• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

My Predictions For The Top Security Threats Of 2016

January 15, 2016

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

The year 2015 certainly saw its share of unusual technological security breaches, ranging from the Ashley Madison hack to controlling Jeeps from afar.

With the ever-growing breadth of technology services and gadgets, the opportunities to exploit them grows as well.

These are my predictions for the top security threats for the coming year:

Cloud Services
While cloud services solve countless storage and file-sharing issues for businesses, they also amass huge amounts of sensitive information in a single spot. We expect to see hackers try to sneak past the security measures in place on these services to hit paydirt on business data.
[Read more…] about My Predictions For The Top Security Threats Of 2016

Don’t Pay A Ransom To Get Your Data Back

January 15, 2016

Michael Menor is Vice President of Support Services for Tech Experts.

Requesting a ransom from victims is an unfortunate trend gaining momentum in the hacking world. This is typically done using ransomware (where hackers encrypt data and request money for the key) and distributed denial of service attacks (where hackers threaten to overwhelm a system with traffic, thus knocking it offline).

In both scenarios, hackers are looking for the victim to pay up…or else. Should they?

The answer should be obvious: absolutely not.

However, when a person’s valuable data becomes encrypted or they receive a legitimate threat to take down their servers, emotions often get in the way and they’ll end up “paying the piper.” Hackers know this, which is why their ransom methods employ fear tactics.

For example, ransomware like CryptoLocker will lock the user out of their computer while the screen displays a countdown to when their data will be deleted.

With DDoS attacks, a hacker may contact the victim mid-attack and promise to cease the attack for a fee. Both of these situations play straight into a person’s irrational fear, causing them to cough up cash.

Before reaching for your credit card to pay a hacker’s demands… stop, take a deep breath, and think objectively about the situation.

What guarantee do you have that these hackers will actually make good on their promise to turn over your data or cease the attack?

This guarantee is only as good as a hacker’s word, which is pretty worthless seeing as they’re, you know, criminals. Therefore, whatever you do, DON’T GIVE MONEY TO A HACKER!

By paying hackers money, you’ll only add fuel to the fire and help fund the spread of their devious acts.

Plus, there are several reported cases where a victim pays the ransom, only to still have their data deleted or the attacks on their site continue.

What’s it to them if they go ahead and follow through with the attack? They have your money, so who cares? It’s a classic case of adding insult to injury.

Need proof? There’s a recent example of this happening to ProtonMail, a Switzerland-based email encryption service.

On November 3rd, ProtonMail was threatened with a DDoS attack by the hacking group Armada Collective.

Like many companies would do, they ignored the threat, deeming it to not be credible. Soon afterward, their servers became overloaded to the point where they had to cease operations. After paying the ransom, the hackers continued the attack.

Now, consider your own situation. How much would it cost your company if you lost revenue for a full day of work, and you still had to make payroll?

For a medium-to-large sized company, losing a full day’s work would likely come to much more than a few thousand dollars. In fact, hackers understand how downtime can be so costly, which is why they feel justified asking for such an exorbitant fee.

What are you supposed to do if you were asked to pay a ransom by a hacker? The first thing you’ll want to do is contact the IT professionals at Tech Experts. We’re able to take an assessment of the attack to determine how bad it is and restore your data to a backed up version that’s not infected with malware.

When facing a hack attack, we can present you with all the options you can take – none of which will include paying a hacker money.

Yes, You Can Still Get Infected – Even With Anti-Virus

January 15, 2016

Scott Blake is a Senior Network Engineer with Tech Experts.

With the sudden release of a new variants of malware and ransomware such as CryptoWall, users are wondering why their anti-virus programs are not blocking the ransomware infection from infecting their computer.

As with many other forms of malware, the infection needs to exist before a cure or way to detect the threat can be created. This takes time and during this period of R&D, the malware spreads like wildfire.

While there are several forms and classifications of infections, there are basically only two different methods in which infections are released into your system: User Initiated and Self Extraction.

User Initiated infections are caused by a user clicking on a link within a webpage or email or by opening infected email attachment. Once opened, the malware is released and quickly spreads throughout your system.

Because the user manually clicked on or opened the link/document, most anti-virus programs receive this as an authorized override by the user and either internally whitelists the link/document or skips the scan.

CryptoWall is spread through this method, usually contained within an infected Word, Excel or PDF document. The creators of these programs take advantage of the programming of the document to hide the infection.

With the world becoming a paperless society, we are becoming more and more accepting of receiving and opening attachments sent to us through email. It has practically become second nature to just click and open anything we receive, regardless of any warning.

Self-Extracting infections are exactly what they’re named. These infections require no outside assistance to worm their way through your system, infecting as they go.

The number one method creators of this form use to place their software on your system is through “piggy back” downloads.

Red button on a dirty old panel, selective focus - virus

Piggy back downloads occur when you authorize the download and install of one program and other programs (related or unrelated to the original program) are automatically downloaded and installed with it. The most common way is by downloading programs promising to speed up your computer.

Infections can also exist on your system and lay dormant for long periods of time, waiting for the computer to reach a certain calendar day or time. These infections are called “time bomb” infections. Just like piggy back infections, they require no outside assistance to infect your system.

They are mostly found buried in the registry of the system or deep within the system folders. Because they are not active on the time of placement, most anti-virus programs will not detect them. Active reporting through toolbars is another means of becoming infected over time.

When a user downloads and installs a toolbar for their browser, they authorize at the time of install that it is okay to install and all of its actions are safe. However, most toolbars are actively scanning, recording, and reporting back to the creator. They also act have conduits for installations of other unwanted programs behind the scene.

If left unchecked, those additional programs can become gateways for hackers to gain access to your system and spread even more infections.

To help stop the spread of malware/ransomware such as CryptoWall and its variants, we need to become more vigilant in our actions when either surfing the Internet or opening email and attachments.

The best rule of thumb to follow for email is: if you don’t know the sender, or you didn’t ask for the attachment, delete it. As for websites, read carefully before you download anything and avoid adding toolbars.

How to Up Your PowerPoint Game

January 15, 2016

Back when PowerPoint first came out, it didn’t take a lot of finesse to create something visually appealing and exciting. Now, however, PowerPoint and its similar counterparts like Keynote and Prezi, are old hats. It is no longer sufficient to add some generic photos and bullet points that outline your speech to grab your viewers’ attention.

In fact, such uninspiring presentations have led to the coinage of the phrase “death by PowerPoint” to describe PowerPoint strategies that fall flat and leave those forced to watch them on the verge of sleep.

Presentation slide templates for your business with infographics and diagram set
Presentation slide templates for your business with infographics and diagram set

Here are a few things to keep in mind when crafting your next presentation:

• Avoid the following kiss-of-death PowerPoint photo types. Some images have been overused to the point of having little to no meaning. This, consequently, leaves viewers bored because the photos add nothing to the material covered in the presentations. Archery targets, cogs, business people preparing to race or grouped around a monitor, jigsaw pieces, hand gestures, and globes are among these types of images.

• Instead, think outside of the box when choosing photos for your PowerPoint presentations. For example, pass over an image of a handshake to represent a partnership and choose something more untraditional like cheese and crackers or a needle and thread.

• Don’t hesitate to use some of Microsoft’s newly released tools to showcase your images. For example, you can create animations using Morph or try things like frames or transparencies. However, when using such tools and enhancements, make sure they fit the overall theme and feel of your presentation.

As such, your extras will be a seamless part of your PowerPoint and not stick out like a sore thumb.

• Most importantly, focus on the content of your PowerPoint presentation. That is, after all, the purpose – to inform and effectively convey ideas. Your photos are meant to complement your content, not overshadow it.

How to Cut Down Your Mobile Data Usage

January 15, 2016

With unlimited mobile data plans being few and far between, it is imperative to monitor and manage your data usage to prevent outrageously high cellular bills. Even if you have an unlimited plan grandfathered into your service, there are other benefits to cutting down your mobile data usage, including increased battery life on your device and faster service in general. Try these tips to keep your data usage at a minimum:

• Track your usage. It’s impossible to set a usage goal or identify problems without knowing how much data you use and how you use it. Within the settings of your smartphone, you can easily find how much data you’ve used in a billing period and even set warnings for when you approach your data limits.

• Identify what applications use the most data. This can also be done within your smartphone’s settings where you can see app usage at a glance and can also set warnings or cut-off limits at this level. After assessing how much data each application uses, you may even want to delete the most data-hungry ones.

• Take advantage of free WiFi. A wide array of businesses offer free wireless Internet service as a perk to customers, so don’t pass up the opportunity to get your high-usage needs met at no expense to you. You can even configure your settings where applications only update when WiFi is available.

• Put the stymie on streaming music and video. While you may like to show your friends the latest footage off of YouTube or listen to your playlists while on a run, these activities come with a high data usage price tag. Try waiting to view videos until WiFi is available and make your playlists available offline to listen to them at will without any costly data usage.

Just by implementing these simply usage-reducing and awareness strategies, you can greatly decrease your cellular data bill and the workload on your smartphone device. This is a win-win no matter how you look at it.

Four Tips For Next Year’s IT Budget

December 21, 2015

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

As the year winds down, you’re undoubtedly working out plans for 2016, and preparing your IT budget is top on that list. Every year presents unique network, server, and technology challenges that need to be addressed.

The increasing ubiquity of cloud services is something small business owners need to consider, but working out the basic budget items should take priority. Here are four tips to give your business a little bit of breathing room when it comes to planning next year’s IT expenses.

Think in the long term
When planning your IT budget, it’s important to consider both short-term and long-term investments that you’ll be making for the sake of your business.

[Read more…] about Four Tips For Next Year’s IT Budget

A Few Reasons Why Desktops Are Better

December 21, 2015

Michael Menor is Vice President of Support Services for Tech Experts.

With all this talk about mobile devices like tablets, smart phones, and ultra-portable laptops, you’d begin to think that traditional desktop PCs are going to seem archaic.

Depending on your needs, that can be the case, but desktops aren’t going away anytime soon – and for good reason.

More Powerful Hardware
This has been the case from the very beginning – desktop PCs are capable of more powerful hardware.

Desktops don’t need to worry about electricity consumption the same way portable devices do and components don’t need to be shrunk down into a tiny lap-sized chassis.

This also allows better heat dispersion. All three factors give desktops the flexibility to utilize the most complex, cutting edge components that aren’t designed for mobility (yet).

In other words, computer hardware manufacturers build new components, then work on shrinking those components into mobile sizes.

This reason alone will keep the desktop alive – PC gamers, graphic artists, and multimedia buffs will always want high-end desktops.

Cost Effectiveness
Of course, you don’t need the newest, cutting edge components to have a blazing-fast PC. You can easily get by with cheaper, previous generation components.

Remember a decade ago when a desktop PC could cost thousands of dollars? It’s still possible (and easy for some) to spec out a high-end PC with that kind of price tag, but each additional dollar spent isn’t worth it unless you have VERY specific needs.

Also, comparable hardware for a PC is significantly cheaper than similar laptop hardware. If you don’t need the mobility, you can save a pretty decent chunk of money just by sticking with a desktop.

Desktops are Easier to Fix and Maintain
Let’s share a real-world tech scenario. Replacing a part on a desktop is a pretty simple task for a technician. In fact, with a little hand-holding, almost anybody could figure it out. Replacing the motherboard on a laptop, however, is an extremely cumbersome process. Depending on the model, it can involve over two dozen screws and a lot of time.

Replacement parts aren’t as affordable as they are for desktops either. For smart phones and tablets, expect to ship those out to the manufacturer.

You Probably Won’t Leave your Desktop at the Airport/Coffee Shop/Hotel
It’s true! If you are lugging around a big PC case, a monitor or two, a keyboard, mouse, and power cables, it’s pretty likely you won’t accidentally forget it when you realize how light your luggage has become.

All joking aside, because your desktop lives a pretty uneventful life without much movement, it doesn’t endure the little bumps, drops, and spills that laptops, tablets and other mobile devices take.

It’s harder to steal too, so there is a little essence of security knowing your data is locked inside a great big aluminum box tethered to your desk with a web of cables.

Have you moved on from the desktop PC completely or are you still holding on? Do you even want to go strictly mobile? Let us know and let us answer any questions you have.

Replacement Equipment And Workstation Data Storage

December 21, 2015

Scott Blake is a Senior Network Engineer with Tech Experts.

Have you ever found yourself in the middle of a huge project or in the height of your busy season, then suddenly, a key piece of equipment breaks? You have orders that need processed. Deadlines to meet. Stress starts to roll in. You start to wonder how long the downtime is going to last or what this is going to cost your business.

One way to reduce the stress levels and temporarily resolve the situation is to maintain a stock of replacement workstations and essential equipment.

Being able to switch out a workstation or any other critical piece of equipment and be back up and running sooner not only reduces stress levels, but also saves your business countless dollars in lost revenue.

Example: your company designs and prints graphics for billboards. An employee says their workstation has crashed while they were working on a project for your largest client that’s due in two days. What do you do?

You try to contact the manufacturer of the workstation, only to find out your warranty does not cover on-site service and the soonest they could be on location is in two to four days. That’s not the answer you wanted to hear.

If you had a replacement workstation on hand, you could reduce your downtime dramatically. But let’s say you do have one. So you switch out the workstations and your employees is back to work…

Until they realize all of their work is stored on the crashed workstation. Stress levels start to climb once again.

One easy way to avoid losing data would be to migrate the user’s data to a storage device located on your network. Network attached storage is much more reliable than the storage within your workstation. They can also be configured for redundancy.

This entire migration will be transparent to the user as the workstations libraries will still remain intact, just relocated to a different device. As far as the user is concerned, all of their data is saved to the workstation.

The general rule of thumb is to maintain a 10% replacement stock level of workstations or essential pieces of equipment (and always have at least 1). Replacement switches, as well as firewalls, should always be on hand or able to be purchased locally. Being able to replace a switch or firewall to bring your VOIP phone system back online or restore network connectivity to your entire business in minutes is critical.

If your business is unable to maintain replacement inventory, make sure you have (and fully understand) support contracts either from equipment manufacturers or from a local network support company.

Depending on the manufacturer or support company, support contracts can range from 24×7 to 8×5 to “whenever we can get there.” That’s why it’s very important to understand your support agreements. Never get taken by surprise.

Manufactures, depending on the piece of equipment, will offer warranties or support contracts. Be warned the contract may not include next day equipment replacement, data recovery, or installation of the equipment.

They may be able to offer remote assistance, but in most cases, you end up in a long call that does nothing to resolve your issue.

The best option, if available to your business, is to have a managed service plan with a local network support company. Most local support companies will offer same day service including weekends.

Local service companies can act as your business IT support department and/or work with your existing IT department to maintain your business equipment and resolve any issues that arise.

Most local service companies will have replacement equipment and repair parts on hand, thus reducing downtime.

A local service company will also be able to assist your business in less stressful times by offering remote support services and preventive maintenance visits to spot any potential issues before they become larger problems.

They will also work to ensure your business’ network is safe and secure and offer suggestions for upgrades to your infrastructure.

While no one can predict when a workstation may go down or a firewall will fail, the best thing you can do is be prepared.

Maintaining Workstation Data Protection

December 21, 2015

Making sure your workstation’s data is backed up and ready for deployment in the case of workstation failure is vital to any business. Once the workstation has been replaced or repaired, it’s key your employees are able to pick up right where they left off. This means restoring their data as soon as possible.

Three of the more common methods of maintaining data protection on a workstation can be deployed on business networks, as well as home user environments.

Roaming profiles are the method most commonly used in larger businesses. A roaming profile stores user data on a file server or storage device located on the network. This allows the user full access to their data no matter which workstation they log into, as long as it‘s connected to the business’ network.

The roaming profile allows the user to have a consistent desktop experience, such as appearance and preferences.

The downsides to using roaming profiles are that they can be difficult to set up and if the user has a large amount of data contained within their user account, there can be a delay when logging in. User profile folder migration is a method in which the local user data folders are moved to a file server or a secondary hard drive. To migrate your user profile folders, you first need to create new folders located on the storage device, keeping the names similar for ease of use (such as My Documents, My Pictures, etc).

Once the new folders are created, you can change the location of your user profile folders to save to the new folders. After that, all of your data files will be copied to the new location and the original folder will be removed from your local profile.

If the workstation ever needs replaced, you would repeat the process on the new workstation and all of the existing data will be available. However, if you migrate folders to a network attached device and lose network connectivity, you also lose connectivity to your folders and their data.

Simple file storage is the simplest and most common form of data protection on a workstation. This method is accomplished through either hardware or software means, such as connecting an external storage device to the workstation or using a web based file backup such as our Experts Total Backup service.

Simple file storage method is the least costly, which is why it’s often utilized by small businesses and home users. Attaching an external storage device such as a large USB flash drive or hard drive to the workstation allows the user to save the data to the device.

This method is also a way of increasing storage capacity of the workstation without having to install internal hard drives. The drives can be left connected to the workstation or removed for safe storage. Using a web based file backup is another commonly used way of backing up your data files.

Once the backup software is installed and configured, the backup process becomes fully automated. The downside to web based backup is that it’s web-based – so data restore time is based on your Internet connection speed. It can take anywhere from a couple of hours to a couple of days to restore your data depending on the amount of data that was backed up.

If you have any questions on workstation data protection or would like to implement a backup method, call us at (734) 457-5000.

What’s A Good Portable Projector Under $500?

December 21, 2015

Choose the Celluon PicoPro for a reasonably priced projector that’s easy to tote. At just seven ounces with the batteries in it, it won’t weigh you down, and it is small enough to store in your purse or carry in a shirt pocket.

It retails for $399.99, which is pretty inexpensive for a projector of its caliber, and its use of laser technology for a light source creates a good picture on virtually any surface with uniform brightness. The PicoPro is also designed to stay cool without the use of a fan, so it runs quietly enough to allow viewers to focus on the displayed media without the noise distraction.

In addition, since it is small, you can’t view stored images directly from the PicoPro. You can, however, pair it with most smartphones to see any stored media without problems. It focuses automatically, taking the guesswork out of achieving a clear picture. Although the focus is a little softer than that on other projectors, it slightly affects the readability of text-based images but isn’t noticeable otherwise.

The battery lasts two to three hours, and it can also connect via USB to your computer or plug straight into the wall when you need to recharge or conserve power. The Celluon PicoPro also comes with a carrying soft case for protection when on the go and a diminutive stand that works like a small tripod for hands-free use.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.