• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

3 Things You Need To Know About E-mail Marketing

February 8, 2009

It’s everyone’s favorite application. Since its introduction, it has revolutionized the way we communicate, both personally and professionally. It has had a major impact on how companies market themselves, communicate with vendors, send out press releases, rally employees and alert clients to their latest and greatest promotion. The ease, low-cost and speed of e-mail in marketing is the biggest reason why our inboxes are overflowing with spam.

In response to the ubiquitous outcry, “I hate spam,” governments have crafted new regulations surrounding the use of e-mail; and if you are one of the millions of companies using it for marketing, then it’s important that you familiarize yourself with these laws. But the danger doesn’t stop there…

Even if you don’t get caught by the authorities for violating the rules of e-mail usage, you can still end up on a blacklist with the major ISPs such as Yahoo!, AOL, and MSN. Once you get blacklisted, you are considered guilty until proven innocent, and ALL the e-mail you send won’t get through, even to people who want to receive it—a consequence that could end up hurting your business more than a fine.

So what are the basic guidelines of e-mail marketing?
First and foremost, make sure you are only sending e-mail campaigns to people who have solicited (requested) to be on your distribution list. This is called “opting-in” or subscribing, and e-mails sent to these folks are considered “solicited e-mail.” You are perfectly within your rights to send them messages; but if you got their e-mail address by any other means and they did NOT specifically request to be on your list, that is “unsolicited e-mail” or spam.

Sending promotional e-mails to people who have not requested it can be illegal, but certainly annoying…so don’t do it!

Next, make sure you provide directions on how a person can remove themselves from your distribution list in EVERY e-mail. The best place to put this information is at the very bottom of your message. You should also include your full company name and contact information at the bottom so no one can blame you for cloaking your identity—which is in violation of the CAN-SPAM Act.

Finally, when sending mass e-mails, we recommend using a web based service such as iContact (www.iContact.com). These applications will help you manage your e-mail distribution list with automatic opt-out and opt-in tools and will keep your e-mail server off an ISP’s blacklist. Naturally, you want to make sure the information you are sending is interesting and relevant. No one wants more junk filling up their inbox so the better you are at marketing, the better your results will be.Email is not a magic marketing bullet that will solve all your marketing problems, but used correctly, it can help you reach more customers and build stronger relationships with the people you already do business with.

How To Pick A Good Password

February 8, 2009

What’s the most common password? You guessed it…”password.” Obviously this is not the best way to protect yourself against hackers and online thieves. But even if you don’t use the word “password,” you might be using an equally easy password to decipher.
We suggest you DON’T use the following passwords for really important web sites, such as your online banking web site or other financially related sites.
• Your name or your spouse’s name.
• Your children’s names.
• Your pet’s name.
• Your birth date.
• The last four digits of your Social Security number.
• Your phone number.
• Your address.
• A series of consecutive numbers, such as “1, 2, 3, 4.”
• A single word that would appear in a dictionary.
Your best bet for creating a strong password: Use combinations of letters, numbers and special characters.

USB Flash Drives Great For Backups At A Low Cost

February 8, 2009

A few issues back I discussed what random access memory (RAM) was, and how important it was to have as much memory as your computer can hold. This month I’d like to talk about memories. Or more to the point the storage and retrieval of memories.

I’ve experienced countless numbers of hard drive failures in computers that belong to our home user clients and as a result of this failure they lose all of their precious photo memories.

Once I tell them that I cannot rescue these photos, a lot of times they get that deer in the headlights look, and it is so sad. I got to thinking about this as just this past holiday season, my wife and I purchased a digital camera. Never having owned one before, I have been taking pictures like crazy and downloading them to my home PC.

In years past, it wasn’t an issue to back up your photographs. You used to take your pictures into the store and have them developed. It didn’t matter which type it was, slides or photos: Once you got them back developed, you could put them in an album and anything short of a major disaster those images will live on for generations. Your “backup” was the negatives that came back with your pictures.

Hard drive failure can lead to a loss of so many memories that many feel this would be a major disaster. We’ve touched on various backup systems for business users, but home users should be just as vigilant in the protection of what they consider to be their important data, their photo memories.

As technology has changed over the years, storage technology has evolved just as quickly. We used to backup onto floppy disks. Then came the writable CD player. And just a few years back came the development of an affordable DVD writer that can store much more data then a CD.

But the latest technology is the USB thumb or flash drive. This tiny portable electronic drive has no moving parts and is small enough to fit on your key chain.

And as companies refine their technology; these drives have become more and more affordable.

The ease of use is one of it’s best features, a truly plug and play device that works instantly on any computer with a current operating system such as Windows XP or Windows Vista. You can move the drive with true ease from computer to computer to copy those memories and have them stored away for future generations.

I’ve seen USB flash drives with 4GB of storage sell for as low as $25. This type of capacity will allow you to store numerous photos and can serve as an electronic photo album. The other nice thing about a USB drive for backup is that you can use them for more than just pictures – any important data you have on your computer can be backed up or copied.

If you’d like more information about how to use a USB drive to backup your memories (and important documents), just give us a call at (734) 457-5000.

Tech Experts Keeps The Sun Shining For Electrik Beach

January 21, 2009

If the winter weather has you missing your tan, chances are you’d love visiting Electrik Beach, Monroe and Toledo’s premier chain of tanning salons.

Since we last profiled Electrik Beach, the company has added two new locations in Toledo, and updated their computers at all four of their stores. Company president Dennis Asmar keeps his fingers on the pulse of the company’s operations by using state of the art computer and network technology from Tech Experts.

“You can go into any of our four locations and tan,” explained Dennis, “ and our staff is able to review your account to make sure you receive the best service possible.”

Being able to use any of Electrik Beach’s facilities is accomplished through the company’s proprietary tanning management software. Using secure Internet connections, each store communicates with the central server, keeping each customer’s account information up to date.

The company recently upgraded all of their servers and workstations to the latest high speed equipment available from IBM. The company’s servers have super fast and highly redundant RAID 5 arrays, using drives that operate at 10,000 rpms. The speed difference between the old system and the new is remarkable.

“Fifteen or twenty seconds doesn’t sound like a lot of time to wait,” continued Dennis, “but when you have several clients waiting, it can seem like an eternity. With our new systems from Tech Experts, our client wait time has gone way down, while our customer service has gone way up.”

Downtime just isn’t an option for Electrik Beach, so Dennis opted for Tech Experts’ “Experts Total Support” service for the salons. With Experts Total Support, all of the servers, workstations and connectivity equipment are monitored for problems 24 hours a day, seven days a week. As soon as a problem is detected, a ticket is raised, and it is immediately checked.

“Before hiring Tech Experts, our network would sometimes go down, run slow, and we’d sometimes run into just weird problems we couldn’t figure out,” said Dennis. “Since signing up on their support plan, we haven’t had any network problems. I’m VERY glad we hired these guys to support our systems.”

Visit Electrik Beach on the web at www.ElectrikBeach.com.

E-Mail Trouble? Here Are Some Things To Check

January 21, 2009

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Have you ever wondered whether someone got your email? You send a message, you wait to hear back, and…nothing. Did it arrive, or did it get lost along the way?

One of modern life’s greatest conveniences and frustrations, all in one, is email. When it works, it’s near-instant communication. But when it doesn’t, you’re left hanging.

How is it possible for such an important form of business communication to be so unreliable? Sadly, spam is to blame – I long for the good old days of reliable e-mail! As companies work to combat junk e-mail, chances are your mail may have some problems getting delivered. Fortunately, a little knowledge will increase the odds that your message gets through.

Bad Address
A common problem is simply an out-dated or mistyped email address.

With hard-to-remember addresses, frequent job moves, and changing internet service providers, your contact list should be updated regularly.

If you send something to a bad address, you usually get an error message sent right back to you. This is called a “bounce-back message” because the email was sent (“bounced”) right back without getting through.

Check for typos in the address line; if it looks right, pick up the phone instead. Be sure to update your address book with the new email.

Blacklists
A more serious problem occurs if your address is added to a blacklist. These are lists managed by a variety of spam-prevention services that flag people, websites, and servers that are known spammers.
Many anti-spam programs rely on these lists to filter out bad email. If you are caught on one, you will undoubtedly have problems delivering your message. Since different email servers rely on different lists, you may find most email gets through and only a few people have problems. Get on a big enough list – or several lists – and the number of issues will increase.

Even the innocent get blacklisted. For example, a spammer may “spoof” your email, making it appear that you are a spammer even though messages come from a completely different source. If you start getting bounce-back messages as mentioned above, that make it appear you sent large batches of obscene or get-rich-quick emails to people you don’t know, that’s the most likely cause. There’s no way to prevent this; wait a couple of days and it will usually subside.

Greylists
A less serious but equally frustrating list is the greylist. Many large organizations will use these to filter email from senders they haven’t seen before.

As long as your message isn’t spam, this will more likely delay your message than completely block it. However, if you need quick response and the email doesn’t arrive for a full day, it creates a significant communications obstacle.

When the delay is a one-time occurrence and your next message gets through, there’s no need to do anything. Keep in mind you may encounter delays with several recipients; it’s only cause for concern if you run into multiple delays with the same person, or even the same company.

Other Spam Filters
There are a number of additional triggers that can flag your message as spam. Excessive use of the word “free,” for example, is commonly associated with spam messages.

Google “spam checker” and you’ll find a variety of tools (free!) that will scan your message and tell you how spammy it is. Use these tools when you have an email you plan to send to a large group.

Info Overload
Human error is also a factor. With the sheer volume of email coming into our computers each day, it’s challenging to keep email organized.

If your message has been missed, it’s always a good idea to follow up with a phone call. Perhaps it didn’t arrive, but more likely it came in at a busy time and was accidentally overlooked.

A Convenient Excuse
If you take all these precautions and still your email doesn’t get through, and there’s no bounce-back message, you may be the victim of a convenient excuse.

If your email isn’t rejected, isn’t in any spam filter, and yet doesn’t show up despite a “careful review”…and all your subsequent tests work just fine…well, let’s just say technology may not be your problem.

Laptop Or Desktop? It Depends On Your Application

January 21, 2009

I have noticed an interesting trend lately in our service department at Tech Experts.

We have been seeing an increase in the number of laptop or notebook style computers in for service. While this may be due to the holiday season and students returning home from school to visit family, I also feel that the falling prices have lead to laptops being much more affordable then in the past.

This got me to thinking about the comparison of laptops versus desktop and the advantages and disadvantages of both.

Many times I have been asked “Which one is better laptop or desktop?” The short answer is “It depends.” It basically boils down to what you plan to do with the unit.

Laptops are obviously an advantage for students who must travel not only back home and to school, but they also travel between classes and dorm rooms and restaurants. This portability is also an advantage for business travelers and mobile offices. It is hard to carry a desktop with you in your travels.

And with the popularity of wireless “hotspots” in almost every public place, laptops will continue to grow in popularity.

Some of the disadvantages I have seen with laptops are the ease at which the power jack on the unit can become loose and the power adapter cannot charge the battery, because the connector is broken and separates from the board – meaning no power is getting to the computer.

This is typically caused by applying some type of force to the plug when it is plugged into the jack. Tipping the laptop so the weight of the unit rests on the plug will cause this problem and care should always be taken not to do this.

While I am on the subject of power adapters, this is another disadvantage of a laptop. We had a call just the other day from a couple travelling from their home in Louisiana that forgot to pack their power adapter.

No power adapter means you cannot charge the battery which means a useless laptop after a few hours of operation. In this case the couple purchased a couple of extra adapters from EBay and discovered it still did not work. After coming into our service department it was quickly discovered that their power jack in the laptop had broken.

Another disadvantage to laptops is the ease at which careless operators can spill liquid onto the keyboard. If you do this on your desktop computer it is really not that big of a deal to purchase a new keyboard at the local computer shop, plug it in and off you go.

Laptop keyboard replacement is much more difficult and can be a costly repair. You can’t just rinse the liquid out. Often the liquid that is still in the keyboard will dry and cause the keys to stick. Care should always be taken to keep all liquids away from laptops.

Desktop computers, although they are not so portable seem to have longer lifespan then laptops. This is mainly due to the fact that they do not get moved very often. If you are going to move your desktop take extra care to treat it very gently as they do not take jolting and jarring well.

I have had people mention to me they don’t like to type on a laptop. I prefer the feel of a laptop keyboard to a traditional keyboard, and all laptops can accept USB keyboards if you prefer.

So it “depends” on your situation and requirements for your computing needs. Call us at Tech Experts and we can provide you with the expert guidance needed to make the right decision.

Simple Tips To Keep You Out Of Computer Trouble

January 21, 2009

As you can imagine, we see a lot of computer and network issues . Sometimes, they’re pretty difficult to diagnose and repair, but in some cases, a simple fix is all you need. Here are some tips you can refer to the next time your computer goes a little crazy, and some advice to keep you out of trouble.

Reboot!
Nine times out of ten, rebooting your computer and connected equipment will solve the problem you’re having. Do a full restart, which means go to your Start menu, shut down the computer, and power down your peripherals and computer. Then, restart it fresh.

We know what you did
A good computer consultant can tell if you’ve been bad or good on your computer, and usually pretty quickly. Tell us what you really did right before the computer crashed – this will save time and aggravation. Your consultant will figure it out eventually – why not make the repair quicker?

There is no free lunch
Downloading free music, movies and games from the Internet can open holes in the security system of your computer, making it easy for other people to access your files. Be safe… Only use legitimate sites like iTunes and Netflix for your downloads.

Use strong passwords
We walk a fine line in recommending passwords. If they’re really easy to remember, that means they’re also really easy to guess. If we make the password very hard to guess, it’s also going to be very hard to remember.

Here’s a suggestion: Create a “main” password which you then modify for each site you use. A good main password would consist of numbers and letters (but not your birth date!).

Try using your first dog’s name combined with the address of the first house you lived in, and then add to the password for each site. For example, buffy1944 could be a good base password. Then, you’d add AMZ at the end for your login to Amazon.com – buffy1944AMZ.

Update your antivirus
Hackers don’t care that you’re too busy to renew your antivirus and anti-spyware software – in fact, they hope you don’t! Set your software to update at least once a day and run a full system scan at least once a week.

Public wi-fi is public
If you don’t have an urgent need to check your online banking or private e-mail at the coffee house, don’t do it. While you’re on a public network, even if it is encrypted, a nearby hacker can capture your passwords and other personal information.

Tired Of Cell 411 Charges? Check Out Google’s 411

January 21, 2009

If your cell phone bill keeps creeping higher and higher because of calls to directory assistance, we’ve got a time and money saver for you. Google’s at it again. They are known for easy and free, and GOOG-411 is no exception.

This time they’re eliminating those expensive cell phone calls to 411 directory assistance. Their free service helps you find what you need fast and easily, and they’ll even connect your call or send you a map to the location.

It’s completely voice-activated. Program 1-800-GOOG-411 into your cell phone favorites and you’re ready to go. When you’ve found the business you want, say “text it” to send full details to your phone, or say “map it” to get a mobile map (assuming your phone has mapping capabilities).

For full details, visit the 1-800-GOOG-411 Home Page at http://www.google.com/goog411. Or just program in that number and give it a try.

What You Need To Know About Social Networking

December 22, 2008

Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users.

They are very popular but present challenges to small business owners. You can visit our website, www.MySpaceDisorder.com for our warnings about MySpace.

These sites seem to have come out of nowhere. For example, Facebook was founded in May, 2007, and currently has 70 million users. The rapid growth of such sites is part of the problem – you risk being caught off guard. Here are some of the top risks social networking sites pose to your business, and ways to manage that risk.

Indiscretion
Inadvertent disclosure of confidential information is a large risk. You wouldn’t publish your organization chart and phone directory on the internet; but a head-hunter or identity thief can use information on social networking sites to reconstruct this kind of information.

Reputation risk
There is also a risk to your company’s reputation. Social networking is more public and less formal than company email. It is also easier to use than blog software. It’s easy to imagine employees posting pictures or text that would embarrass their employer.

Cyber-slacking
Social networking sites can be addictive and timeconsuming. Cyber-slacking is a genuine concern, and difficult to control and monitor without security enhancements to your network.

Viruses and spyware
Social networking sites often display advertisements. At Tech Experts, we’ve observed that some of these advertisements have caused virus and spyware infections.

Broken privacy and identity theft
Some sites also allow third parties to run applications that have access to user profiles. This is a potential privacy risk. People publish a wealth of personal information in their profiles. This makes social networking sites a happy hunting ground for identity thieves and conmen.

We recommend that companies give serious thought to social networking and how they want to manage the risk.

Make sure your network is protected against web-borne viruses. At a minimum, every computer on your network should have current and automatically updated anti-virus software. For an enhanced layer of protection, install a firewall device that provides multi-layered protection against existing and emerging malware.

Have a clear and comprehensive Acceptable Use Policy in place. Ensure that employees are aware of what they can and cannot do on your company’s network. Review and update it often.

Set Rules for Personal Use. Use your company policy manual to spell out exactly how much personal web surfing is allowed, when, with whom, and under what circumstances. Of course, we recommend none.

Enforce your policies with an appropriate technology. This mean installing web monitoring and blocking software on each computer, or installing a network-wide security appliance.

No matter which option you choose, make sure you actively monitor usage, publish a usage policy, and keep that policy updated as new sites and threats emerge.

 

The Wrong Things?

December 22, 2008

Close your door. Turn off your computer monitor. Sit quietly and look out the window. Now – ask yourself the following question: “How much time do I spend on the wrong things each day?”

Don’t lie to yourself. Answer it as honestly as you can. 5 minutes? 15 minutes? 30 minutes? 60 minutes? 2 hours? 4 hours? More?

Now, turn on your computer monitor. Scan your inbox, even if it’s 4,137 messages. Bring up the weekly view on your calendar and look at it. Look at your todo list (if you have one).

Turn off your computer. Answer the question again.

Are you spending your time on the wrong things?

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2026 Issues
  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Hackers Aren’t Hacking – They’re Just Logging In

February 17, 2026

The “Deepfake CEO” Scam: Voice Cloning Is The Next Cyber Threat

February 17, 2026

Why “It Hasn’t Happened To Us (Yet!)” Is The Most Expensive IT Strategy

February 17, 2026

You Absolutely Need To Back Up Your Cloud Services Like Office 365

January 20, 2026

Tags

AI Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2026 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.