• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

The Top 5 Upgrades To Speed Up Your Systems Now

April 29, 2014

Scott Blake is a Senior Network Engineer with Tech Experts.

Things happen a lot faster in a small business than they do in the corporate world. This is why it is critical for small business owners to ensure their technology is up to date.

Here are five upgrades you should consider including in your IT budget to help you get things done faster.

Get a faster Internet connection
Surprisingly, many businesses which completely rely on Internet connectivity still settle for slow Internet speeds.

It may not seem obvious at first; however, speeding up your Internet connection will speed your business activities, such as file downloads and webpage loading.

You might even consider signing up for a second internet line with another provider just so you can balance your Internet access between the two.

This will speed things up and provide a safety net in case one provider’s network fails. Most of the firewalls we recommend automatically have two Internet connections for redundancy.

Upgrade to Gigabit networking
Upgrading your network speed to Gigabit Ethernet will give you a 10-fold increase in network throughput.

GbE used to be expensive; however, today there are affordable gigabit network switches. In addition GbE works over CAT 5E cabling that is widely deployed, and it is typically built into most desktops and laptops.

Upgrade hard drives to Solid State Drives
If you are not yet ready for a company-wide system upgrade, you can still stretch the lifespan of your desktops/laptops by upgrading the hard disk drive (HDD) to a solid state drive (SSD).Печать

An SSD can read and write data at a higher speed, which allows users to boot up their systems and launch applications faster. SSDs are affordable; even a lower-end model will deliver a significant system boost.
We’ve seen incredible performance increases when installing solid state drives. Windows will boot in 5 to 10 seconds, Word loads instantly, and even QuickBooks speeds up.

Switch to 802.11n  wireless
If your office runs on an 802.11b or 802.11g Wi-Fi network, this would be a good time to deploy the 802.11n wireless.

This comes with a faster wireless speed that makes for a better experience and can support more wireless devices. Note that GbE is necessary to support these faster 300 Mbps 802.11n Wi-Fi access points.

Upgrade computer RAM
More RAM never hurts, and this is bolstered by the sheer affordability of RAM.

While modern computers with 4GB or more of RAM generally have adequate memory for nearly all user demands, increasing your RAM allows you to reduce virtual memory or even turn it off. This makes for a much faster computing experience.

(Image Source: iCLIPART)

Most Commonly Used IT Acronyms and Their Meanings

April 29, 2014

CPU (Central Processing Unit)
The CPU is the computer ‘brain’ and its most important element. It interprets and executes most of the commands from the computer’s hardware and software.

RAM (Random Access Memory)
RAM may be compared to a person’s short-term memory. It is the place where the operating system, application programs and data in current use are kept so they can quickly be reached by the processor.

GHZ (Gigahertz)
GHz describes the frequency cycles and is used when discussing computer performance, usually the clock speed of the CPU. A CPU with a higher clock speed can process data faster. One GHz means 1 billion cycles per second.
Gigabyte
A gigabyte (GB) is equal to approximately a billion bytes and is a measure of computer storage capacity that could be used to describe disk space, data storage space, or system memory.

Megabyte
A megabyte (MB) is a measure of computer storage capacity and is equal to approximately a million bytes. Most PCs have storage in gigabytes, not megabytes.

32/64 BITS
32-bit and 64-bit refer to the architecture that a central processing unit or operating system utilizes. Generally, more bits mean that data can be processed in larger chunks and more accurately.

 

The Hidden Cost Of Internet Misuse At Work

April 29, 2014

Using the Internet for personal purposes in the workplace is causing a dip in employee productivity and costing money for the business owner.

Internet abuse constitutes an issue due to the fact that the browsed content raises ethical questions and often the sites visited are not allowed through office policies.

This is in addition to the fact that the time and frequency of accessing the Internet compromises productivity.

What constitutes Internet abuse?
Workplace Internet abuse is a significant risk factor for employer liability, costing employers’ valuable hours of work.

Internet abuse ranges from viewing pornography in private c472520_moffices to spending hours on social sites, playing online games, shopping online and paying bills through the company Internet.

Other consequences of improper Internet use include litigation, such as sexual harassment, hostile work environments and discrimination.

Revoking privileges
One way to deal with this problem is to entirely remove Internet access. Unfortunately, such a decision has the negative effect of punishing those who don’t abuse the privilege.

In addition, it’s impossible to completely banish personal Internet usage when the business relies heavily on Internet for communication, research and up-to-date information.

Monitoring usage
One way to reduce employer liability is to monitor and filter employee Internet use.
Although there are disagreements about the principle behind Internet monitoring, many employers agree that it is a necessary ‘evil.’

This solution requires some investment and changes in the networking infrastructure but can provide an almost immediate Return on Investment (ROI).

A phased implementation approach works best. Let your employees know you’re making a change, implement, and then give them a few days to adjust.

It is also necessary to draft an Acceptable Use Policy (AUP), implementing rules of personal Internet use before implementing such a change.

If you want to discuss internet monitoring solutions for your business, please give us a call for a free assessment.

(Image Source: iCLIPART)

The Right Strategy To Get More Visitors To Your Website

April 29, 2014

ПечатьEvery website can be improved, however good it is. In fact, you never want to settle for ‘good enough,’ particularly if your website is part of a business.

It’s unlikely that 100 percent of the visitors to your site take the precise action you want, so there is always room for improvement.

Determine your sales path
When thinking about how to attract more visitors to your site, it is first important to figure out the primary goal of your website, and then work backwards.

For instance, if you are selling a product online, the path for your visitors is likely to visit your homepage, navigate to the product sales page, click the order button and then complete the order form before they finally arrive at your thank you page. This path is your conversion funnel; the trick is to optimize and improve every piece of it.

Evaluate each website page
In order to determine how much attention you should give to each of your website pages, you must evaluate them separately.

Find out how many visitors land on each page, and what percentage of them proceed to the next stage of the sales path (its conversion rate). Aiming to increase the conversion rate of each page will be much more effective than looking at your entire website as a whole. For instance, increasing the conversion rate of each page by 10 percent would mean a 33 percent increase in your overall conversion rate.

Constant tracking
It is critical to track the conversion rate of each page both daily and monthly. While daily rates may fluctuate quite a bit, watch out for dramatic conversion drops which might be caused when a page, image or video does not load. On a monthly basis, check the performance of your pages and spot those that are decreasing in effectiveness and need improvement.

(Image Source: iCLIPART)

Severe Weather Is Just Around The Corner… Be Prepared

March 18, 2014

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

March is National Severe Weather Preparedness month, and we’re still shaking off severe winter storms.Tornado season is right around the corner, so it’s important to assess your company’s backup systems.

Disasters put all business data at risk and that’s why so many businesses take steps to protect their systems. But there are still risks that they may miss.

One of the best ways to make sure your network is properly protected is to learn from the mistakes other companies. Here are four key things that virtually guarantee it will be impossible for your business to recover from a catastrophic hardware failure or natural disaster.

Not backing up data
It may seem like common sense when preparing for a disaster or developing a continuity plan that you should back up your data. However, a study from Symantec found that only half of businesses back up more than 60% of their data.

Other businesses don’t back up data or only back up certain systems. This means that if these businesses are faced with a disaster, they could lose up to 40% of their data. Some businesses could lose all of it.

Many experts suggest that businesses not only back up their data, but take more of an all-or-nothing approach. All data should be backed up so that should a disaster happen you can guarantee that nothing will be lost.

Failing to protect off site data
Business is becoming increasingly spread out, with many employees working from outside of the office, or on their own systems. People who telecommute or use their own systems usually store important data on their local machines.

When a company goes to protect or back up their data, some Computer crashmay forget to back up data on machines outside of the company premises.

What’s more, some industries have regulations stating that you must back up data from all end-points (e.g., computers and devices) regardless of their location. So, when you are backing up data, be sure that you also back up data on systems that aren’t in the office.

Not backing up data consistently
The data in your business is always evolving and growing. Therefore, you need to ensure that it is backed up regularly. Because backups take time, there is a higher chance for them to fail. If you only back up once a year without checking, and disaster strikes, you could find that your data is incomplete, inaccessible or out of date. This may make any recovered data essentially useless.

The question is, how often should you back up your data? For most small businesses, a full backup at least once a week is suggested. If you work with client data on a regular basis or in a regulated industry, daily backups would likely be the best plan.

Using outdated backup methods
Just because you back up your data doesn’t mean it will always be available, especially if you use older backup methods such as data tapes or disks. These physical backups can be lost or even destroyed in a disaster and possibly even stolen. You may want to employ a more modern data backup solution that is more reliable, such as our Experts Total Backup cloud backup system.

That being said, you don’t have to give up older methods as these can come in handy, especially if you are going to be operating without the Internet for an extended period of time. By employing more than one solution, you can cover all bases while ensuring that data is largely backed up and available.

If you are looking to learn more about how you can protect your data, please contact us today to see how our systems and solutions can help.

(Image Source: iCLIPART)

Tips For Defending Against Social Engineering Attacks

March 18, 2014

c481198_mby Michael Menor, Network Technician
I just got yet another email from my bank. Or, at least it looked like the bank that had issued one of my credit cards. The email included my correct name and mailing address, as well as a variety of other quality information such as the last four digits of my credit card number.

This may not seem like it is great information, but I regularly change details in my name for accounts, such as using different middle initials, including or omitting part of my first name, or using one of the three different street addresses that will get mail delivered to my home. So when someone gets it all correct, it really is a big deal to me.

According to the email, I needed to log on (yes, convenient link included) and check a fraud alert that was being issued on my credit card by my bank because of suspicious activity.

Again, this did make some sense, because this account was compromised, and I do have fraud triggers set to alert via email and text. Despite the fact that I pretty much always view these emails as suspicious, all in all, it seemed like the type of email that I might not want to ignore.

Except for the fact that the email came to a valid email address which I have never registered with this particular bank. Oddly enough, I have seen this with increasing frequency, and have received both Facebook and LinkedIn notifications with friend/connect requests – with people I actually know – but, both sent to email addresses which I have never registered with Facebook or LinkedIn.

Social Engineering?
Getting a few emails doesn’t necessarily mean I am in the middle of a social engineering attack. The catch here is that the emails contained real information that could only be gathered if someone was working it, so I tend to look a little beyond random phishing. The sender had good information.

A more recent complexity in social engineering is the use of this type of good information in an Advanced Persistent Threat (APT). In this role, social engineering is used in concert with other attack vectors. Information gathered from social engineering is used to target technical attacks, and in turn, information from technical attacks is used to help target further social engineering attacks as an attacker learns more about a set of individuals as well as the entire organization.

The availability of information from public sources like social media allows online research about specific people to be very targeted, further enabling more specific social engineering attacks.

Part of the social engineering attacks that are the most dangerous are those attacks that also try to get targets to execute malicious links or applications, potentially installing malware.

You may recognize a random external email attack that includes a virus or a malicious link. But, how would you respond to an email from your daughter’s college that appears to claim she was being ejected, or an email from a well-known pharmaceutical company that announced recently discovered potentially fatal side effects of a prescription drug that you are currently taking? Personal attacks like this which are tailored to a specific individual have become more common, and we should expect this trend to continue.

Can We do Anything About It?
Since there is no such thing as a personal firewall to help filter out attacks, the single best thing you can do to minimize the chances of a successful social engineering attack is proper awareness. At the same time, some technical controls can help. I have no “magic list” of five things to do, and I know 16 controls can look like a daunting task, but any or all of these things can help reduce the chances of a successful social engineering/phishing attack.

Even starting with one thing that you are currently not doing can help.

1. You should know that social engineering attacks exist. You should also know that attackers are interested in getting personal information as well as corporate information, and that individuals may be attacked through any phone, email or social media account – both work and personal – since personal knowledge can help make targeted attacks more successful.

2. You should be very careful about the type of information you leave in your voicemail greeting. A good default is to leave your first name, and state that you will return the call, without identifying your group.

3. “Extended absence” messages may be necessary, but should be used with care. Consider leaving a “fake” alternate contact name so that a coworker can easily identify that the call came from your out-of-office message. When you’re out and you want callers to reach “Betty Brown” for assistance in your absence, you might leave an outgoing message that says “Beth Brown” instead of “Betty Brown.” Then, when a caller asks for “Beth,” Betty will actually know that this call came as a result of your out-of-office message.
4. To help minimize the ease with which an attacker can identify valid email addresses at your organization, your email server should be configured so that it does not respond to inbound invalid addresses.

5. Make sure that corporate email addresses have little to no relationship with the employee’s user ID. Never make the name in your email address the same as the user ID you use on your internal network. If the user ID that you use to log onto your corporate network is bsmith, do not make your corporate email address bsmith(at)yourcompany.com.

6. You should be filtering attachments on your email and removing attachments with potentially hostile contents, such as executable files. Distributing Trojan horses or viruses via email is a common attack technique.

7. Be aware of company specific jargon. Anyone who uses improper or general information about your company can be regarded as an outsider. Maybe you work for Tech Experts, but everyone calls it “TE.” Using incorrect terminology is a clue that a call may not be genuine.

8. Someone who acts irate or angry and attempts to rush you through a questionable process should be regarded as suspicious. Bullying someone is a common technique to keep a target off balance.

9. Many (not all) data gathering emails come from temporary or “throw away” accounts, such as an account at Gmail or Yahoo. Your staff should be aware that there are a number of reasons an attacker would like to clearly identify valid email addresses and that your staff should consider this in all external responses.

10. Your company should not use or allow the use of external web-based email accounts through the normal course of your business. Do not let employees get used to seeing official email from such accounts (like @gmail.com instead of @yourcompany.com).

11. Your employees should know that no one from corporate IT (or anyone else) would ever call them and ask for their password. Simply put, no employee should ever divulge his or her password to anyone else. Never.

12. You should maintain an accurate and current employee directory with phone numbers. Anyone receiving a suspicious call can ask the caller who they are and consult the phone directory for the name and phone number.

13. Dispose of sensitive material in an appropriate manner. Either use an office shredder or contract with a reputable “secure disposal” company to dispose of sensitive information for you. Yes, “dumpster diving” is real, does happen and does work.

14. The Help Desk can take steps to reduce the number of invalid password resets and snooping attempts.

a. If a user calls from an outside number, the Help Desk’s first response should always be to consult a corporate phone directory for an official work, mobile or home phone number to return the user’s call. Any number not on the list should be considered suspicious.

b. The Help Desk should verify the employee’s full name, with proper spelling, phone extension, department or group. You are trying to add enough information that an attacker would have to be very prepared for the request.

c. The Help Desk should ask the caller for a number at which they can call the user back, regardless of from where the user is calling. A call from anyone who will not provide a callback number should be considered an attack.

d. You may consider having the Help Desk leave a user’s new password in the employee’s corporate voicemail. A valid user should have no trouble retrieving the password. An attacker would have to compromise the voicemail system to get access to the password.

15. If you are being asked to release or reveal something that is clearly sensitive, such as your strategic plan, passwords, pre-release earnings, source code and other such internal information, it should be automatically regarded as suspicious.

16. You should have a plan for how you will communicate internally if you identify that a social engineering attack is taking place against your company.

Does every employee get an email stating that an attack is in progress, and that everyone should exercise additional care? Who should send the email, and what is the final triggering event before a company-wide alert is distributed?

Conclusion
A good social engineer can extract sensitive internal information very quickly, and can then help ensure they make the best use of that information to further additional attacks.

Knowing this, you should understand that a social engineering attack can happen at any time. They don’t happen because you have poor security, they happen because someone else decided you were a target.

(Image Source: iCLIPART)

Browser Wars: Which Browser Should You Use?

March 18, 2014

colorful Internet browserby Lino Perna,Technician

Since its public release in 2008, Google Chrome has been taking its place in people’s hearts and minds, replacing the commonly used Internet Explorer.

Ever since then, these two browsers have been at constant war. The public loved the fresh, simplistic, elegance of Chrome which left Internet Explorer in its dust.

Now, after all these updates and changes, which of the two has made the most positive progress? Which browser is better?

Internet Explorer
Internet Explorer was the most widely used browser up until 2008. It had the internet navigation world in the palm of its hands, and because of its massive success Microsoft decided not to change anything.

Internet Explorer came standard with every new Microsoft computer, so to the general public, that was the only option. Yes there were other web navigators, but this was the best.

In its current state, Internet Explorer 11 is faster and more efficient than any other previous versions. The security and privacy features are phenomenal and coveted by other browsers.

In a general sense, the interface is usable, but may be too complicated for some users. While it doesn’t have site prediction or voice search, it is still faster and better than ever for everyday tasks.

Chrome
When Chrome was first released, it had low usage percentage because it was an unknown browser, but at that point, Firefox had become prominent and had passed up Internet Explorer.

Slowly but surely, Chrome became more widely known and used. It took until 2011, but finally overcame the competition and became the most used browser in the world.

Today, Chrome reigns over the other browsers. Its usage surpasses any of the other browsers, but the question is: Why? The reasoning for the era of Chrome is its design.

It’s easy enough for an individual of any age to use. It simultaneously possesses the ability to give you luxuries such as: a drop-down box with thumbnails to easily access your favorite websites or the integration of Gmail and Youtube.

The simplicity of it contributes to the unparalleled speed that it possesses. Speed, efficiency and quality are the necessary staples of success.

Google Chrome possesses all three of these essential attributes that helped it achieve and sustain dominance over its predecessors.

The built in flash player and PDF support put Chrome ahead of the competition because both tools are used quite frequently in both a business and scholastic setting.

Wrapping Up
It all comes down to this: When it comes to efficiency, speed, and quality, Chrome takes the cake.

Its facile interface, outstanding quality, and unmatched speed rocket it past Internet Explorer, and any other browser at that.

Though Internet Explorer may be easier to access, if you want a browser that can do all you ever needed and more, while also being considerably faster than its competition, Google Chrome is the browser for you.

(Image Source: iCLIPART)

Tech Tips For The Road Warrior

March 18, 2014

c382409_mTraveling is rarely guaranteed to go smoothly, but there are at least a few travel headaches that can be kept at bay thanks to technology. If you know how to make use of it in the proper manner, technology can increase your likelihood of having a positive experience on your next vacation.

One good tip is to use tech to keep updated on your flight status. Flights are commonly disrupted due to one reason and another, and delays and cancellations et al can be tough to keep up with. Many airlines today however enable you to track your flight status via a website or app, so if you own a smartphone you can stay updated on what is happening with your flight no matter where you are. If an app is offered by your airline for this purpose, be sure to download it and ensure your smartphone has been fully charged before you set off to the airport.

Translation apps are another good idea if you are jetting off to foreign climes. Many translation apps on tablets and smartphones are free of charge, and also have voice recognition software, meaning that communicating with people who speak a different language has never been easier.

(Image Source: iCLIPART)

How To Make Hashtags Work For Social Media

March 3, 2014

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

On the list of the great rewards of social networking is its capability to reach a huge crowd while spending minimal costs. Making use of the famous hashtag notation (especially for Twitter and Instagram), you are able to spread your products and services across the globe, and reap the benefits of well-liked trends.

A hashtag must be short and simple to recall
Crafting a hashtag that is too unique or special could be risky. As much as possible, come up with a hashtag that is brief and straightforward so it can easily be remembered.

Long hashtags are at risk of getting misspelled and forgotten. Additionally, with the 140 character limit of every Twitter post, longer hashtags only consume needless space. Simple abbreviations frequently are very effective.

A hashtag must be unique and relevant at the same time
The primary goal of using a hashtag is to bring online users to your social media page.

Picking a general hashtag that may gain large numbers of results will lower the probability of getting your desired volume of traffic.

It may only just make your posts wander off in the search results. You must make sure that your hashtags are only sufficiently unique to be able to avoid too few results.Печать

A hashtag must be searched first prior to using it
Even though you are confident that you have put together the ideal hashtag, it is still crucial to look for that hashtag prior to applying it.

This is the only way to make certain that you will not get classified with any messages that you are not related to. An example of a hashtag disaster was when a certain company used the hashtag “#notguilty” to express how their customers’ felt after eating their product.

However, this Twitter update was published during a popular person’s murder trial. The hashtag #notguilty became a trend, but for an entirely different cause.

Hashtags serve an excellent purpose which improves your chances of reaching a wider audience. Make sure that you know how to utilize them well.

(Image Source: iCLIPART)

How To Prolong The Life Of Your Computer

March 3, 2014

Печатьby Jeremy Miller, Technician
One of the questions we get asked most often is, “What can I do to prolong the life of my computer?” We have been working on computers for years and have found that hardware protection and regular maintenance is the best answer.

What is regular maintenance?
Regular maintenance is the general up keep of your computer over time. There is a number of free software out there that offer this service with a stipulation.

They will partially clean up your system or some malicious software will state it will speed up your computer if you upgrade to the paid-for version. You should not trust this free software because it can damage some applications or even your operating system.

What can I do?
There are many things you can implement to prolong the life of your computer. You first want to think about your hardware because all software can be reloaded, but once your hardware fails your computer can crash like a house of cards.

Cooling is Key
The first thing I recommend is to regularly clean out your computer with compressed air. Nothing kills a computer better or faster than high internal temperatures. On average your computer is about 30 degrees Fahrenheit hotter than the room it is in.

You can also increase your cooling by adding more fans. Many desktop cases have space for additional fans.
The better the air flow the longer your computer will last. For laptops, you must always ensure the fan vents are not being blocked, and you can increase cooling by using a cooling pad that has additional fans to increase the air flow around your laptop.

Make sure you have reliable power
You should always have your computer powered by a surge protector. If you live in a dwelling that has power fluctuations, you should consider an uninterruptable power supply (UPS) which are also known as a battery backup. Many also protect against brownouts.

Most UPS come with multiple outlets, some are protected by the battery as well as surge protection and some are just surge protected.

UPS will provide regular power to your computer even if your power fluctuates, and it can shut your computer down properly if you lose power.

Without reliable power you can short out just about any component in your computer.

If you shut your computer down incorrectly or if you just lose power you can damage your data and can cause your operating system to stop functioning.

Regular software maintenance
Your computer will accumulate a lot of temporary files from software that does not clean up after itself.

Your hard disk will become cluttered from constantly moving files around, and most computers have old unused software still running in the background.
All of this takes a toll on your computer hardware over time. The idea is to keep the software foot print as small as needed.

The less items you have launch at startup will lead to a much longer computer life. This is because most software needs your processor, Random Access Memory (RAM), and hard drive to run.

The more you have running at one time the higher the stress level on your hardware.

Virus infections may not cause noticeable issues right away but over time you will start to notice things not running properly.

Virus infections and other malicious software can take most of your hardware resources which makes your computer perform poorly. You can attempt to clean these infections out yourself, but without knowing how your computer works, you may end up doing more damage than good.

Is there an easy way to regularly maintain my computer?
We are constantly cleaning out computers and are very familiar with issues that arise in these processes.

We offer a solution to clean out your computer on a daily basis, so that you can continually use your computer without interruption. Our service runs in the background and will take care of most issues that arise.

We can help increase the longevity while you get the most out of your computer. If you are interested in learning more or have questions please feel free to call us.

(Image Source: iCLIPART)

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Malware And Ransomware: What You Need To Know

April 14, 2025

Is Your Business Hardware Holding You Back?

April 14, 2025

The Hidden Cost of Slow Internet In Your Business

April 14, 2025

Do Your Cyber Security Plans Fall Short?

March 18, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Spyware Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.