• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

How Much Power Are Your Devices Hogging?

January 17, 2014

c457441_mby David Stone, Technician
Do you find yourself looking high and low for an outlet, a cord or a charger for one of your many electronic devices?

Today’s world finds most people switching back and forth between a mobile device, car infotainment system, workplace computers, home computers and multimedia devices.

It would be wonderful if all of these electronics used the same power adapter and charge time. Unfortunately for you, the consumer, it does not work that way.

Most electronic manufacturers have their own proprietary cords, batteries and charger adapters. You can blame costly patents, industry rivalries, or just the desire to be different as the culprit behind all these seemingly trivial decisions.

Regardless of the reasons, knowing how much power each device draws or requires for charging quickly will empower you as well as save you some money on your electric bill.

Belkin has created the Conserve Insight to provide you with the data needed to monitor the watts you’re using, how your carbon footprint is affected and how much money you’re giving to the power company.

Setting up the Insight is pretty simple and straight forward. Simply plug the Insight into your outlet, then plug in your device and start to monitor your device power usage.

Hit the $ button, and it will switch back between how many watts your currently using as well as how much it will cost you on a monthly basis.

It will even keep track of the carbon dioxide produced in order to power that device.

Another cool feature is the averaging mode option that activates after 45 minutes and projects the carbon dioxide and dollar amount cost for the entire year.

This does not work in watt display mode that only shows you real time usage updates.

The five foot cord that connects the display unit to the outlet adapter is a great improvement over similar products, as you no longer have to crawl around under desks and tables in order to see the read-out.

A bit of form-factor goes the extra mile and makes the Insight look stylish and at home on your desk or workspace.

The best feature by far is the conserve option that allows you to set a time limit for how long the device will draw power.

There’s a switch on the side that allows you to choose from one of three time increments, 30 minutes, 3 hours or 6 hours are your only choices, but most devices today will never take more than six hours to charge.

The Insight will power itself off after the time has elapsed, saving you the hassle of unplugging each device after they’re fully charged.

Belkin has taken the steps to innovate a product that has plenty of market share, and will most likely win over consumers for its ease of use and reliability.

Using technology to better manage your high tech devices and power usage, plus you can use it to manage your Christmas lights!

(Image Source: iCLIPART)

One Last Time… How Important Are Small Business Backups?

December 30, 2013

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Last month, I shared with you my personal experience with local search and how it impacted the surgery my dog Daisy needed. This month, I’m going to share with you my personal experience with the importance of offsite backups.

Earlier this month, we had a pretty bad fire at the house. Everyone got out ok, including Daisy and Bailey, but the damage is incredible. We’re living in a condo for the next six to nine months while the house is repaired.

The fire started in the center of the house, where all of my networking equipment is located, including my Fortinet router and my Western Digital network attached storage (NAS) device.

I use the NAS primarily to store old tax information, backups of my Quickbooks files, backups of my extremely important pictures from Michigan Football games, and other personal information.

The Fortinet, NAS and everything else that was in that room are completely destroyed – all that remains is a charred mess of plastic connected together by the thin copper wire that used to be Ethernet cable.

As is always the case, the fire was completely unexpected. And, it happened so fast that we had just enough time to get ourselves and the dogs out. There was no time to save network equipment, much less anything else.

Dec-2013-backupsAnd that’s the important thing to take from this. No matter how convinced we are that “it could never happen to me,” it’s our responsibility as business owners to be prepared for any eventuality.

Fortunately, all of my personal data is protected by the same industrial strength backup solution we use for our business clients – our Experts Total Backup service.

All of my files and documents were backed up to the Tech Experts cloud servers, and nothing was lost. Our Experts Total Backup service works quietly in the background, compressing and encrypting your files before sending a copy of them to the backup server in the cloud.

A few days after the fire, once things settled down, it took just a few hours to copy everything down from the cloud and onto a new NAS unit.

So, what’s the take away from all of this? Expect and prepare for the unexpected. If I didn’t have an offsite backup for my data, I would have lost a ton of information, but none of it mission critical (except, perhaps, my U of M football pictures).

A similar disaster at a small business would be catastrophic in the best instance, and deadly if the company didn’t have offsite backups.

And as I’ve written many times before, your business’s backup is only as good as the last time you tested it.

Whether your backup is onsite using tape or other removable media, or offsite using a service like Experts Total Backup, you must routinely test and verify your backups.

Thanks!
Everyone around me has pitched in to help, but a few folks have gone above and beyond.

Leski Insurance Agency and MEEMIC Insurance Company (734-242-6759) have been incredible.

The Frenchtown Fire Department was on-scene in minutes.

Annette Perna-Taormina from Gerweck Real Estate took literally one day to find us a temporary place to live. Call her for your real estate needs at (734) 243-4200.

Finally, friends Michele Paled, Marlene Messina, Tammi VanAken, Candie Mulligan, Kim Harper, and my mother Carol have been incredibly helpful and supportive.

Why Social Networking Is Important For Any Business

December 30, 2013

by Jeremy Miller, Technician
If you are not currently using social media for your business then chances are that you have fallen behind your competitors.

Social networks such as Twitter, Facebook, Pinterest, LinkedIn, Instagram, YouTube, and Google+ are great platforms to promote brand awareness, communicate with existing and potential customers, as well as attract new leads.

Up to a quarter of developed nation’s Internet traffic is used on social media and networks. It is free to sign up and use all of these social networks. Why wouldn’t you want to address this market?

Social media sites can help you establish your online presence. Statistics show that over 70% of people trust ads on social networks from friends, while only 10% of people trust advertisements from websites.

Social media is more than just getting your name out there; it establishes trust and lasting relationships with new and existing clients. You can keep in touch in a personal manner, update services that you offer, and offer discounts and coupons on your social sites.

Social networks work like word-of-mouth, but more reliably. Your friends and followers can easily share your content with as many people as they want without interrupting their daily lives.

This is important because if it is a hassle to view your advertising it could be considered a nuisance instead of a promotion.

Instead everyone will check their social sites and see a post from their friend to check out your business. They are already in the mood for reviewing messages, so this is not an inconvenience to read.

Now before you start making a profile on every social site, first consider what you want to get out of social networking. Most businesses could get a Twitter account to share basically anything instantly.

Twitter is great for marketing and reaching many people instantly. Since Twitter is available easily from any smart phone, it is basically like texting all of your followers at once. Your followers can then retweet or share anything that you post.

Facebook is also very popular. It is a publicly trusted location and it performs really well in Google’s search index. This means that if you are having trouble with getting your website to the top results in Google, Facebook can help. Your company’s Facebook page should not take too long to reach the top results if someone is searching for your business.

Each social network is different and attracts different crowds. This can be seen in the usage statistics for each network. This can help you determine which social networks would be best for you to reach your desired audience.

When starting out you want to start slowly. Do not join every social network you can find. It would be best to join Twitter and Facebook at first. Determine who is going to manage the social sites. Then once you have some followers post some polls or special offers to attract more followers.

Once your followers start posting to your page, read their posts and answer them. This will add a lot of value to your business.

You can begin posting articles related to your business to encourage people to spend more time reading your content. Some things to keep in mind would be to not post too often or you may be considered a spammer.

Once you have become familiar with social networks you can expand to other social networks such as Google+ or Pinterest. The most important rule of all is to be patient; you may not see results overnight. However, if you provide quality content, service, and interactions on your social sites you will be successful.

If you would like help determining where you should start or need any help with your existing social networks, give us a call.

Data Security: Why You Should Be Concerned

December 30, 2013

by Michael Menor, Network Technician
All businesses, big or small, have client data which is the life blood of their company. Losing this data can prove deadly; even worse having this data held hostage.

The purpose of this article is to explain the importance of data security with encryption and also viruses like CryptoLocker which purposely encrypts your data and requests that you pay a ransom to release this data. This nasty little virus is no joke, many companies have fallen prey to it and have paid the ransom which ranges anywhere from $300 and upwards to $2000.

Let’s talk about this CryptoLocker virus. “What is it?” you ask. This is a piece of ransomware that targets computers with the Windows operating system. This virus is spread as an email attachment and has been seen to pose itself as a voicemail message.

Once CryptoLocker is installed on your computer, it encrypts all documents on your local computer, as well as ones that are stored on network drives and external storage. The encryption used is strong, 2048-bit, cracking this level of encryption is impossible.

It would take approximately 6.4 quadrillion years to break. Even if you were using a super computer it would take a very long time to break.

Hard drive encryption should be the first step in ensuring data integrity. Microsoft has their own encryption technology called BitLocker, which is only available on Windows Enterprise and Ultimate editions.

TrueCrypt is a free alternative. The only problem with this is that once you authenticate the drive that is secured with either software, it is ready for use and allows the user to freely read and write to the drive. Which in turn lets other programs on the computer do the same.

In regards to TrueCrypt, it has no supporting management infrastructure, and no key recovery system. If you forget your password, or something goes wrong with the TrueCrypt file, there is no way to get your data back. You must therefore keep separate backups. Another alternative to hard drive encryption is backing up your important data to the Cloud. You don’t have to worry about maintaining a storage server or carrying around an external hard drive. Everything is available to you wherever you go as long as you have an Internet connection.

Talking about all this data security will not stop the standard user from opening email attachments without verifying the sender of this file. Having proper net etiquette training can be very useful, you want your employees to understand the risks of these attachments and the possible risks involved when they’re viewing their email or even browsing the Internet.

Before users open any email attachments they should ask themselves. Is the email address trusted? Were you expecting an email from them? Is the spelling and grammar consistent with what you’d expect from the sender?

Security Expert, Nick Shaw has created software that can prevent CryptoLocker. This software prevents CryptoLocker from ever executing and has been proven to work on Windows XP and Windows 7 workstations.

Contact us for more information on how to prevent viruses or if you have any questions regarding data security and backups.

Windows 7 System Information Gadgets

December 30, 2013

by David Stone, Technician
Microsoft pulled support for desktop gadgets for Windows 7 a while ago, but they are still available and quite handy for getting real time updates on system performance.

If you are an end user that likes to know up-to-the-minute system information, then these are just what you’ve been looking for.

Below is a list of 5 such gadgets that make accessing information fast and are visually appealing.

Margu Notebook Info 2
Margu Notebook Info 2 is used for laptop and notebook specific information and offers a simple to read layout.

This gadget will give you real-time updates for wireless local area network (WLAN) and local area network (LAN) interfaces, net usage, multicore usage, clock/calendar, central processing unit (CPU), battery, uptime, power management plans, RAM/CPU usage and hard disc drive usage.

The graphical user interface (GUI) allows for you to add/remove any of the information you want to display as well as rearrange the layout. This provides one of the best options for laptops.

Xirrus Wi-Fi Monitor Gadget
Xirrus Wi-Fi Monitor Gadget provides you with very detailed information about wireless connections within range.

It allows you to view the data rate, service set identifier (SSID), the channel, signal strength, IP addresses and even local connection layouts.

Clicking on a wireless network in the map will return a usage history report of the available networks.

You can even change the skin of the gadget and configure the brightness, although it can be a bit distracting with the constant sonar animation.

Drives Meter
Drives Meter offers up-to-date status of the health of your hard drives as well as set alarms for low disk space. The alarm will make a sound when remaining space left meets the threshold set by the user.

The display shows disk activity, used space, remaining space and total disk space.

This gadget definitely comes in handy when trying to troubleshoot hard drive issues or for keeping tabs on disk usage.

Network Meter Gadget
Network Meter Gadget is an excellent wireless traffic monitor, if not the best.

On one small display screen you can quickly see the wireless service set ID (SSID), internal and external IP addresses, firewall status, signal strength, upload/download speeds, speed test and connection security status.

If you select the fly-out features and see the name of the network, name of the adapter, the maximum speed, the MAC address, the subnet mask, Dynamic Host Configuration Protocol (DHCP) lease details and much more.

System Information
System Information is an all-in-one gadget that allows you to view information on the operating system, CPU, uptime, memory, HDD, network drives, optical drives, battery and network.

You can select how much information you would like to display through the following modes: normal (shows all information), compact (shows headers only) or compressed (only one icon is shown).

Just because Microsoft has determined that support for gadgets will no longer be provided, doesn’t mean that you have to do without these tools.

If you’re looking for tools to hand out system information, you can’t go wrong with one of these gems.

 

How Important Are Websites And Search Engine Rankings For Local Businesses?

November 27, 2013

nov-2013-daisy

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

I recently had to find a new veterinarian for my dog Daisy. She had a fairly large sized tumor in a delicate spot, and it needed to come off. Her former doctor in Ohio sold his practice, so I was searching for a local vet who could take care of the surgery and ongoing care.

Daisy’s a healthy dog, but she’s getting up in years – she’ll be 15 on her next birthday – so I was really concerned about the effects of anesthesia and the success of the surgery.

Of course, I spoke to friends and family for their recommendations, but I also spent a lot of time looking on my own. And where did I search? Google, of course.

We have a large number of small business clients who serve the local market area – companies like florists, tanning salons, and even a marina – and aren’t interested in, or even need, the global exposure a web site gives their company.

A fresh and updated website doesn’t always figure into their marketing strategy. I think that’s a costly mistake. According to a report published by Google, 70% of consumers still reference the yellow pages. I was surprised by that statistic – I don’t even have a phone book at home anymore.

What’s interesting is that only 33% of those consumers use the yellow pages exclusively. That means that almost 70% of local shoppers are using search engines for at least part, if not all, of their buying research for local products and services.

Google has recognized the need for local, small business search results, and has for a number of years offered Google Places and Google Local for small businesses to showcase their companies. Places or Local results point back to a company’s website.

That’s the important part. While I was looking for a veterinarian, I found a dozen local offices. About half of those had websites. And all but two of those websites were old and out of date. One doctor’s page even had the wrong phone number on it.

Having an updated and user-friendly website is only part of doing well in local search.

The other part is optimizing your site to make it index well in Google, so when consumers search for the services you provide, your site shows up at the top of the listings.

We offer both website development services, as well as search engine optimization. Pricing for a modern, user friendly website (that you can edit yourself once it’s finished!) starts at just $299. If your website needs are more complex, we can handle that too – and at a very budget-friendly price point. If you have an interest in updating or modernizing your company’s website, I’d welcome the chance to talk with you about it.

Daisy is doing great, by the way. Her stitches came out a few weeks ago and she’s back to chasing cats in the yard and angling for cookies in the house.

Mobile Device Management Is Key In Securing Your Network

November 27, 2013

by Jeremy Miller, Technician
Mobile devices have been finding their way into the workplace since the cell phone was invented. Since the evolution of mobile devices in the workplace is rapidly growing and changing it can be hard to make sure that your device is not leaking company information intentionally or even unintentionally.

Information Technology (IT) has had to evolve alongside mobile technology and how to secure devices without restricting too much access.

There are usually two options of allowing mobile devices in the workplace. You can provide your employees with a company owned device or you can allow them to use their personal device.

Providing your employees with a company owned device allows you to monitor every detail about the phone including calls, messages, installed apps and location of the device. This is possible because the employee can expect no privacy from the company on this device.

When you allow an employee to use their own device at work you have to take their personal privacy in consideration. You might not want to monitor their phone calls, messages and apps installed.

Instead you can make the device more secure. You can install monitoring software that will allow you to lock the device if it gets lost, wipe the device if you know it may have fallen into the wrong hands, or find the device by using GPS location.

We have the ability to install our monitoring software onto any Android or iOS device and choose a profile that will suit a personally owned device, a company owned device or we can even customize a plan that will suit your needs even more specifically.

Since mobile devices are prone to getting lost or stolen they need to be protected in the best way that you can. In most cases installing monitoring software is the best solution.

This is because we can monitor the phone without interfering with the device usage. Once the device is compromised we can act quickly to get the device secured.

On the other hand if you notice an employee is acting suspiciously you can monitor their phone usage to determine if they are wasting time or acting maliciously against the company and take action before something more serious happens.

The best part about managing your mobile devices through Tech Experts, is that we are very competitive with other personal phone security managers out there in both price and features.

Our prices are very affordable and services can be easily customized to meet your needs.

It takes just about as long as installing an app to your phone as it does to setup our management software on any mobile device running Android or iOS.

You will be able to rest assured that your mobile devices are virtually safe from data loss, your employees are using their resources and time accordingly, and in the event of an issue we will be there to assist you in any way we can.

If you are interested in trying out our mobile device management service please contact us and we will be happy to help you with any questions.

Network Security: Top Tips For A Secure Network

November 27, 2013

by Michael Menor, Network Technician
As the first layer of defense in your network, it is important to take a step back and review the design of your perimeter security.

To ensure a sound architecture, you want to start with what ultimately must be protected and then design your perimeter security so it can scale as your needs grow/change. Since the threats you know about and face today may not be the ones you face tomorrow, you want to be sure your design is flexible enough to meet future needs.

Think of your network perimeter like a castle during medieval times, which has multiple layers of defense – a moat, high walls, big gate, guards, etc. Even in medieval times, people understood the importance of having layers of security and the concept is no different today in information security. Here are four tips:

Build layers of security around your castle
No defense is 100% effective. That’s why defense-in-depth is so important when it comes to building out your security. The traditional first line of defense against attacks is typically the firewall, which is configured to allow/deny traffic by source/destination IP, port or protocol.

It’s very binary – either traffic is allowed or it’s blocked by these variables. The evolution of these network security devices has brought the Next-Generation firewall, which can include application control, identity awareness and other capabilities such as IPS (Intrusion Prevention Systems), web filtering, advanced malware detection, and more baked into one appliance.

Whether or not it’s part of your firewall or a separate device, IPS is another important perimeter defense mechanism. Having your IPS properly optimized and monitored is a good way to catch attackers that have slipped past the first castle defense (firewall/router).

The popularity of moving more into the cloud has brought cloud-based malware detection and DDoS (Distributed Denial of Service) services. Unlike appliance-based solutions these are cloud-based services that sit outside your architecture and analyze traffic before it hits your network.

Harden your device configurations, software updates and security policies
Here is where we start building those walls to prevent attackers from getting inside the castle. The first line of defense typically involves network security devices such as routers, firewalls, etc. which each act like the guards, gate, moats, etc. of long ago.

For each layer of security, you want to ensure they are running the most up-to-date software and operating systems, and that devices are configured properly.

A common misstep occurs when organizations assume they are secure because of their many layers of defense, but a misconfigured device is like giving an attacker a key to the castle. Another important practice is to tighten security policies (of course without impacting the business), so for example you don’t have a router allowing just anyone to Telnet to it from outside your network.

Enable secure network access
While firewalls, routers and other security layers are in place to prevent unauthorized access, they also enable access that is approved. So how do we let authorized personnel into the castle? The drawbridge of course! Next-generation firewalls can help here by scanning inbound and outbound user traffic, all while looking for patterns of suspicious behavior.

Password complexity also plays a big part in Secure Network Access. Ensure your users are following these common rules.

  • The password must be exactly 8 characters long.
  • It must contain at least one letter, one number, and one special character.
  • Two of the same characters sitting next to each other are considered to be a “set.” No “sets” are allowed.
  • Avoid using names, such as your name, user ID, or the name of your company or employer.
  • A new password shouldn’t be too similar to the previous password.

Another way to have secure access from the outside through the perimeter is to install a VPN (Virtual Private Network) that is configured to allow encrypted communication to your network from the outside. Utilizing two-factor authentication with a VPN contributes towards ensuring the integrity of the users making the request. This is external-facing to your network and allows users to tunnel into your LAN (Local Area Network) from the outside once the appropriate measures are taken to secure access.

Create and segment the DMZ
If firewalls, routers, web filters, etc. are the guards, moat, gate, walls of a castle, then the DMZ (De-Militarized Zone) is like the courtyard once inside the castle – another area before the private quarters.

When creating a DMZ, there should be at least a front-end firewall for the external traffic and a back-end firewall for the internal traffic. Firewall rules should be optimized and tightened on all publicly available systems to allow traffic to only the necessary ports and services in the DMZ. From an internal perspective you also want to limit who can access systems within the DMZ. One approach is creating firewall rules to only allow the source IP addresses and port to the specific server and then adding proxies in the network from which admins are allowed access to the systems.

Segmenting systems within the DMZ is also something to strongly consider so that if a system is breached in the DMZ, it can’t spread as easily. For example, you don’t want a web server passing data to an application or database server in a “public DMZ.” Configuring systems within different VLANs (with a layer 3 switch) will help you isolate and respond to incidents if a server in a DMZ is compromised.

A sound network security perimeter architecture requires multiple layers of defense, up-to-date and hardened policies and controls and segmentation. All of these things make it harder for an attacker to gain access to your crown jewels and easier for you to isolate and respond to breaches when they occur.

BlackBerry To Profit From Patents

November 27, 2013

by David Stone, Technician
After a little over a decade of being a main mobile power in the business world, Blackberry (NASDAQ: BBRY) is fading to black.

The smartphone and tablet manufacturer is getting edged out by an array of factors: First they waited too long to release a device that could compete with Android and iOS, and then fell short on innovative features and operability. Secondly, they failed to market their devices to generate the kind of “tech buzz” needed to drive consumer sales these days.

While Blackberry reigned supreme as the go-to business message service and mobile emailing solution, they were surpassed by changes in industry and social popularity.

Perhaps they made changes too little too late, or perhaps they thought that their grip on the business world would ever cease. Either way, they will forever be an example of how refusing to adapt and change or not being able to see the coming change will extinct your business.

The announcement of profit losses was preceded by a work force reduction plan and the possibility of going private. Both indicate a company in turmoil, not a tech giant about to reinvent the way people connect and share data. The future for new devices looks bleak at Blackberry, but the future of the company looks like it might have some options that provide low-maintenance profitability.

In addition to being the 6th largest manufacturer of mobile devices (smartphones & tablets) Blackberry also provides mobile internet service to 91 countries on a worldwide network of over 500 mobile carriers.

Blackberry also holds a lot of proprietary patents, which much like Microsoft will generate plenty of income with little to no cost. This would essentially turn the company into a technology holding company, with a focus on maintaining licensing not developing new hardware. In effect, this would hand the company over to the lawyers and wrestle it away from the engineers. That does not bode well for any company that wants to be an industry trend-setter.

With stiff competition from Android and iOS, a former industry standard in the world of mobile computing is all but gone. Perhaps it will remain in the ring for a few more rounds with a cult-like following of users, or maybe they will break into the services sector and resurge as a mobile-enhancement services company.

It’s A Scary Time For Your Company’s Systems And Data

October 18, 2013

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

We sent out an email a few days ago alerting folks to a new and particularly nasty virus that’s making the rounds. It’s called CryptoLocker and, if your systems get infected with this particular kind of “ransomware,” it is, frankly, a nightmare.

CryptoLocker scans your system and looks for all of your file storage locations – your local C: drive, any USB thumb or external drives, and even network shares (if you save files on your S: drive, for example).

It then encrypts every file it finds using a sophisticated, spy-level type of encryption. Your files – Word, Excel, Powerpoint, etc. – all become unusable.

Pay up, or else
You’ll then get a pop up on your system, letting you know that your personal files are encrypted, and if you want the key to unlock them, you’ll need to pay the cyber crooks to get it. The ransom (thus, the term “ransomware”) is anywhere from $300 on up. And, there’s a deadline – 72 to 100 hours – after which, the key to your files is destroyed, and you’re simply out of luck.

Prevention
This nasty virus is spread by opening email attachments or through other “social engineering” means.

Spam/virus filtering are generally aware of the threat and actively block emails that contain elements of this and other malware.

We suggest notifying your employees immediately of this new virus and making sure everyone is following some basic preventive measures:

  • Do not click on attachments in emails from someone you don’t know or companies from which you haven’t expressed interest in receiving information.
  • Do not click on links, advertisements or pictures that pop up on your screen when visiting other websites.
  • Do not engage in social media games or click on links that appear on social media platforms.

The virus emails come in the form of a shipping notice from UPS or FedEx. It is obviously fake, but the scammers make it look very real.

Why aren’t you backing up your data?
I’ve been in the IT business for nearly 27 years and I can say I’ve pretty much seen it all. But I’m still astounded when we run across a business owner who isn’t backing up their data.

Studies show that only six out of every 10 people back up their computer files. The 40% that don’t said that it was because they didn’t think they needed to.

According to a report by PricewaterhouseCoopers, 70% of small businesses that suffer a significant data loss go out of business within a year.

These ransomware and other destructive viruses are becoming more and more prevalent. We work hard to keep your systems safe and protected, but no antivirus software catches 100% of everything.

More than ever, it is vitally important that your business have a solid backup system that is managed, monitored and tested. Too many times we’ve gone in to help a new client who is in the middle of a disaster, only to find out they were religiously changing tapes in a system that hadn’t successfully ran a backup in months – or years.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.