• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

10 Warning Signs Of Impending Computer Disaster

March 11, 2008

These Tips Can Help You Avoid Expensive Downtime And Repairs

Computers rarely stop working overnight. In most cases, there are early warning signs that problems are brewing.

Here are 10 surefire signs that you need to get a professional to investigate your network ASAP:

  1. Your workstation or server starts running very slowly, freezes up, or crashes.
  2. Your web browser has been changed to another strange browser you’ve never seen before.
  3. You are getting an unusual amount of pop-up windows, even when you aren’t surfing the web.
  4. You don’t know if every computer on your network has the most current virus definitions.
  5. You don’t know if you have a firewall in place or the last time it was updated.
  6. You haven’t attempted to restore your data from a backup tape or other storage device in awhile, and you aren’t checking your backup log for errors.
  7. You receive e-mails accusing you of sending spam, and/or you find e-mail messages in your “outbox” or “sent” folder that you didn’t send.
  8. Your computer starts making a grinding, clicking, or loud whirring sound.
  9. The fan is constantly running.
  10. You are getting a growing number of error messages, and you are forced to create work-arounds to complete certain work tasks.

If any of these signs are present, you should contact a pro immediately to investigate further!

The old saying of an ounce of prevention is worth a pound of cure is especially true in the world of computers and all things digital; and if you are like most businesses, your computer network is critical to the operation of your company – so make sure you don’t procrastinate if any of these signs are present.

Ideally, you should perform regular health checks and maintenance on your network to make sure problems don’t crop up. Here’s why:

  • Critical security updates need to be applied at least once a month to protect you from a constant flow of new hacker attacks.
  • Firewall, virus and spyware protection need to be monitored and updated on a daily basis because new attacks are released daily.
  • Your data backup system needs to be monitored and tested frequently to ensure easy data recovery in the event of loss. The rate of tape drive failure is 100%; that’s why you need to frequently monitor your backups.
  • Servers and workstations need regular tune-ups to keep them running fast and error free.
  • Monitoring of disk space is important to avoid data loss, crashes, and storage problems.
  • Server event logs need to be monitored for early alerts to network issues.

One of the biggest mistakes business owners make is taking a reactive approach to network support and maintenance rather than a proactive one.

In other words, they wait until something stops working and THEN they call in the professionals to fix it. This approach not only costs more in the long run, but it also leaves you vulnerable to more devastating crashes such as data corruption and loss, virus attacks, and extended downtime.

Even NEW computers and equipment need regular maintenance because new threats are constantly evolving.

Fortunately, there is an inexpensive and easy way for you to completely avoid – even anticipate and prevent – these problems while making your network far more secure, reliable, and problem free.

We call it our “No Problem Network Support” plan, and it’s designed specifically for the small to medium business owner that doesn’t have the time, expertise, or staff to perform this regular network maintenance.

Thanks to advancements in support technology, we can now monitor your network 24/7/365 days a year and provide all the maintenance your server needs for a fraction of the time and cost.

For a flat, monthly fee, you’ll get 24/7 remote monitoring of your network to not only ensure that it is running at peak performance, but also to guarantee that your data is being backed up and secured, that your virus definitions are up-to date, that your firewall is configured properly, that your server is optimized, as well as keep an eye on over 100 system processes and alerts that could spell problems brewing.

If you hired a technician – even a junior one – to perform these basic network tasks, it could easily cost you $40,000 in salary, insurance, and hiring costs. If you were to outsource this type of service, it would easily run you $800 to $1,000 a month in hourly, on-site fees.

However, thanks to the No Problem Network Support plan, we can deliver all of these services to you for as little as $189 per month.

We’re so certain that you are going to LOVE this service we are willing to give it to you for 3 months, absolutely FREE, and without any obligation whatsoever.

If at the end of those 3 months you aren’t absolutely convinced that this service is worth every penny you are paying for the fast service and peace of mind, simply call or send us an e-mail that says, “this just isn’t what I had in mind,” and we’ll stop the service immediately—no payment, no obligation.

That way, you have absolutely nothing to risk. What could be more fair than that?

But if you decide to keep the service, we’ll bill you a flat monthly fee that you’ve agreed upon up front — no surprises, hidden costs, or extra fees.

And, to make it even more of a “no-brainer,” we’re going to offer the first 5 clients a very special VIP discount to create an even greater incentive for you to sign up TODAY.

To take advantage of this FREE 3-month trial, contact us at 734-457-5000, or e-mail info@expertsmi.com.

Hackers Are Now Targeting Macintosh Computers

March 11, 2008

Until recently, MacIntosh computer users have long enjoyed relative freedom from hacker attacks; however, Symantec says online criminals are now setting their sites on Mac users.

Online porn hunters are the latest target. Visitors to porn sites are led to believe they can download a free video player when in fact they are installing malicious code onto their Macs.

Once the users authorize the transaction, the hackers can redirect the users future browsing to fraudulent web sites and possibly steal the user’s information or passwords.

Sometimes they simply send ads for other pornographic websites. This results in thousands of dollars in income for the criminals.

While common thinking is that Macs are essentially more secure than PCs, security experts argue differently. They believe Macs are no more secure than PCs, and that the relatively low number of viruses, exploits and other cyber attacks directed at Mac users is due to Apple’s relatively small share of the computer market.

With that said, the fact remains that for every single attack on a Mac, there are at least 100 attacks on Windows-based systems.

Going On A Trip?

March 11, 2008

Here Are 4 Websites You Should Visit!

  • The U.S. Department of Transportation (www.dot.gov) offers airline, highway and rail safety information.
  • The Transportation Security Administration (www.tsa.gov) has advice on
    safe travel by air, land and sea. For example, they post tips on
    dealing with airline security checks.
  • The U.S. State Department (www.state.gov/travel) provides information
    on what to do before, during and when you return from a trip overseas.
  • The Centers for Disease Control and Prevention (www.cdc.gov/travel)
    Don’t come home sick! This site offers health-related travel
    information.

Increase Your Wireless Network Signal Strength

February 1, 2008

If you’ve installed a wireless network at your home or business, you may find your goal of “less desk, more freedom” is hampered by low signal strength, interference, and dropped connections.

You may also discover that your wireless network covers only half of your business, or that the signal barely seems to penetrate into the next room.

Insufficient range is a common problem for many wireless networks, but there are ways to extend your coverage area into the places you need it most.

1. Center your router. Setting up a wireless network is all about location. Unfortunately, it’s hard to know exactly what your coverage area will be before you install the equipment.

If possible, place your wireless router in the center of the area you wish to cover. The omnidirectional antennas on most routers radiate in a doughnut-shaped pattern around the pole. If your router is located in a corner of your office building, much of that radiation pattern will fall outside your home. Also, consider mounting your router high on a wall or ceiling far away from furniture and shelving that can impede or block Wi-Fi signals.

2. Add antennas or repeaters. You can use a wireless repeater to extend your range. Repeaters receive data packets and retransmit them at full power. Repeaters can also be difficult to install, especially if you’re new to networking. Keep in mind that repeaters tend to rely on proprietary solutions that are vendor specific and work only when you use the same brand of router and repeater.

Still, a repeater can significantly increase the range of your wireless network and is well worth considering if you want to add a few rooms to your coverage area.

What Is A Website Certificate, And Why Is It Important?

February 1, 2008

If you ever make purchases online, you must know how to quickly determine if the website you are about to buy from is secure.

A secure connection is an encrypted exchange of information between the website you are visiting and the browser you are using. Encryption of data is simply a process of converting the information you type in (your name, address, and credit card number) into an unreadable format that only the receiving website can decipher.

Encryption is done through a document the website provides called a website certificate. When you send information to the website, it is encrypted at your computer and decrypted at the website to prevent hackers from intervening and stealing your credit card information.

So how do you know if a site has a certificate and a secure connection? There are two things to look for. Just note that these two checks only apply to the web page where you actually enter your credit card information, NOT the entire site itself.

Once you are on the actual order page, look for a tiny yellow padlock in the bottom right corner of your web browser. Depending on your browser version, the Security Status bar may be located on the top of the browser and to the right of the Address bar. The padlock should be closed (locked).

Next, look at the actual URL. It should begin with “https” rather than the standard “http.” If you are on a website and you see these two things, the site will have a certificate.

Another way you can view a site’s certificate is through your browser’s menu options. In Internet Explorer, go to File, Properties and then click on the Certificates button. The same dialogue box will then come up for you.

If you ever get a warning that there is a problem with the website’s certificate, it could be due to a number of problems such as the names on the certificates don’t match up with the website or the certificate has expired.

If this happens, you may want to call the company and place your order by phone rather than going through their website.

Finally, make sure you check out every company’s Privacy Policy. Even if they have a secure checkout process, they could give or sell your information to third party companies.

5 Ways To Make Your Old Computer Faster & More Reliable

February 1, 2008

If your computer is a few years old, but your budget just doesn’t allow for a new computer, some simple upgrades and maintenance tasks can help get another year or two out of your machine.

#1. Add Memory. One of the most inexpensive and effective ways to improve a computer’s performance is to install more RAM (random access memory). This will speed up the applications installed on your computer and allow you to open and run more programs simultaneously.

#2. Upgrade The Processor Or Add A Graphics Accelerator. If you are just looking for a little more “zoom,” upgrading the processor or installing a graphics accelerator will give your computer the ability to process information faster and improve its overall speed.

#3. Perform Regular Maintenance On Your Servers and Desktops. Computers, like cars, need regular maintenance to perform at top speed and reliability. At a minimum, you should run ScanDisk and the Disk Defrag Utility on your machines once a month. This will make your applications and files load and run faster.

#4. Run A Spyware Scan Once A Week. One telltale sign that your computer is infected with spyware is slow, unstable performance. Spyware sucks up your system’s resources to carry out its evil intent, slowing down your computer and even causing it to freeze and crash.

#5. Disable Or Remove Unnecessary Programs Running In The Background. Many computers have pre-installed software programs that use up system resources and slow down your computer.

While these recommendations will certainly speed up your system, they isn’t a miracle cure for a seriously out-of-date computer network. If your computer or network constantly crashes, freezes up, or runs painfully slow, then it’s time to give us a call at (734) 457-5000 for an upgrade.

10 Easy Ways To Eliminate E-Mail Overload

January 10, 2008

E-mail driving you crazy? Every time you delete one, do fi ve more show up? Are you fi nding it impossible to answer every e-mail you receive? If you answered “yes” to any of these questions, you’re not alone!

Some people are even declaring e-mail bankruptcy — they dump every e-mail in their inbox and start over. If that’s not an option for you, then here are 10 tips to reduce e-mail overload.

1. Get a good spam filter.
Even if it saves you just 10 minutes a day, that adds up to over 59 hours a year.

2. Cancel subscriptions to unwanted mailing lists, and opt-out of LEGITIMATE e-zines.
But be careful! Trying to opt-out of spam e-mails will only alert the sender that they have a LIVE address. Also, make sure you are careful to check the “unsubscribe” or “opt-out” box when purchasing items online.

3. Ask your friends to remove you from joke groups or chain messages.
Simply explain your situation and, if they are good friends, they’ll take you out of their message group.

4. Don’t post or publish your e-mail on websites.
Spammers will steal it and put it on their lists.

5. Don’t respond to every e-mail you receive.
Yes, it’s okay NOT to respond to some e-mails. If it’s a group e-mail, don’t respond with “okay” or “:)” — it’s not necessary unless the sender is specifically asking you a question or requesting a response.

6. Be succinct.
Restrict your messages to a few sentences. If you can’t, pick up the phone or talk in person. This will avoid the back-and-forth of e-mail conversation.

7. Take advantage of subject lines.
If possible, put your question in the subject line, or your message. If that’s not possible, make your subject line very descriptive so the recipient knows what your message is about. Here’s another tip; create a set of codes with your coworkers and place them in the subject line to help them process and prioritize messages. For example, use “FYI” for informational messages. Use “AR” for action required and “URG” for urgent messages.

8. Block time to answer your e-mail and fight the temptation to check your e-mail every few minutes.
You will save yourself a lot of time and be far more productive.

9. Respond to messages when you open them so you only read them once.
If the e-mail requires an action step, schedule the action step and delete it from your inbox.

10. Set time aside in the morning and the evening to process your inbox.
Shoot for a completely empty inbox. File messages you need to keep and set reminders for messages that require you to follow up.

Now, here are some tips to keep from adding to the e-mail overload of others…

1. Be courteous when forwarding an e-mail: summarize the thread and why you are sending it at the top of the e-mail.

2. Don’t copy someone on a message unless it is necessary. And explain why you’re copying them. Recipients won’t need to guess your intentions. This means less back and forth messages.

Useful Websites To Add To Your Favorites List

January 10, 2008

Retirement:
www.BenefitsCheckUp.org
www.AARP.org
www.annuity.org/retirement/planning/

Interest rates:
www.Bankrate.com

Mutual funds:
www.Morningstar.com

Real estate:
www.Realtor.com
www.Zillow.com
www.loopnet.com

Paying for college:

www.FinAid.org
www.collegesavings.org

Financial planning:
www.smartaboutmoney.org
www.annuity.org/financial-literacy/

Almost All Windows Computers Missing Patches

January 10, 2008

Survey By Security Company Reveals 95% Of Computers Need Updating

Nearly all Windows computers are likely running at least one unpatched application and about four out of every ten contain 11 or more vulnerable-to-attack programs, a study by an Internet and network vulnerability tracking company revealed.

According to Secunia ASP, more than 95% of the PCs that have downloaded and installed its Personal Software Inspector (PSI) utility sport one or more application for which security fixes are available.

Secunia tracked the first PSI scan after its installation to get an idea of patch status before users start to update their machines, which can also be done through the utility.

Out of about 20,00 machines; 95.46% of them have an unpatched application on their hard drive. “There is a newer version available form the vendor that corrects one or more vulnerabilities,” said Jakob Balle, Secunia’s development manager. “But the users have yet to install the secure version.”

Some of the other statics cited by Balle were just as damning: 41.94% of the machines scanned by PSI have 11 or more vulnerable applications; and more than two-thirds, or 67.63%, of the PCs have 6 or more unpatched programs.

“Close to all computers are running with several insecure application installed,” Balle pointed out.

And the picture is probably even darker than the one he painted. “These results should be considered ‘best case’ scenarios; The real numbers are likely to be worse,” he said, citing the self-selected group that the data represents.

“The users of the Secunia PSI are most likely more vigilant and security minded/conscious than your ‘average’ user.”

Secunia released the free patch detection utility a year ago, but shifted it to Release Candidate 1 (RC1) stage earlier this month. The Copenhagen based company claims nearly 191,000 users have downloaded and run the program.

PSI runs on Windows 2000, XP, Vista, and Server 2003, and can be downloaded from the Secunia site, at https://psi.secunia.com/.

 

Safely Dispose Of Old Computers

January 10, 2008

Protect The Environment & Your Personal Information

With the new year upon us, many of you may have upgraded your old PCs for shiny new ones. So what should you do about that old PC left over?

Whatever you do, don’t just throw it into a dumpster! Not only is it an environmental hazard you could be fined for, but you also don’t want complete strangers getting access to your old files, passwords, financial information, and e-mails.

First, keep your old PC around for a few months until you are absolutely certain that you transferred all of the files and programs you needed to your new PC.

Next, you need to make sure the hard drive is wiped clean of any data you had stored on it — and simply deleting the files is not enough. We recommend you seek professional help in clearing the hard drive from any old PCs you are disposing of.

Finally, you may consider donating your old PCs to a charity such as Youth for Technology (www.youthfortechnology.org) or Computers With Causes (www.computerswithcauses.org). Many of these organizations will clean your hard drive to prevent identity theft, and you can write off the donation on your taxes!

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Ransomware: Why Paying Up Could Destroy Your Business

June 17, 2025

What Is A Password Spraying Attack?

June 17, 2025

Windows 10 Is Retiring – Here’s What Your Business Needs to Know

June 17, 2025

Is Your Cloud Setup Still The Right Fit for Your Business?

May 19, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Google Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.