself, but data that is mid-transfer can become corrupted and the system can become unresponsive preventing you from accessing it for work.

Secondly, we generally do not think in Terabits. People on a day-to-day basis are generally dealing with Kilobits and Megabits (which is 1000 Kilobits). When you download a file, you are likely doing it between 10-20 Megabits. This means that this new DDoS attack is 50,000 to 100,000 times faster than your average computer. These numbers are achieved by creating a series of compromised devices acting under singular actions, also known as a botnet.

Chances are, you have never been the victim of a DDoS attack. Unfortunately, that may change. In recent years, attacks on small businesses have increased substantially and the damaging potential has increased over time.

Part of the rise of DDoS attacks is the availability of easy-to-use tools off of disreputable markets and websites. With less skill needed to participate, more people can begin creating DDoS attacks.

So what can you do if someone decides to bombard you with a 1 Terabit attack? At that point, wait for it to end. Realistically, no one with that kind of botnet is going to attack a smaller business unless they have a personal vendetta against you.

More likely is a much smaller DDoS attack, something in the realm of sub-100 Gigabit attacks. But what can you do to defend yourself? Well, you might already be on the right track to preventing attacks not only to your business, but others as well. The main way smaller attackers are making a big impact is based on an open DNS resolver.

Now, what’s an open DNS resolver? More or less, it is an error. A DNS can be open or closed; an open DNS resolver allows traffic and requests from any Internet source while a closed DNS limits who can use it. Using open DNS’s, people can bounce off of open resolvers for both a larger attack as well as anonymity. How can you fix this? Most DNS clients are open by default, so make sure that when you set one up, you close it. When an attack does hit, it will generally give you an IP. Make sure to check out which DNS resolver it is coming from and to update the settings.

In the end, all you can do is make sure that your infrastructure is set up in a way that protects your data from a DDoS attack. Double-check your DNS resolvers to make sure they are not open, keep up to date backups available in case of the worst, and inform law enforcement when it does happen so that they may be able to track down the culprits and put an end to their childish games.

Mistakes To Avoid When Setting Up Your Small Business Network

February 1, 2017

Anthony Glover is Tech Expert’s network engineer.

Setting up your ideal network environment can be tricky. Here are a few things to avoid when setting up your network at your small business.

Lack of security on your network
Avoid this at all costs. A secure network is a happy network and, not to mention, a reliable one. This is especially needed if your business depends on confidentiality.

Lack of security leaves you vulnerable to hackers or curious individuals that could obtain information that could be vital to your business.

Ideally, a firewall is an essential choice when security is a factor in your networking environment.

Insecure wireless networking
A wireless connection is a convenient way for wireless devices such as printers, phones, laptops, or any other device that has wireless capability to connect to your network.

However, the convenience factor can turn problematic if left insecure.

When it comes to wireless networking as a security factor, always set a password on your SSID (such as WPSK or WPSK2). Your password should – at the very least – include a capital letter, numbers, and special characters such as “!”.

Poor network management
Poor network management is a much overlooked problem and can quickly become the worst thing that could happen to any small business network.

Good management of your networking equipment will keep your network secure. Poor management can lead to vulnerabilities in the network due to a lack of updates and a lack of securing ports, leading to possible intrusion from hackers.

Remember, all aspects of management are very important. This can include detailed and organized cabling, updating firewall firmware, updating servers and workstations, and securing ports on your server or end-user computers.

Network management – when done right – is ideal for your small business network and should be done by an IT professional such as Tech Experts.

Bad placement of Wi-Fi access points
Bad placement of a WAP can be a huge problem for wireless network signal performance. Poor signal strength can cause slow connections to both the Internet and your local area network and causes sluggish performance of your overall network.

It isn’t enough to simply choose the strongest WAP; it also needs to be placed where it can work properly.

To make sure you get the best performance out of it, it should be located in the center of the area you need to cover.

You should also keep in mind that the weakest signal points are directly below and above your WAP.

Cutting corners on speed
Buying a 10 mbps switch just because it’s on sale is a bad idea. Speed is your friend, especially when setting up your small business network.

A faster network will increase activity and save you time and money in the long run. 1 gbps equipment should be the ideal solution to not only transfer traffic faster, but access everything on your network faster.

We know networks aren’t easy as pie, which is why we always recommend having a professional IT team set up your office.

Cheaper isn’t better, especially when a poorly done set-up can cause large problems once you’re operating.

If you’re looking to set up a new building or relocate (or even redo your current office), give us a call at (734) 457-5000, or email at info@mytechexperts.com, to see what we can do for you.

Five Signs That You Need A New Work Computer

February 1, 2017

Luke Gruden is a help desk technician for Tech Experts.
A work computer is one of your greatest tools in the modern era. Like any other tool, you want to make sure you have the right one for the job – and that your tools are maintained and replaced if necessary.

Computers evolve and change faster than anything else and the demands of security and new software require that your computer be somewhat recent, not a museum piece.

The fastest way to tell if you need a new computer is if your computer boots up into Windows XP or to a Windows system older than 2000.

Windows XP is such old technology that Microsoft no longer provides security updates for it. This leaves XP computers vulnerable to security loopholes and hacking attempts. Even the most high-end computer from XP times would run very slow for modern programs, which often won’t even load properly.

Google Chrome, the web browser, doesn’t even run on an XP. If you boot up to a Windows XP, it is time to replace the computer. Windows Vista is your second sign that you might need to replace your computer soon.

The operating system is still receiving security updates from Microsoft, but not for much longer: April 11, 2017 is the last day of support for Vista. Windows Vista will be over 10 years old, which is about 90 years old in computer years.

In the computer world, we have Moore’s Law, which means that roughly about every 2 years we’re able to double processing power for about the same cost. After 10 years, a computer that would have cost $300 will not run at even a tenth of the speed of a modern computer of the same cost. It is about time to replace that Vista computer; if not this year, then definitely next year.

You might have noticed on different versions of Windows that it says 32-bit or 64-bit at the end of its title. This is important. A 32-bit OS cannot properly utilize newer computers. Without getting too technical: if your computer cannot support a 64-bit operating system, this is a good sign that you might need to replace your computer soon. Having a 32-bit OS is your third sign that you might need to replace your computer.

The fourth sign is if your computer came with a CRT monitor when it was new. A CRT monitor is an older monitor that is big and bulky with a square display instead of a widescreen display like all modern TVs and monitors.

If your computer came with a CRT monitor, replace this computer immediately. This computer will not run many modern applications. It may not even run basic websites that are out there today, let alone modern computer programs.

The last sign is that you’re asking this question about your current computer. Chances are, if your computer is 4 to 6 years old, it could be time to replace your computer if you need to run modern applications. If 10 years is 90 in computer years, then 6 years old is getting up there in age.

If you are still questioning if it’s a good idea to replace your computer, give Tech Experts a call. Once learn more about your particular situation, we can help you figure out if your current computer suits your work needs or if you should take the plunge to upgrade.

To Firewall, Or Not To Firewall, That Is The Question

February 1, 2017

When operating a small business, there are many things to consider regarding your communication. Whether it’s within the office or to the outside world, efficient and secure communication is a key component to running a business effectively.

There’s also the issue of transferring data, which can be considered the biggest aspect concerning the communication needs of your business. Internet and network security is a big topic these days, with all the changes inherent with technology, and all the vulnerabilities popping up all over the place.

Just last year, it was figured that roughly a million new viruses, spyware, and other malware created each day. Yes, a MILLION PER DAY. After that sinks in, consider this: it only takes roughly 82 seconds for sensitive data to be hacked, duplicated, and dispersed to the world at large.

Last year, 5 out of 6 companies were targeted by some piece of malicious software. Most of the new threats are things like digital extortion, sophisticated breaching attacks, and social media hacks.

A firewall is a good way to protect yourself and your company against an attack. A firewall is either a physical box or a piece of software that provides protection. They update on a regular basis to combat against the biggest and baddest hacker software out there. Even if they can’t update quite fast enough, it’s much better than just leaving your network unprotected.

The first, and simplest method, is to make use of the firewall that comes with your operating system. This is typically the built-in Windows Firewall.

This firewall is commonly used and is usually a good idea for a very small company. It’s perfect for an organization with low traffic and not much sensitive data (such as credit card data, social security numbers, addresses, and other personal data).

A physical firewall is a better choice for bigger, more established business with a need for robust and reliable security. Don’t get me wrong; even if you have a smaller business with little data transfer and communication, a physical firewall is always a good way to go. But you should really use a cost-benefit analysis to determine whether it’s really worth going through the extra steps and money it would take to implement a solution like this.

Physical firewalls can be looked at like something that separates the outside world from your internal network.

They are robust, they provide an added layer of security, and you get what you pay for. It is always recommended that you use a physical firewall.

The downside of this, however, is two-fold. First, and most obvious, you have to splurge a little to get a decent solution. Secondly, someone has to know how to install, configure, and maintain it. This is where Tech Experts comes in.

Once it’s all said and done, if your security measures are in place, you can rest assured that your days will be less stressful. You’ll be able to sleep at night knowing your data and other forms of communication are protected from the outside world.

Five Common Causes For Business Computer Slowdowns And How To Fix Them

October 25, 2016

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

All computers inevitably slow down at some point. The more we use them to download programs, install extensions, and fill up the hard drive with files, movies, and photographs, the slower they get.

Fortunately, keeping your computer running at a rapid pace is relatively straightforward, providing you develop some basic electronic housekeeping habits.

Here are the top five reasons computers slow down and how you can fix them.

Your hard drive is failing
Hard drives fail eventually, so make sure you backup your files on a regular basis. Some users claim that solid state drives (SSDs) are more reliable than hard drives because they don’t incorporate moving parts. However, that’s nothing more than a myth and the data stored on them can still be corrupted. [Read more…] about Five Common Causes For Business Computer Slowdowns And How To Fix Them

How To Select The Best Computer For Your Business

October 25, 2016

When shopping for an ideal business computer, it’s not the cheapest purchase but the most beneficial tech that’s going to last for the long haul.

For example, you find a local electronics ad that points out a PC that looks ideal due to the price – but beware, most budget PCs have components that are either already outdated or will be very soon.

When picking out the best computer, you need to understand your needs both currently and in the future, then purchase a PC that will accomplish that.

So what’s the best manufacturer?
There are several manufacturers that sell great PCs for the small to mid-size business owner, such as HP, Lenovo, or Acer.

The great thing about all of the manufacturers is that each one has its own ideal PC and, depending on your needs, one will fit better than the next. Remember, reviews are your friend.

Decide whether or not you need portability.
If your work involves you leaving the office or taking your work home, get a laptop.

If you are stationary in an office, get a desktop and remember to get the best processor possible for your budget. Time is money and a better processor will increase your overall speed.

Got cores?
A good processor will have multiple cores. You will need at least a dual core to get the job done at a considerable rate. Most users will not need to go higher than a quad core processor to perform everyday tasks.

However, the more cores present will make your PC not only faster but able to manage more task more effectively.

Graphic needs?
Your business will decide how much graphics power you need. For instance, if you’re a graphic designer, you would want something that is going to really process graphics for those high-resolution vectors and possibly some video-editing purposes.

You would want to get a PC with no less than a mid-range graphics. However, if you run a flower shop, video processing really wouldn’t be key to the core of your business and you would want to spend your money elsewhere, such as memory or a better CPU.

Most on-board video nowadays are sufficient enough for the small business owner and wouldn’t have difficulties with everyday computing.

How much memory?
Again, this boils down to the core attributes of your business and what your business needs to operate effectively.

Ideally, at least 4 GB of memory is a great standard for any business computer to start and most desktop or laptop PCs also offer upgradeability. So you can always add more memory later, if necessary.

Storage?
The motto is – the more space you have, the less chance you have of reaching the storage limit.

In today’s world, SSD storage is the fastest and most sought after for storage hardware.

When picking a hard drive for your system, anticipate how much space you really need so you end up with a PC that can manage the factors set for your business.

Seem like a lot to manage on your own? You can always give us a call to review your PC needs. Give us a call at (734) 457-5000, or email info@mytechexperts.com.

What Makes For A Good Password?

October 25, 2016

Luke Gruden is a help desk technician for Tech Experts.

It seems like every week we need to make a new password for a new account. When making a password, there is usually some colored bar letting you know if your password is strong or weak.

It is very important that we maintain strong passwords for our accounts, so no one uses a password generator to guess the password and gain access to our private information.

What actually makes a good password? Length is one of the best methods to making a stronger password as it’s harder for a computer to hack a longer password. For the length, it’s recommended to have at least 12 characters.

If your password consists of basic words, it’s recommend the password be even longer as a lot of password crackers out there auto-search dictionary words.

You can even make a sentence or sentences. There is no rule against something like this: “Hello! I am Luke with Tech Experts and I work on computers!” That was about 60 characters and would take significantly longer to crack than a simple 12 character password.

The next best factor to making a good password is complexity. Complexity is when a password uses special characters, numbers, random capitals, and contains few or no dictionary words. The more complex a password is, the far harder it is for a computer to crack the password. “s5df1K51lj!@# ^k5$#1#!!2 @” would be a really good password, but good luck remembering it. Too complex and it’s hard to remember, too short and it’s easy to crack.

However, using length and complexity, we can make a strong password that we can remember.

Adding a number and special character to each word you use will drastically increase the strength of the password without making it too complex “Hello$1 my$2 name$3 is$4 Luke!$5” is most likely a stronger password than the one I used earlier that contained 60 characters simply because the special characters aren’t in the dictionary.

Another important note about passwords is that you should keep every password different for each profile. It can be tempting to use the same password for every account online, but at least try to make variations of your passwords.

The main reason why is that if a website is leaked or hacked, your password can be out there in the public and can be attempted on your other accounts, so even if you have the best password in the world, using the same password for every account can make your accounts vulnerable.

The last good practice for passwords is to change your password every 6 months or so, so even if your password was leaked without your knowledge, changing the password would end the issue. Also, some computers will try to crack a password 24/7 and, with enough time, it will eventually guess the right password. Changing your password every so often will thwart those computers that endlessly guess at your password.

Another way to ensure you have different strong passwords is to use a password manager. A password manager is a type of program that stores your different passwords for different accounts, but that itself still needs a good password to protect your collection. With a password manager, you can use a generator to create very long complex passwords and not have to worry about remembering them as long as you have accesses to your manager.

If you need any help with passwords or with setting up a password manager, you can count on your Tech Experts to help you on your way. Contact us with any questions at (734) 457-5000.

Backups: Don’t Wait Until It Breaks

October 25, 2016

Accidents happen. Eventually, something will go wrong and when it does, you are going to want to be protected. Having a backup means more than just having an extra file on hand. It means being able to rest easy knowing that, if the worst should happen, it would not be the end of your business. It means that in the event of a total collapse of your systems, you have a fallback plan. It means knowing that you have already taken care of the largest problem in the event of a crash: recovering files and getting back up to date.

The most common way data is lost is due to a workstation failing due to user error or the occasional spilled drink. If the workstation is not backed up, the files may all be lost. A growing way to lose data is due to viruses and infections that spread throughout the computer and delete, steal, or corrupt the data.

The question people begin to become puzzled with is, “What can/should I backup?” The easy answer is everything. With technology being what it is today, space is cheap. You can sometimes back up an entire business for a few hundred dollars. On the other hand, you can wait for everything to go wrong, replace a dozen devices then try to start recovering all the data lost in the tragedy.

If space does become tight, start to look at things your business cannot function without, such as client information (phone numbers, email addresses, notes about the client), sales and product receipts, Internet bookmarks, anything that cannot be replaced, and anything that takes time to replace.

Backing up the data can be as simple as storing a copy of your important files on an external hard drive that you bring up to date every week. If the worst should happen after a backup is kept, you need only to plug in the backup drive to the repaired or replacement computer, copy the contents over, and continue on with your work. Instead of losing years of data, you only lose a few days.

What should you use to back up your data? In the example above, using a small flash drive or external hard drive, they can usually be damaged or lost quite easily. If the memory device is lost, it poses a problem in that it is unsecured data and can be accessed by anyone that plugs it into their computer. While these devices can be a cheap solution to backing up data, they are far from perfect.

One of the most popular solutions for any business – smaller businesses especially – is online backup. The perk of online backup is there is no hardware or software on site that can be damaged, lost, or stolen. A monthly fee based on how much storage you require is all it takes. Choose the data you want to backup and it will be securely sent to a data center where it is stored. Generally, this can be done automatically which can remove accidental user error from the equation.

In a perfect world, we would all have a backup for our data and a backup for our backup, but even having one backup can sometimes be enough to keep a problematic crash or error from becoming a monumental crisis. If you do not already have a backup in place, you have to ask yourself one thing: if all your systems crashed tomorrow, would you recover?

Three Great Ways To Capture Feedback On Your Website

October 25, 2016

Businesses gather and utilize customer feedback in their business strategy to ensure the products and services they produce meet customer needs. Here are three ways to gather client feedback from your website visitors.

Email is an immensely valuable method of securing honest feedback from customers. However, many organizations neglect to consider the customer experience when designing email channels. There are three things you should take into consideration when communicating with customers via email:

1. Ensure you respond to customers in a speedy fashion: A recent study found that 81% of customers would be more likely to leave feedback, if they thought they would get a rapid response.

2. Develop an organized system by which customer feedback is handled. Keep track of what feedback you have received from whom and use this information to guide future customer interactions.

3. Follow up on all correspondence in an honest and open manner.

Surveys are very challenging to develop; however, they can provide extremely useful insights. Test long and short surveys to find out which are the most effective in providing with the feedback you need. Tools like Qualaroo are great for short surveys, while Survey Monkey is ideal for longer questionnaires.

Customer interviews provide direct feedback from your customers and allow you to develop a more personal relationship with them. When planning the interview process, it can be useful to focus on user attitudes toward the problems they typically encounter and employ a critical incident method to encourage customers to recall specific problems.

Five Tips For Staying Ahead Of Malware

October 25, 2016

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Malicious software has become an everyday issue for many computer users, and it can have serious implications for your finances. To keep your information, data, and finances safe, you need to be aware of the common threats to your online security that exist and how you can protect yourself against fraudulent activity.

According to research from Kaspersky Security, malicious software, which is also commonly referred to as malware, impacted as many as 34.2% of computer users in 2015. But what is malware and how does it work?

Malware is somewhat different than computer viruses because instead of completely stopping your computer from operating, it sits quietly in your system stealing important and sensitive information.

It is estimated that over 1 million new forms of malware are released on a daily basis in the form of spyware, Trojan horses, phishing links, and ransomware. [Read more…] about Five Tips For Staying Ahead Of Malware

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.