• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Legit Or Bogus? How To Spot A Rogue Anti-Virus Program

December 8, 2009

Have you seen an advertisement or pop-up offering a free PC scan, or telling  you that your computer is infected and at risk? If so, you’ve seen first hand a harmful trojan disguised as an anti-virus program.

These types of rogue anti-virus scams are on the rise. They appear legitimate, and the number one way unsuspecting users get infected is from clicking a malicious link in the pop-up message. Most of these pop-ups have what sound like legitimate virus names, and some even ask you to pay for the  program.

They will almost always have a notice indicating you need to “click here” to install the program to disinfect your PC. Once you click on that link, you’re infected.

To take it a step further, if you actually do enter your credit card information, the hackers have your personal data and can use it at will.

I have anti-virus. Won’t that protect me?

Though the best anti-virus programs will protect you from many threats they can not protect you against all malware, especially the newer infections.

There are millions of different types of infections and hundreds created every day. Even top of the line security companies take days and even weeks to catch the infections.

What can a rogue anti-virus program do?

An infection can do almost anything to a computer, from stealing information  to destroying your valuable data. Some malware will log your password information and use it to try to infect other computers on your network.

Some infections will let your computer be used as a “bot,” which lets attackers use it to share illegal files, attack other systems on the Internet, or spread infections to your friends and family.

How do I protect myself?

Here are some basic tips to keep yourself from being a victim of a rogue anti-virus program.

1. Keep your computer updated with the latest security patches for your operating system and web browser.

2. Never click on a pop-ups that you come across on a website. Even if the  advertisement looks legitimate, chances are it isn’t.

3. Check to make sure your Internet firewall and antivirus are updated every time you use your computer.

4. Turn off any Active-X and scripting from foreign websites. Many of the infections come from these types of scripts. Almost always, your system will ask you if you want to run the script. Always pick “no.”

5. Keep a good backup. Some infections can be so severe that you will need to restore files for your PC to be disinfected and repaired properly.

6. Scan your computer on a regular basis. Most antivirus programs will do this automatically. AVG is a very good program that will scan every day, and can be set to run at night so it doesn’t slow down your work.

Sit Back And Relax. We’ll Do The Driving

December 8, 2009

Remote support software put a technician at your desk, without ever leaving the office
It goes without saying that nearly everyone has a computer not only in their office, but also in their home. Just about everyone has experienced a problem at one time or another, and many times, the problem can be pretty simple to  resolve once a technician starts working on it.

Larger companies have IT staff that can address and fix most problems in person because they are in the same building as the system with the problem.

Small to medium size businesses, however, generally can’t justify having someone on staff to resolve PC issues when they come up. Home computer users often have to carry their machines in for service.

In the past, clients would call us with a problem, perhaps an error message that pops up when they try to open a document. The technician would try to ask the right questions, and try to visualize what the client was experiencing so we could resolve the problem.

Home users would have to disconnect their system (taking care to remember exactly where the cords plug in) and bring the machine into our office for service. It isn’t very convenient, and trying to remember how everything plugs back together can be a real problem.

Well, all of that has changed now! You can sit back at let us drive your computer using remote control.

We’ve invested in software that lets our technician view and operate your computer remotely, without you ever having to bring it in for service, or have a technician come on site. Nearly everyone has high speed Internet now, so the software runs very quickly and efficiently.

This remote management software makes diagnosing a problem a lot easier and quicker than before. Our remote control software is encrypted for security (your data is never sent over the Internet unprotected) and requires that you give permission in order for it to work. It’s very safe and secure.

Once connected to your computer, the technician can view your desktop and take control of your system. He sees the same screens you do, including any error messages. It is just like having one of our highly trained technicians sitting right there with you.

Our clients have found this remote support software to be one of the most time saving and useful tools in our technology toolbox.

Unfortunately, for problems that are more in-depth, or hardware related, remote control doesn’t work. For simple error messages or software issues, sit back and let our technicians help you remotely.

 

Questions About Cloud Computing? Hosted Services 101

December 8, 2009

With cloud computing taking off the way it has in the information technology field, hosted services are becoming widely implemented, more and more each and every day. So what are hosted services?

Hosted services are a wide variety of IT functions including: email hosting, web hosting, storage, security, monitoring, applications, (SaaS) and infrastructure over the Internet or other wide area networks (WAN).

Email Hosting
This type of service offers premium email at a cost rather than using advertising supported free email, or webmail (IE: Yahoo, Gmail, Hotmail, AOL, etc.).

Email hosting allows for custom configurations, as well as supporting a large number of accounts. Another great benefit that people love is the fact that you can have your email with your own custom domain name.

For example, instead of JSmith@yahoo.com, you can have JSmith@(yourcompanyname).com.

Security can be enhanced with this service, from spam filtering, to custom platforms and policies.

Hosted email is far more customizable then a traditional free email solutions. Most companies that provide email hosting also provide web hosting.

Web Hosting
This service lets users publish personal or professional websites, and make them available via the World Wide Web.

The hosted service provider is basically providing the customer with server space to store the various information, videos, audio, and image files, as well as management and backup services for their websites.

Remote Backup
This service provides users with an online system for backing up computer files and storing them. We covered remote backup service in our September newsletter (www.TechTidBit.com).

Typically, remote backup software would run on a schedule, and backup files daily, compress, encrypt, and sends the files to our servers via the Internet.

The beauty of a remote backup service is the fact that the client does not have to worry about switching and labeling tapes, or any manual steps what so ever.

Disaster recovery takes it a step further, and is able to take a backup image, and virtualizes your entire server. In the event of a server crash or other disaster, the service provider can have your server back online and fully functional within hours.

Hosted services are here to stay, due to their ability to minimize IT and training costs, control and predict your costs, remotely monitor/manage the infrastructure, and maximize the changing business needs and requirements, allowing the business to focus on its operations, and core growth rather than their computer networks.

Think Security Is a Problem Only for Big Companies? Think Again!

November 24, 2009

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Information technology (“IT”) security is sometimes thought of as a problem only for the largest companies, whose data protection lapses expose customer information and result in front-page coverage.

Small and mid-sized businesses,of course, are just as susceptible to malware and network intruder attacks. In some cases, small companies confront a greater challenge. While large businesses and government agencies employ chief information security officers and IT security staffs, smaller firms usually don’t. This places the small business owner in a DIY situation.

Small businesses face many security vulnerabilities, but the SANS Institute, a think tank that focuses on IT training and certification, cites two pressing problems: unpatched software running on PCs and vulnerable web-based applications. Email attacks, dubbed “spear phishing,” specifically target unpatchedvulnerabilities in frequently used products, such as Adobe Acrobat, QuickTime and Microsoft Office.

The second factor, at-risk web applications, account for a sizable chunk of known security gaps. Assaults focused on web applications represent more than 60 percent of the total attack attempts observed on the internet, according to SANs.

Getting a Grip
Making sure current security patches are installed on applications and shoring up web application defense are just two chores small company owners face. They need to consider internal lapses – such as employees divulging intellectual property via e-mail – as well as external threats. In addition, many firms must meet regulatory compliance directives. A retailer handling credit card data must comply with the Payment Card Industry Data Security Standard.

With all of the security issues and products to address them, small businesses may have trouble knowing where to begin.

A vulnerability assessment, also referred to as a risk analysis, comes in handy here. Such an assessment aims to define the scope of an organization’s security issues, thereby identifying likely areas for investment in protection.

The key steps in a vulnerability assessment include taking stock of a company’s IT assets – servers, applications, networks, client-side devices among other gear. With this census in hand, a business can move on to prioritize assets according to their value to the business. The next phase is to zero in on vulnerabilities, starting with the more important assets.

Getting Started
Small businesses seeking to start down the vulnerability assessment track can turn to a few self-help resources. For example, the National Institutes of Standards and Technology (NIST) offers its eScan Security Tool, which was designed for small businesses: https://www.mepcenters.nist.gov/escan/.

The tool prompts users through a series of questions that touch upon such topics as computer virus protection, back-up policies, and the physical security of computer systems. At the end of the questioning, the tool generates a report with suggestions for improving IT security.

NIST also offers a guide to small business information security, which includes a section on identifying and prioritizing information. You can download a copy at http://csrc.nist.gov/publications/drafts/ir-7621/.

Small business owners can also opt to hire an IT consultant to help conduct theassessment. The task of automated vulnerability scanning, for instance, may call for an expert who can interpret the results and distinguish between “false positives” and legitimate concerns.

An company must take care in hiring an outsider. The consultant will learn all about your weaknesses and must be of the highest integrity. Client lists and referrals should provide the evidence. Security certifications, whether vendor-specific (e.g., Cisco Certified Security Professional) or independent (e.g., Certified Information Systems Security Professional), also help guide selection.

Tips To Optimize Your Computer’s Performance

November 24, 2009

Has your computer significantly slowed down since you first bought it? Does it seem slower than ever? Is something wrong? These are questions and concerns of many users when it comes to their computer systems.

Almost every day I encounter clients who have these complaints, so I’ve put together a few pointers and best practices to keep your systems running in tip top shape!

All of these tips use system tools that are built right into your Windows operating system, whether you’re running Windows 95, 98, ME, NT, XP, Vista, or Windows 7.

They may vary in location, as well as the look and feel of the applications, but overall they all are designed to do the same things.

Clean Up Disk Errors
Every time you improperly shut down your computer, a program crashes, or a power outage happens, your computer creates errors on the hard disk.

Over time, these errors can cause the system to read and write data to the hard drive slower, hence slowing your entire system down. For this, Windows has built in what’s called a disk check.To run disk check simply:

1. Click START > My Computer
2.Choose the drive you want to run the check on, and RIGHT click it, and choose PROPERTIES.
3. In the PROPERTIES box, click the TOOLS tab. In the errorchecking section, press the CHECK NOW button.
4. Choose both automatically fix file system errors, and scan for and attempt to recover bad sectors, and proceed by clicking START.

Delete Temporary Files
Your computer picks up and stores temp files all the time, while you browse the web, work in programs such as Microsoft Word, and even when installing new programs.

Over a period of time, these temporary files can really bog your system down, so you have to be sure to clean them up on a regular basis.

For this, Windows has what’s called Disk Cleanup.

To run disk cleanup simply:
1.Go to START > My Computer
2.Choose the drive you want to run the cleanup on, and RIGHT click it, and choose PROPERTIES.
3.In the properties box, click DISK CLEANUP.

Disk cleanup will calculate how much space you can free up on your hard drive.

After it runs its scan, the disk cleanup dialogue box will show a list of files you can remove from your computer.

The list will include: Downloaded Program Files, Temporary Internet Files, Microsoft Error Reporting Temp Files, Office Setup Files, Recycle Bin, and Thumbnails.

4.From here, go ahead and check all the boxes, and click OK.
5.Disk cleanup will now remove those selected files, and close when it has completed and you are done!

Organize Your Data
Over time, as we install new programs, save new files, documents, videos, pictures, music, etc. data can become what is known as fragmented.

Fragmented files are a huge cause of slow performance. For this, Windows built in the Disk Defragmenter.

Disk Defragmenter analyzes all your files, and organizes them nice neatly in the same locations, rather than randomly spread across your file system.

You should run this utility at least once a month at least to prevent files from becoming badly fragmented.

To run disk defragmenter you simply:
1.Click START > My Computer
2.Choose the drive you want to defrag, and RIGHT click it, and choose PROPERTIES.
3.In the properties box, click the TOOLS tab, and then in the defragmentation section, click DEFRAGMENT NOW.
4.In the disk defragmentation box, select the volume you want to scan, and click defragment. (Typically this would be your C: drive )

Follow these three easy tips, and your computer will stay running in tip top shape for as long as you have the system. Remember it is important to keep regular maintenance on your computers, just as you do on most all mechanical and/or electrical devices.

Can Your Computers Prevent The Flu?

November 24, 2009

Three things you can do right now with your technology that may prevent the flu pandemic from affecting your company’s productivity.

The Centers for Disease Control (CDC) predicts that 1/3 of the US population will catch the flu this year, with the average employee missing between two and four weeks of work. This pandemic has the ability to cripple many small- to medium-sized businesses, according to disaster recovery experts.

But believe it or not, how you deal with your computers can actually prevent the flu from affecting your business productivity.

When most business owners think about the impact of a pandemic illness, the first scenario is often most or all employees calling in sick. Realistically, the possibility of a large number of your employees becoming ill at the same time is pretty low.

Your business is much more likely to feel the impact from the response and containment measures organizations will use to minimize an outbreak. Consider these senarios:

Employees can’t come to the office because they or a family member may have been exposed to the virus, but aren’t necessarily ill.

Or, an employee can’t come to work because their child is ill, or their school or daycare service has closed for a week to ten days to contain an outbreak.

In each of these scenarios, your employees are healthy, but have pressing personal demands that conflict with showing up at work.

Here are several ways you can use your technology investment to mitigate some effects of a swine flu outbreak both for ill employees, and employees who can’t make it to work because of other issues.

Do Everything You Can To Slow The Spread Of The Flu
The flu spreads through personal contact like shaking hands, touching a keyboard or mouse used by an infected coworker, and through the air by coughing and sneezing.

So watch who you touch and use disinfectant wipes to clean your workspace including the keyboard and mouse before and after you use them.

You can also reduce the amount of people who need to touch your computer equipment by using a program like our Experts Total Support service, where the technician can work on your system remotely.

Stay In Touch Electronically
Timely communication may be one of the keys to keeping your employees from becoming ill. Consider setting up an email list service so that employees can notify one another if they or a family member has become ill. You may even consider using the email to text message capability most cell phone providers offer to alert employees if another staff member is ill, or will be out caring for a family member.

Prepare For Employee Absence With Remote Access
No matter how hard you try to prevent it, you may still have some of your staff out sick at the same time. While no one with the flu is going to do much besides lie in bed, many employees will work part time from home if they have access to their office computer.

Some doctors believe this could actually hasten their recovery by eliminating boredom. So, setting up a way that your employees can remote into their computer from home helpsyou both.

We’ve compiled a free report to help you address some of these issues. “The Ultimate Small Business Owner’s Guide To Setting Up A ‘Work From Home’ Or Remote Network Access System” includes all of the information you need to set up a work from home program that is both useful for employees, and safe for your business.

For a free copy of this report, call the office at (734) 457-5000, or email “info@expertsmi.com.”

 

Track Flu Trends On Google

November 24, 2009

Google Flu Trends provides near real-time estimates of flu activity for a number of countries and regions around the world based on aggregated search queries. Some of these estimates have been validated through comparison with official historic influenza data from the relevant country or region. Countries with estimates that have not been validated are labeled as experimental. www.google.org/flutrends

Internet Monitoring Software Can Boost Office Productivity

November 24, 2009

It goes without saying the Internet is a very useful tool that most of us use on a daily basis at work. I have a number of clients who have software applications that are web based and require all employees to have web browsers open and active all day long.

The Internet can be a very useful place. It gives you the ability to find just about anything you could ask for. It can also lead to distractions and temptations. Say you want to check the final score of the game you were watching last night.

One click of the mouse and you can have all the latest sports scores and stories. Worse yet, the IM chatting (instant messaging) and Facebook browsing can fill your day as opposed to the work you are getting paid to do.

As a result, there are software packages available that can monitor and report what someone has been looking at, or looking for, on the Internet.

More and more companies are concerned about what their employees use the Internet for, and more importantly, what they are doing while they are “on the clock”.

These software packages, such as Spectorsoft, can be loaded onall computers on a network, and gives  business owners the ability to record emails, chats, IMs, websites, web searches, programs run, keystrokes typed, files transferred, screen snapshots.

Literally everything that is done on that computer can be reviewed at a moment’s notice at anytime.

Some may think that this is an invasion of privacy, but please keep in mind: Private things are best left at home.

Websites such as Facebook and MySpace can be wrought with viruses and can cause a problem on a company’s network.

I’ve used these types of monitoring programs to review screenshots once a problem has occurred to determine the cause of the problem, and see exactly what the user was doing when the infection occurred. Beyond reporting, these software packages retain the user-level investigative tools that a lot of clients have grown to rely on.

If you detect a problem or suspect a specific employee is the main culprit of abuse, you can dig deeper and review every detail of the computer and Internet activity to gather the evidence you need.

The level of detail is so precise that you can see what an employee does each and every second, and even include screen shots of the activity whenever the employee is on a certain website, or logged into a certain chat program.

Not only can you record and monitor Internet activity, record instant message chats, and websites visited, but you can also block porn, other adult content or other web sites that aren’t work related.

Legally speaking, to install monitoring software on a computer, you have to meet one of two requirements: You have to own the computer, or you have to notify all users that they’re being monitored.

If you feel you need to deploy such a tool on your network, do not hesitate to call Tech Experts, and we can recommend the right software package for you.

Automatic Updates: Be Safe by Being Secure

October 24, 2009

We are all well aware of how  popular the Microsoft Windows operating system has become. Not only is this  operating system popular for the business world, the vast majority of home computers run this operating system in various forms.

This popularity can make you a prime target for hackers and other criminals looking for a way to take advantage of a security risk in the operating system. Microsoft is keenly aware of this issue and takes steps almost instantly to make security patches and updates available for you, or your IT professional, to download and install.

Depending on how you have the automatic updates setting configured, these updates may or may not download and install themselves automatically, or you may have to initiate the process yourself manually.

While this feature is nice, most IT pros would rather pick a time to download and install these updates in a controlled situation, where the loading process can be monitored for any problems or issues that may arise.

The automatic updates utility can be accessed through the control panel. Once you open up automatic updates, you have the option there to select automatic updates, but even if you have automatic updates turned on, it is always a good idea to visit Microsoft’s update website occasionally and have the update center scan your computer to check and make sure you have all the latest updates available.

Microsoft also has a very thorough program called “Microsoft Baseline Security Analyzer 2.1.” This tool written for IT professionals provides a streamlined method of finding common security misconfigurations.

This tool allows our technicians to quickly scan your server or workstations and identify any missing security patches and provides a quick link to the supporting white paper that will explain to the technician exactly what security issue is being addressed with the particular security patch. Once enough of these security patch releases become available, Microsoft bundles them all together into what is called a service pack. This allows IT pros to download this patch to portable media and deploy it very quickly in a network environment.

I cannot stress the importance of keeping up with these service packs and security patches. A case in point, I went to a client’s office and checked every one of their workstations to see how “up to date” they were.

One of the stations required a service pack installation that has been available for months now. In addition, it
required 59 additional updates to bring it up to date.

You can imagine the risk that this system was to the client’s network. We now have this client’s network under our Managed Services Plan. This plan is offered for a nominal monthly fee and encompasses their server and all  stations.

Now these stations are monitored around the clock by our network operations center, and updates are downloaded and installed after hours, as soon as the updates are available.

So make sure to keep your computer and your information safe by being secure and contact Technology Experts to get your network protected by our Managed Services Plan. It’s the best way to make sure your network is safe and  secure.

What Is Windows Update?

October 24, 2009

Windows Update is a service  provided by Microsoft that provides updates for the Microsoft Windows operating system and its installed components, including Internet Explorer.

An optional feature disables access to Windows Update and enables access to Microsoft  update, an expanded version of the service which provides updates not just for the operating system & Internet Explorer, but also for other Microsoft Windows software, such as Microsoft Office, Windows Live applications, and Microsoft Expression.

Security updates are delivered on the second Tuesday of each month, called “Patch Tuesday,”
but security updates can be delivered whenever a software update is required to prevent an exploit targeting Windows users.

Windows Update can be configured to install updates automatically, ensuring that a computer is always up-to-date and not vulnerable to computer worms and other malware.

Windows Vista, Windows Server 2008 and the most recent Windows 7 provide a Control Panel to configure update settings and check for updates.

For previous versions of Microsoft Windows, updates can be downloaded from the Windows Update website, using Internet Explorer.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Could Social Engineering Bring Down Your Business?

August 25, 2025

Don’t Let Outdated Tech Slow You Down: Build A Smart IT Refresh Plan

August 25, 2025

Biometrics Are the New Password – But What Happens If Yours Gets Stolen?

August 25, 2025

The Clock Is Ticking: Preparing Your Business For Windows 10 End-of-Life

July 22, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.