• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

aSKaVIE

Your Tech Concierge™

  • Not tech savvy?
  • Room Service
    • 10-Ingredient Cocktail
    • New Installs
    • AI
  • aSKaVIE
    • Troubleshooter
    • Q&A
    • Training
    • Anchor Archives
    • tECH tALKtIPS
  • Boutique
    • Anti-Virus
    • Backup
    • Digital Imaging
    • Hardware
    • Hardware – Pre-Owned
    • Software
    • Other
    • aVIEzON-2024
    • Personal Computer Driver’s License
  • Contact
    • Testimonials
    • Privacy Policy
  • Payment

7 Common Mistakes to Avoid

May 1, 2014 By Avie Uniglicht

The 7 MOST COMMON MISTAKES SMALL BUSINESS OWNERS MAKE… EVERY TIME THEY TURN ON & TURN OFF THEIR COMPUTERS

Do you have these “7” handled?

For over 30-years, I have been an advocate for Safe, Secure, Effective computing. In the process of witnessing how entrepreneurs cope with the day to day challenges they face and knowing how costly and frustrating computing and technical issues can be for them, I’ve put together this list of the 7 most common mistakes and how to prevent them. With the proper knowledge and preparation, many of these time wasters and money eating events can easily be avoided. Why deal with these issues AFTER they become a drag on your resources?  We can make it easy and eliminate the causes and as a bonus, STREAMLINE your daily activities to make your entire computing experience a more favorable one.

The #1 most common challenge that I see is “Lack of Accurate Documentation”.  There is no greater time waster than searching for information that you need to complete a computing process.  Whether it be usernames/passwords to the computers, servers, websites, e-mail accounts, etc.  that you need to do your business, or vendor phone numbers, purchase registrations, warranty expirations,  license numbers – you think of the need – an organized system to keep the information easily accessible should be your first priority to help streamline the process.

Number 2 on our list of 7 is “Data backup and preservation”.  It is ALL ABOUT YOUR DATA!  Hardware, Software, Peripherals – they will all fail and can routinely be replaced.

Your DATA however, this is the meat and potatoes of your business. Being personal and strategic to your business, your data can’t be “purchased” from a 3rd party and provisions for protecting it, preserving it, and controlling it must be made.  This means using techniques of Backup and Encryption necessary to keep the data available no matter what the circumstance.

Number 3 – “Data Access”.  Controlling who has access to your computers is a key element to protecting them and the data on them.  Physical access to computers allows anyone with limited knowledge the ability to do almost anything to them and their contents.  It is important that controls be in place to restrict who, when, and what users are permitted to do with your information.  When employees are terminated, immediate action steps should be in place to change passwords and access to company property. With Bring Your Own Devices (BYOD) now very common in the workplace, Employees often not only have access to e-mail on their Smart Phones, Tablets, and Laptops, they may also have access via remote access to your other data sources.  Closing these gaps while first being aware of them is key to a strong “Data Access” policy.

Number 4 – Current “Anti-Malware / Anti-Virus / Firewall protection” is necessary for all endpoints, Servers, and Network Connected Smart Devices. I’ve recommended a “cocktail approach” to layering security using the latest technologies available. So many risks exist today that single vendor solutions often miss intrusions not because they are ineffective, but because different approaches and methods are necessary to identify and neutralize these “attacks”.

Number 5 – “Educating and “Licensing” Users” is a required element in the process.  Back in the early 2000’s I created a concept I call “The Personal Computer Driver’s License”.  While it has always been a State requirement to gain a familiarity and level of competence with a moving vehicle, I too believe that computer users should also be licensed to “traverse the data super-highway”. Too often, intrusions occur via phishing schemes, e-mail downloads, poor search habits, and other “preventable” actions a bit of knowledge could easily address.  Regular training can reinforce the importance of steps that I refer to as “The 2-Minute Pause™” and “The Pushaway™”.

Number 6 – “Routine Maintenance” – Using utilities to help cleanup temp files, surfing histories, old outdated registry entries, etc., running routine scans, and verifying that all necessary backups and programs are updated and running properly are all necessary to keep systems running like new.  System inspections, following up on any user reported errors, etc. are measures that keep systems and users content.

Number 7 – “Power Management” – Controlling how systems are powered, cooled, started and shut down are all part of good system management.  For Desktop systems and Servers, reliable Battery Backup devices are recommended to control the clean and consistent power necessary to keep systems from “locking up” or shutting down unexpectedly.  For those who use Laptops, maintaining proper cooling and air flow is necessary.  Users often close the lid of a laptop and “take off” in a rush without waiting for the system to properly “sleep”.  For longer term “excursions”, laptops should be placed in hibernation of completely shut off to protect the hard drive.

There is much more information than this article has time to cover on each of these 7 Steps.  I am planning a webinar that will elaborate on these as well as provide answers to your related questions. If you’d like more information about the Webinar or to request a personal consult anytime, please complete the Contact form at: https://www.askavie.com/contact/ and mention “7 Steps Webinar” in the Comment section. I’ll be certain to keep you informed.

This is 9th in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to TheRosyReport@askavie.com.


askavietechquestionsforbusinessownersAbout Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

Primary Sidebar

aSKaVIE’s Remote Room Service™

Your Tech Concierge

tECHtALK tIP Newsletter

Thank you for subscribing to my aSKaVIE’s Silver Platter™. I value you and your time and promise not to overwhelm you with frequent contact. On occasion, I will share some information with you which includes our latest tech news and special offers only available to my Silver Platter™ VIP's.

 

Select list(s) to subscribe to


By submitting this form, you are consenting to receive marketing emails from: aSKaVIE, 112 Marielle Ln, Norristown, PA, 19401, http://www.askavie.com. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Thank you so much Avie, you’ve always helped me tremendously. I’ve worked on computers all through my 47 years service to the oil industry, but you’re still teaching me things I never knew. You’re the BEST!!!! — Marsha

Ok Seriously! Avie Uniglicht just save me $500 on upgrading my Mac! If anyone has computer problems or questions…Avie is the expert! You must friend him! Now!

Best in the country and truly fixed in minutes! Thank -you again for your awesome quick service…He’s the best people don’t mess with the rest!

hello all my fb friends…I want to share with you an amazing experience I just had. Was having problems with internet connection (so I thought) and contacted Comcast… we all know what a joy calling them is… of course no help there so I reached out to someone I met through FB, Avie Uniglicht of […]

Hi Karen, He is in PA and I am in FL – He works remotely and takes control of your computer by way of a pass code that you approve. he can only do it with your approval. I’ve known him since 5th grade and I trust him completely. He made my computers so good […]

Recent Posts

  • “Windows Users – Time for a Tune-Up?”
  • So you want to Broadcast?
  • Protect your Credit and Identity
  • The File Cabinet
  • “Can I Trust That Connection?”
  • Boutique
  • Contact
  • Room Service
  • Testimonials
  • Privacy Policy

Copyright © 2025