• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Online Banking: Five Steps To Protect Yourself

May 21, 2010

I was reading the Wall Street Journal website recently, and came across an interesting article about online bank fraud. The article was about a small business owner in California had over $100,000 stolen from his bank account.

He only recovered about $50,000 of it back. The other $50,000 went to a bank in Europe, where mules (someone who receives the stolen money) started to withdraw the money from the bank account.

How did this happen? The business owner had spyware on his computer that transferred his banking username and password to the hackers. I always shake my head when I read an article like this, because I know it could have been easily avoided.

Anti-virus and anti-spyware
The first step in protecting yourself is to make sure your computer has anti-virus and anti-spyware installed.

If you’re doing online banking, make sure that you’re using commercial quality protection – not something you download from the Internet for free.

The stronger your first layer of protection, the safer you are online.

We see computers every day that don’t have this simplest of protection installed; or, worse, the business owner has installed protection software, but then fails to keep it updated or renewed.

Unified threat management
The next step is to invest in a unified threat management (UTM) firewall. A UTM firewall is miles ahead of the simple DSL or cable routers you’d pick up at the office supply store.

They offer solid protection against viruses, hackers, spyware, and the host of other Internet dangers.

The device scans all Internet traffic in real time, and can protect you even before the anti-virus and antispyware vendors have updated their software for new attacks.

UTM firewalls can also implement web filtering and prevent the computer from reaching the intended attacker.

Web filtering can block access to websites that contain malware and spyware; it can also protect employees from going places they shouldn’t be.

Fortinet is our preferred vendor that makes firewall appliances that do what I describe above. A dedicated firewall and UTM appliance is very effective in helping prevent an attack such as this.

Block SPAM at the source
One of the sneakiest ways hackers can compromise your computer is through email, so you’ll want to look for a rock-solid spam filtering solution. Numerous cloud based (hosted) solutions exist that are very inexpensive. A good spam filter will keep viruses, phishing and other attacks from hitting your email. Reflexion is our favorite cloud based email filtering solution. The product is easy to use, well supported and extremely effective.

With online banking, phishing attacks are very common. Someone creates an email that looks like your bank in an attempt to collect information, you click on the link, and next thing you know, the hackers have your login and password.

Personally, I never open emails from my bank. Most banks will not contact you for important account information with email.

Perform regular maintenance
The fourth step to keeping your computers safe is patch management. Microsoft releases security updates for Windows nearly very week. Having a trained IT professional ensure patches are applied correctly – and quickly – will protect you from any security holes in the software that you’re running.

Most small businesses should look at one of our managed service plans, which provides you with “whatever it takes” service at a low fixed monthly cost.

Pay attention
The final step is a matter of common sense. Most people will go to potentially hazardous websites or click on something they shouldn’t have. My suggestion is if you are doing Internet banking, it should be on a computer that is used the least.

If you are going to go to questionable websites, don’t do it on the computer where you do your banking.

Analyzing And Cleaning Out Your Computer’s Hard Drive

May 21, 2010

These days, hard drive space is incredibly inexpensive. If you’re running out of space, installing a new hard drive could be an easy option to free up storage.

Many times, though, hard drives can become cluttered with old and uncessary information, that, when removed, will give you plenty of free space.

There are a few tips that that will help you find where your storage is being consumed, and potentially save you the investment in a new hard drive.

Disk Space Fan
The first utility to examine is a little application called Disk Space Fan. The standard version of the program is free, and there is also a professional (paid) version. The free version will work for freeing up some space.

Disk Space Fan will show you what folder or folders are using up all of your hard drive space.

When you open the program it will show you all the current hard drives on the computer. Most users will be just working from the C drive. On the C drive there will be a “Windows” folder and a “Program Files” folder.

Next to those folders you will see the size of the files in the folder. This will help you by seeing which folder has more files in it. By clicking on whatever folder you want to analyze you can keep clicking on the folder to find where the most hard drive space is taken up.

This will give you a better idea of where your space has disappeared to. Be extremely careful when deleting files and folders.

If you’re not sure if the folder can be deleted, the best practice would be to leave it in place and talk with your computer professional.

The above method works if you are really looking to cleanup space on a hard drive. For other people maybe just cleaning out temporary files or some old program files is enough.

CCleaner
A great application for cleaning up temporary files and folders is a tool called CCleaner. This tool is an all in one tool to help clean up a computer that might have a lot of old and unused files on it. The software is free for everyone to use.

CCleaner will clean extra program files, Internet explorer temporary files, disable startup items, remove programs that you do not want installed and even cleanup unwanted registry entries.

I am not a person to ever recommend a user to play with the registry but CCleaner does a great job in analyzing the registry and only removing the unwanted registry entries.

The only setback with CCleaner is that it does not have any scheduling feature to allow you to run it regularly without manually running the program every time you want to make a change on the computer.

ATF Cleaner
Finally, if you are a Windows XP user there is a very simple application that I recommend you run every week or so.

ATF cleaner is a freeware application that the user does not even have to install. This application cleans out only temporary files from programs and also the Windows cache.

These are just a few nice little programs that every user can use to help keep their computer running fast and free up disk space.

Network Security: Keep Your Network Environment Secure

April 7, 2010

As more and more people rely on the Internet to get things done in their daily life, network security is more important than ever. Typically, small businesses and home network users haven’t had to worry much about security.

Poor network security exposes you to viruses, spyware, and most dangerous, cyber criminals a.k.a. hackers.

These guidelines and best practices can help eliminate, or at least mitigate, the majority of network breaches and security vulnerabilities.

Security Policy
An active security policy is always the most important item for protection of your network, whether it is in your home or in a business environment.

This is simply a statement, or guideline of the rules and how security is setup in the organization.

This role will govern the level of security users are allowed access to on the network. The roles and responsibilities of each person on the network, as they are part of the system, should be clearly defined.

Passwords
Although the most obvious, it is definitely one of the most important,and often, most neglected ttems.

Be sure to enforce strong passwords across your network – a weak password could lead to a user account being compromised.

Email
Certain email attachments can become a major problem if the wrong one is opened, and a lot of the time it is by accident.

Some of the most common file types to block would be: .bas, .bat, .vbs, and .exe.

Patches/Updates
Be sure your operating system is up to date with most recent patches, security updates, and service packs. This will close many of the vulnerabilities that can be exploited by hackers.

Inventory
Keep a good inventory of your network devices by developing and maintaining a list of all hardware and software components that are implemented on the network.

Try to understand which software applications should be installed, and which provide a weak security configuration so you can monitor those applications.

Adopt The Least Privilege Concept
The least privilege concept influences the network and/or systems administrator to create custom policies for having permissions and access to network resources.

Try to allow only what access is absolutely necessary to users, not giving them more rights to the system than they should have.

Remote Access
Certain ports can be blocked to keep unwanted users from remotely accessing your network and any of its resources.

If you’re one of the many small business owners who also works from home on occasion, there should be a security policy in place for VPN (virtual private network) access and your IT support company should assist with getting connected properly.

Keeping these simple guidelines in mind when thinking security on your network, and you’ll prevent several possible problems from happening, as well as maintaining a safe and effective performing work environment for work and for pleasure, in home or in business.

How To Protect Your Computer From Lightning Damage

April 7, 2010

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

During thunderstorms many people are leaving their computers unprotected. Simply turning a computer off during a thunderstorm does nothing whatsoever to protect the computer.

Nearby lightning strikes can cause surges through the power lines or phone lines into your house or office, and these often damage your computer.

Sometimes, just the power supply is damaged, and other times the damage is so extensive that the whole computer has to be replaced.

Power surges also do incremental damage to electronics, so the computer may work properly for a while, but occasionally lock up.

This type of fault is hard to diagnose or repair, so when storms approach, the best idea is to turn off the computer and unplug it from the outlet.

Don’t forget to unplug your phone line or cable Internet from the computer too. These are the second most likely way for surges to get into your computer – the first being the electrical supply.

We often have a large number of service calls in the days following a severe thunderstorm – the most common complaint is: “My computer was fine when I shut it off, but now it won’t power on.”

Having a good, quality surge protector is great for the minimal day-to-day power surges that happen mostly unseen in the background. These surges and spikes gradually damage electronics.

But if lightning strikes, a surge protector will be instantly destroyed along with anything it was  supposed to be protecting.

Also, keep in mind that cheaper surge protectors wear out over time, but there is no way of knowing their status.

Your best bet for safe computing during our spring thunderstorm season is to leave your computer unplugged when not in use – or at the very least, unplug it as storms approach.

Be sure to see this month’s special newsletter insert, “What Every Small Business Owner Needs To Know About Computer And Network Power Protection.”

Should you Leave your Computer on at Night?

April 7, 2010

Clients frequently ask if they should leave their computer on all the time or turn it off when they are not using it.

Several years ago we would have said to turn their PC off to save power, but with the proliferation of viruses and threats over the last few years, the answer has changed.

Today, anti-virus and anti-spyware applications need regular updating. These updates are often scheduled to run late at night when the computer isn’t in use.

Windows needs to be updated often for security patches. This doesn’t happen daily, but it may happen several times a month, and usually at night.

In addition to the above, you should be backing up your data every day. The best time to do this is at night when you are not using the computer.

Bottom line: Leave your PC (but not your screen) on at night so it is updated properly. But,  restart the computer several times a week to clear the memory.

Key Features To Keep In Mind For A New LCD Monitor

April 7, 2010

If you’re looking to upgrade your computer monitor, you want to make sure that you get the most bang for your buck, and buy the best monitor in your price range.

There are literally hundreds of monitors on the market, each with different features and specifications. You’ll want to keep these in mind when going over your options.

Response Times
The response time refers to how fast the monitor’s pixels can change colors.

Faster is obviously better because it reduces the ghosting effect when an image moves across the screen. The lower the response time is, the less you are going to see a faint trail in applications such as video games, streaming videos, or even Internet Explorer.

The response time is measured in milliseconds (MS). So the lower response time you get with your monitor the better performance you’ll receive.

Viewing Angle
Have you ever looked at a computer monitor from an angle and noticed that the image became dimmer or even disappeared. To compensate for this problem, LCD manufacturers have designed wider viewing angles. Don’t confuse this with a widescreen display, which means the display is physically wider.

Manufacturers give a measure of viewing angle in degrees (a greater number of degrees is better).

In general, when you’re choosing a new monitor, make sure it’s rated between 120 and 170 degrees.

Manufacturers measure viewing angles differently, so the only best way to really evaluate it is by testing the display yourself. Look at it from the top, bottom, side to side, and also keep in mind how you will have the monitor positioned on your desk.

HDMI Inputs
HDMI is becoming the future of video input devices. The top of the line computer monitors provide at least one HDMI input on them.

The HDMI input is on there so you can use a high-definition source such as a Blue-Ray player or even a high-definition camcorder.

You might also want to consider HDMI outputs in case you need to run a monitor to another highdefinition video source, such as a high-definition television or another HD monitor.

If you do decide to go with the HDMI, ensure that the ports are HDMI 1.3 compatible so that you are ready for any future upgrades to the HDMI standard.

Resolution and Contrast Ratio
Many manufacturers will try to sell you on resolution and contrast ratio as the two most important considerations when buying a new computer monitor.

While these features are important, they’re less of a consideration among the best monitors.

Contrast ratio numbers are way too easily manipulated to be an indicator of a good monitor, so don’t just rely on this number to tell you whether a monitor is good or not.

All of the best monitors have a ton of flexibility in resolution and support all of the most common resolution formats.

If you are running video editing software you might want to double check to see if you need something specific that meets your needs.

Remember if you need any assistance in choosing a new monitor, or comparing options, give us a call at (734)-457-5000. We’ll be happy to help.

Cleaning Tips For Flat Screen Monitors

April 7, 2010

Unlike their CRT cousins, LCD monitors require a bit of special care when cleaning. Their displays are much more sensitive and are easily scratched and damaged.

Follow the easy steps below to safely clean your flat screen monitor in just a few minutes.

1. Turn off the monitor. A dark screen will show dirty or oily areas better.

2. Use a dry, soft cloth and very gently wipe the screen. A great choice would be the microfiber type of cloth used to clean eyeglasses.

3. If the dry cloth didn’t completely remove the dirt or oil, don’t press harder to scrub it off. Pushing directly on the screen can cause pixels to burn out.

4. If necessary, dampen the cloth with distilled water or with an equal ratio of distilled water to white vinegar.

Tips
1.Avoid using paper towels, toilet paper, tissue paper, or something like your shirt to wipe the LCD screen. These non-ultrasoft materials can easily scratch the screen.

2.Avoid cleaning products that contain ammonia, ethyl alcohol, acetone, or ethyl acid. These chemicals can react with the materials that the screen is made of which could damage it or make it go yellow.

3.Never spray liquid directly on the LCD screen or it could run inside the monitor and cause damage.

3 Easy Ways to Green-up Your Small Business

April 7, 2010

E-waste contains all kinds of nasty stuff, including lead, mercury and cadmium. Sadly, much of this waste gets shipped to landfills and smelters in developing countries, exposing tens of thousands of people to harm.

Your first question when seeking to get rid of office equipment should be this: Can someone still use this stuff? If yes, post it on Craigslist or eBay. It’ll be gone in a New York minute.

If it’s beyond repair, you’ve got a few options.

The best is to find a recycler that’s involved in the Basel Action Network’s e-Stewards program, a group of companies that have vowed not to export hazardous waste to poor countries.

Another option is to give it back to the manufacturer. The problem with this approach is you can’t be sure they’ll use a morally sound recycler.

To sum up, here are your options:

Best: If the device is still operational, sell or donate it.

Second best: Find an electronics recycler near you that is an e-Steward member.

Third best: Use the manufacturer’s take back program.

Resources

Craigslist.org: Sell or donate your unwanted (but functional) electronics. http://craigslist.org/

E-stewards.org: Lists recyclers that have pledged not to dispose of hazardous e-waste in developing countries. http://www.e-stewards.org/local_estewards.html

Epa.gov: Find local recyclers. View a list of manufacturer take back programs. http://www.epa.gov/waste/inforesources/news/2009news/08-r2.htm

Buy a water cooler
These aren’t just for idle chitchat! By quenching your thirst at the water cooler you avoid having to buy plastic water bottles—the scourge of Earth.

According to this story in Outside Magazine, there is a flotilla of plastic crap the size Texas in the Pacific Ocean – wait, scratch that: the “Eastern Garbage Patch” is actually twice the size of Texas. http://outside.away.com/outside/culture/200912/david-de-rothschildplastiki-1.html

Don’t go to work
Skype, Google Wave, GoToMeeting. The technology required for telecommuting is cheap and readily available.

And there’s no better way to lower your carbon footprint than to reduce your highway time. If your boss wants you in the office, consider carpooling a day or two per week with a coworker.

Or just build a crack case for telecommuting:a quick Google search will give you all the material you need.

Assemble a PowerPoint presentation and channel your inner Al Gore. Just promise us that when you start telecommuting you won’t be that guy in his pajamas jabbering into his cell phone at Starbucks.

Do You Know What Junk Email Costs Your Business?

March 23, 2010

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

I used to think of junk email (spam) as just minor nuisance. Not so anymore. Today, spam is a major problem that costs businesses more than $100 billion a year in lost productivity and mitigation and prevention measures.

Spam used to be sent primarily by small time hackers trying to sell hair restoration, fake university degrees, and of course, anatomy enhancement pills.

The junk mail to real mail ratio was small, and spam didn’t take up a lot of room in email boxes. Spam didn’t place a huge burden on email servers, and they were easy to block.

Today, small time scammers are still responsible for some of those spams. The majority, however, are the work of organized criminals who use spyware and botnets to flood inboxes with an unprecedented amount of junkmail.

Spam profits can be huge. Hot stock tip scams, where criminals use spam to artificially create interest in a stock and raise the share price, can net the spammers millions of dollars.

Phishing scams, designed to steal your identity, can provide criminals with access to a mass amount of credit card data and sensitive corporate information.

Estimates put the cost of phishing alone at more than $8 billion in 2009.

With so much money at stake, spammers are constantly looking for new ways to get their junk emails past spam filters and to make their scams appear more convincing.

It has also drove an increase in the volume of junk mail. More than 2.8 million emails are sent every second – over 247 billion per day. Over 90% of that is junk email.

The cost to business
So, how does spam cost your business money?

Lost productivity: Experts put the labor cost of deleting each junk email at around four cents. By itself, that’s not all that significant. Multiply that, though, by perhaps 20 employees, each deleting 50 junk emails per day, and you’ll be spending over $14,000 over the course of a year.

Computer and network costs: Spam sucks up Internet bandwidth, and server storage space, both of which are significant costs to your business. This is especially true since a lot of spammers are using attachments to get around spam filters.

Security breaches and infections: Most malware and spyware infections are distributed via hacked websites. Even so, email has become more and more popular for infecting innocent users.

If your network becomes infected as the result of spammed spyware or malware, you’ll be facing a potentially expensive clean-up operation.

Phishing emails can lead to the exposure of sensitive corporate or financial information.

What you can do
The most effective way to prevent spam is to block it before you see it. We have dozens of clients with several hundred e-mail accounts currently utilizing our e-mail filtering system. We eliminate over 98% of the junk mail you normally would receive before our clients ever see it.

Our Experts Total Defense spam filtering system lets only the relevant and important messages come through.

You’ll have a clean inbox every day, and your Blackberry won’t ring all day with junk emails. You and your staff will become much more efficient and e-mail will be more useful again.

Plus, Experts Total Defense offers email archiving and off-site storage, saving valuable drive space on your servers.

You can use our filtering system if you have email hosted with us, or if you have your own in-house e-mail server (like Microsoft Exchange and Small Business Server). Give me a call if you’d like more information.

Reduce Printing Costs With These Six Tech Tips

March 23, 2010

Printers are an essential part of daily business, and often, business owners struggle with ways to reduce the costs associated with printing office documents. Here are a few tips that will help keep printing costs in check.

1. Set the print quality to its lowest setting for day-to-day printing. Most printers automatically default to high-quality printing to make sure the pages come out looking good. However, these high-quality images require a lot of ink or toner which can cost you a pretty penny over the life of your printer.

For most print jobs, the lowest quality setting will work just fine.

When you need a sharper print job, you simply change the setting for that one document. How to change your printer’s settings varies depending up on the type of printer.

In Windows, go to the “Start” menu and click on “Control Panel.” Choose “Printers and Faxes,” right click on the printer you wish to change and choose “Properties.” While you’re there, set the default to black and white to save on color ink and toner too. If black and white is fine for most day-to-day print jobs, you will save you a bundle on color ink.

2. Print more on every page. This will save ink as well as paper costs. Reduce the font size in a document by a point of two In just one year, going from 12 point to 9 point type, could save 3-5 reams of paper, per user.

3. Don’t let your inkjet printer go for more than a few days without use. If it sits for long periods of time, the tiny jets in the printer cartridge can dry up causing print jobs to have white streaks. Correcting this causes a large amount of ink to be used. And for laser printer users, turn off the printer when it won’t be used for a period of  time. Keeping the printer’s fuser hot takes a lot of energy.

4. Clean your printer frequently. Faint output, unprinted lines running across the page, or streaks on your printouts can indicated clogged nozzles or a dirty printer. Check your user’s guide for the recommended cleaning procedure for your printer.

5. Refill your cartridges. You can buy kits and do this yourself or you can buy refilled cartridges. The quality is just as good as new, but the cost is much lower. Plus, you’re helping keep old cartridges out of the landfill.

6. Buy a laser or solid ink printer. Inkjet printers cost significantly more per page than laser printers. If you do a lot of printing, a laser or solid ink printer is an economical investment.

For example, this newsletter is printed on a Xerox Phaser 7400 color printer. The output is amazing, the printer is fast, and best of all, the cost per print is extremely affordable.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2026 Issues
  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Hackers Aren’t Hacking – They’re Just Logging In

February 17, 2026

The “Deepfake CEO” Scam: Voice Cloning Is The Next Cyber Threat

February 17, 2026

Why “It Hasn’t Happened To Us (Yet!)” Is The Most Expensive IT Strategy

February 17, 2026

You Absolutely Need To Back Up Your Cloud Services Like Office 365

January 20, 2026

Tags

AI Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2026 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.