b2ap3_thumbnail_mouse_security_400.jpg

Your Computer Can Identify You Based On How You Move Your Mouse

b2ap3_thumbnail_mouse_security_400.jpgAny user of technology knows that it’s important to optimize security on all fronts of your business. The only problem with this is that passwords aren’t as secure as they used to be. Many businesses have moved in the direction of two-factor authentication, which requires a secondary credential in order to access an account. Did you know there’s a security method that uses your mouse’s behavior to authorize your login?

A startup called BioCatch has developed an authentication procedure that analyzes your mouse movements and behavior. Everyone has probably encountered two-factor authentication at some point or another, be it for a bank account login or email inbox access; but we doubt that you’ve ever given mouse two-factor authentication a shot.

According to BioCatch, the way that a PC user uses a mouse can identify who they are. ZDNet explains:

The entire way that we use the human-machine interface embedded within each and every modern computer, browser, or website, is like a unique fingerprint. Lefties will operate a mouse differently to right-handed people, for example, and each user ‘grabs’ an icon at a different point, angle, and so on.

Essentially, BioCatch’s idea looks at the way users move their mouse to build a “character profile,” so to speak. This helps identify whether the user is actually who they say they are. In fact, it’s been estimated that this method of authentication can prevent fraudulent logins up to 80 to 90 percent of the time.

In addition to monitoring your mouse movement, BioCatch’s solution considers other aspects, crammed into four layers of properties:

Layer One: Standard Authentication
Layer one consists of the device, network, IP address, hardware, and location – all traits that physically tie you to your PC. These are the typical authentication properties used when logging into an account. The following layers, however, take a much different approach to authentication.

Layer Two: Physical Profile
Layer two consists of mainly motion-related actions, such as moving objects around the screen, hand-eye coordination, and the mouse pointer (or finger on touch screen devices).

Layer Three: Cognitive Profile
Layer three consists of examining mental abilities, such as response time and connection time. It also looks for suspicious activity that is out of the norm. One example used by ZDnet is online banking – normally, a user would check their balance before doing anything. If a money transfer is their top priority, something might be up.

Layer Four: Invisible Challenges
BioCatch’s final layer of protection is meant to authenticate a user’s identity, but not in the traditional sense. BioCatch purposely puts problems in the way of the user in order to determine who they are. Everyone reacts to potential threats differently, and their response can be used to verify one’s identity.

Will mouse two-factor authentication catch on? We don’t know; but what NuTech Services does count on is the importance of two-factor authentication in general. Users need to have more than just a password protecting their accounts if they want to stay secure. This is especially important for any business-related material. With today’s sophisticated hacking tools and procedures, all it takes is one skilled hacker to crack a password.

To get started with two-factor authentication, give NuTech Services a call at 810.230.9455.

computer_that_talks_400.jpg

Tip of the Week: Take Advantage of Notepad’s Text-to-Audio Feature

computer_that_talks_400.jpgSome people talk to their computers, but not like they would speak to another human being. We coax it into doing it what we want, or we curse it out when it doesn’t. A day may come when artificial intelligence has progressed so far that we won’t be able to distinguish a computerized conversation from a normal one; but it is not this day. Until that glorious day comes, we’ll have to settle for these two methods to interact verbally with your PC.

My Notepad Sure Has a Big Mouth
We bet you didn’t know that the Windows Operating System has a tool installed on its Notepad that allows it to convert text to audio. However, this feature isn’t available without a little tinkering on your part. It requires a bit of programming, but infusing life into your Notepad is as easy as copying some text and slapping it on the page.

It’s Alive!
First, you want to open Notepad. Copy and paste this text into Notepad:

Dim msg, sapi
msg=InputBox(“Enter your text for Conversation | Tool by Irshad (http://pctricksonline.blogspot.com)”,”PC Hacks Text-To-Audio Converter”)
Set sapi=CreateObject(“sapi.spvoice”)
sapi.Speak msg

Go to File > Save As, and make sure that the file type reads text_audio.vbs. Afterward, close the note and open the text_audio.vbs file. A magic little box will appear on your screen. Type your text into the box and pat yourself on the back; you’ve just breathed life into an inanimate object (sort of). Fun things to type into this include, but are not limited to, “Help! I’ve been turned into a computer,” “Look at me. I’m a computer programmer,” and “Kneel before me, humans!”

That’s Not What I Said
If you don’t want to try your hand at programming Notepad to breathe life into your PC, you could always try using Google Voice Search. This is a standard Google Chrome feature, and is very easy to use. You simply go to Google’s homepage and click on the microphone icon to the right of the Google search bar. Then, you speak into your microphone and Google will search for it. The more the app is used, the more accurate it becomes. You might want to consider turning Safe Search on if you are afraid of what you might accidentally search for. You never know what you might find on the Internet.

“Smart” Phones
For those who want a simpler experience, there are always the apps offered for smartphones. Apple offers Siri for iOS, and Android has Google Now. It’s better than the magic 8-ball, we suppose, and you shouldn’t get too bored talking to them. Just remember, nothing is better than actual human interaction.

These technologies are just a taste of what’s to come over the next few years. Technology advancement is growing at an alarming rate, so keep your eyes peeled for other great interactive programs. What are your favorite interactive apps, and why? Share it with us in the comments!

b2ap3_thumbnail_leave_your_workspace_400.jpg

Be Sure to Take These 4 Actions Before Leaving Your Desk Unattended

b2ap3_thumbnail_leave_your_workspace_400.jpgWe’ve published several blog articles about enterprise security technologies, but it’s equally important to focus on the other side of the security equation and make sure people know how to properly log off, lock, and walk away from their workspace. To that end, even something as seemingly-mundane as forgetting to lock your computer can leave your network vulnerable, big-time.

Here are four actions every office worker should take before leaving for the day–even if you feel like you can fully trust your co-workers. Not to sound paranoid, but when it comes to crime, the old saying is true: “It’s always the person you least suspect.”

Log Out of Your Web Accounts Before Logging Off Your PC
Before leaving your workstation, it’s best practice to log out of whatever online accounts you have open. It might seem like you’re safe by simply closing your web browser, but if you didn’t take the time to actually log off from your account, your browser may keep your account open; despite the fact that the browser itself is closed. In a situation like this, all a person has to do to “hack” your account is open the browser and go to the active website. Upon doing this, they may find your account open. They will then have complete control to navigate your account as if they were you, which can lead to some pretty hilarious social media posts. They could also change your account settings, revoking your control. Social media isn’t the only culprit here – bank accounts and online email accounts are just as susceptible.

The consequences of not logging out could be more serious if a malicious hacker were to remotely take control of your computer while you were away from it. All they would have to do is open your web browser, look at your history to see what sites you frequent, and then visit these links from your browser. An account that’s still logged in will grant them instant access. In a situation like this, an account that’s been manually logged out of would be more difficult for a hacker to access. For serious threats like this, it’s extremely beneficial to have NuTech Services monitoring your network for any suspicious activity.

Be Sure to Log Off Before Stepping Away From Your PC
For similar reasons as logging out of your account, you will want to log off of your PC before walking away from it. If you don’t, a co-worker could easily access your desktop and mess with it in ways only limited by their computer know-how. What’s more, if you work in an office where strangers have easy access, like customers and delivery personnel, you will want to log off before stepping away from your PC. You never know who is going to walk through your front door and snoop around the place.

Put Away and Lock Up Any Mobile Devices
It may seem harmless to close your laptop and leave it on your desk when it’s time to go home, but for someone in the mood to do some crime, a mobile device left out in the open is an easy target. You may think that your co-workers can be trusted to leave your device unattended, but all it takes is one conniving worker who has it out for you to grab your device, dig in, and set you up for failure. Instead of leaving your device out in the open, lock it up in a drawer or a closet, utilize a laptop lock cable, or just take it home with you if it’s your device.

Lock Up the Office Before You Leave
This may sound like a no-brainer, but you’d be surprised by how many businesses overlook the security of side doors, windows, and other access points around their building. Being fully dependent on security measures like access cards, codes, and keys, isn’t enough to fully protect your assets, especially if several different employees can unlock your office. An employee that isn’t wise to the ways of security may see nothing wrong with loaning their access code to another worker, and if you don’t regularly change your locks, then employees who were let go may still have access to your building (and they may have an ax to grind).

Additionally, it’s good to have a surveillance system in place, especially one that you can access from your mobile device, wherever you may be. Because a smart surveillance system like this would piggyback off your company’s network, NuTech Services can help set it up for you, as well as recommend a system that best suits your security needs.

Are there any additional security measures that you take before calling it a day? Share your tips in the comments.

b2ap3_thumbnail_cloud_backup_400.jpg

Introducing the 3-2-1 Formula to Effective Data Backup

b2ap3_thumbnail_cloud_backup_400.jpgWhile there are several options your business has for a backup solution, how much thought have you really put into it? As one of the most mission-critical functions of your IT infrastructure, you need to be sure that you’re getting the best solution for your money. More importantly, you need to know that you can rely on your solution to get you through the most trying times, like after a disaster or data theft.

Taking a 3-2-1 approach to your backup policy is a simple way to get comprehensive continuity for your data infrastructure. InfoWorld describes this concept as having three copies overall of your organization’s data, with two of these being in different formats, and one of them being stored off-site. This is difficult, if not impossible, to do with tape backup, which some businesses still run. However, there’s a much easier way to handle data backup in the form of cloud backup.

With cloud backup, your business can take advantage of safety and security that’s on the level of large enterprises. Unlike tape, which is limited due to the time necessary to perform a comprehensive backup, the cloud allows for multiple snapshots of your data taken throughout the workday. This gives you the peace of mind that your information is comprehensive and redundant. The cloud even makes recovery automatic and as easy as can be, making it ideal for both storage and recovery options.

There are two main issues of cloud data backup that most businesses get stuck on: the technical details, and the price of a complete infrastructure overhaul. Many small and medium-sized businesses feel that they can’t afford this solution, or they don’t have the manpower to ensure that all of the mission-critical technology is available. Being able to back up your files on demand is an essential part of today’s online business world, especially with hackers running amok. So, what’s a budget-minded SMB to do?

One solution is to call NuTech Services and let us explain our managed service offerings to you. Our solutions are designed to optimize operations and increase productivity on all fronts. In fact, our Backup and Disaster Recovery solution is one of our most important services, especially today when hacks can happen when you least expect them. It’s designed to take multiple backups of your data throughout the workday, and sending copies to both an off-site data storage, and in the cloud for easy access.

One of the best features of our BDR solution is its practical neutralization of costly downtime. When your server goes down due to a hack or other natural phenomenon, you’ll ordinarily lose access to any data stored on that server. However, a BDR device has the ability to immediately take the place of your server if it goes down for some reason, and it can deploy your backed-up data in a moment’s notice. This keeps your business running, even when your technology isn’t, giving you ample time to find an adequate replacement.

To make backup this easy, all you need to do is call 810.230.9455.

b2ap3_thumbnail_tips_to_enhance_productivity_400.jpg

Tip of the Week: Try the 52-17 Rule to Get the Most Productivity Out of Your Workday

b2ap3_thumbnail_tips_to_enhance_productivity_400.jpgThere are countless ways to boost your productivity in the office… at least, that’s what the Internet says. How do you separate the productivity champs from the chumps? It’s simple, really; just look for the tried and true methods that have been backed by thorough research. One such study, performed by Julia Gifford of Draugiem Group, claims that workers can be more productive by not trying to do as much office work as possible.

This is hardly the first productivity strategy proposed by professionals. What makes this different from others? Well, it’s backed up with results. Using the tracking application DeskTime, the researchers at Draugiem Group examined how their best, most productive employees spent their time in the office. Surprisingly, it boiled down to how much time wasn’t being spent doing work.

52 Minutes of Work, 17 Minutes of Rest
While it might seem incredibly inefficient, the results of this study turned out to be a cycle of 52 minutes of hard work, followed by 17 minutes of rest. This is similar to the Pomodoro technique, another relatively well-known process which includes 25-minute work intervals with five-minute breaks, followed by one 15-minute break after the fourth increment. Overall, the 52-17 rule seems to be geared more for those who are confident they can stay focused on a single task for almost a solid hour.

The Importance of Rest
Rest is an absolutely critical part of any function performed by humans; therefore, its importance cannot be overemphasized. In fact, many researchers studying the science behind workplaces find that rest is absolutely imperative to the success of all participants.

Entrepreneur Chris Winfield claims that he cut his work week in half because he took consistent breaks throughout the workday. As you can imagine, finding the right balance between work and rest can be a tricky subject. Meetings and other time-sensitive appointments are difficult to fit into an individual’s schedule. For Winfield, he was able to cut his 40-hour work week down to 16.7 hours (not counting the time he spent in meetings). This is a considerable difference, especially because he was still getting everything done that he wanted to.

The End Result: Increased Flexibility
As you can imagine, scrunching your work week to less than half of the original size opens up several opportunities. The only way this is possible is with proper prioritization of important tasks. By ensuring that high-priority tasks are tackled in the most effective way possible, you’ll be able to approach the rest of your work in a clear, stress-free manner. Winfield claims that his approach changed the way he looked at the work week:

The final piece to my puzzle was moving from a five-day workweek, where I had to stop by 5 p.m., to a seven-day workweek, where I could work when it suited me. This took me from 40 to 45 hours available to get my 40 Pomodoros in, to having 168 hours each week. Since I only need 16.7 hours net, that means I only work 10% of my time. What a difference.

Granted, Winfield didn’t count the 20-to-25 hours of meetings and phone calls toward his total time, yet, he still managed to save his sanity by taking small breaks.

If you aren’t quite sold on either the Pomodoro technique or other work-break increment strategies, there are several other alternatives to look into. For one, you can look into using the latest and greatest technology solutions to improve the overall efficiency of your time spent working. Give us a call at 810.230.9455 to learn more about what productivity solutions can help your business.

b2ap3_thumbnail_this_is_autocorrect_400.jpg

The Correct History of Autocorrect

b2ap3_thumbnail_this_is_autocorrect_400.jpgAutocorrect. The world takes it for granted now, but at times, it can be as furious as it is fasting… err, fascinating. It plays such an integral part of our everyday lives, yet how much do you really know about this software?

For example, how many of you actually know how autocorrect came into existence? We bet even less of you know how autocorrect chooses the correct spelling and grammar for each word and phrase out there. Autocorrect was born from a feature that had already existed in Word, which was a glossary of sorts that acted as an auto-expander. With this, you were able to expand existing text with other things, such as a replacer for a company logo.

This method utilized script in the programming, but the pioneer of autocorrect, Dean Hachamovitch (former corporate vice president of Microsoft), realized that the glossary could be used in many more applications. The first word targeted by autocorrect was destined to be teh, a commonly seen word amongst Internet memes and illiterate people worldwide. Hachamovitch crafted a script which would fix this spelling error when you pressed the left arrow key and F3 simultaneously. Perhaps his biggest revelation was when he noticed that English is a very space-oriented language, and that he could trigger the autocorrect to happen upon hitting the spacebar.

Afterward, it was simply a matter of figuring out what the most commonly misspelled words were. Some of NuTech Services’s favorite misspellings are as follows:

  • seperate vs separate
  • affect vs effect
  • its vs it’s
  • misspell vs mispell (nothing is more embarrassing than misspelling mispell)
  • their, they’re, and there
  • recommend vs reccommend
  • could of vs could have

Of course, whether or not a word should be fixed in autocorrect boils down to how often it’s used. Additionally, Microsoft can’t go around recommending obscenities for corrections. Obscenities are labeled as words that aren’t flagged or suggested. Other words are determined by a number of different factors:

  • Keyboard proximity
  • Phonetics
  • Sentence context

What this means is that most words are judged by how popular they are in the context of language and sentence structure. This is also known as the battle between prescriptivism and descriptivism; how words should be used and how they are used in practice. Just because a word is used often doesn’t mean that it is the proper way of using said word.

Has autocorrect made humans lazy? We at NuTech Services don’t think so. If anything, we have to be even more careful about what is typed out, as a single error can be detrimental and embarrassing. Call NuTech Services at 810.230.9455 and we’ll work with you to prevent IT hiccups that could be punishing.

b2ap3_thumbnail_rogue_employees_400.jpg

2/3 of Fired Employees Can Access Their Former Company’s Cloud Data AFTER Leaving

b2ap3_thumbnail_rogue_employees_400.jpgAs an employer, you understand that employees come and go. The same group of professionals who helped you build your business will probably be drastically different ten years, or even five years from now. While employee turnover is a natural occurrence, it also presents a certain risk. Believe it or not, a surprising percentage of employees will leave your business one day, and they’ll take some corporate information with them.

A survey from SailPoint shows that a quarter of your employees might take copies of corporate data with them upon leaving a company. The survey, which specifically dealt with cloud computing usage, was issued to at least 3,000 employees worldwide. As explained by SailPoint president Kevin Cunningham, “The survey results are an eye-opener of how cloud applications have made it easy for employees to take information with them when they leave a company.” With so many employees taking advantage of their mobile technology (aka Bring Your Own Device, or BYOD), IT administrators need to be more cautious than ever in how their information is deployed throughout for their business.

A slightly more disturbing statistic is that one in five employees upload this corporate data to a cloud application (Google Docs, Dropbox, etc.) with every intention of sharing it with others. It might feel impossible that your employees could possibly think about stabbing you in the back like this, but it happens more often than you might think. Some people just don’t leave on a positive note. If they storm off with a flurry of curses, it’s fair to consider that they might attempt to sabotage your business.

Here are some more statistics from the survey:

  • 66 percent of employees said they were able to access a business’ cloud storage applications after they left their last job.
  • 60 percent said they were aware that their employer strictly forbids taking intellectual property when they leave the company.
  • Only 28 percent said their employer’s corporate policies describe who can access mission-critical software-as-a-service (SaaS) apps.

These issues pose a unique challenge for IT departments, as it forces them to consider what happens with your business’s corporate data outside of the network. When an employee is terminated or simply leaves the company, it’s more important than ever to ensure that their permissions to access restricted company files are revoked. This can make it easier to protect your business’s data.

If this is a primary concern of your business (as it should be), give NuTech Services a call at 810.230.9455 to determine the best approach to protecting your confidential corporate information from rogue employees and other malicious entities.

b2ap3_thumbnail_chrome_extentions_400.jpg

Tip of the Week: The 4 Most Useful Extensions for Google Chrome

b2ap3_thumbnail_chrome_extentions_400.jpgIf you’re one of the many people who prefer Google Chrome to other browsers, you know all about extensions and how they can improve your browsing experience. These are mostly add-ons that are designed to augment your browsing experience or adding new features. While some aren’t so useful, there are others that are invaluable under the right circumstances. To help you get the most out of Chrome, here are four useful browser extensions that you should take advantage of.

Text Mode
You don’t need us to tell you that the Internet is a distracting place. Your attention span is at the mercy of YouTube videos, cute cat pictures, and just about everything else humanly imaginable. This can be quite irritating if you’re working on a deadline and absolutely need to complete a big project on time. In order to help you take back your productivity unsullied by the Internet, Chrome’s Text Mode extension eliminates all images so that you can concentrate on the task at hand. Thanks to there being no images loading, you’ll notice that the browser’s speed is slightly increased, as well.

AdBlock
Online ads are annoying. It’s as simple as that. You don’t want to accidentally click an ad and have even more tabs open than normal. More importantly, you just want to browse the web in peace without pop-up videos or distracting ad text in your sidebar. AdBlock completely blocks these ads from your web pages, allowing you to get back to business without a new ad catching your eye.

Lightshot
All Windows PCs come with the innate ability to take screenshots using the PrtScn key. The free tool Lightshot allows you to take focused, clear screenshots of select areas of your screen. For instance, you’ve received a strange error message or noticed a spelling error, and you want to report this to the appropriate personnel. Lightshot also comes with the ability to draw on the image, insert text, and more. You can then proceed to either upload it directly to the Internet, or save it locally on your PC. This helps you give your IT support team a visual representation of what your problem is, allowing for a swift resolution.

Google Cast
Google’s Chromecast is an essential part of any techie’s entertainment repertoire, but in order to use it effectively, you need the Google Cast extension on your PC. Chromecast is a device that you can plug into your television’s HDMI port to send content to the big screen. A great use of this would be in your office’s conference room for a meeting, or simply in your living room for movie streaming. It’s compatible with all sorts of entertainment mediums, like Netflix, YouTube, Google Docs, and more.

Do you have a favorite Google Chrome extension? If so, let us know in the comments.

b2ap3_thumbnail_facial_recognition_400.jpg

Forget Passwords: Access Your Phone By Identifying Pics of Familiar Faces

b2ap3_thumbnail_facial_recognition_400.jpgWith all the hacking attacks we’ve seen in the news, it’s painfully obvious that using passwords just isn’t enough to protect our information. We now have more security measures available than ever before. One of the more unique and effective solutions to have surfaced is Facelock, a clever solution that grants access based on how well you can identify images of your friends and family.

What makes Facelock unique is that it taps directly into your personal memories. By displaying a series of images of people that only you know, in a randomly generated order and with faces scattered in different positions, access is not dependent on a code or a string of characters (which hackers have become skilled at bypassing). Instead, for a hacker to be successful, they will have to tap into your memories, a technology that only exists in science fiction.

You might be thinking, “Okay, what if the device is picked up by a close friend who knows all of the same people that I know?” First off, if they truly are a close friend, they wouldn’t be a jerk and hack into your phone. Second, it’s rare for 100 percent of a person’s friends to be the same. After all, even your spouse had a life before they met you, which included many people whom you’ve never been introduced to.

As secure as Facelock is, a hacker who’s familiar with your social circles does have a better chance at accessing your Facelock-enabled device. In a study of Facelock’s effectiveness, 6.6 percent of hackers who knew the victim were able to successfully bypass Faceflock. Hackers who didn’t know their victims had a less than one percent success rate. Overall, when the two groups were combined, the study showed that Facelock had a 97.5 percent success rate. Additionally, the study showed that would-be hackers who didn’t know the people in the images had a difficult time distinguishing multiple pictures of the same person if they didn’t have a prominent facial feature (like a big nose or a large forehead).

The advantage of Facelock is that you never again have to worry about forgetting your password. However, one disadvantage is that it might not work for your business technology because it will require your IT support team to be familiar with the user’s circle of friends. Plus, for someone who knows you very, very well, hacking into your device may be as easy as playing the classic board game “Guess Who,” minus the fun.

Does Facelock seem like the perfect solution to forgetting your password? Would you trust those who are familiar with your circle of family and friends enough to leave them alone with a Facelock-protected smartphone? Let us know in the comments.

b2ap3_thumbnail_sow_the_seeds_of_business_400.jpg

“It’s Dead Jim:” When to Walk Away from Your Failing Business

b2ap3_thumbnail_sow_the_seeds_of_business_400.jpgRunning a business can be an exhilarating experience, mainly due to the degree of risk that’s involved. When you’re the one calling the shots, your success is only limited by your ability to lead. Then there’s the chance that things won’t work out and you’ll fail miserably. When your business goes the way of the latter, how do you know when your your company is finished and it’s time to call it quits?

If you’re stuck in a hopeless situation, it’s better for your personal sanity to throw in the towel than it is to try and stick it out and make it work. To discover if you should hang in there or close up shop, ask yourself these three questions.

Do You Enjoy What You’re Doing?
Granted, few people actually love every minute of their job; by its nature, work comes with a level of discomfort. Obviously, you should expect some hardships when running a business. To get more specific, the question we’re asking here is, “Have you reached a point where you hate every minute of being a business owner, even to the point where you can’t find any reason to celebrate?” If you’ve reached the point where you can’t get any satisfaction from something that requires so much from you, it’s time to leave your company and seek out something more fulfilling.

Although, if you truly believe in the mission of your business, then you’ve got what it takes to make it through a hard spell and see a problem through to the end. Digging down deep and tapping into your passion to do what you do, and not letting your dreams just be dreams, is what will carry you through a rough patch and lead you to success. This principle quickly becomes evident after talking to any successful leader in your industry who has been where you are today.

Are You Connecting With Your Market?
You might have a business idea that you’re extremely passionate about and believe in wholeheartedly, but if it’s not connecting with your target market, then it might be time to invest in a different idea. That doesn’t mean you shouldn’t stop doing what you love; it just means that, perhaps it would be wiser to have your passion be a hobby, instead of a business for which your livelihood depends on.

Before you give up on a dream because the market isn’t coming around, try taking a different approach and do what you’re doing in a different market. Or, try taking surveys of your target market to find out what they’re really looking for. Of course, if making a major change like this still fails to yield the results you need to be profitable, then maybe your great idea is only great in your head and you should call it quits.

Is it Meant to Be?
Call it fate, or a deep intuition, or even a bad economy, but sometimes seemingly-good ideas just aren’t meant to be. If it feels like nothing is ever going your way and the universe is out to see you fail, well, then maybe it is. Instead of fighting fate, it may be better to just throw up your hands, accept fate, and give up. Who knows, maybe your business can be sold or acquired and you can walk away with some cash in your pocket.

Of course, by their nature, business owners have a can-do attitude and won’t give up until they’ve tried everything they can in order to make their dreams come true. To that end, NuTech Services can arm you with a host of solutions that will streamline operations and provide answers to many of your most pressing problems. After all, it would be a shame to call it quits because you’re stuck on something that could easily be prevented with the right technology.

To learn how technology can help your business climb out of a rut and get back on the fast track to success, give NuTech Services a call at 810.230.9455.

b2ap3_thumbnail_android_security_400.jpg

Tip of the Week: How to Take Back Your Android Device from Bloatware

b2ap3_thumbnail_android_security_400.jpgSmartphones are filled with all sorts of nifty apps. In fact, some of the most useful applications come pre installed on the device. However, not all apps are worth your time. These unwanted applications are called “bloatware,” and can impede the device’s ability to perform to your specifications.

Bloatware is not only annoying, but it can also be threatening to your device’s wellbeing. For instance, Lenovo’s pre-installed Superfish software caused quite the security scare several months back. Furthermore, it can take up space on your device and affect the amount of data you can store on it. In order to get the most out of your Android smartphone, you want to remove as many junk apps as you can. Of course, you should always approach this kind of project with caution. You don’t want to accidentally get rid of a core function of your device and render it inert.

There are several ways to remove or hide bloatware from your device. TechRepublic suggests five apps to do so. Some require that your device is rooted (i.e. you have Superuser control over your phone’s core files and OS), while some simply hide the bloatware from you.

TechRepublic’s Top Anti-Bloatware Apps

  • NoBloat Free: This app allows you to view bloatware on your device, and completely remove it. All you have to do is locate it under the System apps listing, tap it, and then select what you want to do with it from the listed options.
  • System App Remover: As explained by TechRepublic, System App Remover “is a free bloatware removal tool (with ads) that makes removing system apps and bloatware go much faster. Simply open the app, grant root access, check off all the apps you want to remove, and tap the uninstall button.”
  • Root App Deleter: Here’s yet another app that can delete your bloatware from your phone. However, unlike the others, you can choose to either hide it or delete it completely. Hiding it doesn’t clear up any space, so you can go that route if you don’t want to risk deleting something important.
  • Disable Bloatware: If you don’t want to remove bloatware completely, you can choose to hide it with Disable Bloatware. As a non-rooted application, you can take advantage of it even if your phone isn’t rooted. This hides your bloatware so it doesn’t distract you, but it doesn’t free up any space on your device.
  • System Apps: This is Android’s built-in application hiding function. With it, you don’t have to download an app to hide your bloatware. As previously mentioned, this doesn’t free up any space on your device, but it does prevent your bloatware from being a nuisance.

If you want to optimize your mobile devices for productivity and efficiency, but don’t want to risk your device’s integrity, you can give NuTech Services a call at 810.230.9455. We’ll help you clean up your devices so that they’re nothing but productivity machines.

b2ap3_thumbnail_xp_logo_for_navy_400.jpg

Microsoft Salutes the US Navy for Sticking with Windows XP

b2ap3_thumbnail_xp_logo_for_navy_400.jpgHave you already arranged for your upgrade to Windows 10 on July 29th? If so, good for you. You’ve made a decision that, last year, several Windows XP users went without. However, those who went without upgrading to a more recent operating system are now feeling the effects of having to purchase custom support from Microsoft following Windows XP’s expiration; including the United States Navy.

As reported by ZDNet, the US Navy is planning on spending an estimated $9 million this year on custom support for Windows XP. The problem here is that unsupported software is a major security risk, and custom support is so expensive that small and medium-sized businesses can’t afford it, even under the best circumstances.

Also, $9 million is an obscene amount of money for just about anything, especially when you consider that it’s going toward a system that’s literally getting replaced as soon as possible.

The proposed deal is said to run for a maximum of three years, and offers critical security patches and updates for Windows XP, Office 2003, and Windows Server 2003, the latter of which is set to expire this year on July 14th. The reasoning behind the agreement is that the Navy takes advantage of numerous legacy applications that aren’t compatible with more recent operating systems. This complicates the process of upgrading, and forces them to rely on expensive custom support. The deal is expected to run until July 2016, but just in case, they have plans to continue until 2017. You don’t need us to tell you that it’s a huge expense that could have been avoided.

If your business hasn’t upgraded from Windows XP yet, you’ve taken some very serious risks that could easily be avoided if you simply upgraded your operating system to one that’s supported by Microsoft. Of course, it’s not always so simple, as the navy’s predicament shows. When you run older software like legacy applications, you might encounter compatibility issues.

In fact, some software is so out of date by today’s standards that newer technology completely forsakes it for more recent (and, quite frankly, better) solutions. Some of these applications might be mission-critical, where they’re vital to the day-to-day operations of your business. Furthermore, if you’re not a technology expert, it can be difficult to judge which applications will be obsolete upon your upgrade.

This is why NuTech Services’s technology consultation services are so valuable. We provide the foresight needed to understand which software is compatible with your new operating system. This is especially important, as the Windows Server 2003 expiration date is fast approaching. Give us a call at 810.230.9455 to learn more.

b2ap3_thumbnail_vr_ready_to_take_off_400.jpg

4 Game-Changing Virtual Reality Technologies

b2ap3_thumbnail_vr_ready_to_take_off_400.jpgEntertainment has become such a huge part of technology consumption that nobody can think of a smartphone or the Internet without immediately thinking about it. In fact, entertainment has grown so important that some are trying to create machines that integrate virtual realities into the lives of everyday consumers. What is virtual reality, and is it limited to the entertainment industry; or can it be used in the business sector, as well?

What Defines Virtual Reality?
Everyone has a different opinion on virtual reality. Some might think it’s as complicated as we’ve seen it in various films, but in all actuality, it’s not quite as immersive as moving your entire body into a virtual space. You don’t shift through dimensions. Your consciousness doesn’t detach from your body.

As defined by the Merriam-Webster dictionary, virtual reality is:

[…] an artificial environment which is experienced through sensory stimuli (as sights and sounds) provided by a computer and in which one’s actions partially determine what happens in the environment.

So, a virtual reality isn’t necessarily a reality at all; in essence, virtual reality is tricking your mind through sensory shenanigans into believing that what you see and hear is really there.

Oculus Rift
The Oculus Rift is the virtual reality technology that consumers are most likely to be familiar with. It’s manufactured by Oculus VR, which was acquired by Mark Zuckerberg of Facebook for two billion dollars earlier this year. The device in question, the Oculus Rift, is a headset that allows for sight and hearing stimulation via a heads-up display and headphones. Though a consumer version of the Oculus Rift isn’t slated until later in 2015, it’s sure to primarily be used by gamers; making it somewhat obsolete in the business world.

Google Cardboard
Not to be bested by Facebook’s acquisition of the Oculus Rift, Google created Google Cardboard. Cardboard allows you to turn your smartphone into a virtual reality headset. With Google’s cardboard blueprints, you can cut and fold cardboard into the base. While Cardboard is a neat, thrifty way to get a feel for what’s to come, the material available for download is limited to a handful of games and short movies.

Google Glass
Google’s take on a reality augmentation technology was mostly a bust, but in theory, it was a good idea. Google Glass was a pair of glasses that could act similarly to a smartphone, but hands-free. Some of its features included connecting the Internet, simple voice commands, a camera for both photos and videos, and a touchpad on the side which is used to control the device. It was even capable of using other Google applications, like Gmail, Google+, Google Maps, and more.

Unfortunately, Google Glass failed to take off because of its outrageous consumer price, and its stigmatized reputation due to privacy concerns. For the average consumer, Google Glass boasted a whopping $1,500 price tag. According to Forbes magazine, its parts and assembly should have cost less than $80. Furthermore, with a camera disguised as a spiffy pair of specs, Google Glass was at odds with privacy in general. In a world where organizations are increasingly sensitive to the preservation of their business secrets, it’s no wonder that Google Glass wouldn’t fit in with the business world.

Microsoft HoloLens
The development of Microsoft’s HoloLens was largely kept under wraps until earlier this year, when it was announced that it would follow shortly after the arrival of Windows 10 this July. Designed as a reality augmentation device, it takes elements of the real world and integrates virtual elements into them. It’s designed to work around your surroundings, and unlike the Oculus Rift, you still see your surroundings through the heads-up display.

Unlike the other two examples, Microsoft Hololens presents a unique business advantage. The possibilities are expansive. According to Microsoft’s official HoloLens site page, it’s expected to make leaps and bounds in the construction industry, space exploration, education, and more. However, whether or not the HoloLens will prove to be an efficient use of augmented reality is yet to be seen. It has big shoes to fill, and after the failure of Google Glass, consumers might be more skeptical of it.

What are your thoughts on virtual reality and augmentation in the workplace? Do you foresee a world where it can be efficient enough to accept its drawbacks? Let us know in the comments.

b2ap3_thumbnail_security_checklist_400.jpg

Tip of the Week: Use This Security Checklist to Protect Your Network

b2ap3_thumbnail_security_checklist_400.jpgAs a business professional, you have a responsibility to ensure that your company’s network and data is protected from hacking attacks. It can be difficult to remember to take all of the necessary precautions, but with our help, you can easily outline all of the measures that should be taken to maximize security for corporate data.

Start by going down this handy checklist:

Are You…

  • … Maximizing Password Security? A password that’s difficult to crack is one of the best (and easiest) assets your business’s network can take advantage of. If threats can’t make it past your password, they can’t do much damage. When changing your password, remember to use strings of complex characters, including both upper and lower case letters, numbers, and symbols.
  • … Using Two-Factor Authentication? When using two-factor authentication, you’re basically making the process of signing into your accounts more difficult by adding another security step to your login process. This means that a hacker must obtain even more information, like your mobile device. This extra step makes it vastly more difficult for a hacker to get into your account.
  • … Updating with the Latest Patches and Updates? The latest patches and security updates help keep your systems up to date and protected from recently discovered vulnerabilities and malware, improving your infrastructure’s overall security and dependability.
  • … Protected by a Firewall? A firewall is your first line of defense from incoming and outgoing threats. It analyzes the traffic moving to and from your network, keeping threats from infiltrating it in the first place, and quarantining them for proper elimination.
  • … Using a Spam-Blocking Solution? Spam is both an annoying waste of time and a potential threat. Spam messages often have viruses and malware attached to them, so it’s best that they stay out of your inbox in the first place. This is what a spam-blocking solution accomplishes. It can save you time and increase your network’s security.
  • … Protected by an Antivirus Solution? When the average consumer thinks about security, this is their go-to solution. An antivirus is designed to detect and destroy threats to a system’s security, effectively preventing catastrophe.
  • … Using a Web Content Filter? If you suspect your employees of having questionable web browsing habits, you can implement a content filtering solution. This solution will keep their time at work free of inappropriate, or simply unsafe, web browsing.
  • … Regularly Scanning Your Network for Threats? If your business isn’t regularly checking your network for undetected threats, you might find that you have some issues to take care of.

While this list might seem long and time-consuming to fill, it doesn’t have to be. NuTech Services has the ability to serve up and manage any security solutions you need to keep your network safe. Just give us a call at 810.230.9455 to learn more.