• Skip to main content
  • Skip to primary sidebar
  • Home
TechTidBit – Tips and advice for small business computing – Tech Experts™ – Monroe Michigan

TechTidBit - Tips and advice for small business computing - Tech Experts™ - Monroe Michigan

Brought to you by Tech Experts™

How To Fall In Love With Your Computer All Over Again!

February 13, 2012

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Have you ever shouted at your computer because it froze up, crashed, and caused you to lose work? Have you ever whacked it with your hand, kicked it, or smashed the keyboard out of frustration?

If so, you’re not alone. Problems with a computer, cell phone or other gadget can be so frustrating that it has been called “computer rage” by some psychologists, and it’s on the rise.

According to a recent poll, three quarters of computer users have admitted to shouting, swearing, or committing acts of violence towards their computer (for the record, I think the number is much higher!).

While some simply curse the darn thing, others have admitted to hitting it until their hand bled or throwing it across the room.

One computer user was quoted as saying, “You feel so helpless. All you can do is sit there and watch the stupid thing freeze up and there isn’t a darn thing you can do about it. The error may only cause a few minutes delay, but it feels like a lifetime when you’re in a hurry to get things done.”

Deadlines are missed, work is lost, customers angered – all because of computer trouble. And the vast majority claim that problems like this happen on a consistent basis.

Apparently, technical problems are only the start of most peoples’ anxiety.

Many report that they are further angered by the time and process it takes to get the problem fixed, and some employees claim computer problems are their number one source of work anxiety and stress.

IT related problems further compound employee dissatisfaction since it often forces them to work late or take work home. If you are an employer, take note: your unstable computer network could be elevating your employees’ anxiety and job dissatisfaction levels, not to mention interfering with their productivity.

Our Experts Total Support Plans have helped dozens of clients end “computer rage” at their company. There are two ways we accomplish this: First, our 24/7 monitoring helps us detect and prevent problems before they show up. Your system runs faster, has fewer problems, and users aren’t constantly having to deal with system errors.

We also keep your security patches up-to-date, we prevent spyware, viruses, and hackers from invading your network, and we make sure you have a reliable backup of your system and data.

This basic maintenance is critical to the speed and performance of your computer network.Second, getting help is MUCH easier and faster with Experts Total Support.

Our secure software allows us to remotely log in to your network to diagnose and resolve most problems on the spot. No more waiting around for a technician to show up!

Sign Up Today And Get Your First Month FREE 

Since it’s Valentine’s Day, we want to “show you the love” by giving you the first month of service FREE. 

You’ll discover how Experts Total Support will make you fall back in love with your computer network. Give the office a call at (734) 457-5001.

Security Risks Of Employee Owned Devices

February 13, 2012

Employees using their own mobile devices for work may seem like a good idea at first – it’s less expense for you, the employer, and they can also make employees more productive.

However, it also means that you are allowing potentially unsecure devices to access your company’s data. The solution? An effective IT security policy that balances personal freedom to use these devices and your need to secure important business information.

As technology continues to become more affordable and accessible to consumers, it’s an inevitable fact that employers will see more and more of their employees using  their own personal devices such as laptops and mobile phones to access the company’s IT system.

This can be a dangerous thing. Since these devices aren’t company owned and regulated, you have limited access and control over how they are used. Employees could download all sorts of malware and viruses on their devices and pass the infection along to your IT system when they access it.

The solution: a comprehensive IT security policy. It’s important that you find a compromise between the freedom of the employee to use the device as desired and your need to keep your IT system safe from viruses and other threats to your data’s security.

Steps such as having employees run mobile device management (MDM) software on their devices is one of many actions you can take to lessen the risk of security breaches. You may also want to implement applications and software that check and screen for malware, both for laptops and mobile devices. And don’t forget that while Android seems to have a bigger problem with malicious software, Apple isn’t exactly virus-free, either.

Employees have a right to use their personal devices as they see fit, but not at the expense of important company information stored in your IT system. Running a tight ship in terms of security is an effective way to protect your business interests and your sensitive company data.

If you are interested in knowing more about developing a concrete and effective IT security policy for personal device use as well as general system access, please don’t hesitate to give us a call so we can sit down with you and discuss a custom security blueprint tailored for your company’s network.

Free Antivirus Software: No Bargain

February 13, 2012

Free antivirus software may seem like a bargain, but it’s not. In this tough economy, getting something for free is always a good thing, right? Short answer: It depends on your tolerance for risk.

Here are some issues to consider before you delay an investment in network protection and use “freeware” instead. First, free antivirus software doesn’t provide the comprehensive protection you need against today’s biggest online threats. So when you trust your computer, applications, files and identity to free AV software, it can end up costing you more in time, aggravation, and money than you ever imagined.

Most free antivirus software is really just bait that some software companies use to lure you in. It’s usually a “light” version of one of their paid products that offers only limited protection against today’s online threats.

After you install most free antivirus software, you can expect to be hit with a barrage of annoying, time-wasting pop-up alerts telling you that it only provides basic” protection. Then you’ll receive recommendations to switch to one of the software maker’s paid security products for “complete” protection.

Another point to keep in mind: Experts agree that today’s biggest online threats come in forms that free antivirus software doesn’t stop. Threats such as rootkits, bots, keyloggers, hackers, phishing scams, and infected websites breeze right past most free antivirus software.

These threats can pose an even bigger danger than viruses, not only to your computer and files, but to your bank account as well. They can lead to a hard drive crash, system failure, or worse, identity theft. Also, free antivirus software is generally reactive. That means it only deals with threats after they’ve attacked and had an opportunity to do damage to your computer and files.

When you build your own security suite using standalone free security software, compatibility issues can cause conflicting alerts and even hard drive crashes. That’s even more time wasted – and a whole load of aggravation you don’t need.

So what’s the bottom line? Free antivirus software simply doesn’t provide the comprehensive protection you need in today’s online world. When you add up the various costs listed above, free antivirus software isn’t free at all.

Windows XP: Usage Declining After 10 Years

February 13, 2012

With Windows XP being released more than 10 years ago its still amazing that it is still on top when it comes to the most widely used operating system. The question still stands however, why?!

Many users have become comfortable with Windows XP and everyone hates change so it is really no surprise that users are holding on to the antiquated operating system. There are however major problems with holding onto old technology.

The first major problem is support. Windows XP is slated to lose its support in early August of 2014. “So why not hold on to Windows XP a little longer, I heard Windows 8 is coming out soon?” While there are many users out there with that mentality, it is bad practice to hold on to an operating system beyond its useful life.

The fact is there is a great alternative to Windows XP that has been out long enough that the bugs have been worked out and is a stable alternative. Windows 7 is the alternative, while many users are nervous about moving on to a new operating system because they don’t like change, Windows 7 is a very intuitive, stable and user friendly operating system.

The second reason you should not be holding on to Windows XP over Windows 7 is the simple fact of security. Windows 7 has been proven to be more than five times as secure as Windows XP.That’s right, all those viruses you get in Windows XP due to its numerous security holes do not exist in Windows 7. While its true there are still some viruses and malware in Windows 7, this is true of any software (Yes even a Mac…).

Many businesses are starting to see these facts as well and are not waiting around for Windows 8. So why are they not waiting?

Well, current reviews of Windows 8 have very mixed opinions on whether or not it will be a good fit for businesses. Much like Vista was to the Windows XP user, Windows 8 is going to be a very different looking and feeling operating system.Many people in the Information Technology field have their doubts as to whether it will fit into businesses well due to the drastic changes that have been made in the users interface.

While Windows 8 is still not released to the general public yet, it still appears that it will be too big of a change for those in the business world that generally are not early adopters of new Windows operating systems (Sound familiar?).

Many businesses are just starting to push into Windows 7 for their primary workstations and the numbers of Windows XP  computers versus the number of Windows 7 computers out are starting to show that. Windows XP has dropped over 10% in the past year which is huge! As a matter of fact Windows 7 gained 15% last year which  means not only is it doing well enough to take those XP users, but it also managed to steal some users from other operating systems.

The long and short is it is time to get that upgrade and stop wasting your time with Windows XP. Windows XP will cost you more to maintain due to the fact that it is more likely to have viruses and other problems. Windows 7 is the way to go don’t wait until Windows XP support finally dies then decide its time.The time is now, save yourself the hassle and plan the upgrade process now rather than waiting till the last minute.

We can get you upgraded to Windows 7 or, if your computer is too old to put the money and time into it to switch to Windows 7, we can get a computer for you with Windows 7 and transfer all of your existing data to it. Just give us a call.

 

Feature article by:
Tech Experts

Are You Ready To Meet Your Social Match?

February 13, 2012

Whether MagnetU catches on to quite the same extent as social media sites such as Facebook remains to be seen, but for many, the appeal of being alerted every time they are in the vicinity of someone who has the same “social desires” as they do will undoubtedly be enormous.

MagnetU describes itself as the first real-world street network; essentially this little device acts as “a bridge between your online digital life and the real world” by broadcasting your social media profile to everyone around you. Whether you are looking for the perfect love match, want to meet people with similar hobbies or are more interested in making business contacts, all you need to do is go to MagnetU.com, fill in your social desires, and then sign in to Facebook, Twitter and other social network sites to receive alerts each time a “compatible” individual passes nearby.

You can even change which particular social desire you wear at any given time so that you can look for your soul mate while you’re out socializing and a potential business partner when you’re at a business conference.

Although critics of MagnetU point out that machines are notoriously bad at people-matching and suggest that society already faces enough distractions from social media without this addition, it could just turn out to be another one of those technological necessities that we can’t do without, if only because everyone else is using it!

Sometimes Something’s Just Gotta Give

February 13, 2012

Whether you’re chasing around between two or three different jobs, trying to maintain a standard of living that used to be achievable doing just one, or burning the candle at both ends to fit in numerous extracurricular activities as well as holding down a full-time job, sometimes there just comes a point where something’s got to give.

Although it might be easy to assume that a constant state of activity means forward progression, when things start to get too frantic, all that dashing around can easily become self-defeating. Not only does the body become exhausted, but as the brain goes into overload, mistakes start to be made, things begin to be forgotten and it becomes impossible to give your best to anything that you attempt. Far from moving forward, what often happens is that you end up spending most of your time sorting out the muddles that have been created due to time pressures and the inability to stay organized.

Both mind and body need time to relax, so if your life has started to look like one endless merry-go-round and offers no respite, bear in mind that sometimes you can achieve more by doing less. Focus on what’s most important and give anything else the old heave-ho!

Increase Your Typing Speed And Accuracy With A Touch Typing Course

February 13, 2012

Touch typing could be described as a “technical” skill, and you only have to watch today’s army of twofingered typists to see that it’s a dying art. Not only is touch typing invariably much faster than poking away at a keyboard with just two index fingers, but being able to type without taking your eyes off the computer screen also decreases the incidence of error by a huge margin because you can see instantly when you have hit the wrong key.

Unlike years ago when learning to touch-type involved signing up for an expensive course, today there are numerous free resources on the Internet that require nothing more than a small investment of time. A wide range of books that promise to teach you to touch-type in a matter of a few hours is also available.

Take the pain out of using a keyboard and brush up your skills for the workplace or your own home use by taking a free online touch typing course and becoming an expert in hours.

New Year’s Resolutions For Problem Free Computing

January 20, 2012

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Even though we’re a few weeks into the new year, it’s not too late to take a look at your company’s network and make a few resolutions for better computing in 2012. Here are a few suggestions.

Better backups – now!
Implement a better, more reliable backup system to ensure your critical business data is properly protected. If you’re still using tape drives or not employing the latest professional-grade backup software, there’s no bigger New Year’s resolution that you should have.

You should have both an onsite and offsite backup of your data that allows you to restore files fast. Your backup should also be image-based, not just file-based.

Data loss can happen from human error, hardware/software failure, fire, flood, theft or other disaster. Every hour that you’re without your critical business information could cost you thousands of dollars.

Check out the cloud
Is cloud computing is right for you? In many cases, parts of your IT infrastructure can easily be put in the cloud to save you money and give you better service. It is important to talk to someone who can honestly assess your situation and tell you the pros and cons of making the switch to the Cloud. It’s not for every business but it’s worth exploring closely.

Dump the old PCs
I know that no one really likes spending money on new computers but think about how much unproductive time your staff spends waiting for their slow machines.

You can get an entry-level business desktop now for as little as $600, and speed upgrades to newer machines are very reasonably priced. What’s the cost of staff sitting around waiting for their computer or dealing with computer problems?

Upgrade your server
New servers are light years ahead of the ones made three, four and five years ago. Your company is less productive and less profitable with a server that slows everyone down.

Change your passwords
Most businesses regularly have employees leave, including those who were involved with supporting the computer network. Changing passwords regularly will improve security and protect your valuable customer and business data.

Perform a security review
We’re seeing all sorts of increased threats from hackers these days and you need to make sure your security approach is up to date. There are many parts to your security that you should examine including password strength; anti-virus software; and getting a strong firewall that will prevent intrusions, attacks and other malicious activity.

Keep up with your preventive maintenance
Downtime and annoying IT problems can be prevented with regular maintenance on your computers and network. If you’re not doing this now, it’s time to start!

Start the year right with a full audit of your network to develop your IT plan for the year.

Our top of the line network audit is a 27-point review of the security, performance and reliability of your network, and includes a full hardware and software inventory, plus checks on the health of your server, firewall, and network backup.

Data Management: From Storage To Security

January 20, 2012

One of the most important aspects of maintaining a smooth running safe and secure network comes down to data management.

How you or your company manages its data is important because if managed improperly, or not managed at all, you risk losing years of important confidential data due to failed hardware or even worse, theft.

Data management needs to begin with an audit of your various assets and how they should be managed properly.

This is the first step because you need to know what you have to manage and more importantly how it needs to be managed (can you use a simple flash drive backup, do you need a NAS, how secure does the data needs to be, should data be encrypted, etc.)

An audit should take place at the beginning of your data management plan as well as at the end which will be touched on later.

During your data management audit you need to first lay out what data is being used, when it is in use, when your slow periods are, and how securely you need to store this data.

For example client credit card data requires much more security than say your pictures from the company party.

After establishing what data you have as stated above you need to separate it into its various classes.

Generally people will store all of their data together so if that is your plan, you need to plan your security based on your most important and confidential data sets.

Some people may have a very large amount of data and smaller data sets that need more extreme security.

In these cases backup sets can be separated to allow less confidential data to be backed up to a less secure and much cheaper backup device while you could have a more secure setup for your confidential data.

One major consideration when it comes to backing up your  data is encryption.

The stronger the encryption on data the longer it will take to recover in the event of a data loss.

Encryption is one of the best methods to store data, determined by level of security – it can be high or low.

Again the amount of encryption contributes greatly to recovery time. Data can be managed and stored in many different manners.

Some of the various storage solutions are; a network drive to another computer, a NAS, a flash drive, an external hard drive, data drives and tapes, offsite backups, etc.

Depending on your needs and the amount of recovery time needed, your choices can vary.

For instance, if you have 1 TB of data you are backing up chances are you would be doing an onsite backup rather than offsite to decrease down time in the event of a crash.

A terabyte of data in an offsite backup is going to take a very long period of time to download to your server if your only recover option is to download from the Internet.

A much better solution for this amount of data would be a data drive like a “REV” drive. A REV drive in combination with good backup software offers plenty of space to backup and encrypt your data.

Backups via tapes or data drives should have at least the previous night’s copy taken offsite each night to ensure that you keep one data set safe at all times. It is a horrible idea to store all data onsite.

After you have a plan in place, run through the audit again once things seem to be running smooth to see what is in place, how its running, how secure it is in the event that a data set is stolen, and is the backup time/recovery time acceptable.

If the answer to any of these questions makes you feel your backup solution may be inadequate, it may be a good idea to try something different.

Even though it would cost more money to change data management solutions, it will save you money and hassle in the long run if you find it does not meet your company’s needs.

For a full data management audit give us a call today and we can happily sit down and discuss with you possibilities for your backups and data management as this only touch on a very small portion of data management.

Your data is very important and generally people do not realize just how important it is until they’ve either lost it or had it stolen due to poor management practices.

Feature Article Written By:
Tech Experts

How Strategic Business Continuity Planning Can Prevent Losing Money And Customers

January 20, 2012

The concept of business continuity planning is nothing new to conscientious business owners.

Without a doubt, the ability of an enterprise, large or small, to recover from catastrophic events and continue to provide an acceptable level of service to its customers  while maintaining a satisfactory level of profits is a basic requirement of good business practice.

Although such awareness has always been a feature of good management, the startling events of September 11 2001 has brought the world into a heightened state of preparedness for disaster.

Why the need for continuity and disaster planning?

Increasingly, natural disasters continue to surface in one place after another.

Consider recent major floods, earthquakes, tsunamis, hurricanes, corporate crimes and malicious attacks upon computer systems in nation after nation and you will sense the pressing need for sound business continuity planning to avoid disruptions due to technology and other failure.

Another factor which contributes to this need is the changing business climate in view of the expansion and increasing accessibility of the Internet over the past decade.

So organizations which formerly rendered services to their customers during fixed hours of business, now find themselves offering their services on an extended schedule, even 24 hours a day, seven days a week.

This means that customers have grown accustomed to this ready access to their suppliers and vendors. And now the reality is that consumers have become less and less tolerant of interruptions in a company’s service and availability.

Business continuity planning – is it just for big business?

Business continuity planning now takes on an increasingly important role, not just for larger enterprises, but for small businesses alike.

In fact for small businesses it is even more critical to be ready to respond to the needs of its customers.

Customers expect this and have no problem locating alternate suppliers who stand ready to take your place in the market!

This is true whether you are in the manufacturing or service business, marketing and sales or any other facet of business.

Your network – a key  component in business continuity 

Nowadays a company’s IT System with its network of computers has become the backbone of many businesses.

Vital functions such as Data Processing, inventory and  payroll management, Internet based operations including online sales, human resource and training systems, project management and an almost endless variety of other business functions are critically dependent on the efficacy of your computer system.

Clearly then, any technology disruption can have disastrous consequences.

Therefore business continuity planning often deals  extensively with maintaining a dependable IT system.

This brings into focus not only the hardware components of the system and its application programs, but also the data contained in the system.

Ways to ensure continuity

Some of the key components that determine system reliability include Data Storage Devices, UPS systems, power generator systems and so on.

And nowadays, Cloud Computing is being relied upon to extend the reliability of Computer Systems and ensure business  continuity in the event of major failure.

There seems to be a tendency to use the expressions ‘business disaster recovery’, and ‘business continuity’ interchangeably.

However upon closer examination it becomes clear that the two concepts are quite distinct.

Continuity of service is the desired state we want to maintain while recovering from any unexpected calamity whether an extended power outage, Computer System failure or other problem.

Such continued operation calls for a comprehensive plan that covers the most probable occurrences.

From this information it can be seen that ensuring business continuity calls for a strategy regardless of the size of the business.

As disasters continue to increase in frequency and magnitude, more and more careful thought must be given to your company’s preparedness to respond in the event of any business threat.

The increasingly prominent role of computers in business calls for highly reliable data backups, hardware redundancy, and keen, effective planning as a way to ensure business continuity in the event of any catastrophe.

« Previous Page
Next Page »

Primary Sidebar

Browse past issues

  • 2025 Issues
  • 2024 Issues
  • 2023 issues
  • 2022 Issues
  • 2021 Issues
  • 2020 Issues
  • 2019 Issues
  • 2018 Issues
  • 2017 Issues
  • 2016 Issues
  • 2015 Issues
  • 2014 Issues
  • 2013 Issues
  • 2012 Issues
  • 2011 Issues
  • 2010 Issues
  • 2009 Issues
  • 2008 Issues
  • 2007 Issues
  • 2006 Issues

More to See

The Hidden Cybersecurity Risk In Your Business

October 14, 2025

Advanced Strategies To Lock Down Your Business Logins

October 14, 2025

The Long-Term Costs Of Slow Computers

October 14, 2025

Five Simple Ways To Keep Your Business Data Clean

September 23, 2025

Tags

Antivirus backups Cloud Computing Cloud Storage COVID-19 cyberattacks cybersecurity Data Management Disaster Planning Disaster Recovery E-Mail Facebook Firewalls Hard Drives Internet Laptops Maintenance Malware Managed Services Marketing Microsoft Network online security Passwords password security Phishing planning Productivity Ransomware remote work Security Servers smart phones Social Media Tech Tips Twitter Upgrading Viruses vulnerabilities Websites Windows Windows 7 Windows 10 Windows Updates work from home

Copyright © 2025 Tech Experts™ · Tech Experts™ is a registered trademark of Tech Support Inc.