• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Three Great Ways To Capture Feedback On Your Website

October 25, 2016

Businesses gather and utilize customer feedback in their business strategy to ensure the products and services they produce meet customer needs. Here are three ways to gather client feedback from your website visitors.

Email is an immensely valuable method of securing honest feedback from customers. However, many organizations neglect to consider the customer experience when designing email channels. There are three things you should take into consideration when communicating with customers via email:

1. Ensure you respond to customers in a speedy fashion: A recent study found that 81% of customers would be more likely to leave feedback, if they thought they would get a rapid response.

2. Develop an organized system by which customer feedback is handled. Keep track of what feedback you have received from whom and use this information to guide future customer interactions.

3. Follow up on all correspondence in an honest and open manner.

Surveys are very challenging to develop; however, they can provide extremely useful insights. Test long and short surveys to find out which are the most effective in providing with the feedback you need. Tools like Qualaroo are great for short surveys, while Survey Monkey is ideal for longer questionnaires.

Customer interviews provide direct feedback from your customers and allow you to develop a more personal relationship with them. When planning the interview process, it can be useful to focus on user attitudes toward the problems they typically encounter and employ a critical incident method to encourage customers to recall specific problems.

Five Tips For Staying Ahead Of Malware

October 25, 2016

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Malicious software has become an everyday issue for many computer users, and it can have serious implications for your finances. To keep your information, data, and finances safe, you need to be aware of the common threats to your online security that exist and how you can protect yourself against fraudulent activity.

According to research from Kaspersky Security, malicious software, which is also commonly referred to as malware, impacted as many as 34.2% of computer users in 2015. But what is malware and how does it work?

Malware is somewhat different than computer viruses because instead of completely stopping your computer from operating, it sits quietly in your system stealing important and sensitive information.

It is estimated that over 1 million new forms of malware are released on a daily basis in the form of spyware, Trojan horses, phishing links, and ransomware. [Read more…] about Five Tips For Staying Ahead Of Malware

Should Your Small Business Use A Domain Network?

October 25, 2016

Luke Gruden is a help desk technician for Tech Experts.

If you have 5 or more computers that are sharing files and are constantly being worked with, a domain network would be in your best interest.

A domain network using a server has many benefits to a work area, a work building, or even multiple buildings using VPN. The flexibility, security, and convenience of a domain is, in most companies, invaluable. Sign into your account from any computer that is a part of the domain and you no longer need to use only your personal computer to access files.

If something were to happen to your computer, you could just use another computer to sign into your account and continue working without much downtime. This is also a far more secure way for users to access other computers as they have to use their credentials and only have the permissions that their credentials provide, not those of the computer itself. As long as users are not sharing passwords, you can have every user accounted for, policies implemented, and control what they can and cannot access when it comes to Internet, files, and programs.

Secure file-sharing is an easy and basic function of a domain server with Active Directory, which all the computers connected to the domain have access to. If you wanted only certain users to have access to certain files, you can have folders set up that prevent unauthorized editing, but still could be read — or even not be seen at all.

Having 5+ workers able to access the same set of files to edit as needed is an amazing way to save time and improve project efficiency. Everyone can see the file as it is saved or changed and they can continue to edit records as necessary without ever having to go on the Internet or transfer the file. Just get on any computer on the domain and you have instant access to the files that you need without a second thought.

Active Directory is your IT department’s best friend when it comes to handling large or small groups of computers as IT can access the domain server to make adjustments to other computers without ever stopping the work flow.

Forgot your password? Your IT can very easily use the server and reset your password for you without having to go to your computer. Setting up a new computer that needs certain printers and drivers installed? IT can set up the server to push those standard programs and drivers without having to install each individual program. Need to set up a new user account? It’s created on the server and the user can be accessed on all computers. There are so many possibilities that open up when you have a server domain available for your workstations.

We have only scratched the surface of what’s possible with a domain server and the amount of time and effort it can save for everyone in the company. I believe every business that is looking to grow should have a domain server early on as it will be easier to set up and can evolve to your needs as your company grows.

If your company needs help setting up a domain network, you can count on Tech Experts to take care of it.

Drawbacks To The “Smart” World

October 25, 2016

We have mentioned ransomware and viruses many times. It’s something that can be seen daily without much effort. Everywhere you look, a computer is hacked and held for ransom. The user ends up losing everything in most scenarios.

However, in today’s world, we have more than just laptops and desktops. What if someone hacked your fancy new “smart” device? If someone took over or locked you out of your phone, then what would be your next move? What if they locked your home devices like your thermostat or refrigerator? The technological world can sometimes cause quite a panic.

The first question to address is a pretty big concern: How in the world does this even happen? With poor security standards, it’s not the most difficult job for those with malicious intent. In the most recent scenario released, a thermostat was hacked by adding files remotely and setting them to run in the background.

The operating system on the device did not check the security or contents of any files processed and ran the ransomware, which then requested money. In this case, if the victim did not pay, the temperature would be locked at 99F degrees.

Sadly, this is just one example. While not all malware attacks on smart devices may cause this type of concern, others are no better. Some other attacks will actually store data on the infected devices, then perform DDOS attacks against unsuspecting victims.

Small apps and programs that can be used for phishing can also find their way onto devices and be completely unknown to the user.

Fixes have rolled out over time for some of the bigger concerns, but there always seems to be something new. With these on your network, it’s not a big step to get to your actual files and programs on your PC either.
Currently, not everyone has a smart appliance in their home. That said, smart phones have obviously worked their way to the larger majority. We all download apps for one reason or another to make the phone better serve us. A wave of people will flock to the latest craze and download the most popular apps. In these scenarios, there are often “fakes” as well. These will offer some form of related service or product but will also bundle in malicious code. This code has all sorts of capabilities. Some may send texts without the owner’s knowledge. Other times, it’s possible to have information stolen. The possibilities are sometimes frightening.

So what can be done in the world of smart devices encroaching on all sides of life? In terms of larger devices and appliances, there isn’t room for removal and clean-up on the user side.

Developers are both the ones at fault and the ones that will find solutions ahead of time for the worst infections and hacks. Phones can have anti-malware programs run to help prevent data breaches, however. Most will come with a manufacturer version, but it’s always best to explore options to ensure you are protected.

Even if your smart devices don’t store information vital to you, they can still act as a gateway to anything else on your network.

As such, your office area or business workstation may fall victim soon after. Since these are the real powerhouses that hold your programs, data, and backups of other devices, it’s imperative to keep these clean and functional. Luckily, there are teams such as the one at Tech Experts that are able to identify and neutralize a threat. That alone adds peace of mind in a sometimes uncertain “smart” world.

Four Ways To Avoid Prolonged Sitting At Work

October 25, 2016

Prolonged sitting at work is a global problem that is unlikely to improve any time soon. So what can you do to incorporate movement into a sedentary job to reduce the damaging effects prolonged periods of sitting will have on your health?

Use a standing workstation. It may not sound particularly comfortable, but standing at your desk for some periods during the day will reduce the negative consequences of desk work. Invest in a decent stand-sit work desk solution so that you can switch between standing and sitting in accordance with your comfort needs.

Stand while talking. If you don’t want to go all in and work in a standing position, make sure you take regular breaks from sitting. One way of achieving this could be to stand every time you are talking on the phone. You may also wish to stand while working on brainstorming activities or while engaged in group workshops.

Stretch regularly. According to the experts, it can be unhealthy to remain in a single posture for more than 30 minutes. If you feel your muscles tightening, stand up and give your body a stretch. The Mayo Clinic has published a handy guide to office stretches that workers can complete while engaged in other tasks.

Get your posture right. Complete a workplace assessment to test the extent to which your seating and working position are ergonomic. Identify any areas of weakness and make the appropriate changes, such as repositioning your monitor, immediately.

Why It’s Important To Change Your Router’s Default Log-in

October 25, 2016

Mike Simonelli is a network technician for Tech Experts.

It’s a pretty common scenario: a small business wishes to add Wi-Fi to its existing network infrastructure. A quick trip to the nearest big-box store reveals several Wi-Fi capable routers or access points to choose from. Grabbing up the mid-priced model, the business owner heads back to the shop and uses the included Ethernet cable to plug the new device into an existing switch and, just like that, instant Wi-Fi.

There are a couple of concerns regarding the above scenario that the savvy business owner should be having. The first and most obvious: “I plugged it in and now everyone with a laptop has unrestricted access to my network.” How do you control who can connect to your Wi-Fi?

The answer is to enable a wireless security protocol on the router or access point. WEP is an acronym for Wired Equivalent Privacy (or Wireless Encryption Protocol) and it was designed to provide the same level of security as that of a hard-wired Ethernet connection.

Because wireless networks broadcast messages using radio waves, they are subject to eavesdropping. WEP provides security by encrypting the data to protect it as it is transmitted from one point to another. Almost all wireless devices will support WEP and instructions for enabling it on a particular device should be readily found in the documentation.

Enabling WEP will keep people without the correct password off your Wi-Fi and also prevent unauthorized eavesdropping of network traffic.

Another often overlooked concern is changing the default credentials that are needed to login and administer the new wireless device.

I can’t tell you how many times that I’ve connected to a wireless network and browsed to the default gateway I was assigned (normally something like http://192.168.0.1) and typed in “admin” and “password” on the login form that is presented and gained access to the router’s configuration.

The username “Admin” and the password “password” are typically the default credentials as they come pre-configured on Linksys routers, as well as some other brands.

If these credentials work, then potentially anyone can have unrestricted access to your router’s configuration. At this point, no wireless security protocol such as WEP will protect you since it can simply be turned off in the router’s administration interface.

Worse yet, an intruder can set his/her own password and change the admin password to something else. Once this happens, usually the only way to regain access to your own Wi-Fi network is to factory reset the device, which removes all of your configurations.

The bottom line – never leave a wireless device at its default settings when you connect it to your network. By taking the time to follow these simple guidelines, you will make your wireless device a worthwhile addition to your infrastructure, as well as making your network that much more secure.

If you have any questions during your router set-up or if you’d like to find out how to increase your office’s security using your current router, give Tech Experts a call at (734) 457-5000, or email support@mytechexperts.com. We’d be happy to help.

Five Ways Cloud Computing Can Improve Your Business

August 15, 2016

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Regardless of the size of your business, you can harness the power of the same high-tech tools used by Fortune 500 companies, thanks to cloud-based technology.

According to recent studies of small- to medium-sized businesses, those using cloud computing greatly outperformed those that didn’t. One study showed an average of 26% more growth and 21% more profitability for small- to medium-sized businesses using cloud computing over those that only had their heads in the clouds.

Here are five concrete ways the cloud can help your business:

Reduced costs
Cloud computing eliminates the need for a large IT department. With the data centers located off-site, your business is not responsible for the electricity to run, maintain, or periodically upgrade those servers. The money saved by using cloud computing can then be redirected into growing your business or marketing to new clients. [Read more…] about Five Ways Cloud Computing Can Improve Your Business

Anti-Virus Advice For Your Small Business

August 15, 2016

Brian Bronikowski is a field service technician for Tech Experts.
Anti-virus has always been a major concern for users at all levels. From trojans and keylogging programs, to ransomware and malicious software, there is always a new threat on the table.

When we purchase an anti-virus software, there is a certain feeling of security we expect to have, that there is no worry when it comes to those malicious attacks. That’s what the money goes towards. The problem is that sometimes anti-virus actually does quite the opposite.

In a recent study, household name Symantec (Norton) was labelled with multiple critical vulnerabilities that in fact make the system less secure than if it was running without an anti-virus program.

One would hope that a company of this size would be able to resolve these before they’re discovered — or at the very least, promptly look for ways to clean up their act. Unfortunately, Symantec wanted to put on the brakes and wait before patching these flaws that affect every product associated with the company.

Most of the affected systems have been patched since the first reports from June. When you see a report like this and pair it with the performance-degrading effects large anti-virus companies impose, it becomes a simple question: what do you do?

There are a multitude of protection software on the Internet and in-store. Some of these will go back and forth in terms of highest rankings. Some are big brands that are pre-installed on most computers. Others are less well known, but gaining ground. It’s all about finding the right one for you.

More often than not, we will see the likes of McAfee and Norton on systems. These are loaded for you when you buy a new system and will start as a trial. Users will often purchase the system instead of going through the arduous task of properly removing an anti-virus program.

The problem here is that generally the user will purchase whatever is “recommended” which will often be an entire security suite. These will bring a low-end computer to a halt and greatly degrade the mid-range and higher end computers.

It is important to stay away from the big names like these as there is little innovation and plenty of flaws. Some of these flaws may be performance alone and others are security flaws.

Some of the lesser known programs are often times a good alternative. With these, it’s always good to look at any recent vulnerabilities or complaints users have had.

Some protection systems have deleted files or overwritten system files in the past. Research is important for these situations. That said, common free programs, such as AVG and Avast, are found on millions of systems.

Keep in mind, most free protection softwares have one catch or another. Spam-like interfaces that constantly ask for purchase or the requirement for manual scanning are the most common culprits. If you are able to stay on top of things, these can work out well enough.

Unfortunately, most users are unable to due to the workload given to them. Protection ends up being an afterthought; one that can cost a lot more than the software itself. There is one nearly foolproof way to get rid of these worries for good: allowing professionals to take care of your protection.

Tech Experts is able to supply a managed anti-virus that is inexpensive, well-reviewed, and kept up-to-date with the latest virus definitions. We are able to install it in both home and business environments.

With that in mind, it’s an easy choice when picking what you want to shield you from the dangers of the digital world.

Is It Ever A Good Idea To Share Your Password?

August 15, 2016

Luke Gruden is a help desk technician for Tech Experts.

There are times when it can be tempting to share account information or give a coworker access to files and programs to streamline processes. Other times, you might be away from the office and someone may need something on your Windows.

There are many reasons why workers would want to share accounts and passwords that would be in good faith and, on the surface, best for business. Should this be allowed and acceptable in a work setting? The short answer is no, and for several good reasons.

As much as it would seem that sharing passwords and credential information could help workers, this can lead to poor habits and huge security vulnerabilities. All it takes is for one person to write a password down for another person to read it.

It is common for someone using social engineering to go into company buildings and look for sticky notes, note pads, or files on desktops with passwords and account information on them. This way, they have the means to steal company information.
Even worse, it will look like the user account that was used to steal information was the one stealing information instead of the thief.

Another common event at some work places is that some workers will use their coworkers account to do something risky, so if anything happens, the account holder is the one in trouble and not the person borrowing their account.

backupWhen it comes down to the pressures of keeping a job or to work towards promotions, it can be surprising what some people might resort to in achieving their goals.

Sometimes, a person sharing an account might make a mistake and mean no harm, like deleting some important files on accident or click something they didn’t know about in an area of the computer they normally do not have access to.
This would also look like the account holder made the mistakes and not the actual person. There is a reason why certain people have access to certain drives, websites, and programs. Permissions and restrictions should be respected.

Your Windows account and email are your unique fingerprints and they should be protected. Everything you do on a computer is recorded in event logs and possibly on other monitoring systems on the network. Your account information should serve you as well as prove the work you have done.

It may be tempting to share account information, but there are alternatives. If a coworker needs access to a program or website, let IT know.

If the coworker really needs access for their job, then your manager and IT will change permissions to allow them access and they’ll no longer have to ask for your password.

What about if they need to work on files that you are working on? Your IT can setup a network drive and enable access for both you and your coworker so that files can be edited and changed freely without ever logging into each other’s accounts.

There may be many other reasons as to why people may want to share their account information, but chances are, there are alternatives that your IT can implement so that no one’s personal credentials are given out. Keep your account your own and there will be no unnecessary risk or possible security threat out in the open. If you have security or user concerns or would like to develop a permissions plan, we would be happy to help. Give us a call at (734) 457-5000.

(Image Source: iCLIPART)

Guest WiFi: Improves Security And Customer Satisfaction

August 15, 2016

Mike Simonelli is a network technician for Tech Experts.

One of the first things I look for when I enter any establishment is the WiFi network. My laptop needs it. My phone needs it. I need it. It comes as a shock to me in the rare circumstance that I can’t find one or, worse yet, when I do find one but I am denied the network password.

Usually when this happens, I am there as a consumer. This annoyance is even more frustrating for people that are visiting for business such as vendors, consultants, and clientele.

Such people rely on Internet access to communicate with their own offices via e-mail and instant messaging or remote access to product databases and other information.

These frustrations can be avoided by the addition of a guest WiFi network and can even benefit your own existing WiFi network. Adding a guest network to an existing WiFi infrastructure can be a cost effective way to improve the overall security and privacy of your network.

wifiSegregating your network will keep your workstations, servers, printers, and other network devices secure while keeping your clients, vendors, and other guests off your main network. Allowing visitors unrestricted access to your company’s primary WiFi network can be a costly mistake. These unmanaged mobile devices can carry all types of sophisticated malware, trojans, viruses, and network probes, just waiting for a chance to attack your network.

Keeping these devices segregated to their own guest network will, at the least, add a layer of protection to your own equipment.

Not only will a guest network keep visitors off your primary WiFi, but it will also keep you from having to give out your primary network’s password to a multitude of strangers. A complex, never changing password can be used for your employees, while a short and simple password can be given out to guests upon arrival, and then changed frequently.

In addition, you can configure your equipment to only broadcast the network ID of your guest network and keep your primary network ID a secret, adding an additional layer of security.

Finally, some of the higher-end WiFi access points and routers will allow you to limit the amount of bandwidth that is allocated to your guest network or control the type of traffic that is allowed to pass through it. Doing so will prevent your visitors from inadvertently bringing your network to a halt with bandwidth-hogging traffic such as streaming video and torrent downloads.

If your business is already allowing visitors access to the primary WiFi network, then there is simply no downside to configuring a second WiFi network for guests, especially if your wireless hardware already supports the option.

Doing so will make your network more secure by allowing you to keep the network IDs and passwords a secret, as well as make it easier for your visitors to connect. Once connected, your guests can then be limited as to how much of your resources they can use, ensuring that your normal business operations aren’t interrupted.

If you have any questions about WiFi permissions or how you can increase both security and customer satisfaction in one go, contact us today by calling (734) 457-5000.

(Image Source: iCLIPART)

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2026 Issues
  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Hackers Aren’t Hacking – They’re Just Logging In

February 17, 2026

The “Deepfake CEO” Scam: Voice Cloning Is The Next Cyber Threat

February 17, 2026

Why “It Hasn’t Happened To Us (Yet!)” Is The Most Expensive IT Strategy

February 17, 2026

You Absolutely Need To Back Up Your Cloud Services Like Office 365

January 20, 2026

Tags

AI Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2026 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.