LiveChat Live Help
Contact us today!
(248) 218-5018
facebooktwittergooglelinkedinyoutubeExpetec Technology Services RSS Feed
 

Expetec Technology Services Blog

Expetec Technology Services has been serving the Troy area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Unless you’re the trade-in or hand-me-down kind of person, it’s likely that you have a supply of old Android devices squirrelled away somewhere. You know, just in case the one who have now breaks. However, these old devices can be useful in other ways around the office. For this week’s tip, we’ll go over three alternate uses for your mobile device in the office.

Continue reading
0 Comments

Tip of the Week: How to Print Directly From Your Android Device

Tip of the Week: How to Print Directly From Your Android Device

Have you ever tried to print something from your smartphone? Yes, we know that sounds kind of absurd--but it’s certainly not impossible. In fact, it’s often easier to do this than sending yourself an email with the attachment, or accessing the files on your desktop. We’ll go over how you can print a document or picture from your Android smartphone so that you can make things just a little bit simpler.

Continue reading
0 Comments

Tip of the Week: Know Exactly How Far It Is from Point A To Point B With Google Maps

Tip of the Week: Know Exactly How Far It Is from Point A To Point B With Google Maps

Who needs a GPS device when you have all that you need, right in your pocket? We’re talking, of course, about your smartphone. Whether you have an Android device or an iPhone, Google Maps can make for a great alternative, and it sure beats trying to use an atlas. You can use Google Maps to chart the distance between any target destinations and your current location. You can even use it to get the total distance for an upcoming vacation.

Continue reading
0 Comments

100 Countries Hit By Android DDoS Malware

100 Countries Hit By Android DDoS Malware

In what is one of the first attacks of its kind, a botnet dubbed WireX swept across 100 countries, controlling over 120,000 IP addresses at its peak. The factor that made WireX so unique was the fact that the botnet was made up of Android-powered devices that had one of 300 malicious apps downloaded from the Google Play Store.

Continue reading
0 Comments

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing history.

Continue reading
0 Comments

Tip of the Week: Block Telemarketers and Other Annoying Callers From Your Android Device

b2ap3_thumbnail_block_callers_400.jpgCalls from telemarketers are the worst. These unwelcomed calls are especially annoying if you’re trying to be productive, and you’re interrupted in the middle of the workday by the same number repeatedly. Thankfully, more recent models of Android smartphones have the capabilities to blacklist numbers built right into the device. Here’s how it’s done.

Continue reading
0 Comments

Alert: A New Android Threat Spreads Malicious Adware

b2ap3_thumbnail_cybersecurity_400.jpgMalware and viruses are so common nowadays in the technology world that it’s no surprise when new ones are created. Thus, it should come as no surprise that hackers are looking to spread smartphone malware to unsuspecting users around the world. Kemoge, a new malicious adware for the Android mobile operating system, has spread to 20 countries, and is taking the mobile device world by storm.

Continue reading
0 Comments

Tip of the Week: How to Broadcast WiFi From Your Android Device

b2ap3_thumbnail_broadcast_from_smartphone_400.jpgSometimes you find yourself in a pinch and you really need a WiFi signal for your laptop in order to complete a task. If you’ve got your smartphone handy, then you can easily turn your device into a WiFi hotspot and give your laptop the wireless Internet signal it needs. Here’s how you can accomplish this from your Android device.

Continue reading
0 Comments

Tip of the Week: How to Lock Your Android Device

b2ap3_thumbnail_got_that_andoid_on_lock_400.jpgYou’ve got a lot of sensitive information stored on your mobile device. If it were to fall into the wrong hands, you wouldn’t want the new user to have easy access to it. This is why every mobile device should be locked. Here’s how to lock your Android device, as well as how to pick out a lock screen setting that’s right for you.

Continue reading
0 Comments

Tip of the Week: How to Delete Your Mobile Files with Dumpster App

b2ap3_thumbnail_dumpster_app_400.jpgAndroid smartphones are at the top of the mobile market, but they have a flaw which some people don’t even realize is there - the lack of a recycle bin. Anything deleted is unlikely to be recovered, which can be seriously inconvenient for many people. What if you accidentally delete something important? Thankfully, there is a fix to this problem in the form of an app called Dumpster.

Continue reading
0 Comments

Tip of the Week: How to Remotely Wipe Data From Your Android Device

b2ap3_thumbnail_data_wipe_from_android_400.jpgJust for one second, try to imagine your life without your personal mobile device. Mobile devices has pervaded our very existence, and they are integral tools for connecting to your business’s network. But even with this colossal amount of data on the device, some people still manage to lose them. What would happen if your smartphone fell into the hands of one of your competitors, or even a hacker?

Continue reading
0 Comments

You Won’t Believe How Hot This Girl’s Smartphone Story Gets! [VIDEO]

b2ap3_thumbnail_broken_smartphone_400.jpgHave you ever noticed that your mobile device may run a little hot after a heavy day of use? In normal circumstances, a warm smartphone is no big deal. Although, on rare occasions, a perfectly good smartphone has gotten too hot and caught on fire!

Continue reading
0 Comments

Blog Archive

Sign Up for Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Tip of the Week Privacy Technology Best Practices Cloud Internet hackers Business Computing Productivity Business malware IT Support Backup Microsoft Email Software Network Security Data IT Services Hosted Solutions Managed Service Provider Hardware Efficiency User Tips Mobile devices Computer Disaster Recovery Mobile Device Management Workplace Tips Google Business Management Microsoft Office Smartphone Android Miscellaneous Remote Monitoring Ransomware Holiday Virtualization Windows Business Continuity The Internet of Things Smartphones Network analytics Remote Computing Collaboration Server Social Media Operating System Small Business BYOD Mobile Computing Unified Threat Management WiFi Phishing Passwords IT Support Alert Managed IT Services Cybersecurity VoIP Outsourced IT Upgrade Windows 10 Save Money BDR Big Data Managed IT Office Firewall Vendor Management apple Gmail communications Innovation Saving Money Data Management Lithium-ion battery Search Productivity Employer-Employee Relationship Browser Quick Tips Managed IT services Internet of Things Facebook History Budget Communication Artificial Intelligence Outlook Marketing Automation Proactive IT Running Cable Money Help Desk Wireless Technology Update IT Management Document Management Customer Service App Bandwidth Save Time Windows 10 Encryption Recovery Information Technology Hard Drives Cost Management Hiring/Firing Content Filtering Saving Time Best Practice Intranet Hard Drive IBM User Data Backup Apps Two-factor Authentication Data Recovery Word Law Enforcement Gadgets Data storage tablet IT Consultant SaaS Hacking Antivirus Spam Project Management Office 365 Health Bring Your Own Device Hosted Solution Networking Robot Disaster Tech Support Mobility Business Growth Net Neutrality Phone System Administration eWaste Cloud Computing Legal Laptop Specifications Solid State Drive Chrome Computing Infrastructure Access Control Flexibility Mobile Device Education End of Support Cryptocurrency Presentation Telephone Systems Data Security Risk Management Website Social Patch Management Virus Network Congestion Programming Business Intelligence Wireless Google Docs Comparison Password Bitcoin Compliance iphone Digital Telephony Excel Computers VPN Experience Retail Training Unified Threat Management Safety Virtual Desktop Going Green IT service Government Start Menu Maintenance Documents DDoS PowerPoint Heating/Cooling Uninterrupted Power Supply YouTube Social Networking Travel Cybercrime Downtime Monitors Current Events Scam avoiding downtime Unified Communications Software as a Service Cortana Google Maps Company Culture Corporate Profile Shortcut Fiber-Optic Knowledge Consultation IP Address Google Calendar Upgrades Windows 7 Permissions Trending VoIP Pain Points Fraud Google Wallet Tech Terms Customer Relationship Management switches Bata Backup Augmented Reality How To Technology Tips Computer Repair Freedom of Information Environment Processors Digital Signature Cabling Statistics HIPAA Capital email scam Drones CIO Entertainment Online Currency Vendor Mangement Teamwork News Human Resources Worker Productuvuty Competition Vulnerabilities User Error IT consulting Business Mangement Content Management Sync Mobile Technology Gaming Console Writing Fake News Cleaning Licensing Entrepreneur Sports Electricity Application Business Cards Data Loss Windows XP Domains Best Available Hack Mobile Payment Router Microsoft Excel Society Redundancy WannaCry Social Engineering Data Breach Google Drive Value Archive Distributed Denial of Service Television Read Regulations Windows 8 Computer Accessories Storage Risk Mangaement Office Tips Electronic Payment Time Management Emails Mouse Computing Blockchain Printer Emergency Access Micrsooft LiFi Computer Care SharePoint Tip of the week Vulnerability Staffing Troubleshooting Spyware File Sharing Audit LinkedIn Skype Visible Light Communication Touchscreen Evernote Bluetooth Virtual Assistant Music Business Technology Business Owner Cache Public Speaking Politics Printing Deep Learning Advertising PDF Websites Data Warehousing Keyboard Settings Hard Drive Disposal Black Market Securty Data Protection Streaming Media Inbound Marketing Assessment Hacker USB Public Cloud Downloads Windows Server 2008 Product Reviews Co-Managed IT Displays

      Top Blog

      Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
      QR-Code