• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Questions About Cloud Computing? Hosted Services 101

December 8, 2009

With cloud computing taking off the way it has in the information technology field, hosted services are becoming widely implemented, more and more each and every day. So what are hosted services?

Hosted services are a wide variety of IT functions including: email hosting, web hosting, storage, security, monitoring, applications, (SaaS) and infrastructure over the Internet or other wide area networks (WAN).

Email Hosting
This type of service offers premium email at a cost rather than using advertising supported free email, or webmail (IE: Yahoo, Gmail, Hotmail, AOL, etc.).

Email hosting allows for custom configurations, as well as supporting a large number of accounts. Another great benefit that people love is the fact that you can have your email with your own custom domain name.

For example, instead of JSmith@yahoo.com, you can have JSmith@(yourcompanyname).com.

Security can be enhanced with this service, from spam filtering, to custom platforms and policies.

Hosted email is far more customizable then a traditional free email solutions. Most companies that provide email hosting also provide web hosting.

Web Hosting
This service lets users publish personal or professional websites, and make them available via the World Wide Web.

The hosted service provider is basically providing the customer with server space to store the various information, videos, audio, and image files, as well as management and backup services for their websites.

Remote Backup
This service provides users with an online system for backing up computer files and storing them. We covered remote backup service in our September newsletter (www.TechTidBit.com).

Typically, remote backup software would run on a schedule, and backup files daily, compress, encrypt, and sends the files to our servers via the Internet.

The beauty of a remote backup service is the fact that the client does not have to worry about switching and labeling tapes, or any manual steps what so ever.

Disaster recovery takes it a step further, and is able to take a backup image, and virtualizes your entire server. In the event of a server crash or other disaster, the service provider can have your server back online and fully functional within hours.

Hosted services are here to stay, due to their ability to minimize IT and training costs, control and predict your costs, remotely monitor/manage the infrastructure, and maximize the changing business needs and requirements, allowing the business to focus on its operations, and core growth rather than their computer networks.

Think Security Is a Problem Only for Big Companies? Think Again!

November 24, 2009

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Information technology (“IT”) security is sometimes thought of as a problem only for the largest companies, whose data protection lapses expose customer information and result in front-page coverage.

Small and mid-sized businesses,of course, are just as susceptible to malware and network intruder attacks. In some cases, small companies confront a greater challenge. While large businesses and government agencies employ chief information security officers and IT security staffs, smaller firms usually don’t. This places the small business owner in a DIY situation.

Small businesses face many security vulnerabilities, but the SANS Institute, a think tank that focuses on IT training and certification, cites two pressing problems: unpatched software running on PCs and vulnerable web-based applications. Email attacks, dubbed “spear phishing,” specifically target unpatchedvulnerabilities in frequently used products, such as Adobe Acrobat, QuickTime and Microsoft Office.

The second factor, at-risk web applications, account for a sizable chunk of known security gaps. Assaults focused on web applications represent more than 60 percent of the total attack attempts observed on the internet, according to SANs.

Getting a Grip
Making sure current security patches are installed on applications and shoring up web application defense are just two chores small company owners face. They need to consider internal lapses – such as employees divulging intellectual property via e-mail – as well as external threats. In addition, many firms must meet regulatory compliance directives. A retailer handling credit card data must comply with the Payment Card Industry Data Security Standard.

With all of the security issues and products to address them, small businesses may have trouble knowing where to begin.

A vulnerability assessment, also referred to as a risk analysis, comes in handy here. Such an assessment aims to define the scope of an organization’s security issues, thereby identifying likely areas for investment in protection.

The key steps in a vulnerability assessment include taking stock of a company’s IT assets – servers, applications, networks, client-side devices among other gear. With this census in hand, a business can move on to prioritize assets according to their value to the business. The next phase is to zero in on vulnerabilities, starting with the more important assets.

Getting Started
Small businesses seeking to start down the vulnerability assessment track can turn to a few self-help resources. For example, the National Institutes of Standards and Technology (NIST) offers its eScan Security Tool, which was designed for small businesses: https://www.mepcenters.nist.gov/escan/.

The tool prompts users through a series of questions that touch upon such topics as computer virus protection, back-up policies, and the physical security of computer systems. At the end of the questioning, the tool generates a report with suggestions for improving IT security.

NIST also offers a guide to small business information security, which includes a section on identifying and prioritizing information. You can download a copy at http://csrc.nist.gov/publications/drafts/ir-7621/.

Small business owners can also opt to hire an IT consultant to help conduct theassessment. The task of automated vulnerability scanning, for instance, may call for an expert who can interpret the results and distinguish between “false positives” and legitimate concerns.

An company must take care in hiring an outsider. The consultant will learn all about your weaknesses and must be of the highest integrity. Client lists and referrals should provide the evidence. Security certifications, whether vendor-specific (e.g., Cisco Certified Security Professional) or independent (e.g., Certified Information Systems Security Professional), also help guide selection.

Tips To Optimize Your Computer’s Performance

November 24, 2009

Has your computer significantly slowed down since you first bought it? Does it seem slower than ever? Is something wrong? These are questions and concerns of many users when it comes to their computer systems.

Almost every day I encounter clients who have these complaints, so I’ve put together a few pointers and best practices to keep your systems running in tip top shape!

All of these tips use system tools that are built right into your Windows operating system, whether you’re running Windows 95, 98, ME, NT, XP, Vista, or Windows 7.

They may vary in location, as well as the look and feel of the applications, but overall they all are designed to do the same things.

Clean Up Disk Errors
Every time you improperly shut down your computer, a program crashes, or a power outage happens, your computer creates errors on the hard disk.

Over time, these errors can cause the system to read and write data to the hard drive slower, hence slowing your entire system down. For this, Windows has built in what’s called a disk check.To run disk check simply:

1. Click START > My Computer
2.Choose the drive you want to run the check on, and RIGHT click it, and choose PROPERTIES.
3. In the PROPERTIES box, click the TOOLS tab. In the errorchecking section, press the CHECK NOW button.
4. Choose both automatically fix file system errors, and scan for and attempt to recover bad sectors, and proceed by clicking START.

Delete Temporary Files
Your computer picks up and stores temp files all the time, while you browse the web, work in programs such as Microsoft Word, and even when installing new programs.

Over a period of time, these temporary files can really bog your system down, so you have to be sure to clean them up on a regular basis.

For this, Windows has what’s called Disk Cleanup.

To run disk cleanup simply:
1.Go to START > My Computer
2.Choose the drive you want to run the cleanup on, and RIGHT click it, and choose PROPERTIES.
3.In the properties box, click DISK CLEANUP.

Disk cleanup will calculate how much space you can free up on your hard drive.

After it runs its scan, the disk cleanup dialogue box will show a list of files you can remove from your computer.

The list will include: Downloaded Program Files, Temporary Internet Files, Microsoft Error Reporting Temp Files, Office Setup Files, Recycle Bin, and Thumbnails.

4.From here, go ahead and check all the boxes, and click OK.
5.Disk cleanup will now remove those selected files, and close when it has completed and you are done!

Organize Your Data
Over time, as we install new programs, save new files, documents, videos, pictures, music, etc. data can become what is known as fragmented.

Fragmented files are a huge cause of slow performance. For this, Windows built in the Disk Defragmenter.

Disk Defragmenter analyzes all your files, and organizes them nice neatly in the same locations, rather than randomly spread across your file system.

You should run this utility at least once a month at least to prevent files from becoming badly fragmented.

To run disk defragmenter you simply:
1.Click START > My Computer
2.Choose the drive you want to defrag, and RIGHT click it, and choose PROPERTIES.
3.In the properties box, click the TOOLS tab, and then in the defragmentation section, click DEFRAGMENT NOW.
4.In the disk defragmentation box, select the volume you want to scan, and click defragment. (Typically this would be your C: drive )

Follow these three easy tips, and your computer will stay running in tip top shape for as long as you have the system. Remember it is important to keep regular maintenance on your computers, just as you do on most all mechanical and/or electrical devices.

Can Your Computers Prevent The Flu?

November 24, 2009

Three things you can do right now with your technology that may prevent the flu pandemic from affecting your company’s productivity.

The Centers for Disease Control (CDC) predicts that 1/3 of the US population will catch the flu this year, with the average employee missing between two and four weeks of work. This pandemic has the ability to cripple many small- to medium-sized businesses, according to disaster recovery experts.

But believe it or not, how you deal with your computers can actually prevent the flu from affecting your business productivity.

When most business owners think about the impact of a pandemic illness, the first scenario is often most or all employees calling in sick. Realistically, the possibility of a large number of your employees becoming ill at the same time is pretty low.

Your business is much more likely to feel the impact from the response and containment measures organizations will use to minimize an outbreak. Consider these senarios:

Employees can’t come to the office because they or a family member may have been exposed to the virus, but aren’t necessarily ill.

Or, an employee can’t come to work because their child is ill, or their school or daycare service has closed for a week to ten days to contain an outbreak.

In each of these scenarios, your employees are healthy, but have pressing personal demands that conflict with showing up at work.

Here are several ways you can use your technology investment to mitigate some effects of a swine flu outbreak both for ill employees, and employees who can’t make it to work because of other issues.

Do Everything You Can To Slow The Spread Of The Flu
The flu spreads through personal contact like shaking hands, touching a keyboard or mouse used by an infected coworker, and through the air by coughing and sneezing.

So watch who you touch and use disinfectant wipes to clean your workspace including the keyboard and mouse before and after you use them.

You can also reduce the amount of people who need to touch your computer equipment by using a program like our Experts Total Support service, where the technician can work on your system remotely.

Stay In Touch Electronically
Timely communication may be one of the keys to keeping your employees from becoming ill. Consider setting up an email list service so that employees can notify one another if they or a family member has become ill. You may even consider using the email to text message capability most cell phone providers offer to alert employees if another staff member is ill, or will be out caring for a family member.

Prepare For Employee Absence With Remote Access
No matter how hard you try to prevent it, you may still have some of your staff out sick at the same time. While no one with the flu is going to do much besides lie in bed, many employees will work part time from home if they have access to their office computer.

Some doctors believe this could actually hasten their recovery by eliminating boredom. So, setting up a way that your employees can remote into their computer from home helpsyou both.

We’ve compiled a free report to help you address some of these issues. “The Ultimate Small Business Owner’s Guide To Setting Up A ‘Work From Home’ Or Remote Network Access System” includes all of the information you need to set up a work from home program that is both useful for employees, and safe for your business.

For a free copy of this report, call the office at (734) 457-5000, or email “info@expertsmi.com.”

 

Track Flu Trends On Google

November 24, 2009

Google Flu Trends provides near real-time estimates of flu activity for a number of countries and regions around the world based on aggregated search queries. Some of these estimates have been validated through comparison with official historic influenza data from the relevant country or region. Countries with estimates that have not been validated are labeled as experimental. www.google.org/flutrends

Internet Monitoring Software Can Boost Office Productivity

November 24, 2009

It goes without saying the Internet is a very useful tool that most of us use on a daily basis at work. I have a number of clients who have software applications that are web based and require all employees to have web browsers open and active all day long.

The Internet can be a very useful place. It gives you the ability to find just about anything you could ask for. It can also lead to distractions and temptations. Say you want to check the final score of the game you were watching last night.

One click of the mouse and you can have all the latest sports scores and stories. Worse yet, the IM chatting (instant messaging) and Facebook browsing can fill your day as opposed to the work you are getting paid to do.

As a result, there are software packages available that can monitor and report what someone has been looking at, or looking for, on the Internet.

More and more companies are concerned about what their employees use the Internet for, and more importantly, what they are doing while they are “on the clock”.

These software packages, such as Spectorsoft, can be loaded onall computers on a network, and gives  business owners the ability to record emails, chats, IMs, websites, web searches, programs run, keystrokes typed, files transferred, screen snapshots.

Literally everything that is done on that computer can be reviewed at a moment’s notice at anytime.

Some may think that this is an invasion of privacy, but please keep in mind: Private things are best left at home.

Websites such as Facebook and MySpace can be wrought with viruses and can cause a problem on a company’s network.

I’ve used these types of monitoring programs to review screenshots once a problem has occurred to determine the cause of the problem, and see exactly what the user was doing when the infection occurred. Beyond reporting, these software packages retain the user-level investigative tools that a lot of clients have grown to rely on.

If you detect a problem or suspect a specific employee is the main culprit of abuse, you can dig deeper and review every detail of the computer and Internet activity to gather the evidence you need.

The level of detail is so precise that you can see what an employee does each and every second, and even include screen shots of the activity whenever the employee is on a certain website, or logged into a certain chat program.

Not only can you record and monitor Internet activity, record instant message chats, and websites visited, but you can also block porn, other adult content or other web sites that aren’t work related.

Legally speaking, to install monitoring software on a computer, you have to meet one of two requirements: You have to own the computer, or you have to notify all users that they’re being monitored.

If you feel you need to deploy such a tool on your network, do not hesitate to call Tech Experts, and we can recommend the right software package for you.

Automatic Updates: Be Safe by Being Secure

October 24, 2009

We are all well aware of how  popular the Microsoft Windows operating system has become. Not only is this  operating system popular for the business world, the vast majority of home computers run this operating system in various forms.

This popularity can make you a prime target for hackers and other criminals looking for a way to take advantage of a security risk in the operating system. Microsoft is keenly aware of this issue and takes steps almost instantly to make security patches and updates available for you, or your IT professional, to download and install.

Depending on how you have the automatic updates setting configured, these updates may or may not download and install themselves automatically, or you may have to initiate the process yourself manually.

While this feature is nice, most IT pros would rather pick a time to download and install these updates in a controlled situation, where the loading process can be monitored for any problems or issues that may arise.

The automatic updates utility can be accessed through the control panel. Once you open up automatic updates, you have the option there to select automatic updates, but even if you have automatic updates turned on, it is always a good idea to visit Microsoft’s update website occasionally and have the update center scan your computer to check and make sure you have all the latest updates available.

Microsoft also has a very thorough program called “Microsoft Baseline Security Analyzer 2.1.” This tool written for IT professionals provides a streamlined method of finding common security misconfigurations.

This tool allows our technicians to quickly scan your server or workstations and identify any missing security patches and provides a quick link to the supporting white paper that will explain to the technician exactly what security issue is being addressed with the particular security patch. Once enough of these security patch releases become available, Microsoft bundles them all together into what is called a service pack. This allows IT pros to download this patch to portable media and deploy it very quickly in a network environment.

I cannot stress the importance of keeping up with these service packs and security patches. A case in point, I went to a client’s office and checked every one of their workstations to see how “up to date” they were.

One of the stations required a service pack installation that has been available for months now. In addition, it
required 59 additional updates to bring it up to date.

You can imagine the risk that this system was to the client’s network. We now have this client’s network under our Managed Services Plan. This plan is offered for a nominal monthly fee and encompasses their server and all  stations.

Now these stations are monitored around the clock by our network operations center, and updates are downloaded and installed after hours, as soon as the updates are available.

So make sure to keep your computer and your information safe by being secure and contact Technology Experts to get your network protected by our Managed Services Plan. It’s the best way to make sure your network is safe and  secure.

What Is Windows Update?

October 24, 2009

Windows Update is a service  provided by Microsoft that provides updates for the Microsoft Windows operating system and its installed components, including Internet Explorer.

An optional feature disables access to Windows Update and enables access to Microsoft  update, an expanded version of the service which provides updates not just for the operating system & Internet Explorer, but also for other Microsoft Windows software, such as Microsoft Office, Windows Live applications, and Microsoft Expression.

Security updates are delivered on the second Tuesday of each month, called “Patch Tuesday,”
but security updates can be delivered whenever a software update is required to prevent an exploit targeting Windows users.

Windows Update can be configured to install updates automatically, ensuring that a computer is always up-to-date and not vulnerable to computer worms and other malware.

Windows Vista, Windows Server 2008 and the most recent Windows 7 provide a Control Panel to configure update settings and check for updates.

For previous versions of Microsoft Windows, updates can be downloaded from the Windows Update website, using Internet Explorer.

Gone In Sixty Seconds: Protecting Your Laptop & Data

October 24, 2009

September was a whirlwind travel month for me, having been in both Charlotte, North Carolina and Chicago in the last three weeks of the month.The training is great, but as anyone who has traveled lately knows, the airports can become a real challenge.

I was waiting in the Charlotte airport for my return flight to Detroit, and watched an awful story unfold.

A passenger, who was obviously a business owner or executive was searching frantically for his laptop case. After about 20 minutes, airport police showed up and it turns out his laptop had been stolen.

Business owners as well as your average everyday computer users are turning to laptops more and more each and every day, due to their mobility and the ability to keep them in touch with the office no matter where they are.

A huge importance that many seem to forget is keeping their data safe, and doing regular backups. I would guess that every three in five users are not performing any type of backups. They run the huge risk of losing all their valuable data, programs, and even their entire computer as the gentleman in the airport did.

It is crucial to have a backup solution in place, especially for business owners who keep most of their work information on their laptop computer.

With today’s technology options, you can find a backup solution that will work for you, and there seems to be a price range for everybody.

Backups can be performed in several ways, from a manual backup to a CD or DVD, some form of removable media like a flash drive, or SD card, and there are even the higher end solutions like BDR and off site backups.

Typically a backup solution would come with a piece of software to control your backups. Things such as what you’re backing up, how often your backing up, and where you want the backups to go.

The beauty of using software is it almost completely automates the process, and becomes something you don’t have to worry about any longer, knowing that if your computer is stolen, or your hard drive suddenly crashes out, you have a good copy of your data, and you can be back up and running in no time at all.

My favorite solution is the offsite backup, which can be offered thanks to the Internet. With an offsite backup system, data that is on your laptop, workstation, or server(s) can be sent out across the Internet (typically encrypted) to an offsite location.

So for example, you could be working at your company, and having all your daily additions to a highly secure data center out in the cloud. This would protect your information from a disaster such as a building burning down, or a fatal hardware crash.

If that sounds like overkill for your situation, an easier solution can be used, such as backing up once a week to a flash drive.

All Windows based systems have a utility built in called Backup and Restore. This utility will allow users to backup just their  personal data, such as pictures, documents, emails, etc. or even take it a step further and back up the entire computer’s  configuration, including the data.

Windows Complete PC Backup and Restore is most useful for disaster recovery when your PC malfunctions.

This feature helps you create complete PC backups, and then in the event of a serious system issue or data loss, Windows Complete PC Backup and Restore can restore your entire PC environment, including the operating system, installed programs, user settings, and data files.

If you do not have currently have a backup solution implemented, please contact our technical support team. We can work with you to set up backups to a flash drive or CD.

We also have a great offsite solution for $39.99 per month that will keep all of your data safe in the event of a failure. It works transparently in the background, encrypting and forwarding your data to our data center, where’s it is stored and updated as needed.

The best thing about this type of solution is that it doesn’t require you to do anything – the backups occur automatically, and we’re notified if there is ever a problem where your backup didn’t complete properly.

LoJack For Laptops

October 24, 2009

The technology behind Computrace LoJack for Laptops by Absolute Software is the Computrace Agent, a small software client that is embedded into the BIOS firmware of most computers at the factory. Or Tech Experts can install this agent for you.

The Agent in your computer maintains daily contact with the Absolute Monitoring Center. If you report your computer stolen, Agent contact will increase to every 15 minutes.

Increased contact allows Computrace to obtain specific details like the physical location of your computer, any activity that has occurred post-theft, and other important data that will aid Computrace in working with local law enforcement to catch the thief and return your property to you.

Regardless of recovery status, you can remotely delete data to remove some or all of the information stored on your computer so that it doesn’t fall into the wrong hands.

This could include files and applications containing personal photos, internet bookmarks, browser cookies, financial information, and stored passwords.Everything an identity thief would need to steal your identity.

On the web: www.absolute.com

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

The Hidden Cybersecurity Risk In Your Business

October 14, 2025

Advanced Strategies To Lock Down Your Business Logins

October 14, 2025

The Long-Term Costs Of Slow Computers

October 14, 2025

Five Simple Ways To Keep Your Business Data Clean

September 23, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Twitter Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.