• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Simple Tips To Keep You Out Of Computer Trouble

January 21, 2009

As you can imagine, we see a lot of computer and network issues . Sometimes, they’re pretty difficult to diagnose and repair, but in some cases, a simple fix is all you need. Here are some tips you can refer to the next time your computer goes a little crazy, and some advice to keep you out of trouble.

Reboot!
Nine times out of ten, rebooting your computer and connected equipment will solve the problem you’re having. Do a full restart, which means go to your Start menu, shut down the computer, and power down your peripherals and computer. Then, restart it fresh.

We know what you did
A good computer consultant can tell if you’ve been bad or good on your computer, and usually pretty quickly. Tell us what you really did right before the computer crashed – this will save time and aggravation. Your consultant will figure it out eventually – why not make the repair quicker?

There is no free lunch
Downloading free music, movies and games from the Internet can open holes in the security system of your computer, making it easy for other people to access your files. Be safe… Only use legitimate sites like iTunes and Netflix for your downloads.

Use strong passwords
We walk a fine line in recommending passwords. If they’re really easy to remember, that means they’re also really easy to guess. If we make the password very hard to guess, it’s also going to be very hard to remember.

Here’s a suggestion: Create a “main” password which you then modify for each site you use. A good main password would consist of numbers and letters (but not your birth date!).

Try using your first dog’s name combined with the address of the first house you lived in, and then add to the password for each site. For example, buffy1944 could be a good base password. Then, you’d add AMZ at the end for your login to Amazon.com – buffy1944AMZ.

Update your antivirus
Hackers don’t care that you’re too busy to renew your antivirus and anti-spyware software – in fact, they hope you don’t! Set your software to update at least once a day and run a full system scan at least once a week.

Public wi-fi is public
If you don’t have an urgent need to check your online banking or private e-mail at the coffee house, don’t do it. While you’re on a public network, even if it is encrypted, a nearby hacker can capture your passwords and other personal information.

Tired Of Cell 411 Charges? Check Out Google’s 411

January 21, 2009

If your cell phone bill keeps creeping higher and higher because of calls to directory assistance, we’ve got a time and money saver for you. Google’s at it again. They are known for easy and free, and GOOG-411 is no exception.

This time they’re eliminating those expensive cell phone calls to 411 directory assistance. Their free service helps you find what you need fast and easily, and they’ll even connect your call or send you a map to the location.

It’s completely voice-activated. Program 1-800-GOOG-411 into your cell phone favorites and you’re ready to go. When you’ve found the business you want, say “text it” to send full details to your phone, or say “map it” to get a mobile map (assuming your phone has mapping capabilities).

For full details, visit the 1-800-GOOG-411 Home Page at http://www.google.com/goog411. Or just program in that number and give it a try.

What You Need To Know About Social Networking

December 22, 2008

Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users.

They are very popular but present challenges to small business owners. You can visit our website, www.MySpaceDisorder.com for our warnings about MySpace.

These sites seem to have come out of nowhere. For example, Facebook was founded in May, 2007, and currently has 70 million users. The rapid growth of such sites is part of the problem – you risk being caught off guard. Here are some of the top risks social networking sites pose to your business, and ways to manage that risk.

Indiscretion
Inadvertent disclosure of confidential information is a large risk. You wouldn’t publish your organization chart and phone directory on the internet; but a head-hunter or identity thief can use information on social networking sites to reconstruct this kind of information.

Reputation risk
There is also a risk to your company’s reputation. Social networking is more public and less formal than company email. It is also easier to use than blog software. It’s easy to imagine employees posting pictures or text that would embarrass their employer.

Cyber-slacking
Social networking sites can be addictive and timeconsuming. Cyber-slacking is a genuine concern, and difficult to control and monitor without security enhancements to your network.

Viruses and spyware
Social networking sites often display advertisements. At Tech Experts, we’ve observed that some of these advertisements have caused virus and spyware infections.

Broken privacy and identity theft
Some sites also allow third parties to run applications that have access to user profiles. This is a potential privacy risk. People publish a wealth of personal information in their profiles. This makes social networking sites a happy hunting ground for identity thieves and conmen.

We recommend that companies give serious thought to social networking and how they want to manage the risk.

Make sure your network is protected against web-borne viruses. At a minimum, every computer on your network should have current and automatically updated anti-virus software. For an enhanced layer of protection, install a firewall device that provides multi-layered protection against existing and emerging malware.

Have a clear and comprehensive Acceptable Use Policy in place. Ensure that employees are aware of what they can and cannot do on your company’s network. Review and update it often.

Set Rules for Personal Use. Use your company policy manual to spell out exactly how much personal web surfing is allowed, when, with whom, and under what circumstances. Of course, we recommend none.

Enforce your policies with an appropriate technology. This mean installing web monitoring and blocking software on each computer, or installing a network-wide security appliance.

No matter which option you choose, make sure you actively monitor usage, publish a usage policy, and keep that policy updated as new sites and threats emerge.

 

The Wrong Things?

December 22, 2008

Close your door. Turn off your computer monitor. Sit quietly and look out the window. Now – ask yourself the following question: “How much time do I spend on the wrong things each day?”

Don’t lie to yourself. Answer it as honestly as you can. 5 minutes? 15 minutes? 30 minutes? 60 minutes? 2 hours? 4 hours? More?

Now, turn on your computer monitor. Scan your inbox, even if it’s 4,137 messages. Bring up the weekly view on your calendar and look at it. Look at your todo list (if you have one).

Turn off your computer. Answer the question again.

Are you spending your time on the wrong things?

Looking Ahead: What’s In Store For Your Company?

December 22, 2008

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Our clients are typically small and medium sized companies, and while some of them are putting the brakes on and slowing down, most are still going strong.

We’re feverishly working with many clients to plan out their IT projects for 2009. Several clients are looking to upgrade their infrastructure with new servers, workstations and higher speed networking equipment. Even more will be enhancing their Internet speed and security and upgrading their websites (look for an incredible web and e-mail service promotion from us next month!).

These clients understand the importance of keeping their network and critical business systems update to date and in great operating condition.

What Is Your 2009 Plan?
By now, you’ve undoubtedly got the framework of your 2009 plan put together. What’s on the agenda?

From our corner of the world, as your computer guys, we’re seeing many companies looking for ways to decrease expenses and increase sales. We think some of the key technologies you’ll see helping with that include virtualization, unified communications, and cloud computing.

Virtualization
Virtualization technologies go back all the way to the 1960s and IBM’s M44 mainframe systems. In essence, virtualization lets you create and run more than one server “system” on a single piece of server “hardware.” The obvious benefit is that you’re able to run distinct servers on one piece of hardware.

An example application for small business would be a company that uses a specialized piece of software that requires a dedicated server. If the company is smaller, chances are a lot of that server’s horsepower is going to sit idle – because not a lot of people are using it. With virtualization, we would simply create another virtual server and install the special business software on that virtual server, saving the cost of an additional server.

Unified Communications
During the next few years, you’ll see the number of different communications vendors you work with reduced considerably. The technology already exists to check your e-mail from your cell phone, and to receive voice mails in your e-mail.

Cloud Computing
“The cloud” is a metaphor for the Internet. In general terms, cloud computing is the concept that your computing resources are no longer located in your office, or on your server, but rather, purchased as a service and delivered via the Internet. More and more, the services your company relies on every day will move to cloud computing applications, eliminating the need for hardware at your office.

The initial cost savings of cloud computing are obvious; the longer term cost savings will come from reduced operating expenses (employees can work from home, or anywhere, lowering the need for expensive office space) and access to higher quality services that are traditionally too expensive for small companies to implement. Salesforce.com is the perfect example of an enterprise-class application made available to small companies through the use of cloud computing.

Thank You!
As we wind down 2008, I’d like to thank the clients and friends that support Tech Experts. The trust and confidence you place in us as your IT company is invaluable, and everyone here is very thankful for your business. Happy new year!

A Great Book To Read
Panic: The Story of Modern Financial Insanity (edited by Michael Lewis) is a brilliant book and a good start to our new “Recommended Reading” list.

Panic covers five modern financial crashes: The Crash of 1987, The Russian Default / Collapse of Long Term Capital Management, The Asian Currency Crisis of 1999, The Internet Bubble and The Subprime Mortgage Disaster.

Each section has a perfect setup – a few articles preceding the actual crash followed by articles that are written as the crash is happening. Lewis finishes off each section with at least one post crash article.

There are some interesting characters throughout the book, but my favorite example is from The Internet Bubble section: Bernard Madoff – yes, the one that’s been in the news lately.

 

 

Free E-mail Accounts? You Get What You Pay For!

December 22, 2008

We’ve all been told there is no such thing as a free lunch; yet it’s hard to resist the siren’s call of “FREE.” That’s one of the reasons why so many people have free e-mail accounts through Hotmail, MSN, and Gmail.

And while you might not be paying out of pocket for these services, there IS a cost. Here’s the price you pay when you use a free e-mail account:

An Extra Helping Of Spam: And loads of it. Are these free services selling your e-mail account? Do spammers have ways of gleaning your e-mail account? No one seems to know for sure (or at least they’re not talking). But the bottom line is you’ll end up with a lot more ads for Viagra than you bargained for.

Your E-mails Aren’t Guaranteed To Be Delivered: The majority of spam messages come from free e-mail accounts. Even though you aren’t sending them, spam filters look at the server sending the message and, if it’s a known source for spam, will block the e-mail from going through. That means your emails might be getting blocked before they even reach the sender.

Customer Service? Non-existent! See you DO get what you pay for! If you have a problem, you’re on your own to figure it out.

Difficulty In Moving, Forwarding, or Downloading: Free e-mail services require that you read your e-mail through their web interface. If you want to move, forward or download your e-mail, contacts or other information, the process is cumbersome and sometimes impossible.

No Archiving: E-mail archiving, or storing old emails in a searchable, retrievable format has become very important (even a legal requirement) in some industries like medical and financial. Email is considered a form of communication and if you use it to support customers, order products, or to negotiate any type of deals, you want to keep a record.

So while these free services are okay for chatting with friends, they are NOT recommended for business purposes or for anything important.

Here’s a question to ask yourself: If your e-mail account was erased tomorrow and all your messages, contact information, and history were gone, would it be a slight inconvenience or a catastrophe? If it’s the latter, then you need to get a “real” e-mail account.

And, while you’re at it, you should also get an account that reflects your own URL, like cbogedain@expertsmi.com. The only reason for keeping a free e-mail account is to provide certain web sites with an e-mail address when you don’t care about getting communications from them, or that may spam you later on – that way, you can simply get rid of it and get a new one when you start to get too much spam.

Seeing the Sites – Telemarketing Scam Defense

December 22, 2008

by T.J. Lee
The connected age we now live in has brought us both great wonders and significant evils. What’s interesting is that the same technologies are often used for both.

One tool that can, and is, often misused is the telephone. Once the most annoying thing you were subjected to was a call, always at dinner time, which turned out to a telemarketer sales call. But the number of scams, spams, and serious whams that can come from seemingly innocent telephone calls has skyrocketed.

Ever get an odd call in voicemail or on your answering machine with instructions to call back right away? Do you call, not call, is it real, a trick, a trap? Before you dial check with this interesting site to see what’s what with the return number.

http://800notes.com/

You can type in a number and find out if it’s a known scam, or if others have been getting the same calls as you. You can also tap into the latest news on Do-Not-Call lists, telemarketing scams both domestic and coming from overseas, as well as articles about your telephone rights, what to do if you are getting harassing phone calls, how to file complaints with the appropriate government agencies and more.

What’s nice is that all of the pages provide for reader comments so you can benefit from the experience of others with the topics being discussed.

4 Hidden Dangers Electricity Poses To Your Computer Network… And One Simple, Inexpensive Solution That Will Prevent Them All From Doing Damage

December 22, 2008

Is your computer plugged in? Do you use a power strip with a surge protector? If so, you are a heartbeat away from disaster and don’t even realize it. The same electricity you depend on to run your computer and network is also trying to destroy your data.

Believe it or not, electricity is one of the biggest threats to your computer network and the data it contains. Here are four computer power problems you must know about and how to prevent them.

Transients
Commonly known as surges and spikes, these are caused by lightning storms, wind, squirrels shorting out power lines, auto accidents, etc. Several times each week these spikes can travel up the power cord into your computer damaging everything from power supplies to motherboards.

Conventional wisdom says use a power strip with a surge protector and you are safe. As usual, conventional wisdom is dead wrong. After several months, these surge protectors become useless having been zapped by the surges they were designed to protect against.

Blackouts
Whether momentary or prolonged, the sudden loss of power can corrupt your PC to the point of not being able to start up again when the lights come back on.

Sags
This is when the power drops below normal. Have you ever seen the fluorescent lights flicker for a moment? Then you have witnessed sag. Sags are more common than surges and are caused when equipment like air conditioners, blow dryers, water heaters, laser printers, copy machines and other electrical equipment are turned on or come out of sleep mode. A typical small office will experience 30 or more sags each day. Sags cause many of the weird and unexplained problems computer users complain about every day.

Noise
Ever been watching TV and seen fuzzy pictures and/or white lines or dots when you turn on a blender or vacuum cleaner? This is the result of electrical noise. While a fuzzy TV picture is an annoyance, this electrical noise causes many computer problems including loss of data.

So how do you protect yourself from electrical problems? The most simple and inexpensive solution to all four of these hazards is a battery backup. The battery backup (also known as a UPS or Uninterruptible Power Supply) senses when there are problems with the power and automatically switches to the battery protecting you from computer damage and data loss.

Choosing the correct battery backup for your computer or server can be tricky. Having one with a battery too small is the same as having none at all.

For most desktop computers, a battery backup with a 500VA or larger rating should be sufficient to keep you going through momentary power problems, and give you time to shut down your computer if you experience a longer power outage..

Protecting your server requires detailed knowledge of the server functions and power consumption in order to pick the right battery backup solution. If you want help in determining the right protection for your specific network, give us a call: 734-457-5000.

Everyone’s Talking… So What About The Economy?

November 23, 2008

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

I’m coming off a marathon couple of weeks of travel… I’ve been to Council Bluffs, Iowa (near Omaha) for a peer group meeting and to Nashville, Tennessee for a marketing seminar. The one constant everywhere I visited was conversation about the economy. It’s the main topic on every news cast, every news paper article, and every news radio program.

Economists are calling what we’re experiencing a “precession” rather than a real recession. Activity is stalled because everyone’s scared. This isn’t to say that the economic pressures aren’t real – I talk with clients every day who are experiencing slower sales and slowed collections.

In our business, we’ve not seen a significant decline in sales so much as we’ve seen clients slowing their payments. Companies that paid regularly within our net 10 terms are now paying in 30 days. Clients who paid in 30 days are paying at 45. I think everyone is hoarding their cash because they’re scared and not sure where things are headed.

Whatever the terminology – slowdown, precession, recession, decline, etc. – that this is the perfect time to be working on our businesses to really take advantage of the situation. What do we need to do when times get a little tougher? Adapt and change! Here are a few thoughts for consideration.

Cash Is King
We need to evaluate how cash leaves and enters our company. Can we cut some outgo or speed up some inflow? We need to watch cash because he who has it will win. Cash flow is a critical thing to take care of. Watch your A/R and keep it collected. Cut back where it makes sense. Evaluate how the money flows.

Reinvent!
In our business, technology, processes and procedures change constantly. We have to reinvent ourselves pretty regularly to survive. There is no better time than a difficult one to see what needs to be changed or improved in our companies. There are likely things that need to go, and new things that need to be added. Think carefully about your business and what should continue to be part of it.

Get Outside Your Box
Forget “But we’ve always done it that way.” Don’t let the norm be the norm – look outside your comfort zone and consider all options. You can’t allow the rut to keep you on the wrong path. Creative thinking and planning will be key to coming out of this on the other side.

Plan Carefully!
Planning is always important but never more important than when times are tough. You need to make sure you have a solid plan and your team understands it. There is no money or time to waste, so your plan needs to keep everyone working toward the same goals.

Market Your Business!
We have a client, John Poniewozik from Iceberg’s One Hour Heating and Air Conditioning, who has his business marketing down! His promotions are unusual and attention getting. Have you seen his penguin television ads or direct response letters? They’re really great. You might think some of our marketing is unusual, and I admit that it is.
But I think that is the key to why it works! Doing the same old boring stuff that every other business with whom you compete is doing, makes your business blend into the background. There is no differentiation – if you market like everyone else, there’s no way to tell why your business is better.

I have a friend who is a marketing consultant, and she often talks about how business owners fall into the habit of “ego based marketing.” They think “my clients are different” or “my customers would never respond to that type of marketing.” Baloney! Customers are craving something different. Use that to get their attention and get them to buy from you instead of your competition.

Execute
As business owners, I think we have a tendency toward perfection. We want everything our companies do to be 100%. I suffer from this myself, and it has been difficult for me to learn and accept that 95% is good enough 95% of the time. We get stuck sometimes in “paralysis by analysis” mode and keep “working on things” and never “getting things done.”

Execute on your planning. Execute your marketing strategies. Execute your process improvement projects. There will be time to perfect them as you go along. But when your competitors finally get around to executing their “perfect” plans – you will be that many steps ahead of the game.

Difficult times are opportunities. Many will struggle, some will fail, but for those who are ready and execute – you can leverage these times to make up ground quickly.

My advice: Don’t listen to the news. Follow your own plan and make things happen.

Technical Terms Confusing? Here’s An Explanation!

November 23, 2008

As a technician for over 20 years, I have heard a variety of terms being thrown around and I am sure a lot of these are terms you have heard at one time or another and never knew the true meaning of the word. I thought that a list of terms most people have heard along with the definitions would help to understand the variety of things that can happen to a computer, but hopefully not yours.

Hang: A totally unresponsive computer is said to be hung, or hanged. You could also use the term frozen, though hang is the accepted term used by computer nerds for generations.

This very thing happened to me just the other day. I was home on my personal PC and I needed to view a webinar on Windows Server 2008. I got ready for the webinar and when the webinar started my computer just froze. I checked with a co-worker to make sure there was nothing wrong with the website. I had to reboot my computer and when I did I was able to view the webinar. My computer had totally hung. But once the PC came back up I discovered I had a glitch…

Glitch: Whenever the computer does something strange or unexpected or behaves in a manner inconsistent with normal operation, that’s a glitch. Glitches happen to everyone.

In this case, my sound did not work. As far as I knew it was working. The sound may have not been working for weeks but you notice it missing only when you otherwise would expect it. Such is the agony of the glitch. When I asked my wife if she had any problems with the computer I got the classic “Oh yeah, I meant to tell you I think the sound is out.” Often, you fail to notice a glitch unless it does something that directly affects what you’re doing.

Bug: A bug is an error in a computer program. Despite the efforts of the best programmers, most computer software is riddled with bugs. Bugs are what cause computer glitches. Bad bugs can cause a computer to hang or crash.

Note that most of the worst bugs happen when you mix two programs together and they interact in some new and unexpected way. The term comes from the early days of computing, when a real bug (a moth) got stuck in the circuitry.

Crash: Crash is another term for a dead computer — specifically, what happens to a hard drive when it ceases operation. A crash is typically more sensational than a hang.

Remember that a hang is a freeze. A crash is typically accompanied by spectacular warning messages or weird behavior (and may indicate more than just a dying hard drive). In fact, a crashed computer may still be teasingly functional. Only the foolhardy continue to use a crashed computer.

If you have been experiencing any of the bugs, glitches, hangs or crashes make sure to visit a professional at Tech Experts as soon as possible so we can do our best to protect your vital information from disappearing forever. You can reach us at (734) 457-5000.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

The Hidden Cybersecurity Risk In Your Business

October 14, 2025

Advanced Strategies To Lock Down Your Business Logins

October 14, 2025

The Long-Term Costs Of Slow Computers

October 14, 2025

Five Simple Ways To Keep Your Business Data Clean

September 23, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Twitter Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.