• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Pinterest: The Next Social Site For Small Business?

March 13, 2013

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Facebook, followed by Twitter, have always been the go to social media websites for businesses.

This year, we saw the rapid rise of Pinterest, which is now the third largest social media site today. The website continues to attract plenty of users and enthusiasts – including small and big businesses alike.

What Is Pinterest?
Pinterest is a virtual pin-board that lets people organize and share photos that they find anywhere on the web. They can create specific boards and pin any photo that they come across – in case they need it for inspiration.

The website is often touted as a digital dream collage, or a corkboard with magazine clippings and recipes.

Users can create boards about anything, and pin any photos they like ranging from recipes to gifts to fashion to food.

The website is image based only, except for the small captions on the photos, thereby taking away the clutter of texts and webpages.

Users can also view the most recent pins or the most popular ones, follow other users, like other photos and even re-pin them on their own boards.

Unlike Facebook or Twitter, where accounts can be made private, all pinned photos on Pinterest are available for public viewing, so anyone can basically comment or re-pin your photos. Likewise, you can like and pin anything that catches your attention as well.

Who Is Using Pinterest?
Pinterest has indeed grown over the past year, with a total unique visitor increase of 2702.2% since May 2011. It averages around 1.36 million users each and every day and is driving more traffic than Google+, LinkedIn, YouTube and even Twitter, and the number continues to rise.

Top businesses have also taken to Pinterest to reach out to potential clients. These include mobile phone carriers such as Verizon and AT&T, mobile phone manufacturers like Motorola, LG, Samsung and Apple as well as other brands such as Whole Foods, Krogers, Nordstrom and the like.

Why Should You Consider Pinterest?
Pinterest is something worth considering because it is a website that inspires action in people. It serves as a recommendation engine, or a repository of ideas, purchases and sales waiting to happen.

Pinterest users constantly visit the site to look for ideas, inspiration and other things that are out of the ordinary. Likewise, they visit the site to look for things they or their friends might find interesting or to remind themselves what they need to buy, use or revisit.

Many users also visit the site to recommend and share products that they like; and they can serve as potential buyers.

Remember that millions of users do these on a daily basis – and some of them might just end up as your near-future clients, long term buyers and potential product advocates.

Windows XP Support Ending Soon

March 13, 2013

By Tech Experts Staff
Windows XP set the bar for business friendly operating systems and has been in use for over twelve years now. Microsoft is now pushing users to its new operating system, Windows 8. Many users and administrators alike feel that Windows 8 will not be a suitable business friendly operating system for its users.

Another issue with Windows 8 is that many software providers still do not support it so as a business where should you be looking? Windows 7 has been the most business/application friendly operating system since Windows XP so that would be the best replacement.

Since Microsoft is discontinuing support for Windows XP, what does that mean exactly and when is it going to happen?

Microsoft has set a date of April 8th 2014 as the end of support date for Windows XP. Oh, 2014 you have plenty of time to plan down the road right? Wrong, when Microsoft stops supporting the operating system it will become very vulnerable to attacks so you want to make sure this is completed before Microsoft ends support.

Hackers will develop malware to attack XP and Microsoft will no longer be working to patch the holes that cyber criminals are using to steal your personal information.

Since support is ending it means that doing online banking or other transactions on your personal computer running this operating system will become extremely dangerous. In relation to businesses, they risk exposing client data which can be very costly.
Businesses need to plan these operating system upgrades as it will take a decent amount of time/preparation to complete smoothly and successfully.

Planning means start now don’t wait till the last minute or you will not be able to get everything switched over in a smooth fashion. Since upgrading computers from Windows XP to Windows 7 is the best option to prevent major security risks what needs to be considered to accomplish this?

The first step in getting your company ready for operating system upgrades is making sure your software is compatible. Many organizations use software that is specific to their industry, the software companies that develop this software also needs to be preparing.

Companies should be checking with their software providers to ensure their software will work on Windows 7 and should get documentation on how to smoothly upgrade their computers software for the least downtime possible.

Not only does industry specific software need to be addressed but software you use every day also needs to be looked at. Most computers running Windows 7 are 64 bit operating systems, that being said not all software runs on a 64 bit operating system.

One application I can think of that is not compatible with Windows 7 (we have seen numerous issues) is older versions of Microsoft Office. Businesses need to not only keep their operating systems up to date but this software also should be. Office XP does not function properly on Windows 7 nor do any other old versions.
The other problem with keeping old software like this is the file formats have changed since they have been released. Your clients may start sending documents to you that your copy of Office might not be able to read. Office 2010 pairs well with Windows 7 and it supports all current file versions released by Microsoft.

One final consideration, many businesses and users alike want to know what it will cost to simply upgrade from Windows XP to Windows 7 however, there are two problems with this.

First, Windows XP to Windows 7 does not offer an in place upgrade, this means that all of your software, user files, etc. would be lost simply doing an “upgrade” to Windows 7. While user files can be backed up, software/applications cannot, they will have to be reinstalled.

Second, upgrading an old workstation may not be worthwhile. In most cases, older hardware was not designed to run Windows 7 and because of this tends to run slower and not perform as well as a computer that was designed for it.

We highly recommend upgrading the entire workstation to new hardware, especially in the case of businesses. It just doesn’t make sense to spend all the money on the time involved in upgrading the operating system if you can’t gain speed benefits and make your employees more productive.

Need a hand getting started with your businesses upgrade? Give us a call today at (734) 457-5000 and we can work with you on a plan to get your company switched over to Windows 7 so that your computers remain supported for years to come.

How To Know If You Have A Virus Infection

March 13, 2013

by Jeremy Miller, Technician
There is a lot of anti-virus software on the market today. They are created from many different software developers. All of them are a little different in how they protect your system.

There is no guarantee that your anti-virus software can protect you from any virus out there.

First let’s look at how anti-virus software works. Anti-virus software is usually installed on your computer, then it is scheduled to scan your computer regularly. A virus scan will scan each file on your computer for a “known” virus signature.

A virus signature is a piece of code that is known to your anti-virus software manufacturer as a virus. If your anti-virus detects a signature it will either remove it or ask you how to handle the file. You should remove any viruses that your anti-virus finds for you.

Most anti-viruses come with heuristic protection as well, which is when your anti-virus is able to detect suspicious activity on your computer.

Viruses are known to leak information, such as online banking information, or any other personal or confidential information.

They can lie dormant waiting for a specific user interaction before becoming active. They have the potential to cause unrepairable damage to computer operating systems.

There are many ways to get a virus on your computer with having an anti-virus software installed. The main reason is that virus developers have studied many different anti-virus software, and have been able to write viruses that cannot yet be detected by most anti-viruses.

The reason your anti-virus software cannot detect a newly written infection is because the anti-virus manufacturer has not yet seen the virus and does not have a signature in the database for it. This is the big reason why you should keep your anti-virus software up-to-date.

Another reason that your anti-virus software might not detect a virus would be because you trusted it.

Have you ever saw a pop-up on your screen asking for your permission to allow a program to run? If so then you may have allowed a virus to infect your system.

The last most common cause of infection is attempting to “Speed up your PC.” There is a lot of software out there that claims to speed up your PC for free. The problem is that good software is not free. Some free versions of software can actually slow your computer down, to promote the paid-version.

Also when downloading this software, there is usually a few links that look like download links.
If you click on the wrong one, you may install a virus. Also once you do get the right link, there are usually additional software included during the installation process.

You should always pay attention to every screen during the installation process to make sure you are only installing what you intended to install. There are a number of ways to detect if you may have a virus on your computer.

Your computer should behave regularly. This means your computer should not have any drastic changes day-to-day.

If you have lost access to something, or cannot connect to sites or services that you normally can you may have a virus. If you are browsing the Internet and your address bar does not go directly to the site you want, you may have a virus.

Also if your computer takes longer to startup than usual, this may be a sign of a virus.

If you have any of these symptoms on your computer or if you would like to proactively manage your computer’s security, you should contact us for assistance.

We recommend regular check-ups for your computer to prevent any malicious activity on your computer. You can contact us to work out a plan to combat malicious activity on your computer that will be simple and easy to understand.

 

Get Past The Roadblocks To Creative Concepts

March 13, 2013

Sometimes the ideas just don’t come. You don’t have to be a cartoonist or a novelist to need fresh ideas; every job calls on us to find creative solutions from time to time. When you’re not feeling the magic, look for these common causes of “imagination block”:

Inside the box thinking
You may be looking for familiar solutions to the same old problems. Get into the habit of questioning all your assumptions and looking at situations from different angles.

For instance, instead of asking, “How can we sell this product to our customers?” try, “What would make a customer reject this product?” and build your solution around eliminating that objection.

Fear of…
Maybe you’re afraid of failure. Or the commitment a solution might call for. Or perhaps you’re aware that the best idea will require you to do things you’re not comfortable with.

Confront your fears head on, and identify why they’re paralyzing you. Most of the time you can overcome them if you break them down into manageable elements.

Lack of knowledge
Take a look at your subject. If it’s unfamiliar, you may not know enough detail to generate any relevant ideas. Do more homework.

Or if you’re casting about for a completely new idea, devote time to studying something outside your usual area of expertise without looking for a flash of inspiration. Often, exploring a new field will generate unexpected connections between existing projects.

Overabundance
Sometimes the problem is that you’ve got so many partial ideas that you can’t choose just one to develop.

Try picking one at random and working on that alone until you’ve either got a solid project or you reject it for being unworkable. Or step back and look at your priorities so you can choose the option that suits your needs best.

Twitter Writing Tips

March 13, 2013

Writing on Twitter is by necessity an exercise in brevity, and it may surprise you to find out that B2B marketing can actually be quite effective even when you can use a maximum of only 120 characters.

Here is an important tip: just stick to the facts. Long titles may be SEO friendly, but more than likely they will just get lost on Twitter, where they simply do not work. Titles need to be short, to the point and appealing.

On Twitter it is not a bad thing to be familiar; messages with a famous quote, a hit song or a piece of pop culture often resonate.

Tweets that carry with them some kind of positive connotation will give your message extra impact.

This does not mean, however, that you can just copy text outright, so exercise some discretion.

Being timely is also important on Twitter. You are writing for a real-time audience, and any message needs to be in tandem with the current interests of your followers. Remember, he who hesitates on Twitter is truly lost.

Steps To Secure Your Social Media Strategy

February 12, 2013

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Keeping your internal network secure is one of the top jobs of IT consultants like Tech Experts. You don’t want confidential company or client data to show up on the web.

But what happens when you start marketing your company on social media sites? How do you keep your company secure?

In general, cyber criminals aren’t stupid. They troll sites like Facebook and Twitter, looking to take advantage of useful information employees naively post.

A policy that educates your employees on the “Do’s and dont’s” of social media posting can save your company an enourmous amount of aggravation.

Here are a few steps to include in a social media policy to ensure social media is conducted in a secure manner. It’s important to have a solid policy if you want to ensure that your network and data remain safe from potential social media threats.

Watch where you click
Almost all social media postings contain links to other content. This is the sweet spot hackers are targeting. They place innocuous links to virus and spyware programs, or even worse, hijacked accounts of your friends and business associates.

You should tell employees involved in your social media efforts not to click on any suspicious links. If they receive links from friends that seem uncharacteristic, it’s a good idea to not click on them.

Update privacy settings
Social media sites constantly update and change security settings on their networks, leading to unexpected exposure of information you might not want indexed on the web. It’s a good idea to ensure that all of your profile information is private, and that you regularly review your privacy settings.

Don’t share personal information
This might seem obvious to you, but there are still unsuspecting users out there who share too much of their personal information on social sites. Remember, social media is all about being social. Pretty much everything you share can be viewed by others. The last thing you want is an identity thief accessing your contact information and other personal data.

Log in using HTTPS
HTTPS is a web protocol that ensures the data sent between your computer and a web site is secure and encrypted. Many social sites like Facebook, Twitter, and Google Plus support HTTPS, and you should ensure that you use it.

To use HTTPS, you simply put an S at the end of the usual http address in the URL bar of your browser. I.e., https://facebook.com will open a more secure version of Facebook. By using HTTPS you can eliminate Man-in-the-Middle attacks and other similar types of phishing.

They key thing to remember: If you don’t know them, they aren’t your friend. You’ll be miles ahead if you treat social media interactions like you do real life interactions. You wouldn’t offer a stranger your cell phone number or home address until you knew them well. The same precautions apply to your social media accounts.

Common Network Problems Resolved

February 12, 2013

By Tech Experts Staff
It’s amazing how easily network problems can turn into a huge headache for businesses and home users. If you don’t have guidance when purchasing equipment, or don’t know how to properly maintain and troubleshoot issues, you could be down for hours or days.

While network problems and questions are very common, there really are simple solutions to them. This month we’ll take a look at the most common network related questions and problems and how we generally resolve them.

The first question we regularly hear, most often from home users, is “How do I know what kind of equipment to purchase?”

That isn’t that hard of a question. Generally, with network equipment, it comes down to the old saying “You get what you pay for.”

When you buy networking equipment, whether it’s a switch to expand the number of available connections on your network, or a router, don’t buy the lowest priced one you can find.

There’s a reason one piece of equipment is more expensive than another. Generally, the price difference means drastic differences in the speed of the unit, number of available ports, range, and in some cases security features.

So, when buying network equipment, don’t scrimp – you’ll end up with a slow network lacking in features.

Even when you have good equipment in place you can still run into network problems. The most common issue on a network tends to be a malfunctioning device.

It is normally much less expensive to try replacing a device as a first step to resolving a problem than it would be to have a tech go around and test every device on the network.

For example, if your network is having issues with slower than normal connections, high latency, etc. it is entirely possible that your switch or router has begun to fail.

With consumer grade network equipment, routers and switches can fail as much as once per year depending on the quality of the device and how well you’ve protected it from power surges.

If you’ve replaced your router and/or switch, and you continue to have high latency and strange issues, the next step is to check your network cables.

The cables you’ve been moving around over the years and putting stress on may have faults that are causing problems.

At this point, a tech would need to go through and test the cabling to make sure there are no issues with them.

A cable that is either wired improperly or is starting to fail can cause problems that will affect a network in many ways.

Sometimes, depending on the severity of the fault, it can cause intermittent failures resulting in spotty connections. If a cable fails altogether it can prevent a user from being able to connect to the network entirely.

Once all of the cabling issues are straightened out and we know our devices are good, you may still have a computer acting up on the network.

In that case, it is possible that the network interface card (NIC) is failing. Sometimes this can be a hardware problem where the NIC fails, but sometimes it is possible that the software on your computer is causing problems with it.

For instance, a NIC takes drivers for the operating system to allow it to communicate on the network. If you have the wrong driver installed, or the driver is corrupt, it can cause a lot of network problems.

Another possibility is a virus or other malicious software installed on the computer.

Depending on what the virus is designed to do it could be causing the problem with your computer’s ability to connect to the Internet.

Depending on the severity of the infection and what it was designed to do, it is possible that a virus could cause the entire network to run slowly.

What it all comes down to is that it is really best to have a professional diagnose network issues and work with you directly when trying to get equipment for your network.

With the number of variables involved, if you don’t deal with networking on a regular basis it’s fairly easy to be confused.

Feel free to contact us anytime for advice on network upgrades and help diagnosing problems with your network, firewall, switches or routers.

What To Expect As Office 2013 Releases To The Public

February 12, 2013

by Jeremy Miller, Technician
The arrival of the new Office Suite is upon us. There are myriad of new features and experiences in Office 2013.

A new Office suite means there are upgrades, new features and tools to learn the locations of. Thankfully Microsoft has done their homework before putting out this Edition of Office.

Microsoft Office will be released later this month. Microsoft has paid attention to what customers want while developing this suite without sacrificing what they need.

Microsoft has mildly changed the user interface to a “Windows 8 Style theme with the option to make slight customizations to make your Office experience more personal.

Office will be available in either a local installation or through Microsoft’s Office 365 service for a monthly fee.

Microsoft has integrated the ability to sign in directly to Office using your Microsoft Account credentials.

This is one of the ways that Microsoft has integrated Office with the cloud. Logging into Office allows you to save any file from Office directly to your Microsoft SkyDrive with the cloud-storage included with all Microsoft Accounts.

You can also add additional locations for online storage or share your documents directly to social sites like: Twitter, Facebook, or LinkedIn.

Another new aspect of Office is the ability to integrate apps into all products in the Office suite.

You may have been familiar with this feature if you have used Outlook 2010. You may now add apps to one of the programs in the Office 2013 suites.

Also when you launch any one of the programs in the Office suite you will now open a landing page that will ask you what type of document that you wish to create from a blank document to anyone of the many templates included.

Microsoft has released the Application Programming Interface (API) for Office 2013, this will allow software developers to write applications that will integrate directly into Office.

This will give you the ability to customize Office to any company’s specific needs. The developer then has the ability to publish and sell their apps on the Office and SharePoint store.

This gives Office 2013 a flexible lifecycle since the software will be constantly growing and integrating new useful features.

In Office 2013 there is a tool available to measure your usage across the entire Office suite. This will be useful if you need to identify the most used solution or to create macros to increase the workflow that a user can handle.

One of the largest improvements in Office is within Word. Microsoft has finally included in its own software the ability to read, modify and create Protected Document Files (PDF). Until now you were required to download a PDF reader such as Adobe Reader to view PDF files.

Office has been modified to create a more stable user experience. Since you now sign into Office it will remember your preferences, settings, and files.

This will make your Office experience similar on every computer or device that you use. As long as you have saved your documents to the cloud you will be able to access them from any computer with an Internet connection.

If you are interested in upgrading to Office 2013 then please contact us. We can give you a better idea if upgrading is the best option for you or your organization. We can also help you plan and implement the migration if you choose to upgrade to Microsoft Office 2013.

Plan Your Workday’s Start For Maximum Efficiency

February 12, 2013

Your first few minutes at work can set the tone for the entire day, so don’t waste them. Here are some tips for launching a productive day from the very start:

• Arrive on time. Nothing throws you off your game like having to catch up with everyone else. Get the rest you need, and give yourself plenty of time to show up when you need to be there.

• Settle in smoothly. Don’t take too much time for this. Spend just a few minutes reviewing your to-do list (updated the night before!) and checking in with your boss and employees. Plan your day, but be ready for interruptions as they arise.

• Check messages—briefly. Don’t bother answering every email and phone message you’ve received since yesterday. Review them quickly, deal with any that require immediate attention, and then move on.
• Think. Your brain is fresh in the morning, so use it to make plans. Review your long-term goals as well as your most urgent tasks for the day, and spend a little time analyzing your priorities so you can put your energy where it will do the most good.

• Choose your most important task first. This may be the task you least want to do, but putting it off will only distract you and drain your energy. Look over your to-do list and pick the job that will have the biggest impact, and take it on while you’ve got maximum energy and the fewest interruptions.

• Plan a break. Don’t push yourself to stay at peak energy all day. Schedule a quick break at some point in the morning so you can double-check your priorities, revise your plans, and get a little rest to prepare for the rest of the day. Enjoy a “brain snack” such as trail mix, peanut butter and toast, or hummus and vegetables.

Easy Tips To Secure Windows 8 Devices

February 12, 2013

With cybercrime on the rise, even the brand-new Windows 8 can leave a person vulnerable – which means it is important to know how to protect your devices from the moment you get them.

The good news is that this is not difficult if you follow a few simple tips.

You should commit to security from the very beginning; password-protect your new device immediately, connect to a Wi-Fi network you know is secure and register your device.

A number of companies such as NortonLive PC Quick Start will enable you to get your brand-new device up and running, easily and safely.

It is also important to be careful when choosing apps. All apps are allowed a certain level of access to private information, but some may use this in a malicious manner.

Make sure you read the user agreement to prevent giving the manufacturer rights you aren’t comfortable with, such as letting it into your social network and accessing a friend list. All your apps, email, bank accounts and social networks should be protected with complex passwords that you do not share with anyone.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.