• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Pros And Cons Of Cloud And Physical Backup Solutions

November 24, 2015

Scott Blake is a Senior Network Engineer with Tech Experts.

When it comes to backing up data, you have two choices – you either maintain physical copies of your data or you utilize cloud services to host your data. Before you make a decision, you should look into the pros and cons of each and determine which one is a good fit for you.

Pros of Cloud-Based Services
Utilizing the cloud requires no capital investment for additional hardware or personnel to monitor and maintain your data locally.
Cloud service providers offer scalability to your data needs. No more adding additional drives or servers to maintain your data.
Data stored in the cloud is safe from any disasters that your office may have.
Your data can be accessed from any Internet connection in the world.
No maintenance of data drives. The cloud service provider takes care of everything on their end.
Cloud-based storage for your data will remove any risk of data corruption or hardware fault. This will allow you to reduce overhead by reducing the amount of IT staff personal assigned to manage and maintain your company’s data.

Cons of Cloud-Based Services
Cloud storage requires an Internet connection for uploading and downloading of data. If your connection is slow, you should expect slower uploads of data and increased access time to your data.
While almost every cloud service provider offers plans that come with data encryption, not all do. Make sure your cloud provider is securing your data.

Pros of Physical Backup
No vendors to deal with. You are in complete control of your data. You control how it’s backed up, accessed and maintained.
Data backups tend to take less time. There is no dependency on an Internet connection for backing up or accessing your data.
You are in complete control of the security process that protects your data.

Cons of Physical Backup
Localized data storage does offer the sense of control and knowing where your data is. However, that piece of mind can incur some high costs and overhead.
As the size of your data grows, so does your investment in storage media such as flash drives, external hard drives, internal hard drives and additional servers.
Physical devices will fail. It’s not “if,” but “when.” All mechanical devices will fail at some point in their life cycle. Additional IT staff will need to be put in place to monitor and maintain the physical equipment to ensure data integrity. This increases overhead.
In the event of a disaster in your business, data accessibility and recovery will be dependent on if extra steps were taken to secure physical copies of your data off-site.
Doing this will require the purchase of additional hardware and additional manpower to ensure the data is corruption-free.

Again, before deciding which method to implement, figure out which solution will work best for your business. Not every company’s backup or data storage needs are the same.

For assistance in setting up either cloud-based or local backup solutions, call the experts at Tech Experts: (734) 457-5000.

Have A Disaster Recovery Plan? Consider An Update

November 24, 2015

Much of one’s vital information may be stored digitally that its loss could be potentially devastating.

Although we all know the value of backing information up, it’s often not performed as regularly as it should be, in reality.

Think about how you and your business would cope with a natural disaster or hardware malfunction that wipes all of your precious data. Do you have a plan in place to recover it?

Chances are, you do have a recovery plan: it may be shooting your files into cloud storage or backing your data up periodically on USB drives or other external storage.

While such plans are certainly better than nothing, they may not be the current best choice for your needs.

After all, the potential threats to your data security are constantly changing and growing, and in order to protect yourself and your business files, your disaster recovery (DR) plan needs to evolve, too.

Your computer systems and hardware have also likely evolved since the last time the DR plan was created or updated. These changes can greatly impact the efficacy of your current DR plan.
Just as your software needs occasional updating, your recovery plan also needs periodic tweaking to best protect your data.

Set up a schedule to review and adjust your plan regularly, and always give it some extra care when your business undergoes a significant change. You may even consider testing your current plan to identify its strengths and weaknesses.

The important thing, however, is that your business does make updates to how you intend to deal with disaster, so those hurdles can be overcome with as little headache, downtime, and cost as possible.

Windows 10 Updates Are Now Mandatory

November 24, 2015

For those who have made the switch to Windows 10, there are some changes to how the new operating system updates are handled.

While users were previously notified of the availability of updates and were prompted to install them, these changes are now made automatically. Most Windows 10 users are likely unaware of this change because the only notification from Microsoft is a brief line in the licensing agreement that states users will “receive automatic downloads without additional notice.”

Microsoft doesn’t have any nefarious intentions (or at least we hope they don’t) by making this change; its intent seems to keep the most up-to-date version of the operating system on users’ devices.

There are, however, some potential drawbacks to having automatic updates without user knowledge. While the updates make it easier for Microsoft to keep up with changing technology, knowing its users are basically all on the same page and developers have a consistent target audience, these updates can potentially cause systems to interact differently with other hardware devices that aren’t part of the updates.

A particular printer’s driver, for instance, may lose functionality with an automatic update, and affected users would just be dumbfounded as to what happened, ultimately having to replace that hardware device.

Although Microsoft isn’t making any settings changes widely known, there is a way to configure your device to only install security updates automatically. This keeps your PC or tablet safe from the latest security threats while keeping your computer system as stable as possible.

Unfortunately, this option is not available to users running the Home version of Windows 10. Thus far, only the Enterprise Edition provides this capability, which is an important consideration for business owners.

The Three Scariest Threats To Small Business Networks

October 27, 2015

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

While spam, pop-ups, and hackers are a real threat to any small business network, there are three security measures that you should be focusing on first before you do anything else.

Worry About E-mail Attachments, Not Spam
Sure, spam is annoying and wastes your time, but the real danger with spam is in the attachments.

Viruses and worms are malicious programs that are spread primarily through cleverly disguised attachments to messages that trick you (or your employees) into opening them.

Another huge threat is phishing e-mails that trick the user by appearing to be legitimate e-mails from your bank, eBay, or other financial accounts.

Here are three things you must have in place to avoid this nightmare: [Read more…] about The Three Scariest Threats To Small Business Networks

The Benefits Of Managed IT

October 27, 2015

Michael Menor is Vice President of Support Services for Tech Experts.

It can’t be denied that cost drives business. When the technology your business relies on fails, you have to get it repaired or replaced quickly in order to keep the resulting downtime from damaging your business.

The traditional method of computer repair is much like when your car is in disrepair: when your technology isn’t working properly, your organization reacts to the problem by calling your friendly, neighborhood computer repair guy.

The technician will come to your office and try to fix the technology that is broken. When they figure out they can’t fix the problem on the spot, they will give you a quote.

The time and materials of summoning these technicians to the office will cost you money, so will the replacement technology, and most notably, the downtime you accrue.

Add that to the variable cost of fixing the malfunctioning technology… and your business has a real problem.

At Tech Experts, we offer a proactive IT support platform that utilizes remote monitoring and management software to ensure that the technology that’s attached to your network – and your network itself – is up and working properly. Additionally, our whole IT services platform is billed in one monthly payment.

If you add it up, you are saving money in every aspect of your business.

You not only remove the variable costs of keeping your IT running smoothly, but you also get proactive support that, in many cases, gives you the time to replace hardware before it fails, saving you from the doldrums of companywide downtime.

The fact is that small and medium-sized businesses (SMB) need to cut their technology support costs if they want to compete with larger organizations.

There are a myriad of benefits that come from a managed services provider like Tech Experts handling the administration and support of your technology. Besides the obvious cost savings, four other huge benefits include:

Comprehensive Support
A major speedbump SMBs have when shopping for any service that claims to help their business is the quality of that service.

For those that worry that our managed services are too good to be true, we employ certified and trustworthy technicians that are proficient in finding solutions for today’s most challenging business technology problems.

Single Point of Contact
As an alternative from having to manage several vendors, our IT service provides you with a single point of contact for all of your technology needs. Since we understand the intricacies of your network, we can get issues resolved faster.

Faster Support
Through the use of remote support that we offer to all managed clients, we can more quickly address issues you might be having.

Many problems can be solved without an on-site visit. Additionally, annoying obstacles like forgotten passwords and account lock-outs can be resolved in a few minutes when we already have account configurations on file.

HIPAA Compliance
While it may not apply to all businesses, doctors’ offices and other related medical facilities can maintain HIPAA compliance when using our services. By collaborating with us on your organization’s policies, you can avoid costly government fines in the event of a medical breach or network inspection.

Managed IT services can provide you with many other benefits. For more information about how our managed IT services can benefit your organization, call us at (734) 457-5000 today.

Beware The Fake Microsoft Cold Calls

October 27, 2015

Scott Blake is a Senior Network Engineer with Tech Experts.

The phone rings and you don’t recognize the number or name on the caller ID. You pick up anyway and the caller tells you that they work for Windows Support or Windows Service Center and they are a Microsoft Certified Technician.

They go on to say they have received log files or have determined that your computer is infected and causing corruption throughout your Windows operating system.

They ask if you’re at your computer now and, if not, to go there. Once there, they walk you through how to open your Event Viewer and show you the Administrative Events under the Custom Views folder.

They are quick to point out all of the red circles labeled “Error” are all Malware infections. They then ask you to look at the number of events listed and they go on to advise this is the total number of infections currently on your computer.

The caller then says they can clean your system of all infections, but they will need to have remote access to the computer.

At this point in the call, most people have been thoroughly convinced by the voice on the other end of the phone that their system is indeed infected and needs to be cleaned. After all, the caller knew where to look for the so-called infections and they do sound like they truly want to help.

The Microsoft “employee” will even tell you that if you don’t let them remove the infections, the “hackers” that placed the malware on your system will have complete access to all of your information.

They warn that your identity is in jeopardy of being stolen. You must give them remote access to your computer. They are your only hope and you must trust them. After all, they say they work for Microsoft.

The fact of the matter is that the caller does not work for Microsoft in any capacity. They don’t work for any of their third party vendors nor any security firm that has been retained by Microsoft.

They are in fact the “hackers” attempting to convince you to give them access to your computer to infect your system and steal your data.

If you allow them remote access, they will start to install malicious programs on your computer. They’ll copy all of your information and, in some cases, encrypt your data.

They will tell you that that the infection is too severe for a “standardized” cleaning and you will need to pay money to have them install removal programs to clean the system.

In mid-2013, NBC News Technology reporter Frank Catalano, reported on receiving one such phone call himself.

After his ordeal with the fake Microsoft, Mr. Catalano contacted the real Microsoft. He received the following reply:

“In 2010, Microsoft began receiving reports of scammers making phone calls or sending emails to people,” replied a spokesperson for Microsoft’s Digital Crimes Unit. They advised that they had referred the cases to the Federal Trade Commission.

One very important thing to remember is that Microsoft (or any of its partners) will never cold call you. They will never ask for remote assistance. They will never ask for usernames and passwords.

If you have fallen victim to such a scam, disconnect your network cable and take your computer to a trusted service center or repair facility and explain in detail what happened as soon as possible.

For questions or advice on what to do about cold call scammers, contact Tech Experts at (734) 457-5000, or by email at info@mytechexperts.com.

Should You Eject USB Drives Before Unplugging Them?

October 27, 2015

While it is possible in some cases to remove a USB drive without using the eject option and not cause harm, you should always eject a drive before removing it from your PC’s USB port to be on the safe side.

Some USB drive users thought this was only necessary with Linux and Mac because the dialog to eject a device is so prominent, and Windows doesn’t make it as clear to safely eject a USB drive.

It is, however, possible to accidentally lose or corrupt the data on the thumb drive even when using Windows.

The information stored on USB drives can become corrupt when the device is pulled out because most operating systems employ something called write caching, a fancy way of describing how Windows sometimes saves tasks to do all at once in order to be efficient.

When a computer user initiates the proper ejection process, it tells the OS to complete all those tasks first before it’s safe to remove the drive from the USB port.

Windows handles removable drives a little differently than Mac and Linux, which is perhaps why the way to safely eject USB drives isn’t as easy to find.

Often, Windows doesn’t recognize or categorize these drives as removable, and this actually makes proper ejection even more important. When a removable drive is identified as a non-removable one, Windows automatically uses write caching.

This means that any data associated with a saved task can be lost in the event that a user pulls the drive out without first clicking the “Safely Remove Hardware” option in the system tray.

Tips On Buying Smart Watches

October 27, 2015

The smart watch is one of the hottest new products in the tech market today, and it’s with good reason. These devices give users the ability to monitor and control more than one device simultaneously and can even eliminate the need for some items.

In addition to the obvious time function, you can make and receive calls and monitor fitness activities among a host of other features straight from your wrist. However, with the number of smart watch manufacturers growing, it can be hard to decide which one is best for your needs. Consider the following before making any costly purchase:

Is it compatible with your smartphone? Since most smart watches are designed to be a companion to your cell phone, it is important to check their compatibility. Some devices are designed to work only with the iPhone while others are mainly for Android products. Then, there are third-party manufacturers producing watches that are compatible with all smartphone operating systems. If in doubt about the compatibility of a smart watch with your smartphone, ask a salesperson or search for the product online.

How important is a full-color screen to you? When presented with the choice between a black-and-white E Ink and a full-color screen, you likely choose color without any other information. There are, however, some great benefits that come with the monochrome E Ink screen.

For starters, full-color screens produce more glare in the outdoors while E Ink ones are visible virtually anywhere. Monochrome screens also save considerable battery life compared to their color counterparts, lasting up to days longer between charges. They do, however, have a dated and less visually appealing look.

Do you want a touch screen or old-school button gadgetry? While most consumers opt for the familiar touch screen technology featured on smartphones, the simpler button styles have a following as well.

A touch-display interface usually has easier navigation, but the small screen size can cause lots of pressing errors. Smart watches with physical buttons also run a little cheaper, but the choice is ultimately based on personal preference.

What types of design extras do you value? Smart watches vary greatly when it comes to design and little extra touches. While a fashionista may delight in the ability to swap out bands to coordinate with particular outfits, this may not impress another consumer who consider the extra pieces a hassle to keep away from kids or pets.

Look at a variety of products, weighing the importance of certain features with any additional costs, and then make a decision.

Avoid These Five Email Annoyances

September 23, 2015

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Email is a primary form of communication in the business world because it allows people to work within their own schedules and time-management styles.

With its ease of use, however, we may be sending more messages than necessary, contributing to a general email overload that can mask which items are most important.

Here are some common pet peeves in regards to this lightning-fast communication that may help you refine your email practices:

Sending/Responding to All
Before you send a mass email to all of your contacts or reply to all on an email, ask yourself if each of those people really have a need to know the information within your message.

While this may cover all bases, it is disrespectful to the recipients of your message that aren’t an essential part of the conversation by wasting their time and clogging their inbox. [Read more…] about Avoid These Five Email Annoyances

Benefits Of Remote Monitoring And Management

September 23, 2015

Michael Menor is Vice President of Support Services for Tech Experts.

Remote technology is so efficient and popular that it’s infiltrating many industries that you’d be surprised to hear about. One such sector is the healthcare department.

Some doctors are taking advantage of the leaps and bounds made by technology to help their patients get back on their feet as easily as possible.

As managed service providers, our primary goal is to use remote technology to help users solve their IT crises. Similarly, doctors can use remote technology to diagnose and treat patients, much like how we do with our own systems.

United Healthcare, one of the largest health insurance providers in the United States, supports what WIRED magazine calls “telemedicine,” a video visit from a doctor who offers consultation services rather than an in-person appointment. As reported by WIRED:

United says it will cover virtual doctor visits offered through NowClinic, Doctor on Demand, and American Well. These platforms connect patients with thousands of doctors—albeit not the patient’s usual doctor—via video chat. These consultations typically cost $40 to $50 a pop, but now that United is covering these visits, members will only have to pay their usual co-pay, making virtual medicine much more affordable for more people. For now, these virtual visits will be available only to UnitedHealth’s self-funded customers, but the feature will expand to most members by next year.

Remote technology is helping more people stay healthy simply by allowing them to access a doctor’s consultation whenever they need to.

This makes it more convenient for not only the patient, but the doctor as well. They don’t have to arrange for an on-site diagnosis and they can avoid contagious sicknesses more easily.

It’s simply a much more efficient way of doing things and allows for more affordable healthcare in general.

In fact, remote technology is such a great tool that any industry can take advantage of its uses, from teaching or training to communicating between other locations to customer service.

Personally, we at Tech Experts perform most of our maintenance remotely. Managed IT companies use remote technology to ensure that a business’s operations continue to run smoothly.

With the assistance of remote technology, Tech Experts can monitor your business’s systems for critical security flaws and administer patches accordingly. This helps us prevent damage that cannot be undone, like a loss of business data or personal information.

The primary reason remote technology is so useful for managed IT service providers is that your business avoids most on-site visits, eliminating the costs associated with them.

This frees up a significant amount from your budget and allows for more effective use of your IT expenses. Every time you opt for remote management and maintenance, you’re saving your business money.

In fact, most issues can be resolved without an on-site visit. Granted, some hardware problems cannot be resolved remotely, so you can’t completely eliminate the costs of on-site visits; however, being able to mitigate them is often more than enough to make a difference.

Here at Tech Experts, we’re happy to see that remote support is breaking free of the stigma of only being used by hackers to control your PC.

It’s finally being embraced as a useful, beneficial tool that all businesses can use to save time and money.

If you have any questions about remote possibilities, give us a call!

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Could Social Engineering Bring Down Your Business?

August 25, 2025

Don’t Let Outdated Tech Slow You Down: Build A Smart IT Refresh Plan

August 25, 2025

Biometrics Are the New Password – But What Happens If Yours Gets Stolen?

August 25, 2025

The Clock Is Ticking: Preparing Your Business For Windows 10 End-of-Life

July 22, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.