• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Is A Tablet The Right Choice? Pros And Cons

July 31, 2014

Scott Blake is a Senior Network Engineer with Tech Experts.

With so many gadget choices on the market these days, it can be very difficult for people to decide what they need and where to spend their money.

Tablets are currently the top of mobile technology. They are compact, very lightweight and extremely easy to carry. However, they do not possess the processing power of a laptop.

Their functionality as a computing device is very limited, although sufficient for some people’s uses. Tablets can be ideal for those who browse the Web casually, such as read the news or popular websites, and those who play “lightweight” games, or want to watch TV or films while traveling.

Despite advances in some niche professions, tablets are often not suitable for hardcore gamers, presentation arrangement and creation or heavy researching.

Pros of a Tablet Computer

Lightweight
Tablets are smaller in size compared to even the smallest types of laptops and this travel-sized gadget is definitely a plus to those who don’t want to lug a laptop around but still want to bring along a computer.

They are also lighter than laptops, putting less stress on the body and can be handled easily with one hand, unlike laptops.?

Longer Battery Life
The best models of tablets can hold power for up to eight hours or more of typical use, which is significantly longer than any laptop. They can even be on standby for days.

Touch Input
Some people actually enjoy using the touch input as opposed to a keyboard input. Touch input is especially useful for drawing digital images, playing certain games and manipulating certain programs.

c817296_mCons of a Tablet Computer

Lower Performance Ability
Tablets do not have the same processing power as laptops and can easily become overloaded if a lot is done on them. They are only suitable for simple computer usage that doesn’t involve heavy multitasking, like solataire.

Uncomfortable Usage
Most users still prefer the comfort of using a keyboard to type, as using a touch input is much more time consuming and can result in many errors if the user isn’t accustomed to that kind of input.

Using a tablet and its touch input can also be stressful to the wrists and arms of the user since there is no place for the user to rest his or her wrists and he or she has to use the arms to hold up and use the tablet as long as needed. However, some tablets do come with full keyboards as an add-on accessory.

Higher Fragility
The touch-sensitive display of tablets are also a weakness, as this renders them fragile and in need of proper care. Otherwise, the screen can easily be damaged and once the screen is damaged the tablet is unusable.

While tablets are the newer devices, they are slowly improving but they generally still have a lot to catch up with in terms of performance.

However, for the user who uses computers for simple things like checking email, playing games, going on social networks, and other tasks that don’t require the computer to process heavily, tablets have a convenince factor that makes them attractive.

If you have any questions whether a tablet is the right choice for you, give the Tech Experts team a call and we will help you make the right choice.

(Image Source: iCLIPART)

Ten Ways To Minimize Workplace Interruptions

July 31, 2014

Time Concept on Striped Background.You may be trying hard to practice your organizing techniques but still manage to complete only a few of your tasks at the end of the day. It may be due to uncontrolled workplace interruptions.

We suggest ten ways to minimize interruptions in the workplace without sacrificing your role of being accessible and available to co-workers and clients:

1. Use your voicemail when you are doing something important that needs your uninterrupted attention and concentration especially with a deadline. Schedule a time to respond to your messages.

2. Instead of checking your email every few minutes and responding immediately to each email, set a schedule on which times of the day you should read and respond to email messages.

3. If you are someone whom your co-workers often ask for company policies or procedures, create an FAQ and make it accessible to co-workers.

4. When you are in charge of certain processes in the workplace such as reservations, create a procedure for the process in making requests such as an online form.

5. Clearly communicate information needs and turnaround times especially for job order requests in order to avoid unnecessary follow-ups.

6. Block out time on office calendars so you can work without interruption.

7. If you are on a tight deadline or working on something extremely important, make yourself unavailable for interruptions by working outside your office – even if it is just the empty conference room.

8. If you are able to adjust your schedule, take advantage of this opportunity such as working earlier than usual, or having a different day off and work when everyone’s off. This way, you will have less interruptions and you can get more work done.

9. Set certain hours of the day when you will be available to answer questions from co-workers.

10. If you are working on a project with different departments or co-workers, create a regular update meeting in order for everyone to be clearly updated with information and avoid wasting time updating each other individually.

(Image Source: iCLIPART)

Seven Smart Tips To Secure Your Business Network

June 30, 2014

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Hackers are constantly on the lookout for digital data they can use to make a profit, either by stealing money electronically or by selling the information to third parties.

Therefore, it is important to protect your precious data; here are seven tips to get you started:

Policies
Your staff is the front line of defense against hackers. Human error is one of the leading causes of data security breaches, so you need to have policies in place to ensure your employees are promoting the security of your network while working.

Strong passwords
People generally opt for simple easy-to-remember passwords that hackers can easily crack.

A simple “dictionary attack” (using an automated tool that uses a combination of dictionary words and numbers to crack passwords), is sufficient to uncover many passwords.

On the other hand, coming up with a complicated password and saving it to your computer as opposed to writing it down is a simple but very effective way to prevent hacks.

Multi-factor authentication
It is highly advisable to establish multiple layers of technology dedicated to security that you would apply to all your devices, including desktops, mobile devices, file servers, mail servers and network end points.

Multiple security blocks hacking attacks and alerts you to any problems beforehand so you can take the appropriate measures.

Data encryption
Encryption is yet another great security tool that you can use to protect your data. For instance, if your hard disk is stolen or your USB drive is lost, anyone trying to access your data would be unable to read it if it is encrypted.

Backupicon with gold lock
Security makes up half of your data protection, while a proper backup strategy makes up for the other half.
Even with great security, you need to be able to recover your data if you have a failure. Back up often, and remember to test the backup regularly.

Audit
You need to identify the vulnerable areas of your network or which data needs to be protected.

Your entire IT infrastructure, including your computers, mobile devices and network should be audited by a professional IT specialist to determine the appropriate steps to prevent hackers from accessing your data.

Managed services
Managed services are an alternative and highly-effective approach for achieving the best possible security, including backup and recovery.

Many small businesses are unable to adequately meet the daunting and expensive task of securing their data.

With a managed-service provider specialized in data security, you get the benefit of professional services and skills without having to hire an in-house security expert, thus cutting on costs. In addition, you get access to the latest security technology and support professionals.

(Image Source: iCLIPART)

What Happens To Stolen Data After A Breach?

June 30, 2014

Michael Menor is Vice President of Support Services for Tech Experts.

Data breaches have become so common that virtually everyone has been impacted by a breach in some way. Breaches at big retailers make the news, and replacement credit cards ominously arrive in the mail from our banks.

However, there is a lot more to most data breaches than meets the eye, as is the case with more traditional robberies, the theft of data is often just the beginning of the crime. If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.

Understanding the Criminal Infrastructure
While “hacktivist” groups will periodically expose data to further an ideological cause, the vast majority of breaches are perpetrated by criminal groups focused on financial profit. Since very few of these attacks result in the direct theft of currency, criminals need a way to turn their stolen data into money.

Even in the simple case of stolen credit card information, criminals either need to sell the cards to other criminals or use the cards directly to commit fraud. In either case, the card data itself is a precursor to future fraud.

This may seem incidental at first, but there are important consequences. Specifically, the ability to monetize stolen data requires a very different set of skills than those needed to breach a network in the first place.

Data Protection on Red Keyboard Button.A network breach can be a relatively targeted operation perpetrated by a few attackers. However, once a breach is successful, the scale of the operation changes entirely. Whether the stolen data is personally identifiable information (PII), payment card data, or login credentials, the attackers face a challenge of scale. Millions of individual records need to be monetized either by reselling them or using the data directly for profit.

The sheer volume of data makes it impractical to do these tasks manually, and this is where cybercriminals need help. In most cases help arrives in the form of botnets that can automate the processing of individual records, and a larger ecosystem of organized crime that can consume the stolen data. Here are a few examples.

Direct Financial Fraud
Payment card breaches such as the recent attack against Target have obvious financial impacts and motivations. Yet while it is relatively simple for a criminal to derive value from an individual stolen credit card, doing the same for millions of cards is another thing entirely.

This is where the larger criminal ecosystem comes into play. The attackers behind the breach will sell the stolen card data to brokers, who in turn sell cards in batches to lower level criminals who use the data to either buy goods online or print cards to be used in physical stores.

This ecosystem shares a common problem in that stolen credit cards have a very limited shelf-life. As soon as it becomes apparent that a specific merchant has been compromised (Target for example), all of the compromised cards will be quickly deactivated.

This means that freshly stolen and active cards are highly valuable ($100 or more), while older cards can be worth pennies. This is a serious spread, and criminals need to know which sorts of cards they are buying, and the state of the cards they are holding.

To address this challenge, criminals will periodically test a subset of their cards by using them to make small online purchases. Attackers can drop a few hundred credit cards into a botnet programmed to make small purchases, and quickly determine the percentage of cards that are active and working.

Oddly enough, charities such as the Red Cross are a common recipients of these charges because they commonly receive small donations, and the purchase is unlikely to raise red flags with the consumer. Disrupting these validation steps could provide an interesting way to devalue the black-market price of stolen cards, and make the attacks less profitable for an attacker.

Stolen Credentials
End-user credentials (usernames and passwords) are another common target of attackers, and can provide considerable long-term value for additional attacks and fraud.

Unlike payment cards, there are no centralized authorities to deactivate compromised usernames and passwords in the event of a breach. A website that is compromised may lock out affected users so that they have to change their passwords, but there is nothing keeping an attacker from using the stolen credentials at other sites.

A 2011 study from PayPal unsurprisingly found that 60% of users reuse passwords at multiple sites, meaning that a breach at one site can easily spider out to other sites around the Internet.

In order to find sites where credentials are re-used, attackers again turn to botnets in what are called credential stuffing attacks. In these attacks, stolen credentials are fed into distributed botnets, which in turn slowly and deliberately test those credentials against high-value websites.

These attacks can afford to be patient, and will slowly test logins from many different IP addresses to avoid rate and reputation-based triggers that could expose the attack.
This strategy can transform a seemingly innocuous breach into something far more serious. If an attacker is able to take-over a victim’s account on an e-commerce site, they could easily commit fraud in the victim’s name.

Such fraud may take longer to identify because the attacker is using the victim’s real account and from a site that the victim is known to use.

Credentials to social media sites are also highly valuable, enabling an attacker to easily impersonate the victim and infect his or her social networks.

Likewise, compromised personal webmail accounts can be a goldmine for an attacker. Such access not only provides the attacker insight into the victim’s identity, but can also be key to breaking into additional online accounts.

Most sites and applications have an option to reset or resend a user’s password to the email address on file. If the attacker has access to the victim’s email account, he can again use a botnet to proactively find online accounts where that email is used, and then obtain or reset the victim’s password.

These are just a few examples, but it serves to illustrate why it’s important for security teams to consider the lifecycle of stolen data.

In order to monetize a breach, attackers often need to go through additional steps, and this provides additional opportunities to mitigate the effects of a breach.

Likewise, companies can insulate themselves from the impacts of breaches elsewhere on the Internet by knowing how criminals attempt to automatically use stolen data.

This of course won’t prevent breaches from happening in the future, but it certainly is possible to mitigate the damage.

(Image Source: iCLIPART)

Advice For Small Business Owners Overwhelmed By Technology

June 30, 2014

Scott Blake is a Senior Network Engineer with Tech Experts.

A recent study by Brother International Corporation and SCORE found that 64 percent of small business owners feel overwhelmed when it comes to technology, because they have limited resources in information technology (IT).

Surprisingly, this isn’t related to a lack of financial resources, but rather this is due to the fact that many of them do not have the proper technological guidance.

Most of them have no dedicated IT support, and 59% of the survey participants said there are insufficient resources available in small business communities to help them.

Keeping pace with tech trends
According to the study, mobile devices are the most important piece of technology for their businesses, because mobile technology allows for easy and quick reach as well as easy access to documents, regardless of where they are.

Customer Relationship Management (CRM), social media and cloud services are also among the tech tools that small business owners find necessary in running their businesses. Forty nine percent (49%) of business owners consider tech-related investments as their top priority.

However, about half of them are hesitant to invest in it too quickly without a good ROI (return on investment), while the other half are concerned that failing to invest in technology gives their competitors an advantage.

c845014_mSolutions
Outsourcing IT is one alternative for small businesses to take advantage of technology without heavily investing in it.

Social media is also a convenient tool that many IT service providers use to provide tech support to their clients, while office technology products are becoming more user-friendly.

Another important step that small businesses must take as far as IT is concerned is to identify and outline their business processes.

This makes it easier to sort through the best technology to meet their business needs. It also eliminates the frustration experienced at the endless pitches small business owners get from vendors and solution providers that do not even understand their business goals.

Recommendations
When you understand your business processes, you can easily determine the technology that you need or don’t need.

Take advantage of the tools available to help you understand the channels that are driving your business, including apps like Google Analytics. Finally, when using consumer apps for your business, go for the business options as they usually offer more security options and tech support.

(Image Source: iCLIPART)

Are You Losing Customers Because Of Your Website’s Loading Time?

June 30, 2014

The amount of time a page takes to load is undoubtedly an important part of any website’s user experience. The fact is that website visitors care more about speed than all the bells and whistles you add to your website.

In fact, page loading time also affects your search engine rankings. Here are a few additional facts to consider:

On average, consumers expect a web page to load within 2 seconds, with a significant portion of online shoppers abandoning a website that takes more than 3 seconds to load. Additionally, customer satisfaction is decreased by a 1-second page load delay and discourages them from buying from the sПечатьame site in the future.

Measure your website speed
Page Speed Online is Google’s free web-based tool that allows you to easily and accurately measure the speed of your website online.

It also provides an overview of the high, medium and low priority fixes that would help increase your page speed.

However, the suggestions may be fairly technical, and you might need professionals to let you determine which ones are feasible for your site. Some of the ways you can decrease page load time include:

•Enable GZIP compression to reduce the bandwidth of your pages and reduce HTTP response.

•Optimize your images by selecting the ideal size, format and source code.

•Enable browser caching to reduce the number of components that need to be downloaded for subsequent visits.

•Use a content delivery network (CDN) to deliver content more efficiently to users based on their location.

(Image Source: iCLIPART)

Google+ Basics You Need To Know

June 30, 2014

While Google+ may not boast the same popularity that Facebook enjoys, it is becoming harder to ignore. If you are just getting started on Google+, you need to wrap your head around its workings. Here are some basic features to get you going:

The Stream
This is the main home screen for Google+ where updates from people you are following show up in card-like boxes. To pull up public posts related to the same topic as that of a particular post, click the hash-tag on its upper-right corner.

Circles
These are groups that help you organize and manage your social experience. Whenever you follow someone new, you assign the person to a circle, which could be for friends, family, acquaintances or people you don’t know personally.internet banking

You could also add your own customized circles. With circles, you get to focus on content from the specific group of people you want, although you can also view content from everyone. Circles are also useful for controlling who sees what you post.

Finding people
When you first sign in to Google+, the system walks you through a number of steps to locate people you know and to connect with interesting users you may not yet be acquainted with.

Notifications
Google+ uses notifications to let you know when something happens on the network that is directly relevant to you. You can access your notifications by clicking on the bell at the top-right corner of the screen.

Chats and Hangouts
Google’s Hangout messaging system is integrated into Google+ so you can chat with other users and initiate video calls from within the service. Simply click the “Hangouts” link at the top-right corner of the screen and then click on any contact’s name to open a chat session. Clicking the video camera icon will send the person a video chat request.

(Image Source: iCLIPART)

Six Tips For Dealing With Email Overload

May 30, 2014

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Most, if not all, small business owners are barraged by the large number of emails they receive on a daily basis. As a consequence, way too much time is spent on email that actually slows down productivity.

Email has become a ‘disruptive’ technology that could take you on a tangent and eat up your time fast. So, it is important to take charge of your inbox and filter unwanted emails. Here are some ways you could do that:

Prioritize incoming emails
As a rule, not every email you receive requires immediate attention. Filtering out the most important messages allows you to prioritize the emails you should answer and saves you valuable time.

Most email software have a few good filters that make this possible.

Set specific times to respond to your emails
Giving in to the temptation of checking and responding to your emails is actually an issue of inefficiently dealing with emails rather than the abundance of emails.

Instead of continuously checking your email from multiple devices, set specific times throughout the day to check your email and refrain from checking email outside these times. It is actually more efficient to respond to your emails in bulk rather in piecemeal.

Use the search function
Organizing your emails in folders are important; however, if you are searching for an old email, use the search function, the advanced search operators, and filters to quickly find what you are looking for.

Unsubscribe from unwanted lists
To eliminate the many emails that are not spam but which are still cluttering your inbox, take some time and unsubscribe from newsletters or services which you no longer read or use. Look into using a mass unsubscribe tool if you don’t want to unsubscribe from each list.

Smartphone in hand musicUse filters
Most email systems allow filtering, which you can assign to any type of email that you get regularly. For instance, a filter makes it possible to forward emails which contain particular keywords to your assistant or have a particular automated response to certain emails. This significantly reduces the amount of time you spend on email.

Turn off notifications from social media sites
You really don’t need to get an email each time someone responds to your Facebook comment or tweet. Since you’ll eventually see such updates once you actually visit those sites, they shouldn’t be allowed to clutter your inbox. In fact, such notifications are just distractions that could cut on your productivity.

(Image Source: iCLIPART)

Why Is Network Security Important For Your Small Business?

May 30, 2014

Michael Menor is Vice President of Support Services for Tech Experts.

Network security is very important to all networks big or small. The purpose of network security is to prevent loss, through the misuse of data.

There are a lot of issues that can arise when network security is not properly implemented and maintained, a few issues include, but are not limited, to the following: data destruction, data manipulation, and breach of confidentiality.

The most important layer of security is physical security, this should be the first line of defense for any network. An organization can have all the access rules, logical security policies, and Intrusion Detection Systems (IDS) in place, but nothing beats being protected at the physical level.

One of the simplest steps is to lock the door, for example the server room or network closet should have a physical door and lock that secures it. This can also include any items that may be vulnerable to theft or physical damage.

Another form of physical security can be having surveillance cameras monitoring the premises. This gives an organization that extra sense of security, especially after hours.
Earlier we discussed ways to secure the physical network, but what about the logical network? You do not want to be on a network that does not challenge you for logon credentials to access systems.

This is where authentication and password security comes into play. Securing a network with usernames and passwords can prevent unauthorized access to data and also provide measures that prevent unauthorized changes of systems.

System administrators can also implement a password complexity policy, which requires users to have passwords that are of a certain length, and contains a combinations of alphanumeric and special characters. It is also wise for users not to use any personal identifying characters in their passwords because this is usually the first things hackers look into.

The Internet is not a secure place, viruses pose a big security pad lockrisk to a computer network because there are so many out there. Without antivirus protection, a computer can get infected and may even infect other computers on the same network.

Depending on the purpose, or payload, of the virus, the viruses’ creator may have designed the virus to steal or delete information, render a system useless by using all resources, or even use the computer as part of a botnet. Antivirus software provides protection against most, but not all viruses.

Not only should users frequently update and scan their computers for viruses, but they must also be smart when browsing the Internet because many viruses can disguise themselves as legitimate software.

Firewalls are a great way to control the internal network traffic and also incoming traffic from the Internet.

While antivirus protection helps to protect a computer from potentially unwanted programs and viruses, a firewall can help to control network access into a computer system.

There are two types of firewalls: software- and hardware-based firewalls. Both provide similar functions, but it is best to implement a hardware firewall because it gives a system administrator the ability to make changes to a system as a whole, rather than at individual systems, or endpoints.

Within the firewall there are policies which allow or deny traffic based on the needs of the network. The most secure policy is a restrictive policy which denies all network traffic, this policy only allows essential network traffic to traverse the firewall.

If you have any questions about your network security give us a call at the office, (734) 457-5000, or email info@mytechexperts.com.

(Image Source: iCLIPART)

Windows 8 – WOW Does It Look Different!

May 30, 2014

Scott Blake is a Senior Network Engineer with Tech Experts.

Microsoft’s venture into a truly mobile operating system, that can be spread spectrum across all of their platforms, was in theory a great idea.

What went wrong was underestimating the public’s attachment to the look and feel of their Windows XP and Windows 7 (we’ll just forget about Vista) operating system.

With many users still looking sideways at the new stylish Windows 8 interface, and even with the slight upgrades and changes in looks (ha, I laugh at the new start button) that Windows 8.1 has brought on since its release.

For many users out there, this still is not a big enough change to truly bring enjoyment to their personal computer experience.

If you are in “ever search mode” to locate and regain that look and feel of operating systems of yesteryear, there are two great programs that allow anyone of any level of computer experience to install and customize to regain that feeling of comfort.

Classic Shell, a freeware program, can enable a legacy-style Start menu and Windows Explorer interface. You can even have the Windows 7 menu back! But why stop there? Windows XP and Windows Classic menus are available as well. The Classic style will be a comfort to anyone upgrading from Windows 98.

The classic Explorer settings can also transport you into the way-back machine, and users can now have the simple Windows XP style back that they know and love.

A small low impact application that gives you a true look and feel of a Windows 7 interface, while still maintaining the complete functionally of the Windows 8 operating system.

Classic Shell, gives you a true start button and brings back Печатьthat all too familiar look and feel of your dearly departed Windows XP or 7 systems.

Check it out, it even offers a “Shut Down” button. Classic Shell also allows for customization of the new start menu.

Created by Stardock, a company that’s been making Windows user interface mod’s for years, Start8 comes as a free 30-day-trial. After that, you can “unlock” the third-party software for just $4.99.
Start8 does not re-enable the Windows Start menu. Instead, it creates a new menu that looks similar to it. Because of this, Stardock provides a great deal of customization.

Users can make the menu appear Metro-like by giving it square edges, or can stick with the Windows 7 look by giving it rounded edges. It’s also possible to change color, add or remove translucency, and give the Start menu button a custom icon.

And that’s just the beginning. There’s a plethora of options available in the app’s configuration and control menus for users to explore and customize.

Considering its low price and the large number of options, I think this software is a good deal. I even like the optional faux-Metro style.

However, Start8 doesn’t add any new functionality, so users are essentially paying $5 to have what was bundled with Windows 7.

So there you go. Two great choices, it just all comes down to “to pay or not pay, that is the question.”
Remember the technicians at Tech Experts are always ready to lend a hand.

(Image Source: iCLIPART)

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.