• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

How To Create A Windows 10 Recovery Drive

February 15, 2016

Since most Windows 10 users obtained their version of the latest Microsoft operating system as an upgrade from a previous version, there isn’t a built-in recovery system if your PC or other device is disabled.

You would have to revert to that previous operating system and re-download Windows 10. Unfortunately, if that occurs past Windows 10’s first year on the market, that download won’t be free.

To potentially save some money down the line and a significant hassle, it is a good idea to create your own Windows 10 recovery drive to re-install the operating system in the case of a system disaster.

A simple way to do this if you upgraded via the media creation tool is to use that same tool to create a recovery drive on removable media, such as a disc or USB flash drive.

To do this, run the tool, click whether you have a 64-bit or 32-bit system, and choose ‘Create installation media for another PC’ from the available options. This directs you to a screen asking what language you prefer and which version of Windows 10 you currently use. Make the appropriate selections, and you will be walked step-by-step through the rest of the process.

Another method to create a Windows 10 recovery drive is to use the Recovery Options within the Control Panel.

With previous versions of Windows, this feature was a tad easier to locate, but it still lurks in the background for you to find. From the Start menu, you can open Settings and then type Recovery in the top right dialogue box to reveal an option to ‘Create a Recovery Drive’ before following the steps to complete the action. Alternatively, you can just type Recovery Drive into Cortana’s search field on the bottom left of your screen.

With either method, choose to back up your system files, and you will be directed to insert your media after a short wait for a systems check.

You will need at least 4GB of space on your disc or USB drive, and bear in mind that any other information already on it will be erased with the addition of the Windows 10 recovery drive.

This process will take a while, but you are able to continue working as your device copies everything onto your removable media.

Older Internet Explorer No Longer Supported

February 15, 2016

Microsoft recently made the announcement that it will no longer offer support for Internet Explorer versions prior to Explorer 11.

It is also only through Explorer 11 that users can receive updates for the following operating systems: Windows 7, Windows 8.1, and Windows 10. While this does not prevent users from continuing to turn to Internet Explorer for their browsing needs, it does serve as a call to action for optimum usability and security while surfing the web.

Without up-to-date security patches, devices are at risk of malware and other forms of malicious attacks.

In addition to such security risks, users who continue to use unsupported versions of Explorer may lose Independent Software Vendor (ISV) support or encounter compliance issues.

The company also outlined how Explorer users can update to the latest version, at no extra charge. People who use Internet Explorer (IE) can be roughly divided into three categories: Enterprise users, small to medium businesses, and home PC users. Each groups has a slightly different means to upgrade to Explorer 11; however, their experience should be hassle free.

Albeit, some small-to-medium business owners have expressed concerns about their line-of-business (LOB) application having a dependency on a particular Explorer version. Microsoft has addressed this concern by integrating an Enterprise Mode into Explorer 11 that allows backward compatibility with web applications specifically designed for previous versions of Explorer.

Smaller businesses, whose software does not depend on previous IE versions, can upgrade through Automatic Updates or contact a Certified Microsoft Partner like Tech Experts for assistance.

Home PC users could see an automatic upgrade to Explorer 11 via Automatic Updates.

Still, if the home PC upgrades are set to ‘off’, updates to Explorer 11 will have to be done manually through the Control Panel and the Check for Updates button under the Windows Update tab.

My Predictions For The Top Security Threats Of 2016

January 15, 2016

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

The year 2015 certainly saw its share of unusual technological security breaches, ranging from the Ashley Madison hack to controlling Jeeps from afar.

With the ever-growing breadth of technology services and gadgets, the opportunities to exploit them grows as well.

These are my predictions for the top security threats for the coming year:

Cloud Services
While cloud services solve countless storage and file-sharing issues for businesses, they also amass huge amounts of sensitive information in a single spot. We expect to see hackers try to sneak past the security measures in place on these services to hit paydirt on business data.
[Read more…] about My Predictions For The Top Security Threats Of 2016

Don’t Pay A Ransom To Get Your Data Back

January 15, 2016

Michael Menor is Vice President of Support Services for Tech Experts.

Requesting a ransom from victims is an unfortunate trend gaining momentum in the hacking world. This is typically done using ransomware (where hackers encrypt data and request money for the key) and distributed denial of service attacks (where hackers threaten to overwhelm a system with traffic, thus knocking it offline).

In both scenarios, hackers are looking for the victim to pay up…or else. Should they?

The answer should be obvious: absolutely not.

However, when a person’s valuable data becomes encrypted or they receive a legitimate threat to take down their servers, emotions often get in the way and they’ll end up “paying the piper.” Hackers know this, which is why their ransom methods employ fear tactics.

For example, ransomware like CryptoLocker will lock the user out of their computer while the screen displays a countdown to when their data will be deleted.

With DDoS attacks, a hacker may contact the victim mid-attack and promise to cease the attack for a fee. Both of these situations play straight into a person’s irrational fear, causing them to cough up cash.

Before reaching for your credit card to pay a hacker’s demands… stop, take a deep breath, and think objectively about the situation.

What guarantee do you have that these hackers will actually make good on their promise to turn over your data or cease the attack?

This guarantee is only as good as a hacker’s word, which is pretty worthless seeing as they’re, you know, criminals. Therefore, whatever you do, DON’T GIVE MONEY TO A HACKER!

By paying hackers money, you’ll only add fuel to the fire and help fund the spread of their devious acts.

Plus, there are several reported cases where a victim pays the ransom, only to still have their data deleted or the attacks on their site continue.

What’s it to them if they go ahead and follow through with the attack? They have your money, so who cares? It’s a classic case of adding insult to injury.

Need proof? There’s a recent example of this happening to ProtonMail, a Switzerland-based email encryption service.

On November 3rd, ProtonMail was threatened with a DDoS attack by the hacking group Armada Collective.

Like many companies would do, they ignored the threat, deeming it to not be credible. Soon afterward, their servers became overloaded to the point where they had to cease operations. After paying the ransom, the hackers continued the attack.

Now, consider your own situation. How much would it cost your company if you lost revenue for a full day of work, and you still had to make payroll?

For a medium-to-large sized company, losing a full day’s work would likely come to much more than a few thousand dollars. In fact, hackers understand how downtime can be so costly, which is why they feel justified asking for such an exorbitant fee.

What are you supposed to do if you were asked to pay a ransom by a hacker? The first thing you’ll want to do is contact the IT professionals at Tech Experts. We’re able to take an assessment of the attack to determine how bad it is and restore your data to a backed up version that’s not infected with malware.

When facing a hack attack, we can present you with all the options you can take – none of which will include paying a hacker money.

Yes, You Can Still Get Infected – Even With Anti-Virus

January 15, 2016

Scott Blake is a Senior Network Engineer with Tech Experts.

With the sudden release of a new variants of malware and ransomware such as CryptoWall, users are wondering why their anti-virus programs are not blocking the ransomware infection from infecting their computer.

As with many other forms of malware, the infection needs to exist before a cure or way to detect the threat can be created. This takes time and during this period of R&D, the malware spreads like wildfire.

While there are several forms and classifications of infections, there are basically only two different methods in which infections are released into your system: User Initiated and Self Extraction.

User Initiated infections are caused by a user clicking on a link within a webpage or email or by opening infected email attachment. Once opened, the malware is released and quickly spreads throughout your system.

Because the user manually clicked on or opened the link/document, most anti-virus programs receive this as an authorized override by the user and either internally whitelists the link/document or skips the scan.

CryptoWall is spread through this method, usually contained within an infected Word, Excel or PDF document. The creators of these programs take advantage of the programming of the document to hide the infection.

With the world becoming a paperless society, we are becoming more and more accepting of receiving and opening attachments sent to us through email. It has practically become second nature to just click and open anything we receive, regardless of any warning.

Self-Extracting infections are exactly what they’re named. These infections require no outside assistance to worm their way through your system, infecting as they go.

The number one method creators of this form use to place their software on your system is through “piggy back” downloads.

Red button on a dirty old panel, selective focus - virus

Piggy back downloads occur when you authorize the download and install of one program and other programs (related or unrelated to the original program) are automatically downloaded and installed with it. The most common way is by downloading programs promising to speed up your computer.

Infections can also exist on your system and lay dormant for long periods of time, waiting for the computer to reach a certain calendar day or time. These infections are called “time bomb” infections. Just like piggy back infections, they require no outside assistance to infect your system.

They are mostly found buried in the registry of the system or deep within the system folders. Because they are not active on the time of placement, most anti-virus programs will not detect them. Active reporting through toolbars is another means of becoming infected over time.

When a user downloads and installs a toolbar for their browser, they authorize at the time of install that it is okay to install and all of its actions are safe. However, most toolbars are actively scanning, recording, and reporting back to the creator. They also act have conduits for installations of other unwanted programs behind the scene.

If left unchecked, those additional programs can become gateways for hackers to gain access to your system and spread even more infections.

To help stop the spread of malware/ransomware such as CryptoWall and its variants, we need to become more vigilant in our actions when either surfing the Internet or opening email and attachments.

The best rule of thumb to follow for email is: if you don’t know the sender, or you didn’t ask for the attachment, delete it. As for websites, read carefully before you download anything and avoid adding toolbars.

How to Up Your PowerPoint Game

January 15, 2016

Back when PowerPoint first came out, it didn’t take a lot of finesse to create something visually appealing and exciting. Now, however, PowerPoint and its similar counterparts like Keynote and Prezi, are old hats. It is no longer sufficient to add some generic photos and bullet points that outline your speech to grab your viewers’ attention.

In fact, such uninspiring presentations have led to the coinage of the phrase “death by PowerPoint” to describe PowerPoint strategies that fall flat and leave those forced to watch them on the verge of sleep.

Presentation slide templates for your business with infographics and diagram set
Presentation slide templates for your business with infographics and diagram set

Here are a few things to keep in mind when crafting your next presentation:

• Avoid the following kiss-of-death PowerPoint photo types. Some images have been overused to the point of having little to no meaning. This, consequently, leaves viewers bored because the photos add nothing to the material covered in the presentations. Archery targets, cogs, business people preparing to race or grouped around a monitor, jigsaw pieces, hand gestures, and globes are among these types of images.

• Instead, think outside of the box when choosing photos for your PowerPoint presentations. For example, pass over an image of a handshake to represent a partnership and choose something more untraditional like cheese and crackers or a needle and thread.

• Don’t hesitate to use some of Microsoft’s newly released tools to showcase your images. For example, you can create animations using Morph or try things like frames or transparencies. However, when using such tools and enhancements, make sure they fit the overall theme and feel of your presentation.

As such, your extras will be a seamless part of your PowerPoint and not stick out like a sore thumb.

• Most importantly, focus on the content of your PowerPoint presentation. That is, after all, the purpose – to inform and effectively convey ideas. Your photos are meant to complement your content, not overshadow it.

How to Cut Down Your Mobile Data Usage

January 15, 2016

With unlimited mobile data plans being few and far between, it is imperative to monitor and manage your data usage to prevent outrageously high cellular bills. Even if you have an unlimited plan grandfathered into your service, there are other benefits to cutting down your mobile data usage, including increased battery life on your device and faster service in general. Try these tips to keep your data usage at a minimum:

• Track your usage. It’s impossible to set a usage goal or identify problems without knowing how much data you use and how you use it. Within the settings of your smartphone, you can easily find how much data you’ve used in a billing period and even set warnings for when you approach your data limits.

• Identify what applications use the most data. This can also be done within your smartphone’s settings where you can see app usage at a glance and can also set warnings or cut-off limits at this level. After assessing how much data each application uses, you may even want to delete the most data-hungry ones.

• Take advantage of free WiFi. A wide array of businesses offer free wireless Internet service as a perk to customers, so don’t pass up the opportunity to get your high-usage needs met at no expense to you. You can even configure your settings where applications only update when WiFi is available.

• Put the stymie on streaming music and video. While you may like to show your friends the latest footage off of YouTube or listen to your playlists while on a run, these activities come with a high data usage price tag. Try waiting to view videos until WiFi is available and make your playlists available offline to listen to them at will without any costly data usage.

Just by implementing these simply usage-reducing and awareness strategies, you can greatly decrease your cellular data bill and the workload on your smartphone device. This is a win-win no matter how you look at it.

Four Tips For Next Year’s IT Budget

December 21, 2015

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

As the year winds down, you’re undoubtedly working out plans for 2016, and preparing your IT budget is top on that list. Every year presents unique network, server, and technology challenges that need to be addressed.

The increasing ubiquity of cloud services is something small business owners need to consider, but working out the basic budget items should take priority. Here are four tips to give your business a little bit of breathing room when it comes to planning next year’s IT expenses.

Think in the long term
When planning your IT budget, it’s important to consider both short-term and long-term investments that you’ll be making for the sake of your business.

[Read more…] about Four Tips For Next Year’s IT Budget

A Few Reasons Why Desktops Are Better

December 21, 2015

Michael Menor is Vice President of Support Services for Tech Experts.

With all this talk about mobile devices like tablets, smart phones, and ultra-portable laptops, you’d begin to think that traditional desktop PCs are going to seem archaic.

Depending on your needs, that can be the case, but desktops aren’t going away anytime soon – and for good reason.

More Powerful Hardware
This has been the case from the very beginning – desktop PCs are capable of more powerful hardware.

Desktops don’t need to worry about electricity consumption the same way portable devices do and components don’t need to be shrunk down into a tiny lap-sized chassis.

This also allows better heat dispersion. All three factors give desktops the flexibility to utilize the most complex, cutting edge components that aren’t designed for mobility (yet).

In other words, computer hardware manufacturers build new components, then work on shrinking those components into mobile sizes.

This reason alone will keep the desktop alive – PC gamers, graphic artists, and multimedia buffs will always want high-end desktops.

Cost Effectiveness
Of course, you don’t need the newest, cutting edge components to have a blazing-fast PC. You can easily get by with cheaper, previous generation components.

Remember a decade ago when a desktop PC could cost thousands of dollars? It’s still possible (and easy for some) to spec out a high-end PC with that kind of price tag, but each additional dollar spent isn’t worth it unless you have VERY specific needs.

Also, comparable hardware for a PC is significantly cheaper than similar laptop hardware. If you don’t need the mobility, you can save a pretty decent chunk of money just by sticking with a desktop.

Desktops are Easier to Fix and Maintain
Let’s share a real-world tech scenario. Replacing a part on a desktop is a pretty simple task for a technician. In fact, with a little hand-holding, almost anybody could figure it out. Replacing the motherboard on a laptop, however, is an extremely cumbersome process. Depending on the model, it can involve over two dozen screws and a lot of time.

Replacement parts aren’t as affordable as they are for desktops either. For smart phones and tablets, expect to ship those out to the manufacturer.

You Probably Won’t Leave your Desktop at the Airport/Coffee Shop/Hotel
It’s true! If you are lugging around a big PC case, a monitor or two, a keyboard, mouse, and power cables, it’s pretty likely you won’t accidentally forget it when you realize how light your luggage has become.

All joking aside, because your desktop lives a pretty uneventful life without much movement, it doesn’t endure the little bumps, drops, and spills that laptops, tablets and other mobile devices take.

It’s harder to steal too, so there is a little essence of security knowing your data is locked inside a great big aluminum box tethered to your desk with a web of cables.

Have you moved on from the desktop PC completely or are you still holding on? Do you even want to go strictly mobile? Let us know and let us answer any questions you have.

Replacement Equipment And Workstation Data Storage

December 21, 2015

Scott Blake is a Senior Network Engineer with Tech Experts.

Have you ever found yourself in the middle of a huge project or in the height of your busy season, then suddenly, a key piece of equipment breaks? You have orders that need processed. Deadlines to meet. Stress starts to roll in. You start to wonder how long the downtime is going to last or what this is going to cost your business.

One way to reduce the stress levels and temporarily resolve the situation is to maintain a stock of replacement workstations and essential equipment.

Being able to switch out a workstation or any other critical piece of equipment and be back up and running sooner not only reduces stress levels, but also saves your business countless dollars in lost revenue.

Example: your company designs and prints graphics for billboards. An employee says their workstation has crashed while they were working on a project for your largest client that’s due in two days. What do you do?

You try to contact the manufacturer of the workstation, only to find out your warranty does not cover on-site service and the soonest they could be on location is in two to four days. That’s not the answer you wanted to hear.

If you had a replacement workstation on hand, you could reduce your downtime dramatically. But let’s say you do have one. So you switch out the workstations and your employees is back to work…

Until they realize all of their work is stored on the crashed workstation. Stress levels start to climb once again.

One easy way to avoid losing data would be to migrate the user’s data to a storage device located on your network. Network attached storage is much more reliable than the storage within your workstation. They can also be configured for redundancy.

This entire migration will be transparent to the user as the workstations libraries will still remain intact, just relocated to a different device. As far as the user is concerned, all of their data is saved to the workstation.

The general rule of thumb is to maintain a 10% replacement stock level of workstations or essential pieces of equipment (and always have at least 1). Replacement switches, as well as firewalls, should always be on hand or able to be purchased locally. Being able to replace a switch or firewall to bring your VOIP phone system back online or restore network connectivity to your entire business in minutes is critical.

If your business is unable to maintain replacement inventory, make sure you have (and fully understand) support contracts either from equipment manufacturers or from a local network support company.

Depending on the manufacturer or support company, support contracts can range from 24×7 to 8×5 to “whenever we can get there.” That’s why it’s very important to understand your support agreements. Never get taken by surprise.

Manufactures, depending on the piece of equipment, will offer warranties or support contracts. Be warned the contract may not include next day equipment replacement, data recovery, or installation of the equipment.

They may be able to offer remote assistance, but in most cases, you end up in a long call that does nothing to resolve your issue.

The best option, if available to your business, is to have a managed service plan with a local network support company. Most local support companies will offer same day service including weekends.

Local service companies can act as your business IT support department and/or work with your existing IT department to maintain your business equipment and resolve any issues that arise.

Most local service companies will have replacement equipment and repair parts on hand, thus reducing downtime.

A local service company will also be able to assist your business in less stressful times by offering remote support services and preventive maintenance visits to spot any potential issues before they become larger problems.

They will also work to ensure your business’ network is safe and secure and offer suggestions for upgrades to your infrastructure.

While no one can predict when a workstation may go down or a firewall will fail, the best thing you can do is be prepared.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2026 Issues
  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Hackers Aren’t Hacking – They’re Just Logging In

February 17, 2026

The “Deepfake CEO” Scam: Voice Cloning Is The Next Cyber Threat

February 17, 2026

Why “It Hasn’t Happened To Us (Yet!)” Is The Most Expensive IT Strategy

February 17, 2026

You Absolutely Need To Back Up Your Cloud Services Like Office 365

January 20, 2026

Tags

AI Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2026 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.