• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Five Common Causes For Business Computer Slowdowns And How To Fix Them

October 25, 2016

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

All computers inevitably slow down at some point. The more we use them to download programs, install extensions, and fill up the hard drive with files, movies, and photographs, the slower they get.

Fortunately, keeping your computer running at a rapid pace is relatively straightforward, providing you develop some basic electronic housekeeping habits.

Here are the top five reasons computers slow down and how you can fix them.

Your hard drive is failing
Hard drives fail eventually, so make sure you backup your files on a regular basis. Some users claim that solid state drives (SSDs) are more reliable than hard drives because they don’t incorporate moving parts. However, that’s nothing more than a myth and the data stored on them can still be corrupted. [Read more…] about Five Common Causes For Business Computer Slowdowns And How To Fix Them

How To Select The Best Computer For Your Business

October 25, 2016

When shopping for an ideal business computer, it’s not the cheapest purchase but the most beneficial tech that’s going to last for the long haul.

For example, you find a local electronics ad that points out a PC that looks ideal due to the price – but beware, most budget PCs have components that are either already outdated or will be very soon.

When picking out the best computer, you need to understand your needs both currently and in the future, then purchase a PC that will accomplish that.

So what’s the best manufacturer?
There are several manufacturers that sell great PCs for the small to mid-size business owner, such as HP, Lenovo, or Acer.

The great thing about all of the manufacturers is that each one has its own ideal PC and, depending on your needs, one will fit better than the next. Remember, reviews are your friend.

Decide whether or not you need portability.
If your work involves you leaving the office or taking your work home, get a laptop.

If you are stationary in an office, get a desktop and remember to get the best processor possible for your budget. Time is money and a better processor will increase your overall speed.

Got cores?
A good processor will have multiple cores. You will need at least a dual core to get the job done at a considerable rate. Most users will not need to go higher than a quad core processor to perform everyday tasks.

However, the more cores present will make your PC not only faster but able to manage more task more effectively.

Graphic needs?
Your business will decide how much graphics power you need. For instance, if you’re a graphic designer, you would want something that is going to really process graphics for those high-resolution vectors and possibly some video-editing purposes.

You would want to get a PC with no less than a mid-range graphics. However, if you run a flower shop, video processing really wouldn’t be key to the core of your business and you would want to spend your money elsewhere, such as memory or a better CPU.

Most on-board video nowadays are sufficient enough for the small business owner and wouldn’t have difficulties with everyday computing.

How much memory?
Again, this boils down to the core attributes of your business and what your business needs to operate effectively.

Ideally, at least 4 GB of memory is a great standard for any business computer to start and most desktop or laptop PCs also offer upgradeability. So you can always add more memory later, if necessary.

Storage?
The motto is – the more space you have, the less chance you have of reaching the storage limit.

In today’s world, SSD storage is the fastest and most sought after for storage hardware.

When picking a hard drive for your system, anticipate how much space you really need so you end up with a PC that can manage the factors set for your business.

Seem like a lot to manage on your own? You can always give us a call to review your PC needs. Give us a call at (734) 457-5000, or email info@mytechexperts.com.

What Makes For A Good Password?

October 25, 2016

Luke Gruden is a help desk technician for Tech Experts.

It seems like every week we need to make a new password for a new account. When making a password, there is usually some colored bar letting you know if your password is strong or weak.

It is very important that we maintain strong passwords for our accounts, so no one uses a password generator to guess the password and gain access to our private information.

What actually makes a good password? Length is one of the best methods to making a stronger password as it’s harder for a computer to hack a longer password. For the length, it’s recommended to have at least 12 characters.

If your password consists of basic words, it’s recommend the password be even longer as a lot of password crackers out there auto-search dictionary words.

You can even make a sentence or sentences. There is no rule against something like this: “Hello! I am Luke with Tech Experts and I work on computers!” That was about 60 characters and would take significantly longer to crack than a simple 12 character password.

The next best factor to making a good password is complexity. Complexity is when a password uses special characters, numbers, random capitals, and contains few or no dictionary words. The more complex a password is, the far harder it is for a computer to crack the password. “s5df1K51lj!@# ^k5$#1#!!2 @” would be a really good password, but good luck remembering it. Too complex and it’s hard to remember, too short and it’s easy to crack.

However, using length and complexity, we can make a strong password that we can remember.

Adding a number and special character to each word you use will drastically increase the strength of the password without making it too complex “Hello$1 my$2 name$3 is$4 Luke!$5” is most likely a stronger password than the one I used earlier that contained 60 characters simply because the special characters aren’t in the dictionary.

Another important note about passwords is that you should keep every password different for each profile. It can be tempting to use the same password for every account online, but at least try to make variations of your passwords.

The main reason why is that if a website is leaked or hacked, your password can be out there in the public and can be attempted on your other accounts, so even if you have the best password in the world, using the same password for every account can make your accounts vulnerable.

The last good practice for passwords is to change your password every 6 months or so, so even if your password was leaked without your knowledge, changing the password would end the issue. Also, some computers will try to crack a password 24/7 and, with enough time, it will eventually guess the right password. Changing your password every so often will thwart those computers that endlessly guess at your password.

Another way to ensure you have different strong passwords is to use a password manager. A password manager is a type of program that stores your different passwords for different accounts, but that itself still needs a good password to protect your collection. With a password manager, you can use a generator to create very long complex passwords and not have to worry about remembering them as long as you have accesses to your manager.

If you need any help with passwords or with setting up a password manager, you can count on your Tech Experts to help you on your way. Contact us with any questions at (734) 457-5000.

Backups: Don’t Wait Until It Breaks

October 25, 2016

Accidents happen. Eventually, something will go wrong and when it does, you are going to want to be protected. Having a backup means more than just having an extra file on hand. It means being able to rest easy knowing that, if the worst should happen, it would not be the end of your business. It means that in the event of a total collapse of your systems, you have a fallback plan. It means knowing that you have already taken care of the largest problem in the event of a crash: recovering files and getting back up to date.

The most common way data is lost is due to a workstation failing due to user error or the occasional spilled drink. If the workstation is not backed up, the files may all be lost. A growing way to lose data is due to viruses and infections that spread throughout the computer and delete, steal, or corrupt the data.

The question people begin to become puzzled with is, “What can/should I backup?” The easy answer is everything. With technology being what it is today, space is cheap. You can sometimes back up an entire business for a few hundred dollars. On the other hand, you can wait for everything to go wrong, replace a dozen devices then try to start recovering all the data lost in the tragedy.

If space does become tight, start to look at things your business cannot function without, such as client information (phone numbers, email addresses, notes about the client), sales and product receipts, Internet bookmarks, anything that cannot be replaced, and anything that takes time to replace.

Backing up the data can be as simple as storing a copy of your important files on an external hard drive that you bring up to date every week. If the worst should happen after a backup is kept, you need only to plug in the backup drive to the repaired or replacement computer, copy the contents over, and continue on with your work. Instead of losing years of data, you only lose a few days.

What should you use to back up your data? In the example above, using a small flash drive or external hard drive, they can usually be damaged or lost quite easily. If the memory device is lost, it poses a problem in that it is unsecured data and can be accessed by anyone that plugs it into their computer. While these devices can be a cheap solution to backing up data, they are far from perfect.

One of the most popular solutions for any business – smaller businesses especially – is online backup. The perk of online backup is there is no hardware or software on site that can be damaged, lost, or stolen. A monthly fee based on how much storage you require is all it takes. Choose the data you want to backup and it will be securely sent to a data center where it is stored. Generally, this can be done automatically which can remove accidental user error from the equation.

In a perfect world, we would all have a backup for our data and a backup for our backup, but even having one backup can sometimes be enough to keep a problematic crash or error from becoming a monumental crisis. If you do not already have a backup in place, you have to ask yourself one thing: if all your systems crashed tomorrow, would you recover?

Three Great Ways To Capture Feedback On Your Website

October 25, 2016

Businesses gather and utilize customer feedback in their business strategy to ensure the products and services they produce meet customer needs. Here are three ways to gather client feedback from your website visitors.

Email is an immensely valuable method of securing honest feedback from customers. However, many organizations neglect to consider the customer experience when designing email channels. There are three things you should take into consideration when communicating with customers via email:

1. Ensure you respond to customers in a speedy fashion: A recent study found that 81% of customers would be more likely to leave feedback, if they thought they would get a rapid response.

2. Develop an organized system by which customer feedback is handled. Keep track of what feedback you have received from whom and use this information to guide future customer interactions.

3. Follow up on all correspondence in an honest and open manner.

Surveys are very challenging to develop; however, they can provide extremely useful insights. Test long and short surveys to find out which are the most effective in providing with the feedback you need. Tools like Qualaroo are great for short surveys, while Survey Monkey is ideal for longer questionnaires.

Customer interviews provide direct feedback from your customers and allow you to develop a more personal relationship with them. When planning the interview process, it can be useful to focus on user attitudes toward the problems they typically encounter and employ a critical incident method to encourage customers to recall specific problems.

Five Tips For Staying Ahead Of Malware

October 25, 2016

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Malicious software has become an everyday issue for many computer users, and it can have serious implications for your finances. To keep your information, data, and finances safe, you need to be aware of the common threats to your online security that exist and how you can protect yourself against fraudulent activity.

According to research from Kaspersky Security, malicious software, which is also commonly referred to as malware, impacted as many as 34.2% of computer users in 2015. But what is malware and how does it work?

Malware is somewhat different than computer viruses because instead of completely stopping your computer from operating, it sits quietly in your system stealing important and sensitive information.

It is estimated that over 1 million new forms of malware are released on a daily basis in the form of spyware, Trojan horses, phishing links, and ransomware. [Read more…] about Five Tips For Staying Ahead Of Malware

Should Your Small Business Use A Domain Network?

October 25, 2016

Luke Gruden is a help desk technician for Tech Experts.

If you have 5 or more computers that are sharing files and are constantly being worked with, a domain network would be in your best interest.

A domain network using a server has many benefits to a work area, a work building, or even multiple buildings using VPN. The flexibility, security, and convenience of a domain is, in most companies, invaluable. Sign into your account from any computer that is a part of the domain and you no longer need to use only your personal computer to access files.

If something were to happen to your computer, you could just use another computer to sign into your account and continue working without much downtime. This is also a far more secure way for users to access other computers as they have to use their credentials and only have the permissions that their credentials provide, not those of the computer itself. As long as users are not sharing passwords, you can have every user accounted for, policies implemented, and control what they can and cannot access when it comes to Internet, files, and programs.

Secure file-sharing is an easy and basic function of a domain server with Active Directory, which all the computers connected to the domain have access to. If you wanted only certain users to have access to certain files, you can have folders set up that prevent unauthorized editing, but still could be read — or even not be seen at all.

Having 5+ workers able to access the same set of files to edit as needed is an amazing way to save time and improve project efficiency. Everyone can see the file as it is saved or changed and they can continue to edit records as necessary without ever having to go on the Internet or transfer the file. Just get on any computer on the domain and you have instant access to the files that you need without a second thought.

Active Directory is your IT department’s best friend when it comes to handling large or small groups of computers as IT can access the domain server to make adjustments to other computers without ever stopping the work flow.

Forgot your password? Your IT can very easily use the server and reset your password for you without having to go to your computer. Setting up a new computer that needs certain printers and drivers installed? IT can set up the server to push those standard programs and drivers without having to install each individual program. Need to set up a new user account? It’s created on the server and the user can be accessed on all computers. There are so many possibilities that open up when you have a server domain available for your workstations.

We have only scratched the surface of what’s possible with a domain server and the amount of time and effort it can save for everyone in the company. I believe every business that is looking to grow should have a domain server early on as it will be easier to set up and can evolve to your needs as your company grows.

If your company needs help setting up a domain network, you can count on Tech Experts to take care of it.

Drawbacks To The “Smart” World

October 25, 2016

We have mentioned ransomware and viruses many times. It’s something that can be seen daily without much effort. Everywhere you look, a computer is hacked and held for ransom. The user ends up losing everything in most scenarios.

However, in today’s world, we have more than just laptops and desktops. What if someone hacked your fancy new “smart” device? If someone took over or locked you out of your phone, then what would be your next move? What if they locked your home devices like your thermostat or refrigerator? The technological world can sometimes cause quite a panic.

The first question to address is a pretty big concern: How in the world does this even happen? With poor security standards, it’s not the most difficult job for those with malicious intent. In the most recent scenario released, a thermostat was hacked by adding files remotely and setting them to run in the background.

The operating system on the device did not check the security or contents of any files processed and ran the ransomware, which then requested money. In this case, if the victim did not pay, the temperature would be locked at 99F degrees.

Sadly, this is just one example. While not all malware attacks on smart devices may cause this type of concern, others are no better. Some other attacks will actually store data on the infected devices, then perform DDOS attacks against unsuspecting victims.

Small apps and programs that can be used for phishing can also find their way onto devices and be completely unknown to the user.

Fixes have rolled out over time for some of the bigger concerns, but there always seems to be something new. With these on your network, it’s not a big step to get to your actual files and programs on your PC either.
Currently, not everyone has a smart appliance in their home. That said, smart phones have obviously worked their way to the larger majority. We all download apps for one reason or another to make the phone better serve us. A wave of people will flock to the latest craze and download the most popular apps. In these scenarios, there are often “fakes” as well. These will offer some form of related service or product but will also bundle in malicious code. This code has all sorts of capabilities. Some may send texts without the owner’s knowledge. Other times, it’s possible to have information stolen. The possibilities are sometimes frightening.

So what can be done in the world of smart devices encroaching on all sides of life? In terms of larger devices and appliances, there isn’t room for removal and clean-up on the user side.

Developers are both the ones at fault and the ones that will find solutions ahead of time for the worst infections and hacks. Phones can have anti-malware programs run to help prevent data breaches, however. Most will come with a manufacturer version, but it’s always best to explore options to ensure you are protected.

Even if your smart devices don’t store information vital to you, they can still act as a gateway to anything else on your network.

As such, your office area or business workstation may fall victim soon after. Since these are the real powerhouses that hold your programs, data, and backups of other devices, it’s imperative to keep these clean and functional. Luckily, there are teams such as the one at Tech Experts that are able to identify and neutralize a threat. That alone adds peace of mind in a sometimes uncertain “smart” world.

Four Ways To Avoid Prolonged Sitting At Work

October 25, 2016

Prolonged sitting at work is a global problem that is unlikely to improve any time soon. So what can you do to incorporate movement into a sedentary job to reduce the damaging effects prolonged periods of sitting will have on your health?

Use a standing workstation. It may not sound particularly comfortable, but standing at your desk for some periods during the day will reduce the negative consequences of desk work. Invest in a decent stand-sit work desk solution so that you can switch between standing and sitting in accordance with your comfort needs.

Stand while talking. If you don’t want to go all in and work in a standing position, make sure you take regular breaks from sitting. One way of achieving this could be to stand every time you are talking on the phone. You may also wish to stand while working on brainstorming activities or while engaged in group workshops.

Stretch regularly. According to the experts, it can be unhealthy to remain in a single posture for more than 30 minutes. If you feel your muscles tightening, stand up and give your body a stretch. The Mayo Clinic has published a handy guide to office stretches that workers can complete while engaged in other tasks.

Get your posture right. Complete a workplace assessment to test the extent to which your seating and working position are ergonomic. Identify any areas of weakness and make the appropriate changes, such as repositioning your monitor, immediately.

Why It’s Important To Change Your Router’s Default Log-in

October 25, 2016

Mike Simonelli is a network technician for Tech Experts.

It’s a pretty common scenario: a small business wishes to add Wi-Fi to its existing network infrastructure. A quick trip to the nearest big-box store reveals several Wi-Fi capable routers or access points to choose from. Grabbing up the mid-priced model, the business owner heads back to the shop and uses the included Ethernet cable to plug the new device into an existing switch and, just like that, instant Wi-Fi.

There are a couple of concerns regarding the above scenario that the savvy business owner should be having. The first and most obvious: “I plugged it in and now everyone with a laptop has unrestricted access to my network.” How do you control who can connect to your Wi-Fi?

The answer is to enable a wireless security protocol on the router or access point. WEP is an acronym for Wired Equivalent Privacy (or Wireless Encryption Protocol) and it was designed to provide the same level of security as that of a hard-wired Ethernet connection.

Because wireless networks broadcast messages using radio waves, they are subject to eavesdropping. WEP provides security by encrypting the data to protect it as it is transmitted from one point to another. Almost all wireless devices will support WEP and instructions for enabling it on a particular device should be readily found in the documentation.

Enabling WEP will keep people without the correct password off your Wi-Fi and also prevent unauthorized eavesdropping of network traffic.

Another often overlooked concern is changing the default credentials that are needed to login and administer the new wireless device.

I can’t tell you how many times that I’ve connected to a wireless network and browsed to the default gateway I was assigned (normally something like http://192.168.0.1) and typed in “admin” and “password” on the login form that is presented and gained access to the router’s configuration.

The username “Admin” and the password “password” are typically the default credentials as they come pre-configured on Linksys routers, as well as some other brands.

If these credentials work, then potentially anyone can have unrestricted access to your router’s configuration. At this point, no wireless security protocol such as WEP will protect you since it can simply be turned off in the router’s administration interface.

Worse yet, an intruder can set his/her own password and change the admin password to something else. Once this happens, usually the only way to regain access to your own Wi-Fi network is to factory reset the device, which removes all of your configurations.

The bottom line – never leave a wireless device at its default settings when you connect it to your network. By taking the time to follow these simple guidelines, you will make your wireless device a worthwhile addition to your infrastructure, as well as making your network that much more secure.

If you have any questions during your router set-up or if you’d like to find out how to increase your office’s security using your current router, give Tech Experts a call at (734) 457-5000, or email support@mytechexperts.com. We’d be happy to help.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.