• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

planning

How Much RAM Does Your PC Really Need?

September 26, 2018

Frank DeLuca is a field technician for Tech Experts.

First off, note that how much RAM (along with the type and speed) that your system supports will depend on your motherboard.

Consult your PC/motherboard manual, or, if your PC was manufactured by an OEM, use a system checker such as the one found on Crucial.com to find out what RAM is compatible with your system.

Adding RAM to your computer is not a process that will magically make everything run faster. But it can aid your PC in multitasking and performing intensive-heavy tasks like loading 20+ browser tabs, content creation like editing videos or images, editing multiple productivity documents, and running more programs at one time.

Computers may experience significant slowdowns when running a large number of programs at once with low memory.

If all RAM space has been used when trying to open programs, the computer resorts to using virtual memory on the hard drive, which slows the computer down quite a bit.

Upgrading or adding additional memory can eliminate this problem as the computer doesn’t have to resort to using the hard drive for slower pagefile memory.

How much RAM you need in your computer depends heavily on what you use your PC for on a day-to-day basis and on how long you intend to keep the computer.

If you are thinking of investing in a new machine in the near future, waiting things out until your purchase might be the best bet.

If you already have a computer you love but want to shift gears into a different daily task that requires better performance, then upgrading your RAM as part of the process is a great idea and can breathe some extra life into your computer.

Productivity
If you use your Windows 10 computer for word processing, checking emails, browsing the Internet, and playing Solitaire, you should have no problem using 4GB of RAM. If you are performing all of these activities at once, however, you might experience a dip in performance.

Many budget PCs come with 4GB of RAM as a base option. If you plan on keeping your machine for several years, then opting for 8GB of RAM is the safer bet, even if you use it for light tasks.

Video and Photo Editing
This really depends on your workload. If you are editing quite a bit of HD video, go for 16GB or more. If you’re working mainly with photos and a bit of video thrown in, 8GB should get you through. Again, in this instance, it may behoove you to opt for 16GB to give yourself more future-proofing headroom as photo and video quality is only getting better with file sizes exponentially increasing and becoming more memory intensive. Editing will work on lower amounts of RAM, but you’ll become so frustrated with the poor performance that you’ll soon start yearning for an upgrade.

In a nutshell, here are some simple guidelines that apply to most PC devices:

  • 4GB: Entry level memory. Comes with budget notebooks. Fine for Windows.
  • 8GB: Excellent for Windows and Mac OS systems. We recommend this for most people.
  • 16GB: Ideal for professional work and the most demanding tasks.
  • 32GB and beyond: Enthusiasts and purpose-built workstations only.

Remember, buying more RAM than you need doesn’t net you any performance benefit. It’s effectively wasted money.

Buy what you need, and spend what’s left of your budget on more important components such as the CPU or faster storage space like a solid state hard drive (SSD) which can be 10 times faster than a conventional hard drive.

Eleven Benefits Of Having Managed IT Support

January 1, 2018

Chris Myers is a field service technician for Tech Experts.
There are many perks to enlisting a managed service provider to handle all of your technology needs. Here are just a few:

Knowledge Base
You get access to a whole team of experienced professionals who spend all day every day fixing the same problems you are running into. When an issue pops up, chances are we have seen it before and know how to quickly resolve it.

Proactive Support
With our advanced monitoring software, we are immediately alerted to a variety of issues. Often, by the time you notice a problem, we’re already working to resolve it. Detecting and fixing issues early prevents them from escalating into major outages with long down times and expensive repairs. [Read more…] about Eleven Benefits Of Having Managed IT Support

Wiperware: New Malware That Shouldn’t Be Taken Lightly

October 12, 2017

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Any business can be a target for hackers who use ransomware. However, in recent months, a major new threat has emerged. The recent Petya attack was initially perceived to be another form of ransomware.

However, as the firms involved took stock in the aftermath of the events, it became apparent that the attack took the form of “wipeware,” code that is designed to completely destroy the files stored on any system.

What is wiperware?

Wiperware is designed with one goal in mind: total destruction. The malware asks users to install a software update and then it immediately takes control of the device. Once it has gained admin access, it completely overwrites all files on the device and in some cases the entire network. Any attached storage is also vulnerable, included USB external drives, memory sticks and network shared drives.

While the motivations behind Petya remain unknown, what is abundantly clear is that wiperware is a threat that needs to be taken very seriously. Here are a couple of things you can do right now. [Read more…] about Wiperware: New Malware That Shouldn’t Be Taken Lightly

Technology Considerations When Moving To A New Office

June 27, 2016

Michael Menor is Vice President of Support Services for Tech Experts.

Moving your office is never an easy task. You have to move furniture, personal objects, and above all else, your technology infrastructure. There’s nothing simple about moving your office’s technology, but it’s still nothing to get worried about. That’s why we’re here to help – from suggesting the optimal network cabling, to the proper deployment of new and improved technology solutions.

For example, let’s take a look at your office. You have a certain number of workstations, one for each of your employees. These workstations need to be connected via cable to your business’s network. Otherwise, your team could go without required software, data, and other important resources. Your cabling infrastructure could quickly grow to be uncontrollable, especially if you don’t approach your cabling procedures correctly.

[Read more…] about Technology Considerations When Moving To A New Office

Four Tips For Next Year’s IT Budget

December 21, 2015

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

As the year winds down, you’re undoubtedly working out plans for 2016, and preparing your IT budget is top on that list. Every year presents unique network, server, and technology challenges that need to be addressed.

The increasing ubiquity of cloud services is something small business owners need to consider, but working out the basic budget items should take priority. Here are four tips to give your business a little bit of breathing room when it comes to planning next year’s IT expenses.

Think in the long term
When planning your IT budget, it’s important to consider both short-term and long-term investments that you’ll be making for the sake of your business.

[Read more…] about Four Tips For Next Year’s IT Budget

Strategically Upgrading Your Computer Systems

November 24, 2015

Michael Menor is Vice President of Support Services for Tech Experts.

With technology growing faster than most businesses can keep up with, organizations have to continuously upgrade their solutions in order to maintain a semblance of modernity. The only issue with this is that many businesses can’t keep up, simply because they don’t have a team that’s dedicated to this important task.

What technology upgrades should be made a top priority and why?

Naturally, the first thing you need to know about workstation and technology updates is that you need to integrate them periodically in order to ensure optimal security for your organization.

Most viruses and malware will attempt to take advantage of weaknesses in your infrastructure in order to infiltrate it.

These weaknesses in your software and operating systems’ source code will ultimately allow these threats to force their way into your network, putting any contained information at risk.

These flaws are often addressed in software patches and system updates issued by the software developer, but tackling the updates in a timely fashion is a whole other monster.

Managing all software updates is easier said than done, especially without a dedicated IT department watching over your technology. Regular maintenance is often pushed to the back burner and dangerously close to being forgotten about.

Therefore, the best way to make sure that your systems are prepared to handle the threats that are found in today’s computing environment is to make upgrading your technology a priority for your organization.

Software Updates
There are several programs that your organization needs in order to stay functional, so your software updates aren’t limited to just your workstations’ operating systems.

The fewer unnecessary security flaws that can be found in your IT infrastructure, the safer your information will be.

Furthermore, users who are working with top-notch, optimized technology will be far more productive than they would be if they were using sluggish, bogged down computers.

It doesn’t make any sense to let your employees use machines that hold them back from achieving their maximum productivity.

In fact, sometimes you might encounter a situation where using a different software will be better for your business strategy.

It’s always recommended that you consult with a professional technician before making drastic changes to your business’s software infrastructure.

Antivirus Updates
Your antivirus solution is often a software solution, but virus and malware definitions are continuously being updated.

If your antivirus and other security software solutions aren’t properly maintained, it’s like you’re “leaving your keys in the front door,” so to speak.

Your antivirus solution needs to be managed on all workstations – or, better yet, centrally controlled from the server to ensure that all users are protected and up to date at all times.

Hardware Updates
Older hardware that’s been around the block a time or two might have proven reliable, but it will eventually start to show signs of its old age. Hardware failure becomes more likely and you run the risk of losing information due to the degradation of your technology.

This is why monitoring your systems for faulty tech and periodically upgrading to more recent models is preferable, if not necessary.

Granted, all of these software and hardware upgrades may feel overwhelming. This is why Tech Experts offers a remote monitoring and maintenance solution that’s designed to administer patches to your mission-critical systems remotely.

This helps your organization ensure that your systems are always up-to-date. We can also monitor your infrastructure for any irregularities that might be caused by hardware malfunctions, hackers, and much more. Call us at (734) 457-5000, or email info@mytechexperts.com to learn more.

Buying A New Printer? Here’s What To Look For

September 23, 2015

Printers are essential in day-to-day office use. Whether one is needed to create fillable forms or prepare handouts for a presentation, a printer is a valuable tool in general productivity and collaborative projects.

As such, the investment in a new printer is a big deal, and here are some of the most important things to consider when choosing one.

Black vs. Color
Monochrome printers that just use black ink or toner are usually cheaper and may be sufficient for office needs. Full color printers, however, can be used in creating eye-catching booklets, brochures, or flyers, but these are often more expensive for the initial purchase and upkeep.

Functions
Printing isn’t the only thing a printer can do. There are a host of other functions available from copying to faxing to scanning. Review what other office equipment is on hand, and that may narrow the functions needed. For instance, if the office already has a copier, then that function really isn’t necessary in a new printer.

Paper Handling Characteristics
A printer’s paper handling encompasses more than one thing. It refers to how much paper it can hold, which can be crucial for busy office settings, and also the sizes of paper it can handle. The ability to do double-sided printing or presence of an automatic document feeder are other things to consider.

Type of Connectivity
There are three primary modes of connectivity for printers – USB, Ethernet, and wireless – and a printer could have just one or all three. Nowadays, nearly all printers have USB connectivity, but Ethernet connectivity is important for wired office networks. If you want to reduce cords and use it on your wireless network, wireless connectivity is a must.

Replacement Toner/Ink Cost
The total cost of a new printer does not end with the initial purchase; the toner or ink will need periodic replacement. Often, toner and ink are far more expensive than the printer itself, so getting a good deal on the device doesn’t necessarily translate into a good deal for the long run.

It only takes a few moments to check the price of replacement toner and ink, and this can save the company a lot of money in the future.

Leasing vs Buying IT Equipment: Which is Better?

August 31, 2015

When you plan to upgrade or replace computer equipment, there are two ways to do it: Either leasing or buying the necessary IT equipment. As there is no hard and fast rule as to which alternative is better; it heavily depends on your business’ unique situation and needs. Here is an overview of each alternative’s pros and cons to help you decide between the two options:

When you lease IT equipment, the upfront costs are low, which allows a business to set aside moneys for more pressing needs.

There will be a set monthly payment with no surprises, and your business can keep up with the Joneses when it comes to having the most cutting-edge technology. If some new tech system pops up in a year or two that could help your business operations, upgrading is simple to do when leasing.

There are, however, downsides to leasing. Over the long term, you may pay more for the equipment your business uses. With a lease, there’s also the issue of having a contract that usually requires the business to rent the IT equipment for a set length of time.

This means that – even if your business opts to stop using that equipment or it becomes obsolete – the payments still must be made.

When you purchase your business’ IT equipment outright, there is only a single, albeit large, hit to the budget, and there’s no complicated paperwork to fill out or built-in caveats in the contract to look out for. It belongs to the business and decisions regarding maintenance and method of use are entirely up to those within the company instead of being governed by an outside entity. The purchased equipment can even be deducted from the business’ taxes.

On the other hand, putting a lot of money at once into a company’s IT needs may draw too much money out of other divisions’ budgets, such as marketing, for example. This can negatively impact the business’ bottom line. Another consideration is how often technology equipment should be updated. With buying such equipment, it’s far harder to upgrade to the latest technologies, which could require waiting for your recently purchased items to sell before making a fresh IT equipment purchase.

Data Breaches And The Building Blocks Of Cyber Security

May 27, 2015

Michael Menor is Vice President of Support Services for Tech Experts.

The data breaches at Target, Home Depot, Staples, Michaels, Anthem, and Sony Pictures Entertainment are just the tip of the iceberg and the stakes are very high. They’re costly for both businesses and customers and once the breach is announced, customers often terminate their relationship with that business.

You may ask, “What constitutes a data breach?” It is an event in which an individual’s information, including name, Social Security number, medical record and/or financial record or debit card is potentially put at risk. This can be in either electronic or paper format. The data set forth in this article is based on Ponemon Institute’s “2014 Cost of Data Breach Study.” Ponemon conducts independent research on privacy, data protection and information security policy.

New methodologies developed by the National Institute of Standards and Technology (NIST) and other industry standards bodies, such as the Department of Health and Human Services (HHS), are being implemented by many organizations, but best practices for addressing cyber security threats remain vague.

So what can be done to minimize cyber security threats? An effective starting point is to focus on the following essential building blocks of any cyber threat defense strategy.

Most organizations rely on tools like vulnerability management and fraud and data loss prevention to gather security data. This creates an endless and complex high-volume stream of data feeds that must be analyzed and prioritized. Unfortunately, relying on manual processes to comb through these logs is one of the main reasons that critical issues are not being addressed in a timely fashion.

Implementing continuous monitoring, as recommended by NIST Special Publication 800-137, only adds to the security problem as a higher frequency of scans and reporting exponentially increases the data volume. Data risk management software can assist organizations in combining the different data sources, leading to reduced costs by merging solutions, streamlining processes, and creating situational awareness to expose exploits and threats in a timely manner.

One of the most efficient ways to identify impending threats to an organization is to create a visual representation of its IT architecture and associated risks.

This approach provides security operations teams with interactive views of the relationships between systems and their components, systems and other systems, and components and other components. It enables security practitioners to rapidly distinguish the criticality of risks to the affected systems and components. This allows organizations to focus mitigation actions on the most sensitive, at-risk business components.

Effective prioritization of vulnerabilities and incidents is essential to staying ahead of attackers. Information security decision-making should be based on prioritized information derived from the security monitoring logs. To achieve this, security data needs to be correlated with its risk to the organization. Without a risk-based approach to security, organizations can waste valuable IT resources mitigating vulnerabilities that, in reality, pose little or no threat to the business.

Lastly, closed-loop, risk-based remediation uses a continuous review of assets, people, processes, potential risks, and possible threats. Organizations can dramatically increase operational efficiency. This enables security efforts to be measured and made tangible (e.g., time to resolution, investment into security operations personnel, purchases of additional security tools).

By focusing on these four cyber security building blocks, organizations can not only fulfill their requirements for measurable risk reporting that spans all business operations, but also serve their business units’ need to neutralize the impact of cyber-attacks.

These methodologies can also help improve time-to-remediation and increase visibility of risks.

Risks When Employees Use Their Own Mobile Devices

February 12, 2015

Michael Menor is Vice President of Support Services for Tech Experts.

BYOD (Bring Your Own Device) is an exciting development for increasingly mobile and interconnected employees, but also a new challenge for IT security teams.

Gone are the days where security professionals can lock down a finite set of machines and facilities; instead, they must manage an ever-growing, ever-changing landscape of employees, devices and applications, many of which have access to information that needs to be protected.

According to an article on eWeek, a survey was done on organizations with mobile devices connecting to their networks: only 33 percent have any official BYOD policy governing the use of personal portable devices, 67 percent do not.

The security risks are inherent in BYOD between viruses, hacking, improper security, and more. Flat-out thefts of smartphones, laptops, and tablets are also an issue.

In New York City alone, police data show that Apple products were stolen in a total of 11,447 incidents in the first nine months of 2012. That is an increase of 40 percent compared to the previous year.

Of course, employee education and awareness are important as informed users are more likely to act responsibly and take fewer risks with company data. Unfortunately, employees can be careless and criminals crafty, which is why network security defenses and policies are so critical.

Although implementing a restrictive device policy may feel like the most secure approach for your company, it can easily backfire.

Your craftiest employees are going to find a way to connect their devices to your network no matter what. And employees who do obey your “no iPhones” message will probably resent the policy and experience lower productivity.

Bring Your Own Device conceptToday’s workers expect to have 24/7 access to their information. They want to be able to catch up on emails on the evening train ride home or access information while away from the office.

BYOD lets IT staffs eliminate the hassle and expense of provisioning, distributing, and maintaining hundreds of corporate-owned mobile devices.

But setting up a BYOD program isn’t without its challenges. For starters, when you give employees free rein to bring in their own devices, you put your corporate documents and data at the mercy of the native security on these devices.

When you consider that many of your employees probably have “1234” as the PIN on their iPhones, that’s a pretty sobering thought.

Another major concern is your network. When you allow today’s increasingly powerful smartphones and tablets to request resources from your network, you really put your infrastructure to the test.

Are you ready to serve data instantly to hundreds of increasingly powerful hand-held mobile devices?

What if your mobile employees want to watch training videos, play back webinars, or listen to conference call recordings on their devices – can you deliver this kind of bandwidth?

Like most things, there are upsides and downsides, but a decision should be made on what best suits you, your employees, and your business.

When it comes down to it, BYOD isn’t a completely ridiculous idea. In fact, the benefits of BYOD may be worth the extra security precautions required to implement it.

(Image Source: iCLIPART)

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2026 Issues
  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

Hackers Aren’t Hacking – They’re Just Logging In

February 17, 2026

The “Deepfake CEO” Scam: Voice Cloning Is The Next Cyber Threat

February 17, 2026

Why “It Hasn’t Happened To Us (Yet!)” Is The Most Expensive IT Strategy

February 17, 2026

You Absolutely Need To Back Up Your Cloud Services Like Office 365

January 20, 2026

Tags

AI Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2026 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.