• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

What You Need To Know About Social Networking

December 22, 2008

Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users.

They are very popular but present challenges to small business owners. You can visit our website, www.MySpaceDisorder.com for our warnings about MySpace.

These sites seem to have come out of nowhere. For example, Facebook was founded in May, 2007, and currently has 70 million users. The rapid growth of such sites is part of the problem – you risk being caught off guard. Here are some of the top risks social networking sites pose to your business, and ways to manage that risk.

Indiscretion
Inadvertent disclosure of confidential information is a large risk. You wouldn’t publish your organization chart and phone directory on the internet; but a head-hunter or identity thief can use information on social networking sites to reconstruct this kind of information.

Reputation risk
There is also a risk to your company’s reputation. Social networking is more public and less formal than company email. It is also easier to use than blog software. It’s easy to imagine employees posting pictures or text that would embarrass their employer.

Cyber-slacking
Social networking sites can be addictive and timeconsuming. Cyber-slacking is a genuine concern, and difficult to control and monitor without security enhancements to your network.

Viruses and spyware
Social networking sites often display advertisements. At Tech Experts, we’ve observed that some of these advertisements have caused virus and spyware infections.

Broken privacy and identity theft
Some sites also allow third parties to run applications that have access to user profiles. This is a potential privacy risk. People publish a wealth of personal information in their profiles. This makes social networking sites a happy hunting ground for identity thieves and conmen.

We recommend that companies give serious thought to social networking and how they want to manage the risk.

Make sure your network is protected against web-borne viruses. At a minimum, every computer on your network should have current and automatically updated anti-virus software. For an enhanced layer of protection, install a firewall device that provides multi-layered protection against existing and emerging malware.

Have a clear and comprehensive Acceptable Use Policy in place. Ensure that employees are aware of what they can and cannot do on your company’s network. Review and update it often.

Set Rules for Personal Use. Use your company policy manual to spell out exactly how much personal web surfing is allowed, when, with whom, and under what circumstances. Of course, we recommend none.

Enforce your policies with an appropriate technology. This mean installing web monitoring and blocking software on each computer, or installing a network-wide security appliance.

No matter which option you choose, make sure you actively monitor usage, publish a usage policy, and keep that policy updated as new sites and threats emerge.

 

The Wrong Things?

December 22, 2008

Close your door. Turn off your computer monitor. Sit quietly and look out the window. Now – ask yourself the following question: “How much time do I spend on the wrong things each day?”

Don’t lie to yourself. Answer it as honestly as you can. 5 minutes? 15 minutes? 30 minutes? 60 minutes? 2 hours? 4 hours? More?

Now, turn on your computer monitor. Scan your inbox, even if it’s 4,137 messages. Bring up the weekly view on your calendar and look at it. Look at your todo list (if you have one).

Turn off your computer. Answer the question again.

Are you spending your time on the wrong things?

Looking Ahead: What’s In Store For Your Company?

December 22, 2008

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Our clients are typically small and medium sized companies, and while some of them are putting the brakes on and slowing down, most are still going strong.

We’re feverishly working with many clients to plan out their IT projects for 2009. Several clients are looking to upgrade their infrastructure with new servers, workstations and higher speed networking equipment. Even more will be enhancing their Internet speed and security and upgrading their websites (look for an incredible web and e-mail service promotion from us next month!).

These clients understand the importance of keeping their network and critical business systems update to date and in great operating condition.

What Is Your 2009 Plan?
By now, you’ve undoubtedly got the framework of your 2009 plan put together. What’s on the agenda?

From our corner of the world, as your computer guys, we’re seeing many companies looking for ways to decrease expenses and increase sales. We think some of the key technologies you’ll see helping with that include virtualization, unified communications, and cloud computing.

Virtualization
Virtualization technologies go back all the way to the 1960s and IBM’s M44 mainframe systems. In essence, virtualization lets you create and run more than one server “system” on a single piece of server “hardware.” The obvious benefit is that you’re able to run distinct servers on one piece of hardware.

An example application for small business would be a company that uses a specialized piece of software that requires a dedicated server. If the company is smaller, chances are a lot of that server’s horsepower is going to sit idle – because not a lot of people are using it. With virtualization, we would simply create another virtual server and install the special business software on that virtual server, saving the cost of an additional server.

Unified Communications
During the next few years, you’ll see the number of different communications vendors you work with reduced considerably. The technology already exists to check your e-mail from your cell phone, and to receive voice mails in your e-mail.

Cloud Computing
“The cloud” is a metaphor for the Internet. In general terms, cloud computing is the concept that your computing resources are no longer located in your office, or on your server, but rather, purchased as a service and delivered via the Internet. More and more, the services your company relies on every day will move to cloud computing applications, eliminating the need for hardware at your office.

The initial cost savings of cloud computing are obvious; the longer term cost savings will come from reduced operating expenses (employees can work from home, or anywhere, lowering the need for expensive office space) and access to higher quality services that are traditionally too expensive for small companies to implement. Salesforce.com is the perfect example of an enterprise-class application made available to small companies through the use of cloud computing.

Thank You!
As we wind down 2008, I’d like to thank the clients and friends that support Tech Experts. The trust and confidence you place in us as your IT company is invaluable, and everyone here is very thankful for your business. Happy new year!

A Great Book To Read
Panic: The Story of Modern Financial Insanity (edited by Michael Lewis) is a brilliant book and a good start to our new “Recommended Reading” list.

Panic covers five modern financial crashes: The Crash of 1987, The Russian Default / Collapse of Long Term Capital Management, The Asian Currency Crisis of 1999, The Internet Bubble and The Subprime Mortgage Disaster.

Each section has a perfect setup – a few articles preceding the actual crash followed by articles that are written as the crash is happening. Lewis finishes off each section with at least one post crash article.

There are some interesting characters throughout the book, but my favorite example is from The Internet Bubble section: Bernard Madoff – yes, the one that’s been in the news lately.

 

 

Free E-mail Accounts? You Get What You Pay For!

December 22, 2008

We’ve all been told there is no such thing as a free lunch; yet it’s hard to resist the siren’s call of “FREE.” That’s one of the reasons why so many people have free e-mail accounts through Hotmail, MSN, and Gmail.

And while you might not be paying out of pocket for these services, there IS a cost. Here’s the price you pay when you use a free e-mail account:

An Extra Helping Of Spam: And loads of it. Are these free services selling your e-mail account? Do spammers have ways of gleaning your e-mail account? No one seems to know for sure (or at least they’re not talking). But the bottom line is you’ll end up with a lot more ads for Viagra than you bargained for.

Your E-mails Aren’t Guaranteed To Be Delivered: The majority of spam messages come from free e-mail accounts. Even though you aren’t sending them, spam filters look at the server sending the message and, if it’s a known source for spam, will block the e-mail from going through. That means your emails might be getting blocked before they even reach the sender.

Customer Service? Non-existent! See you DO get what you pay for! If you have a problem, you’re on your own to figure it out.

Difficulty In Moving, Forwarding, or Downloading: Free e-mail services require that you read your e-mail through their web interface. If you want to move, forward or download your e-mail, contacts or other information, the process is cumbersome and sometimes impossible.

No Archiving: E-mail archiving, or storing old emails in a searchable, retrievable format has become very important (even a legal requirement) in some industries like medical and financial. Email is considered a form of communication and if you use it to support customers, order products, or to negotiate any type of deals, you want to keep a record.

So while these free services are okay for chatting with friends, they are NOT recommended for business purposes or for anything important.

Here’s a question to ask yourself: If your e-mail account was erased tomorrow and all your messages, contact information, and history were gone, would it be a slight inconvenience or a catastrophe? If it’s the latter, then you need to get a “real” e-mail account.

And, while you’re at it, you should also get an account that reflects your own URL, like cbogedain@expertsmi.com. The only reason for keeping a free e-mail account is to provide certain web sites with an e-mail address when you don’t care about getting communications from them, or that may spam you later on – that way, you can simply get rid of it and get a new one when you start to get too much spam.

Seeing the Sites – Telemarketing Scam Defense

December 22, 2008

by T.J. Lee
The connected age we now live in has brought us both great wonders and significant evils. What’s interesting is that the same technologies are often used for both.

One tool that can, and is, often misused is the telephone. Once the most annoying thing you were subjected to was a call, always at dinner time, which turned out to a telemarketer sales call. But the number of scams, spams, and serious whams that can come from seemingly innocent telephone calls has skyrocketed.

Ever get an odd call in voicemail or on your answering machine with instructions to call back right away? Do you call, not call, is it real, a trick, a trap? Before you dial check with this interesting site to see what’s what with the return number.

http://800notes.com/

You can type in a number and find out if it’s a known scam, or if others have been getting the same calls as you. You can also tap into the latest news on Do-Not-Call lists, telemarketing scams both domestic and coming from overseas, as well as articles about your telephone rights, what to do if you are getting harassing phone calls, how to file complaints with the appropriate government agencies and more.

What’s nice is that all of the pages provide for reader comments so you can benefit from the experience of others with the topics being discussed.

4 Hidden Dangers Electricity Poses To Your Computer Network… And One Simple, Inexpensive Solution That Will Prevent Them All From Doing Damage

December 22, 2008

Is your computer plugged in? Do you use a power strip with a surge protector? If so, you are a heartbeat away from disaster and don’t even realize it. The same electricity you depend on to run your computer and network is also trying to destroy your data.

Believe it or not, electricity is one of the biggest threats to your computer network and the data it contains. Here are four computer power problems you must know about and how to prevent them.

Transients
Commonly known as surges and spikes, these are caused by lightning storms, wind, squirrels shorting out power lines, auto accidents, etc. Several times each week these spikes can travel up the power cord into your computer damaging everything from power supplies to motherboards.

Conventional wisdom says use a power strip with a surge protector and you are safe. As usual, conventional wisdom is dead wrong. After several months, these surge protectors become useless having been zapped by the surges they were designed to protect against.

Blackouts
Whether momentary or prolonged, the sudden loss of power can corrupt your PC to the point of not being able to start up again when the lights come back on.

Sags
This is when the power drops below normal. Have you ever seen the fluorescent lights flicker for a moment? Then you have witnessed sag. Sags are more common than surges and are caused when equipment like air conditioners, blow dryers, water heaters, laser printers, copy machines and other electrical equipment are turned on or come out of sleep mode. A typical small office will experience 30 or more sags each day. Sags cause many of the weird and unexplained problems computer users complain about every day.

Noise
Ever been watching TV and seen fuzzy pictures and/or white lines or dots when you turn on a blender or vacuum cleaner? This is the result of electrical noise. While a fuzzy TV picture is an annoyance, this electrical noise causes many computer problems including loss of data.

So how do you protect yourself from electrical problems? The most simple and inexpensive solution to all four of these hazards is a battery backup. The battery backup (also known as a UPS or Uninterruptible Power Supply) senses when there are problems with the power and automatically switches to the battery protecting you from computer damage and data loss.

Choosing the correct battery backup for your computer or server can be tricky. Having one with a battery too small is the same as having none at all.

For most desktop computers, a battery backup with a 500VA or larger rating should be sufficient to keep you going through momentary power problems, and give you time to shut down your computer if you experience a longer power outage..

Protecting your server requires detailed knowledge of the server functions and power consumption in order to pick the right battery backup solution. If you want help in determining the right protection for your specific network, give us a call: 734-457-5000.

Everyone’s Talking… So What About The Economy?

November 23, 2008

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

I’m coming off a marathon couple of weeks of travel… I’ve been to Council Bluffs, Iowa (near Omaha) for a peer group meeting and to Nashville, Tennessee for a marketing seminar. The one constant everywhere I visited was conversation about the economy. It’s the main topic on every news cast, every news paper article, and every news radio program.

Economists are calling what we’re experiencing a “precession” rather than a real recession. Activity is stalled because everyone’s scared. This isn’t to say that the economic pressures aren’t real – I talk with clients every day who are experiencing slower sales and slowed collections.

In our business, we’ve not seen a significant decline in sales so much as we’ve seen clients slowing their payments. Companies that paid regularly within our net 10 terms are now paying in 30 days. Clients who paid in 30 days are paying at 45. I think everyone is hoarding their cash because they’re scared and not sure where things are headed.

Whatever the terminology – slowdown, precession, recession, decline, etc. – that this is the perfect time to be working on our businesses to really take advantage of the situation. What do we need to do when times get a little tougher? Adapt and change! Here are a few thoughts for consideration.

Cash Is King
We need to evaluate how cash leaves and enters our company. Can we cut some outgo or speed up some inflow? We need to watch cash because he who has it will win. Cash flow is a critical thing to take care of. Watch your A/R and keep it collected. Cut back where it makes sense. Evaluate how the money flows.

Reinvent!
In our business, technology, processes and procedures change constantly. We have to reinvent ourselves pretty regularly to survive. There is no better time than a difficult one to see what needs to be changed or improved in our companies. There are likely things that need to go, and new things that need to be added. Think carefully about your business and what should continue to be part of it.

Get Outside Your Box
Forget “But we’ve always done it that way.” Don’t let the norm be the norm – look outside your comfort zone and consider all options. You can’t allow the rut to keep you on the wrong path. Creative thinking and planning will be key to coming out of this on the other side.

Plan Carefully!
Planning is always important but never more important than when times are tough. You need to make sure you have a solid plan and your team understands it. There is no money or time to waste, so your plan needs to keep everyone working toward the same goals.

Market Your Business!
We have a client, John Poniewozik from Iceberg’s One Hour Heating and Air Conditioning, who has his business marketing down! His promotions are unusual and attention getting. Have you seen his penguin television ads or direct response letters? They’re really great. You might think some of our marketing is unusual, and I admit that it is.
But I think that is the key to why it works! Doing the same old boring stuff that every other business with whom you compete is doing, makes your business blend into the background. There is no differentiation – if you market like everyone else, there’s no way to tell why your business is better.

I have a friend who is a marketing consultant, and she often talks about how business owners fall into the habit of “ego based marketing.” They think “my clients are different” or “my customers would never respond to that type of marketing.” Baloney! Customers are craving something different. Use that to get their attention and get them to buy from you instead of your competition.

Execute
As business owners, I think we have a tendency toward perfection. We want everything our companies do to be 100%. I suffer from this myself, and it has been difficult for me to learn and accept that 95% is good enough 95% of the time. We get stuck sometimes in “paralysis by analysis” mode and keep “working on things” and never “getting things done.”

Execute on your planning. Execute your marketing strategies. Execute your process improvement projects. There will be time to perfect them as you go along. But when your competitors finally get around to executing their “perfect” plans – you will be that many steps ahead of the game.

Difficult times are opportunities. Many will struggle, some will fail, but for those who are ready and execute – you can leverage these times to make up ground quickly.

My advice: Don’t listen to the news. Follow your own plan and make things happen.

Technical Terms Confusing? Here’s An Explanation!

November 23, 2008

As a technician for over 20 years, I have heard a variety of terms being thrown around and I am sure a lot of these are terms you have heard at one time or another and never knew the true meaning of the word. I thought that a list of terms most people have heard along with the definitions would help to understand the variety of things that can happen to a computer, but hopefully not yours.

Hang: A totally unresponsive computer is said to be hung, or hanged. You could also use the term frozen, though hang is the accepted term used by computer nerds for generations.

This very thing happened to me just the other day. I was home on my personal PC and I needed to view a webinar on Windows Server 2008. I got ready for the webinar and when the webinar started my computer just froze. I checked with a co-worker to make sure there was nothing wrong with the website. I had to reboot my computer and when I did I was able to view the webinar. My computer had totally hung. But once the PC came back up I discovered I had a glitch…

Glitch: Whenever the computer does something strange or unexpected or behaves in a manner inconsistent with normal operation, that’s a glitch. Glitches happen to everyone.

In this case, my sound did not work. As far as I knew it was working. The sound may have not been working for weeks but you notice it missing only when you otherwise would expect it. Such is the agony of the glitch. When I asked my wife if she had any problems with the computer I got the classic “Oh yeah, I meant to tell you I think the sound is out.” Often, you fail to notice a glitch unless it does something that directly affects what you’re doing.

Bug: A bug is an error in a computer program. Despite the efforts of the best programmers, most computer software is riddled with bugs. Bugs are what cause computer glitches. Bad bugs can cause a computer to hang or crash.

Note that most of the worst bugs happen when you mix two programs together and they interact in some new and unexpected way. The term comes from the early days of computing, when a real bug (a moth) got stuck in the circuitry.

Crash: Crash is another term for a dead computer — specifically, what happens to a hard drive when it ceases operation. A crash is typically more sensational than a hang.

Remember that a hang is a freeze. A crash is typically accompanied by spectacular warning messages or weird behavior (and may indicate more than just a dying hard drive). In fact, a crashed computer may still be teasingly functional. Only the foolhardy continue to use a crashed computer.

If you have been experiencing any of the bugs, glitches, hangs or crashes make sure to visit a professional at Tech Experts as soon as possible so we can do our best to protect your vital information from disappearing forever. You can reach us at (734) 457-5000.

How To Spot And Protect Yourself From An Infection

November 23, 2008

Are you finding it harder and harder to protect yourself from malicious attacks from the internet?

To help protect yourself you should first start with how to identify them. We will start with sorting them in basic categories.

Viruses – they attach themselves to any file so that when you start the program, you activate the virus. These viruses are usually sent through email or downloaded files from the internet.

Worms – worms are just like what they sound. They keep multiplying and using up all the resources from the computer till the computer comes to a complete stop. These usually are spread through P2P programs and email. They can also be spread over your local network.

Trojans (a.k.a Spyware) – Trojans are the worst. They are used to steal information from the user. They are installed and used without permission and usually have some type of key logger to record what you are typing and send it back to the source so that they can collect credit card numbers and username/password to accounts. These are generally the hardest to find because they usually consists of multiple files.

The best way to protect from and prevent infections is to run the best antivirus/spyware software around. The number one common reason people get infected is not that they accidently download it but, that they do not keep track if their antivirus is installed and updated properly.

Just because you see in the bottom corner that your antivirus is running, does not mean its doing its job. Every day you should check to make sure that your antivirus is updating so that you are protected against the most recent infections. By doing that even if you download a virus the antivirus will scan the file and catch it before it gets too late.

If you do not have an antivirus program installed, I recommend installing one as soon as possible.

One of the best currently out right now is Computer Associates E-Trust Integrated Threat Manager and Antivirus. The program isn’t free, but is a bargain compared to the cost of downtime and an infection.


How To Keep Hackers At Bay

November 23, 2008

No one wants to have their network “hacked,” but what exactly can a hacker do?

Plenty, and you are right to be afraid!

One common way for hackers to access your network is through spyware or viruses, which are malicious programs written to imbed themselves into your network to gather private information, steal financial data, access passwords, e-mail addresses, and spread themselves to other users. But one of the most common ways for hackers to access your system is through e-mail, or spam e-mail to be more specific.

Phishing is when a hacker sends you a legitimate looking e-mail from a trusted source — like PayPal, your bank, eBay, or any number of other legitimate business web sites. These e-mails will tell you that your account is expired or will be closed if you don’t go to a designated web site and update or verify your account information.

Although you may have seen these e-mails before, be very careful! Hackers are brilliant at making not only the e-mail seem legitimate, but also at making the web site you go to look like the real thing.

If you fall prey to their scam, the site will gather your private information and then use that to access your bank account or to charge your credit card. To protect yourself, install a spam filter and NEVER open or respond to any e-mail requesting account verification. Instead, call the company. If it is a legitimate request, you can verify that with them over the phone.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

How To Use A Password Manager And Virtual Cards For No-Risk Holiday Shopping

December 19, 2025

Help Your Team Bridge The AI Gap

December 19, 2025

Is It Time to Rethink Your Phishing Training?

December 19, 2025

Your Best Defense Against A Cyberattack

November 17, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Spyware Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.