• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Gone In Sixty Seconds: Protecting Your Laptop & Data

October 24, 2009

September was a whirlwind travel month for me, having been in both Charlotte, North Carolina and Chicago in the last three weeks of the month.The training is great, but as anyone who has traveled lately knows, the airports can become a real challenge.

I was waiting in the Charlotte airport for my return flight to Detroit, and watched an awful story unfold.

A passenger, who was obviously a business owner or executive was searching frantically for his laptop case. After about 20 minutes, airport police showed up and it turns out his laptop had been stolen.

Business owners as well as your average everyday computer users are turning to laptops more and more each and every day, due to their mobility and the ability to keep them in touch with the office no matter where they are.

A huge importance that many seem to forget is keeping their data safe, and doing regular backups. I would guess that every three in five users are not performing any type of backups. They run the huge risk of losing all their valuable data, programs, and even their entire computer as the gentleman in the airport did.

It is crucial to have a backup solution in place, especially for business owners who keep most of their work information on their laptop computer.

With today’s technology options, you can find a backup solution that will work for you, and there seems to be a price range for everybody.

Backups can be performed in several ways, from a manual backup to a CD or DVD, some form of removable media like a flash drive, or SD card, and there are even the higher end solutions like BDR and off site backups.

Typically a backup solution would come with a piece of software to control your backups. Things such as what you’re backing up, how often your backing up, and where you want the backups to go.

The beauty of using software is it almost completely automates the process, and becomes something you don’t have to worry about any longer, knowing that if your computer is stolen, or your hard drive suddenly crashes out, you have a good copy of your data, and you can be back up and running in no time at all.

My favorite solution is the offsite backup, which can be offered thanks to the Internet. With an offsite backup system, data that is on your laptop, workstation, or server(s) can be sent out across the Internet (typically encrypted) to an offsite location.

So for example, you could be working at your company, and having all your daily additions to a highly secure data center out in the cloud. This would protect your information from a disaster such as a building burning down, or a fatal hardware crash.

If that sounds like overkill for your situation, an easier solution can be used, such as backing up once a week to a flash drive.

All Windows based systems have a utility built in called Backup and Restore. This utility will allow users to backup just their  personal data, such as pictures, documents, emails, etc. or even take it a step further and back up the entire computer’s  configuration, including the data.

Windows Complete PC Backup and Restore is most useful for disaster recovery when your PC malfunctions.

This feature helps you create complete PC backups, and then in the event of a serious system issue or data loss, Windows Complete PC Backup and Restore can restore your entire PC environment, including the operating system, installed programs, user settings, and data files.

If you do not have currently have a backup solution implemented, please contact our technical support team. We can work with you to set up backups to a flash drive or CD.

We also have a great offsite solution for $39.99 per month that will keep all of your data safe in the event of a failure. It works transparently in the background, encrypting and forwarding your data to our data center, where’s it is stored and updated as needed.

The best thing about this type of solution is that it doesn’t require you to do anything – the backups occur automatically, and we’re notified if there is ever a problem where your backup didn’t complete properly.

LoJack For Laptops

October 24, 2009

The technology behind Computrace LoJack for Laptops by Absolute Software is the Computrace Agent, a small software client that is embedded into the BIOS firmware of most computers at the factory. Or Tech Experts can install this agent for you.

The Agent in your computer maintains daily contact with the Absolute Monitoring Center. If you report your computer stolen, Agent contact will increase to every 15 minutes.

Increased contact allows Computrace to obtain specific details like the physical location of your computer, any activity that has occurred post-theft, and other important data that will aid Computrace in working with local law enforcement to catch the thief and return your property to you.

Regardless of recovery status, you can remotely delete data to remove some or all of the information stored on your computer so that it doesn’t fall into the wrong hands.

This could include files and applications containing personal photos, internet bookmarks, browser cookies, financial information, and stored passwords.Everything an identity thief would need to steal your identity.

On the web: www.absolute.com

Great Reasons To Consider A Windows 7 Upgrade

October 24, 2009

Are you one of the computer users who didn’t want to risk the Vista upgrade? While we didn’t really experience any problems with clients who upgraded to Vista, many companies have decided to skip Vista and move right to Windows 7.

Windows 7 is available now to business users under the Microsoft licensing program, and will be in general availability at the end of the month.Microsoft says it will run as well as Windows XP, and have the enhanced look and feel of Windows Vista.

Here are a few of my favorite features in Windows 7 that might make you want to look into upgrading to Microsoft’s newest operating system.

User Account Control
Many users found the enhanced user account control (UAC) function in Windows Vista difficult to work with. If you are not sure what UAC is, it is the dialogue box that will pop up when you run an unknown application. It asks, “Are you sure you want to open this?” Microsoft has greatly improved the options for fine tuning this security feature, so that you don’t have to turn it completely off.

Windows Shake
Windows 7 has a great new feature that helps you keep your desktop organized when you have several programs open at the same time. When you have multiple windows open you are able to click and shake the window you want to keep open and then all the other windows will minimize making it easier to sort through them. Then, if you want them back up you can just shake it again and all the windows come back up again. This, I would say, is one of the best features of Windows 7.

Very Quick Startup
Microsoft has finally solved the slow startup issues many users experienced in Windows XP and Windows Vista. It can be time consuming to just sit and wait for the computer to startup. Sometimes we have clients tell us their computer takes so long to startup that they simply leave it on all the time. Now with Windows 7, Microsoft has made the startup time about twice as fast as a comparable system running Windows Vista or Windows XP.

Auto Window Sizing
If you like the windows shake feature you might also like this windows feature. By moving your window to the top of the desktop the window will automatically maximize. Now if you move the window to the left or the right of the desktop then the window will be maximized, but only on fifty percent of the screen.

Customizing the System Tray
There have always been a lot of options for customizing the Windows system tray in Windows XP and Windows Vista. Windows 7 includes a feature for fine tuning the yellow popup balloon you always see by the clock on the system tray.

In Windows 7 you have the ability to customize which applications are allowed to notify you using the yellow popup bubble by the clock. In Windows XP and Windows Vista the only thing you could do to remove those notifications was to find a Windows registry hack to turn them off.

These are just a few of the many new features that make an upgrade to Windows 7 compelling. If you’ve just purchased a new computer, more than likely you’re entitled to a free copy of Windows 7 (you may have to pay shipping for the actual CD).

We have several systems running Windows 7 in our office, and have found very few compatibility issues. If you’d like to see it in action, feel free to stop by or call our office.

Dual Monitors Helps Insurance Agency Boost Productivity

September 15, 2009

When Robert Leski and Timothy Wittman, owners of the Leski Insurance Agency, decided to upgrade their computer systems last year, they were looking for ways to improve staff productivity and enhance their customer service functions.

After evaluating their workflow, Tech Experts recommended they employ a dual monitor solution as part of the agency’s technology upgrade.

Leski Agency uses an ACT! contact management system to keep track of all of their client’s policies and information.

When customer service representatives (CSRs) are quoting new business, or changes to customer’s existing policies, they will frequently need to refer to the information in ACT! in order to complete the quoting or change forms.

Before the dual monitor solution, the CSRs would have to toggle back and forth between screens. Now, ACT! remains active on one screen while the quote or policy change form is active on the other screen.

“We needed a way to streamline our customer service practices,” commented Tim, one of the agency’s co-owners. “Tech Experts showed us a dual monitor system that lets our employees look up information faster.”

The dual monitor solution was part of a larger technology refresh project the agency undertook last year. As part of the upgrade, Leski invested in a new, faster IBM eServer to store their customer data, documents and accounting information.

The agency also upgraded the staff computers to new Lenovo compact workstation computers. The compact workstation computers are about the size of a box of cereal.

“We really like working with Tech Experts,” Tim continued. “Technology changes every day, and it has become increasingly harder or small business owners to manage their computer systems. With the Tech Experts team taking care of our technology, I can focus on what our agency does best – taking great care of our clients.”

Leski Insurance Agency was founded in 1980 by Robert Leski, a now retired Monroe County Community College professor. The agency writes general lines property and casualty insurance, and specializes in the insurance needs of educators through the MEEMIC insurance company.

Running Out Of Room: Server Storage Upgrades

September 15, 2009

We have all experienced this: The longer you own a computer, the smaller the hard drive seems be. This can be a problem not only for the home user, but a huge problem for business clients and their servers.

Just a few years ago, 100 gigabytes of hard drive space was more than anyone thought they would ever need. Today, laptop computers come with more than 500gb of storage, and terabyte laptop drives aren’t far away.

As applications like Microsoft’s PowerPoint become more powerful, the size of the files being saved grow larger and larger. If you are creating these files on your PC and saving the files locally to your hard drive you can quickly run out of space.

The ease and affordability of “thumb” or “flash” drives allows most users to save these files to removalable media and keep the local drive free to perform the other tasks required. Servers on the other hand are a different story.

Most servers are used for file storage. The data created by all the users on the network is stored on the server. This allows multiple users access to spreadsheets, Word documents or PowerPoint presentations.

They can open the file, make their changes, and save the file back to a common storage space on the server. Most, if not all, of these files are important and more than likely will be used over and over again.

I have found that most of my clients can not move these files to a removable storage device, as they need access to the file almost on a daily basis.

That means the file needs to be on the server and accessible to all users, all the time. Each of these files requires space on the hard drive. If you’re using shadow copies to keep older files in case something becomes corrupt (or someone deletes something accidentally in the application), before you know it, your server is running out of room.

Most of the servers I deal with have separate areas of the hard drive called “partitions” that have the operating system (“OS” )separate from the data storage area. This allows technicians to come in, once the data area or OS partitions start to get full and install a new drive.

We have the ability at Tech Experts to take a server that may have originally had a 100GB hard drive and install a drive with a capacity that will allow you to store information for months to come.

Notice how I said “months to come.” It never fails to amaze me how fast server storage can fill up with data. I have written in previous articles how important it is to back this data up, but it is just as important to make sure you have enough room on your server for both file storage as well as the OS.

Microsoft releases updates to all operating systems continually to keep your systems secure and operating at the best possible speed. Having the room required to install these updates is vital to the health of your network and the productivity of your business.

When it becomes necessary to upgrade your server’s storage with more capacity, we can perform this task with minimal amount of downtime and with an eye toward the future to insure your investment in the server will be well worth it.

How Does Offsite Backup Work?

September 15, 2009

As your storage needs increase, you’re faced with the challenge of managing and optimizing data protection processes. You may find that your data no longer fits on just one tape. On top of all of that, employees often forget to put in a new backup tape each day. That’s when having a fully automated and backup solution is essential for your business.

This is where offsite backup comes in. Secure and reliable data protection is vital to your disaster recovery plan.

Whether you’re backing up 5 GB or 500GB of data, offsite backup solutions allow you to maintain a current offsite backup at a secure remote facility.

A special software agent is loaded on your server, which compresses and encrypts your data before sending it via the Internet to the offsite backup storage facility.

Data is backed up while your servers are up and running. This reduces costs associated with server or application downtime.

In addition, application special software agents allow for real-time backup of Exchange, SQL, and other databases.

Your data is secure from the moment it’s transferred to the storage vault, and it remains encrypted until it’s restored on the client computer. Only those with a vault password can access the backup data.

Social Networking Boosts Your Business!

September 15, 2009

You can’t turn on the television, read a newspaper, or even browse online without hearing about the business benefi ts of “social networking.” What is social networking, and how can it help build your business?

Loosely defined, social networking is nothing more than a group of people who share a common interest getting together online. It gives you the opportunity to create a virtual meeting place where your clients, prospects, vendors and even employees can talk about things going on in your company, ask questions, promote products or sales, and announce special events.

Social networking eliminates time zone differences, a huge factor for many. People from all over the state, country, and even  world can connect and communicate easily in real time, opening many doors that geographical boundaries once closed. In a nutshell: Social networking helps you stay in touch!

There are a myriad of social networking sites on the Internet, and each is geared toward a slightly different demographic or type of user. More than likely, you’ll want to participate in a couple different sites to stay in touch with the most number of people.

The most used sites for business networking include Facebook, LinkedIn.com, and Twitter. Don’t discount the value of participating in online forums and writing your own blog.

Facebook
Facebook (www.facebook.com) has become one of the most popular online relationship building sites. It’s a central point for a lot of different things, like posting status updates (what are you up to right now?), photo albums, and even videos. You can also keep up with what everyone else that you’re “friends” with on the site is doing – and in this case, friends can mean true friends, or business acquaintances.

When you log into Facebook, you’ll see all of your friend’s latest updates about what they’re up to – and when they log in, they’ll see yours, mixed in with other friends they have. Some people post every small detail of what’s going on in their lives, and others post infrequently or only when they have something truly important to say. Neither approach is right or wrong – what you decide to post is more of a personal preference.

LinkedIn.com
LinkedIn (www.linkedin.com) is probably the largest online business networking site. You can post your resume, join special interest groups, search for people you want to meet, and request introductions from your friends to other people you want to meet. That may be the most interesting thing about LinkedIn – think of it as an online “six degrees of separation.” Your LinkedIn network extends from your friends, out to friends they know, out several levels.

Twitter
Twitter (www.twitter.com) is a very popular new online meeting place. Twitter is what’s known as a “microblogging” site, because posts or updates you make are limited to 140 characters at a time. These entries are known as “tweets.”

Ping (www.ping.fm) lets you tie it all together. Ping is a service that will take your update and post it to all of your social networking accounts at one time.

Forums and blogs
Online forums are a great way to meet people who are interested in similar topics, and there are literally thousands of active forums online. It’s easy to participate, and you’ll fi nd a lot of forums are incredibly active. To boost your online exposure, which boosts your company’s profi le, look for forums that focus on topics your clients care about. Then, post answers to other people’s questions. You’ll quickly demonstrate your expertise.

It is easy to say that everyone (and every company) should have a blog, but the reality is, in order to be successful, you’ll need to blog regularly. You have to enjoy writing and be willing to commit to posting on a very regular schedule, or risk losing readers.

By becoming part of a social networking site, you’re not only opening your business to all World Wide Web users, you’re actually making your business more accessible to the public to be available to purchase your products and services. Connecting with other businesses also gives us the ability to share common ideas and practices in groups who share common ideas and business goals.

Choosing The Right Antivirus Software

September 15, 2009

Protecting your computer from spyware, viruses, pop ups and malware is one of the most important things you can do as a computer owner. Not being protected can lead to stolen information or just plain harm to the computer.

Some infections can sit in the background and wait until the right time to deploy. By having a good antivirus program you can protect your computer at all times. Here are some tips to help you choose the right antivirus software for your system.

Costs
When looking for the right antivirus software do not forget to compare pricing. Most antivirus software is fairly priced. Some well known antivirus software can be very pricy due to the well known name that the company has. One of the more affordable antivirus programs that I know is low priced, but has great quality. It’s called Etrust, and it’s made by Computer Associates (CA).

Automatic Updates
You can pay all the money in the world for a good antivirus program, but if the antivirus signatures do not update automatically then it is not worth it. Almost every computer user does not even pay attention if the antivirus is on or not – most just assume it is taking care of business. By having an antivirus that automatically updates it can help keep the antivirus software up to date and protect you from the newest threats.

Frequency of Signature Updates
An important part of the software is how often the software actually updates. They say that a new virus is created every four minutes. So good antivirus software sends out multiple updates every day to make sure the virus signatures are up to date on the most recent threats.

Active Scanning
Active scanning is another feature that is very good to have. Some antivirus programs only protect the computer fi les as they’re being used or access, and not all the fi les on the system. You want protection that is active all of the time, and scans files and programs as you access them.

By having it scan it will look through all fi les on the computer to make sure there are no sleeping threats on the system. Many infections will just keep coming back so having the computer scan every day helps protect from those types of infections.

Performance
When looking at antivirus software, you have to ask yourself: “Will it slow down my computer?”

If the software takes a lot of space and resources, you may fi nd it will slow down your system when it’s working. If you sit down and think of these topics before you rush into buying new antivirus software, I am sure you will get great software for your money.

Also there are many websites that will compare antivirus programs if you are worried about the safety of your computer.

If you have any questions or concerns about the best antivirus for you, please feel free to give us a call here at Tech Experts at (734) 457-5000.

Tired Of Being Tied Down? It’s Time To Lose The Wires!

August 10, 2009

Security Tips For Your New Wireless Network

With the decline in the cost of wireless equipment and “point and click” configuration ability most newer equipment offers, more and more people are setting up wireless networks in their homes and businesses.

One key configuration that is often missed, though, is security of the wireless network.

Is the wireless connection you’re using secure, is your data in jeopardy, and is your identity safe?

You might be asking yourself “How do I secure my network, and what does it mean so say a wireless network is unsecure?”

If a network is classified as unsecure, it means that the network can be accessed without the need for a key, or password. You’ll find unsecure networks in a lot of public places, such as coffee shops and airports.

The problem is that once a  user is connected to an unsecure network, it is possible they could access network resources such as files, folders, printers, etc. that are shared on your computer – many times, without you even knowing.

As you know, this could be a world of trouble if your confidential data is obtained by an unknown user.

A number of things can be done to ensure your wireless network is safe, network resources are protected, and your data is securely stored on your system.

Firewall
Software or hardware devices can be implemented, and are one of the first lines of defense, to prevent unauthorized access of your wireless network. Most wireless routers include basic firewall protection – it just has to be turned on when the unit is configured.

SSID
The SSID is the name of your network. Most routers come with a default SSID, which, if left that way, is a sign of a poorly configured network. This makes you an easy targets for hackers.

Password Changes
By default, wireless routers have a standard username and password that can be easily looked up on the web.

You should definitely set up your own username and password to access your wireless device’s setup screens, so hackers or unwanted Internet users can’t go into the settings on your router and make changes to your security settings.

Be sure to follow standard password security when coming up with the password for your wireless router – you don’t want hackers to be able to easily guess your password, and access your setup screens.

Signal Strength
Most routers allow you to set the signal strength of the network broadcast. Turning the signal down on your router lowers the  chances of outsiders being in range of your wireless network.

Enable Encryption
This is one of the most important steps to securing your wireless network- require a key or network password in order to connect to the wireless network.

There are several types of encryption, the most common being WEP, WAP, and WAP2. Each provides a different level and method of network security. Any form of encryption is better than having an open wireless network.

Securing your wireless network plays a key role in the protection of your data, network resources, and overall privacy when you’re using a home or work network. It’s a quick and easy process, requiring just a few changes to the default setup. The peace of mind and convenience of wireless networking are worth the extra few steps.

Tips To Improve Your Wireless Signal Strength

August 10, 2009

If Windows notifies you about a weak signal, it probably means your connection isn’t as fast or as reliable as it could be. If you’re looking to improve the signal for your wireless network, try some of these tips.

Position your wireless router in a central location
When possible, place your wireless router in a central location in your office. If your router is against an outside wall, the signal will be weak on the other side of your office.

Move the router away from walls and metal objects
Metal, walls, and floors will interfere with your router’s wireless signals. The closer your router is to these obstructions, the more severe the interference, and the weaker your connection will be.

Replace your router’s antenna
The antennas that came with your router are omni-directional, meaning they broadcast in all directions. If the router is near an outside wall, half of the wireless signals will be sent outside the building, and much of your router’s power will be wasted. Upgrade to a hi-gain antenna that focuses the wireless signals only one direction. You can aim the signal in the direction you need it most.

Add a wireless repeater
Wireless repeaters extend your wireless network range without requiring you to add any wiring. Just place the wireless repeater halfway between your wireless access point and your computer, and you’ll get an instant boost to your wireless signal strength. Check out the wireless repeaters from ViewSonic, D-Link, Linksys, and Buffalo Technology.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Could Social Engineering Bring Down Your Business?

August 25, 2025

Don’t Let Outdated Tech Slow You Down: Build A Smart IT Refresh Plan

August 25, 2025

Biometrics Are the New Password – But What Happens If Yours Gets Stolen?

August 25, 2025

The Clock Is Ticking: Preparing Your Business For Windows 10 End-of-Life

July 22, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.