• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

Network

Why An Organized Cabling Plan Is Good For Business

July 25, 2013

by Jeremy Miller, Technician
When you need to begin to cable a building for a business it is a good idea to plan ahead to prevent many issues that you can encounter.

Cabling can be different for every organization. Some organizations move into a new building and need to cable the entire building. Other business may only need to add to the existing cabling.

It would be best to look and see how the cables can all be run throughout the building. Most commercial buildings have drop ceilings that make it easier to run cable.

You will want to check which directions you can run cable. There may be walls or boundaries that are not able to have cable ran through them.

You will also want to develop a standard wiring scheme or convention. This will make everything easier in the long run.

Most organizations have adopted the wiring standard T-586B. If you continue to wire all cable with the same standard then it will make the job easier for you and anyone who needs to add an additional cable after your installation.

There are some things to keep in mind while running the cable. It is best to leave about a foot of extra cable in a single loop above your drop.

This will ensure you have enough cable if you make a punch down error, or want to upgrade in the future. Don’t create a coil of cables as this will cause a magnetic field that will disrupt the data.

With all of this in mind you will need to determine exactly how many data and voice drops you will need to install.

Make a document detailing which room needs what cables and where they need to be placed on the walls.

It is best to color coordinate the cable, for example you would use blue cable for data, white cable for voice, and another color if you need to run other cable such as Ethernet cable for a security system. This will let you easily detect which type of cable you are working with.

If you are installing phones you will want to punch down the same pairs of wires in the same order. This will allow you to terminate the phone systems in your telecomm room more efficiently. Efficiency is essential when undergoing a time-consuming project.

Cable management is important regardless of how many cables you have ran. Your telecomm room can easily start to get out of control with all of the different cables coming into a single location.

There are many ways of organizing your cable, but it is best to plan this before you begin to run any cable. This will also make sure that all of your cables will be long enough to reach the punch-down panel in your telecomm room.

If your business needs help with a cabling project or if you have any questions about cabling give us a call.

The Benefits Of Proper Networking For Your Business

May 17, 2013

By Tech Experts Staff
Many times a company’s network tends to be a difficult part of their infrastructure to decide what they really need.

There are many different ways of configuring a network depending on the company’s needs.

A network can be as simple as having your Internet Service Provider’s modem connected directly to a workstation or as complex as having thousands of workstations and servers connected to a company’s network around the world.

Deciding on what is needed for your network is completely dependent on the intended uses of it. Many factors contribute to this; security, size of network, locations, speed necessary, etc.

For most small companies, they can usually get by with a simple router that has a built-in firewall solution.

While the simple routers take care of giving access to users hardwired to the local network, and in some cases via a wireless connection, they don’t offer the features that a higher end router would.

Many companies have multiple sites that they want to have access to all the same files. One solution is purchasing cloud storage to accomplish this.

While that would be a great idea if you needed access when you are not on your companies network, a much more economical solution is to have a virtual private connection (VPN) setup between sites.

If a VPN is setup between sites the traffic is encrypted with a shared key between the routers which allows the two of them to pass traffic to each other without anyone being able to see what it is.

This allows you to safely send confidential information to members at a different site.

The biggest advantage of a VPN between sites is the ability to have one server at a centralized location and allow all of your sites to have access to it.

This alone can save thousands of dollars when it comes to the network build, you only need one server.

When it comes to having a server, if properly configured they can provide a significant amount of security on the network.

Servers improve security by offering centralized management and providing a means to allow or deny access to files on the network.

For instance, you may have accounting files on a network that you only want certain employees to have access to, with a server you can assign specific users access to these files.

Some routers also have the ability to manage bandwidth. This provides companies the ability to manage the amount of data users can use for different applications.

Many large companies need the ability to control how much bandwidth is being used and what is using it. With higher end routers you have the ability to do this.

On the business class firewalls we generally install at businesses they offer a large package of security tools to help protect your network.

Our business class firewalls offer all of the routing capabilities of the simple, home user routers but also offer antivirus, web filtering, antispam, intrusion prevention system (IPS), and vulnerability management.

The business class firewalls drastically improve a business’s security as well as offers many of the features listed above.

If your business is in need of network improvements to increase security and employee productivity, give us a call and we can offer you a network diagnosis to determine what your company’ needs are and where your networks weak points are.

Common Network Problems Resolved

February 12, 2013

By Tech Experts Staff
It’s amazing how easily network problems can turn into a huge headache for businesses and home users. If you don’t have guidance when purchasing equipment, or don’t know how to properly maintain and troubleshoot issues, you could be down for hours or days.

While network problems and questions are very common, there really are simple solutions to them. This month we’ll take a look at the most common network related questions and problems and how we generally resolve them.

The first question we regularly hear, most often from home users, is “How do I know what kind of equipment to purchase?”

That isn’t that hard of a question. Generally, with network equipment, it comes down to the old saying “You get what you pay for.”

When you buy networking equipment, whether it’s a switch to expand the number of available connections on your network, or a router, don’t buy the lowest priced one you can find.

There’s a reason one piece of equipment is more expensive than another. Generally, the price difference means drastic differences in the speed of the unit, number of available ports, range, and in some cases security features.

So, when buying network equipment, don’t scrimp – you’ll end up with a slow network lacking in features.

Even when you have good equipment in place you can still run into network problems. The most common issue on a network tends to be a malfunctioning device.

It is normally much less expensive to try replacing a device as a first step to resolving a problem than it would be to have a tech go around and test every device on the network.

For example, if your network is having issues with slower than normal connections, high latency, etc. it is entirely possible that your switch or router has begun to fail.

With consumer grade network equipment, routers and switches can fail as much as once per year depending on the quality of the device and how well you’ve protected it from power surges.

If you’ve replaced your router and/or switch, and you continue to have high latency and strange issues, the next step is to check your network cables.

The cables you’ve been moving around over the years and putting stress on may have faults that are causing problems.

At this point, a tech would need to go through and test the cabling to make sure there are no issues with them.

A cable that is either wired improperly or is starting to fail can cause problems that will affect a network in many ways.

Sometimes, depending on the severity of the fault, it can cause intermittent failures resulting in spotty connections. If a cable fails altogether it can prevent a user from being able to connect to the network entirely.

Once all of the cabling issues are straightened out and we know our devices are good, you may still have a computer acting up on the network.

In that case, it is possible that the network interface card (NIC) is failing. Sometimes this can be a hardware problem where the NIC fails, but sometimes it is possible that the software on your computer is causing problems with it.

For instance, a NIC takes drivers for the operating system to allow it to communicate on the network. If you have the wrong driver installed, or the driver is corrupt, it can cause a lot of network problems.

Another possibility is a virus or other malicious software installed on the computer.

Depending on what the virus is designed to do it could be causing the problem with your computer’s ability to connect to the Internet.

Depending on the severity of the infection and what it was designed to do, it is possible that a virus could cause the entire network to run slowly.

What it all comes down to is that it is really best to have a professional diagnose network issues and work with you directly when trying to get equipment for your network.

With the number of variables involved, if you don’t deal with networking on a regular basis it’s fairly easy to be confused.

Feel free to contact us anytime for advice on network upgrades and help diagnosing problems with your network, firewall, switches or routers.

Springtime Brings Seasonal Storms – Protect Your Network!

April 9, 2012

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

It’s a topic I touch on every year around this time – the criticality of power protection and backups for your network. The sad fact of the matter is, no matter how often I preach about it, too many of our clients still aren’t adequately protecting their systems.

Adequate power protection entails three things: Prevention, protection, and testing.

Prevention
During thunderstorms, many people leave their computers unprotected. Simply turning a computer off during a thunderstorm does nothing whatsoever to protect the computer.

Nearby lightning strikes can cause surges through the power lines or phone lines into your house or office, and these often damage your equipment.

The easiest way to prevent problems caused by lightning and power surges is to unplug your computer during a storm. Don’t forget to unplug your phone line or cable Internet from the computer too. These are the second most likely way for surges to get into your computer.

Protection
Having a good, quality surge protector is great for the day-to-day power surges that happen mostly unseen in the background. Don’t skimp on your power protection.

The $9 “surge strip” you can pick up at a hardware store simply gives you more outlets to use – it doesn’t provide protection against power problems.

A good surge protector should run you around $50 – a small investment when you consider the cost of the computer and the value of your data.

Servers and critical workstations should be protected by a battery backup system. We prefer APC because they offer an equipment insurance policy, but any good, well known brand will protect your network.

Testing
Power protection devices, whether a surge protector or battery backup, are designed to fail. They absorb the power fluctuations that could damage your server or workstation.

Your battery backup unit should be tested at least twice per year to ensure it’s functioning properly. The test can be as simple as plugging in a lamp, and disconnecting the unit from utility power. The lamp should stay lit. If it doesn’t, it’s time to replace the batteries in the UPS.

In general, surge protectors and battery backup units should be replaced every three years. This ensures your network, servers and computers are protected by the latest technology in surge supression.

 

How Strategic Business Continuity Planning Can Prevent Losing Money And Customers

January 20, 2012

The concept of business continuity planning is nothing new to conscientious business owners.

Without a doubt, the ability of an enterprise, large or small, to recover from catastrophic events and continue to provide an acceptable level of service to its customers  while maintaining a satisfactory level of profits is a basic requirement of good business practice.

Although such awareness has always been a feature of good management, the startling events of September 11 2001 has brought the world into a heightened state of preparedness for disaster.

Why the need for continuity and disaster planning?

Increasingly, natural disasters continue to surface in one place after another.

Consider recent major floods, earthquakes, tsunamis, hurricanes, corporate crimes and malicious attacks upon computer systems in nation after nation and you will sense the pressing need for sound business continuity planning to avoid disruptions due to technology and other failure.

Another factor which contributes to this need is the changing business climate in view of the expansion and increasing accessibility of the Internet over the past decade.

So organizations which formerly rendered services to their customers during fixed hours of business, now find themselves offering their services on an extended schedule, even 24 hours a day, seven days a week.

This means that customers have grown accustomed to this ready access to their suppliers and vendors. And now the reality is that consumers have become less and less tolerant of interruptions in a company’s service and availability.

Business continuity planning – is it just for big business?

Business continuity planning now takes on an increasingly important role, not just for larger enterprises, but for small businesses alike.

In fact for small businesses it is even more critical to be ready to respond to the needs of its customers.

Customers expect this and have no problem locating alternate suppliers who stand ready to take your place in the market!

This is true whether you are in the manufacturing or service business, marketing and sales or any other facet of business.

Your network – a key  component in business continuity 

Nowadays a company’s IT System with its network of computers has become the backbone of many businesses.

Vital functions such as Data Processing, inventory and  payroll management, Internet based operations including online sales, human resource and training systems, project management and an almost endless variety of other business functions are critically dependent on the efficacy of your computer system.

Clearly then, any technology disruption can have disastrous consequences.

Therefore business continuity planning often deals  extensively with maintaining a dependable IT system.

This brings into focus not only the hardware components of the system and its application programs, but also the data contained in the system.

Ways to ensure continuity

Some of the key components that determine system reliability include Data Storage Devices, UPS systems, power generator systems and so on.

And nowadays, Cloud Computing is being relied upon to extend the reliability of Computer Systems and ensure business  continuity in the event of major failure.

There seems to be a tendency to use the expressions ‘business disaster recovery’, and ‘business continuity’ interchangeably.

However upon closer examination it becomes clear that the two concepts are quite distinct.

Continuity of service is the desired state we want to maintain while recovering from any unexpected calamity whether an extended power outage, Computer System failure or other problem.

Such continued operation calls for a comprehensive plan that covers the most probable occurrences.

From this information it can be seen that ensuring business continuity calls for a strategy regardless of the size of the business.

As disasters continue to increase in frequency and magnitude, more and more careful thought must be given to your company’s preparedness to respond in the event of any business threat.

The increasingly prominent role of computers in business calls for highly reliable data backups, hardware redundancy, and keen, effective planning as a way to ensure business continuity in the event of any catastrophe.

Networking Equipment: What’s It All Do?

September 28, 2011

There are many times when explaining to clients what piece of hardware needs rebooted or reset that they do not know what we are talking about when we reference the piece of networking equipment by name.

Even if you do know what is meant by router, modem, switch, hub, etc., you might not know what the equipment does, and why you need it.

Today is your lucky day! Below is a brief explanation of what the various types of networking equipment is, what it does, and why you need it.

Let’s start from your Internet service providers (ISP) main line into your house or business and work our way up to your computer. It all begins with your modem – this is how you initially connect to your ISP’s main line into your building.

The modem is what connects you to your Internet provider, and secures an IP address for your computer or network to connect to the Internet.

The next piece of hardware in line is normally your router.

Some network installations don’t have a router, usually because the modem supplied by the Internet provider has one built in, or the computer connects directly to  the modem.

A router allows you to have your own network IP scheme and communicate from your network to your ISP’s network.

Routers allow you to expand your network beyond the one device that most ISP’s modems allow by creating a larger subset of IP addresses for your computers to connect to which is then “routed” to your ISP’s IP address and out to the Internet.

This is why they are called routers, they route network traffic. Some routers also offer the ability to connect wirelessly to your network.

These connections act exactly the same way except for the fact that they do not have an Ethernet cable plugged into the computer you are using to connect with and there is increased security on the wireless connection to prevent unauthorized connections to your network. Some routers also offer a high grade built in firewall.

So as you can see routers can come in many different flavors and configurations.

The final piece of hardware in the chain of networking hardware is your switch.

In general switches are designed to be connected to your router and offer more Ethernet ports for you to connect devices to your network.

Most routers offer on average five Ethernet ports – a switch gives you the ability to expand on the number of available Ethernet ports that can connect to your router.

If you want to have multiple devices connected to your Internet connection while keeping your network secure give us a call and we can guide you on selecting the proper equipment as well as getting it setup properly for you.

If this kind of equipment is not configured properly you may not be able to connect to the Internet at all.

Featured Article Written By:
Tech Experts

Fall Is The Perfect Time For An IT And Network Checkup

September 30, 2010

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

To make the most of your IT investment,  you don’t need to be a technology whiz. However, you should have a plan in place for making the most of your company’s data. As fall approaches, now is an excellent time to examine your company’s technology to determine what’s working well and what could be improved.

Is It Time To Update?
Technology changes rapidly. While your systems may appear to be working well, you may be missing out on new ways to protect your business information, help your business run more efficiently, and better serve your customers.

For example, to run some of today’s most powerful programs, you need a fast and large hard drive with significant memory capacity.

You might consider adding newer technology – such as wireless capabilities – to older equipment; but the cost of upgrading a computer is often more than the cost of a new model.

Check Your Power Protection
Loss of electrical power and power surges are the most common causes of data loss and weaken computer components. If your business depends on computers, protecting the power source is critical.

This is especially important if your area is prone to power fluctuations or electrical storms.

An Uninterrupted Power Supply (UPS) unit offers both superior surge protection and, depending on the model, anywhere from 15 to 45 minutes of backup power-enough time to save and copy critical files.

The idea of a UPS isn’t to continue your business dealings while the lights are out. Rather, it is to ensure that your data is available when the lights come back on.

Have You Patched Windows?
Have you installed the latest version of Windows on your computer, and do you keep it updated? Do you do this automatically?

It is incredibly important that you keep Windows and your software applications current. Updates improve performance, fix bugs, and many add new features. You should also regularly update and run anti-virus software.

How’s Your Backup?
Consider storage needs in terms of both capacity and physical location. Depending on the amount of data, you can back up to USB flash drives, CDs, DVDs, tapes, or an external drive.

You might also want to look into off-site backup. Our Experts Total Backup System is an excellent backup, disaster recovery, and offsite storage service.

Integrate Your Data
Over the years, businesses tend to produce multiple silos of data. Your inventory, sales data, and marketing information need to be linked together to better serve your customers and increase your company’s productivity and profitability.

Without this integration, you may not know who your best customers are or you could end up agreeing to provide a top customer with an item you don’t have in your inventory.

Best Steps To Secure Your Wireless Network

September 30, 2010

Do you have a wireless router or wireless access point (WAP) set up in your home or business? If so, is it secured and locked down from hackers and snooping eyes?

There are three basic steps you can take to secure your wireless network.  I recommend performing all of them.

By default, most routers have no security set up right out of the box. This means that your neighbors or anyone close enough to pick up your wireless signal can connect to your wireless network without you knowing it.

They can freely browse the web and without the proper security in place, your router and any network device connected to it (computer, cell phone, etc.) becomes visible to anyone that can see your wireless signal.

From that point on, it is  easy for a hacker to connect to your computer and see your files or steal and delete your data. If you’re not comfortable making changes to your network, then have a trusted IT company such as Technology Experts to make those changes for you.

If you are computer savvy then follow these three basic steps to make your network more secure.

Change Your SSID
Your SSID (Service Set Identifier, which is simply the name of your wireless network) is what you connect to for Internet access.

You want to change the SSID from open security to “WPA2.” This is the most secure setting currently available on most routers. You’ll also need to assign a security key commonly called a pass phrase.

Do not use something common such as your name, child’s name, or any other name that is associated with you. Use a combination of uppercase and lowercase letters, numbers, and characters.

Don’t Broadcast Your SSID
Who needs to know the name of your wireless network? No one other than you. Not your neighbor next door or that guy driving down the road trying to connect to a non-secured network.

There is a setting in your router to disable the broadcast of your SSID.  Again, if you are unsure, then have a trusted IT company perform these changes.

Change Your Router’s Login Password
The last thing to do is  change your router’s management interface username and password.

All routers come with a default user name and password that is easily available on-line for anyone to find.

If you don’t change it, a hacker who gained access to your wireless network (or someone you allowed access), can simply log into your router and play havoc with your network. Be sure to change the password.

Following these three basic steps will make your wireless network much more secure from hackers and from intruders accessing your internet connection.

While a very skillful hacker can still get around even this security, they won’t bother trying.

There are too many unsecured networks out there, so hackers would not waste their time trying to break a network that is configured securely.

Remember, if you need assistance or would like a great IT company to perform these changes, give Tech Experts a call at (734) 457-5000.

Network Security: Keep Your Network Environment Secure

April 7, 2010

As more and more people rely on the Internet to get things done in their daily life, network security is more important than ever. Typically, small businesses and home network users haven’t had to worry much about security.

Poor network security exposes you to viruses, spyware, and most dangerous, cyber criminals a.k.a. hackers.

These guidelines and best practices can help eliminate, or at least mitigate, the majority of network breaches and security vulnerabilities.

Security Policy
An active security policy is always the most important item for protection of your network, whether it is in your home or in a business environment.

This is simply a statement, or guideline of the rules and how security is setup in the organization.

This role will govern the level of security users are allowed access to on the network. The roles and responsibilities of each person on the network, as they are part of the system, should be clearly defined.

Passwords
Although the most obvious, it is definitely one of the most important,and often, most neglected ttems.

Be sure to enforce strong passwords across your network – a weak password could lead to a user account being compromised.

Email
Certain email attachments can become a major problem if the wrong one is opened, and a lot of the time it is by accident.

Some of the most common file types to block would be: .bas, .bat, .vbs, and .exe.

Patches/Updates
Be sure your operating system is up to date with most recent patches, security updates, and service packs. This will close many of the vulnerabilities that can be exploited by hackers.

Inventory
Keep a good inventory of your network devices by developing and maintaining a list of all hardware and software components that are implemented on the network.

Try to understand which software applications should be installed, and which provide a weak security configuration so you can monitor those applications.

Adopt The Least Privilege Concept
The least privilege concept influences the network and/or systems administrator to create custom policies for having permissions and access to network resources.

Try to allow only what access is absolutely necessary to users, not giving them more rights to the system than they should have.

Remote Access
Certain ports can be blocked to keep unwanted users from remotely accessing your network and any of its resources.

If you’re one of the many small business owners who also works from home on occasion, there should be a security policy in place for VPN (virtual private network) access and your IT support company should assist with getting connected properly.

Keeping these simple guidelines in mind when thinking security on your network, and you’ll prevent several possible problems from happening, as well as maintaining a safe and effective performing work environment for work and for pleasure, in home or in business.

4 Hidden Dangers Electricity Poses To Your Computer Network

February 25, 2010

Believe it or not, electricity is one of the biggest threats to your computer network and the data it contains. Here are four computer power problems you must know about and how to prevent them.

Transients
Commonly known as surges and spikes, these are caused by lightning storms, wind, squirrels shorting out power lines, auto accidents, etc.

Several times each week these spikes can travel up the power cord into your computer, damaging everything from power supplies to motherboards. Conventional wisdom says use a power strip with a surge protector and you are safe. As usual, conventional wisdom is dead wrong.

After a few months, these surge protectors become useless since they’ve been zapped by the surges they were designed to stop.

Blackouts
Whether momentary or prolonged, the sudden loss of power can corrupt your PC to the point of not being able to start up again when the lights come back on.

Sags
This is when the power drops below normal. Have you ever seen the fluorescent lights flicker for a moment? Then you’ve seen a sag.

Sags are more common than surges and are caused when equipment like air conditioners, water heaters or laser printers are turned on or come out of sleep mode. A typical small office will experience 30 or more sags each day.

Sags may cause many of the weird and unexplained problems computer users complain about every day.

Noise
If you’ve ever seen a fuzzy picture or white lines on your TV when you turn on a blender or vacuum cleaner, you’ve seen electrical noise. While a fuzzy TV picture is annoyance, this electrical noise causes many computer problems including loss of data.

So how do you protect yourself from electrical problems? The most simple and inexpensive solution to all four of these hazards is a battery backup, or uninterruptible power supply (UPS).

A UPS can sense when there are problems with the power and automatically switches to the battery, protecting you from computer damage and data loss.

Choosing the correct battery backup for your computer or server can be tricky. Having one with a battery too small is the same as having none at all.

For most desktop computers, a battery backup with a 500VA or larger rating should be sufficient to keep you going through momentary power problems.

Protecting your server requires detailed knowledge of the server functions and power consumption in order to pick the right battery backup. If you want help in determining the right protection for your specific network, give us a call: 734-457-5000.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Five Reasons To Be Wary Of AI

May 19, 2025

Don’t Trust The Cloud Alone: Backup Your Cloud Data

May 19, 2025

Seven New And Tricky Types Of Malware To Watch Out For

May 19, 2025

Are You Leaving Your Office Door Open?

April 14, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses VOIP vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.