• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Small Businesses Experience Increase In DDOS Attacks

March 8, 2016

Some readers may already be wondering, “What exactly is DDoS and why should I worry about it?” DDoS stands for Distributed Denial of Service – and a DDoS attack is when a person (or group) acts maliciously and uses a program which has a sole purpose of flooding a server with traffic.

Why would someone do this? There are many reasons one would execute this devastating attack. For instance, you run a news website. You publish an article that this person doesn’t agree with. They, in turn, run their malicious program. It sends thousands upon thousands of page requests (unique requests to open the website), which causes more traffic than your server can handle.

Your server crashes from the load and no one is able to view your site. Of course, this could be one reason among an infinite amount. For whatever evil agenda they have, it does not fare well for those on the affected side.

In 2015 alone, there were some 50,146 attacks that were detected – averaging 137 per day and 5 per hour (Newswire, 2016).

While these attacks may not make national news or headlines, the IT world is paying close attention. With more devices and easier programs to use, almost anyone could be on the bad side of the cyber war.

One of the more recent attacks that happened was on New Year’s Eve. A group calling themselves New World Hacking took down BBC’s global site and Donald Trump’s site. Another big attack was aimed at a big part of the Internet itself. Namely, the 13 DNS servers on the backbone of the Internet.

These servers are important because they translate the words we use (such as website addresses) into the numerical equivalent that the machines understand. There were two separate attempts, one being 160 minutes long and another lasting about an hour. It caused three of the DNS servers to go offline for a couple hours or so, which is enough to cause a lot of slowness issues or DNS errors on a lot of people’s screens.

What can be done to help mitigate this issue? There are a few things. You definitely should have an IT department or IT security group who is able to handle this. Bigger corporations especially should be keeping up with threat trends and keeping their firewalls and security prevention up to date and active.

Now, say you’re a small to medium size business and you have no security on your network. It would be a good idea to have an IT service provider such as Tech Experts to help with your IT and security needs. These days, especially in recent years, it’s not a good idea to just pay your cousin under the table to install a router and call it good.

If you can’t afford to have anything happen to your data or to be down for a day or more, hire a professional. We can set you up with a network designed with your needs and security in mind.

Easy Spring Cleaning Steps For Your Computer

March 8, 2016

Just as it’s a good idea to periodically clean out closets and other areas of your home as part of spring cleaning, your computer needs decluttering attention as well.

This not only makes it easier for you to find files when you need them, but can also speed up the computer performance.

Check for viruses
If you do not have an antivirus installed and set to regularly check your system, make it your first priority to install an antivirus.

Not all viruses put out obvious signals like the blue screen of death; some can lurk in the background, slowing down your computer’s operations or running malware without your knowledge.

Use a disk cleaner
Disk cleaners scour your system looking for files you don’t use, particularly useless temporary ones. Such files won’t impact how your programs work, and they just take up valuable space and can even make your computer run slower than it should.

Organize your files
If you have long lists of files, try grouping them into folders. This will save you a lot of time when looking for something in particular and also makes your storage more aesthetically pleasing.

Toss unnecessary programs
You’ve likely tested out programs and decided they weren’t for you or even grown tired of them. There’s no reason to keep them. Go into your Control Panel and select Programs to see everything that’s on your computer.

Uninstall the ones you can readily identify as ones you no longer want or need, and leave the ones you don’t recognize alone in case they are important. Check and uninstall any web toolbars, too.

Delete your web history and cookies
Over time, all the little data records of where you’ve been while surfing the web accrue, and can greatly slow the functioning of your computer.

Deleting your web history, including cookies, is something you should not be doing just during spring cleaning, but on a regular basis to keep your computer operating at optimum speed.

Severe Security Vulnerabilities Patched By Microsoft

March 8, 2016

Early last month, Microsoft released 13 security patches as part of Patch Tuesday.

While such security measures are usual, this one was particularly important because six of those patches were categorized as critical and require user attention to be put into place.

These six patches addressed programming flaws that had the potential to give cyber-attackers the means to gain full user rights in a wide array of Microsoft’s software programs. The remaining seven patches address the elevation of privileges, denial of service, and ways to bypass security features.

The programs that were at risk from these flaws included all supported versions of Microsoft Windows, the new Edge browser, Internet Explorer, Microsoft Office (including Services and Web Apps), Microsoft Server Software, Adobe Flash Player, and Microsoft .NET Framework.

According to Microsoft, these flaws were detected before any actual security breaches stemming from these issues actually occurred.

If they had not been discovered, cybercriminals may have been able to gain user rights to Microsoft programs via specially crafted websites from remote locations.

Microsoft strongly urges Windows Vista and later operating system users to ensure the latest updates have been installed, especially if they do not have their systems set for Automatic Updates.

VoIP Is The Ultimate Solution For Small Biz Phone Woes

February 15, 2016

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

One major technology pain point small businesses have revolves around communications. If your clients and prospects can’t effectively reach your staff, customer support and productivity is weakened. Increasingly, small businesses need more out of their phone system, and VoIP solutions offer more features with less expenses.

Voice over Internet Protocol (VoIP) is, essentially, phone calls in the cloud. Voice signals are converted to packets that are sent across the Internet and reassembled in the correct order when they reach their destination. VoIP services can be deployed over the Internet or private IP networks (LAN/WLAN).

Why should your business invest in a powerful VoIP solution? There are several reasons, but the most important one is that it’s a huge opportunity to save on your business’s operating expenses. VoIP services can save a small business hundreds of dollars per month on their phone service costs. [Read more…] about VoIP Is The Ultimate Solution For Small Biz Phone Woes

Should You Leave Your PC On Or Power It Down?

February 15, 2016

Michael Menor is Vice President of Support Services for Tech Experts.

At the end of the workday, you’ve got an important decision to make: power down your desktop or log off? Each option has its own set of pros and cons, but are you confident that you’re making the right decision? Here’s how to find out for sure.

First off, the answer to this question is dependent upon how frequently the machine is used. For the sake of this article, let’s address the computing needs of the average office worker who uses their PC for the Monday through Friday, 9-to-5 grind.

Secondly, we feel the need to address a common perception about turning a computer on and off: it does NOT cause physical harm to the equipment.

This was the case in the early days of the PC, back when the power surge from powering it on was actually bad for the components, but this issue has been resolved since 1993.

Another factor to consider is power consumption. If you’re the kind of person that likes to make sure every light is turned off before going home and you pride yourself in finding ways to lower your electricity bill, then you may want to power down your machine for the night.

Although, if you’re looking to leave it on in order to get a jump start on your workday, then put your PC in sleep mode (a.k.a Standby or Hibernate) before leaving the office, instead of turning it off.

Sleep mode is designed to use as little energy as possible, which equates to less than what’s used by a traditional light bulb.

Your geographical location should also factor into this decision.

For example, if you live in a place that’s prone to natural disasters and the power grid sporadically has blackouts, then you’re going to want to power off your machine at the end of the workday.

Unless your IT infrastructure is equipped to handle power inconsistencies with tools like an Uninterrupted Power Supply, a powered-on computer can be damaged by a sudden loss of power.

Also, as explained by Computer Hope, while turning off a PC can protect from a sudden loss of power, turning it off does nothing to prevent damage from a power surge: “A power surge destroys electrical devices regardless if it is on or off. Therefore, turning the computer off does not prevent this from occurring. The only way to prevent power surges is to unplug all power cables, phone cables, and network cables.”

Another factor that you’ll want to consider is your computer’s maintenance schedule. For example, it’s best practice to run a daily virus scan at night so that the scan doesn’t interfere with your work during the day.

Also, if you’re taking advantage of managed IT services like the services that Tech Experts provides, then you’ll want to leave your desktop powered on so that we can remote into it (or all of them) and run scans, perform routine maintenance, apply patches and updates, and more. If the machine is powered down, then we won’t be able to access it and do our job.

After considering all of these different factors, only you can know if it’s best to turn off your PC at the end of the day or keep it on.

Time To “Bite the Bullet” And Upgrade Your Software

February 15, 2016

From the largest of the large companies to the everyday home user, there comes time when you have to upgrade your software, either by force or necessity.

No one wants to spend money to upgrade their software when they feel it still works and functions for their needs, but truthfully, that old reliable software needs to go.

The most important thing to remember is that software companies don’t end support of their software out of malice. It’s simply a business decision.

For a company to continue to release updates and patch security exploits, it would require countless man hours from software engineers, support staff and help desk personnel.

At the same time, they would be continuing to support software that is outdated in functionality and design. No company can survive in today’s fast-paced world by sitting idle.

By not upgrading your software, you are – by your own means – opening yourself and your company up to cyber-attacks from hackers taking advantage of the security exploits that are no longer being patched. This is the single most important reason to upgrade your outdated, End of Life (EOL) software.

While software companies do release new versions of their software and EOL old versions of their own accord, there are times when they too are forced to make changes due to upgrades in an Operating System (OS).

Consider Windows 98, which was the typical OS for several years and boosted a huge selection of software titles ranging from games to business productivity applications.

But when the following Windows releases came along (like XP, 7, 8, and 10) and grew in popularity, any software company that wanted to continue to stay unburied had come up with new versions of their software that would be compatible with each of the new OS platforms.

This, in turn, would force people to upgrade if they wanted to continue to use their software.

Businesses that use programs like Microsoft Office could feel like they are forced into upgrades. This is understandable, but at the same time, you have to make sure your business stays productive and secure.

With hackers waiting for the opportunity to gain access to your business, it’s imperative to make sure you do everything you can to block the attacks. And, yes, this includes upgrading your operating system and software.

There is light at the end of tunnel, however. Companies like Microsoft and Adobe have redesigned the way they sell their software.

No longer will you be locked into one version, whether you purchase the software by the retail copy or by volume license.

They offer plans that allow you subscribe to use the software and during your subscription period you are entitled to receive free version upgrades if there any. They have released subscription plans for large companies, students, and everyday home users.

Remember: it’s better to “bite the bullet” than be struck by the bullet. For assistance with software upgrades or ask questions about the security of your business and software, contact us at (734) 457-5000, or email us at info@mytechexperts.com.

How To Create A Windows 10 Recovery Drive

February 15, 2016

Since most Windows 10 users obtained their version of the latest Microsoft operating system as an upgrade from a previous version, there isn’t a built-in recovery system if your PC or other device is disabled.

You would have to revert to that previous operating system and re-download Windows 10. Unfortunately, if that occurs past Windows 10’s first year on the market, that download won’t be free.

To potentially save some money down the line and a significant hassle, it is a good idea to create your own Windows 10 recovery drive to re-install the operating system in the case of a system disaster.

A simple way to do this if you upgraded via the media creation tool is to use that same tool to create a recovery drive on removable media, such as a disc or USB flash drive.

To do this, run the tool, click whether you have a 64-bit or 32-bit system, and choose ‘Create installation media for another PC’ from the available options. This directs you to a screen asking what language you prefer and which version of Windows 10 you currently use. Make the appropriate selections, and you will be walked step-by-step through the rest of the process.

Another method to create a Windows 10 recovery drive is to use the Recovery Options within the Control Panel.

With previous versions of Windows, this feature was a tad easier to locate, but it still lurks in the background for you to find. From the Start menu, you can open Settings and then type Recovery in the top right dialogue box to reveal an option to ‘Create a Recovery Drive’ before following the steps to complete the action. Alternatively, you can just type Recovery Drive into Cortana’s search field on the bottom left of your screen.

With either method, choose to back up your system files, and you will be directed to insert your media after a short wait for a systems check.

You will need at least 4GB of space on your disc or USB drive, and bear in mind that any other information already on it will be erased with the addition of the Windows 10 recovery drive.

This process will take a while, but you are able to continue working as your device copies everything onto your removable media.

Older Internet Explorer No Longer Supported

February 15, 2016

Microsoft recently made the announcement that it will no longer offer support for Internet Explorer versions prior to Explorer 11.

It is also only through Explorer 11 that users can receive updates for the following operating systems: Windows 7, Windows 8.1, and Windows 10. While this does not prevent users from continuing to turn to Internet Explorer for their browsing needs, it does serve as a call to action for optimum usability and security while surfing the web.

Without up-to-date security patches, devices are at risk of malware and other forms of malicious attacks.

In addition to such security risks, users who continue to use unsupported versions of Explorer may lose Independent Software Vendor (ISV) support or encounter compliance issues.

The company also outlined how Explorer users can update to the latest version, at no extra charge. People who use Internet Explorer (IE) can be roughly divided into three categories: Enterprise users, small to medium businesses, and home PC users. Each groups has a slightly different means to upgrade to Explorer 11; however, their experience should be hassle free.

Albeit, some small-to-medium business owners have expressed concerns about their line-of-business (LOB) application having a dependency on a particular Explorer version. Microsoft has addressed this concern by integrating an Enterprise Mode into Explorer 11 that allows backward compatibility with web applications specifically designed for previous versions of Explorer.

Smaller businesses, whose software does not depend on previous IE versions, can upgrade through Automatic Updates or contact a Certified Microsoft Partner like Tech Experts for assistance.

Home PC users could see an automatic upgrade to Explorer 11 via Automatic Updates.

Still, if the home PC upgrades are set to ‘off’, updates to Explorer 11 will have to be done manually through the Control Panel and the Check for Updates button under the Windows Update tab.

My Predictions For The Top Security Threats Of 2016

January 15, 2016

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

The year 2015 certainly saw its share of unusual technological security breaches, ranging from the Ashley Madison hack to controlling Jeeps from afar.

With the ever-growing breadth of technology services and gadgets, the opportunities to exploit them grows as well.

These are my predictions for the top security threats for the coming year:

Cloud Services
While cloud services solve countless storage and file-sharing issues for businesses, they also amass huge amounts of sensitive information in a single spot. We expect to see hackers try to sneak past the security measures in place on these services to hit paydirt on business data.
[Read more…] about My Predictions For The Top Security Threats Of 2016

Don’t Pay A Ransom To Get Your Data Back

January 15, 2016

Michael Menor is Vice President of Support Services for Tech Experts.

Requesting a ransom from victims is an unfortunate trend gaining momentum in the hacking world. This is typically done using ransomware (where hackers encrypt data and request money for the key) and distributed denial of service attacks (where hackers threaten to overwhelm a system with traffic, thus knocking it offline).

In both scenarios, hackers are looking for the victim to pay up…or else. Should they?

The answer should be obvious: absolutely not.

However, when a person’s valuable data becomes encrypted or they receive a legitimate threat to take down their servers, emotions often get in the way and they’ll end up “paying the piper.” Hackers know this, which is why their ransom methods employ fear tactics.

For example, ransomware like CryptoLocker will lock the user out of their computer while the screen displays a countdown to when their data will be deleted.

With DDoS attacks, a hacker may contact the victim mid-attack and promise to cease the attack for a fee. Both of these situations play straight into a person’s irrational fear, causing them to cough up cash.

Before reaching for your credit card to pay a hacker’s demands… stop, take a deep breath, and think objectively about the situation.

What guarantee do you have that these hackers will actually make good on their promise to turn over your data or cease the attack?

This guarantee is only as good as a hacker’s word, which is pretty worthless seeing as they’re, you know, criminals. Therefore, whatever you do, DON’T GIVE MONEY TO A HACKER!

By paying hackers money, you’ll only add fuel to the fire and help fund the spread of their devious acts.

Plus, there are several reported cases where a victim pays the ransom, only to still have their data deleted or the attacks on their site continue.

What’s it to them if they go ahead and follow through with the attack? They have your money, so who cares? It’s a classic case of adding insult to injury.

Need proof? There’s a recent example of this happening to ProtonMail, a Switzerland-based email encryption service.

On November 3rd, ProtonMail was threatened with a DDoS attack by the hacking group Armada Collective.

Like many companies would do, they ignored the threat, deeming it to not be credible. Soon afterward, their servers became overloaded to the point where they had to cease operations. After paying the ransom, the hackers continued the attack.

Now, consider your own situation. How much would it cost your company if you lost revenue for a full day of work, and you still had to make payroll?

For a medium-to-large sized company, losing a full day’s work would likely come to much more than a few thousand dollars. In fact, hackers understand how downtime can be so costly, which is why they feel justified asking for such an exorbitant fee.

What are you supposed to do if you were asked to pay a ransom by a hacker? The first thing you’ll want to do is contact the IT professionals at Tech Experts. We’re able to take an assessment of the attack to determine how bad it is and restore your data to a backed up version that’s not infected with malware.

When facing a hack attack, we can present you with all the options you can take – none of which will include paying a hacker money.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Could Social Engineering Bring Down Your Business?

August 25, 2025

Don’t Let Outdated Tech Slow You Down: Build A Smart IT Refresh Plan

August 25, 2025

Biometrics Are the New Password – But What Happens If Yours Gets Stolen?

August 25, 2025

The Clock Is Ticking: Preparing Your Business For Windows 10 End-of-Life

July 22, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.