b2ap3_thumbnail_stolen_data_problems_400.jpg

736 Million Records Were Exposed to Data Theft in 2015

b2ap3_thumbnail_stolen_data_problems_400.jpg2015 saw a significant increase in high-profile hacking attacks in organizations of all disciplines: healthcare, government, and even large entertainment companies all fell victim to data breaches. In light of these attacks, valuable lessons can be learned through analyzing the types of records that were stolen. In 2015, over half of all records exposed to hackers were passwords and email addresses.

Take a moment to consider the importance of such credentials; they’re used for accessing online accounts and mission-critical information that’s stored on company networks. If hackers and thieves gain access to them, they essentially acquire unrestricted access to certain accounts that may be critical to the functionality of your business. Plus, since many users use the same password across multiple accounts, having one set of credentials may give hackers a lot of access.

Here are some of the statistics revealed by the Risk Based Security report:

  • In 2015, there were 4,000 reported data breaches, which exposed 736 million records.
  • 40.5 percent of reported incidents occurred in organizations within the United States, with the amount of data stolen totaling around 65 percent of the data stolen throughout the entire year.
  • 238 million stolen data records came from just four huge data breaches.
  • 142 organizations experienced multiple data breaches in 2015.
  • The US and UK combined made up 45 percent of all reported data breaches in 2015.

What You Can Do About It
If you want to keep your business safe from the seemingly endless horde of malware on the Internet, you need to be tirelessly working toward integrating proactive security solutions designed to protect your network from potential threats. One way that you can do so is by implementing powerful security measures that are designed to both prevent threats from accessing your network, and detect them from within before they cause unspoken amounts of damage. Enterprise-level firewall and antivirus solutions are great tools meant to prevent breaches, while content filtering and spam blocking solutions make your network even more resilient. These four technologies are what’s known as a Unified Threat Management solution, and it’s a critical investment for any security-minded SMB.

Another way that you can decrease the chances of being hacked is by using complex passwords that are difficult to guess, and to change these passwords consistently. Your passwords should always be long, utilizing lower and upper-case letters, numbers, and symbols. Never use the same password and usernames for multiple online accounts. Always use different credentials. If you have trouble remembering everything, an enterprise-level password manager is a great way to securely store your credentials.

In the end, it comes down to how well you protect your organization from threats. NuTech Services can educate your business on security best practices, while assisting you with the implementation of comprehensive security systems. Our solutions are designed to minimize the chances of data breaches, and to immediately resolve problems that might come up.

For more information, give us a call at 810.230.9455.

b2ap3_thumbnail_windows_admin_400.jpg

Why You Need to Think Through Which Employees Have Access to What Files

b2ap3_thumbnail_windows_admin_400.jpgIt’s clear that your IT department should have administrator privileges with your business’s technology, but the average employee is another story altogether. Administrator privileges provide users with the ability to do many things, such as install programs and access admin settings. Administrator privileges are exactly what you want to keep users away from, and it turns out that the majority of flaws in the Windows operating system depend on these privileges.

According to a report released by security firm Avecto, it’s estimated that a solid 85 percent of all critical flaws within an operating system can be plugged simply by removing administrator privileges. Most home and consumer-based PCs utilize administrator accounts by default without much thought, but this is a dangerous practice in a business. If hackers can gain access to administrator privileges, they can make changes to the core OS files and steal important information. Most businesses that prioritize security will have limited user privileges on their provided workstations, which help to keep malware and other threats out of central files imperative for the continued functionality of the machine.

As reported by ZDNet:

The report said that removing admin rights could have mitigated more than 99 percent of flaws affecting Internet Explorer, which had a critical-rated flaw almost every month; and mitigated 82 percent of all vulnerabilities affecting Office. The company analyzed the entire batch of vulnerabilities in Microsoft’s monthly security patch update, dubbed Patch Tuesday, to see which flaws would be less impacted whose logged-in accounts “are configured to have fewer user rights on the system.” Out of the entire batch of vulnerabilities reported, 63 percent would be mitigated or unexploitable if admin rights were removed.

User privileges are an easy topic to set on the back burner and forget about, especially if you’re a small business with a small workforce. You might like to think that there’s minimal chance for user error, but the cruel reality is that people make mistakes, be it accidentally misplacing files or allowing malware to run rampant throughout your business’s critical systems. Unfortunately, all it takes is one oversight to leave your entire business infrastructure vulnerable to damage caused by hackers who have administrator privileges.

Therefore, it’s recommended that your organization take full advantage of a user management solution that puts a lid on what the majority of your employees can access. Your users should only be accessing files and information that’s important for their daily duties. For example, the average employee doesn’t need access to personal employee records or client payment information.

Are you doing everything that you can to limit your mission-critical data’s exposure to threats? Security-minded businesses will be taking advantage of not just role-based user access, but also secondary security solutions like firewalls, antivirus, spam blocking, and content filtering solutions that are designed to prevent infiltration in the first place. These four features can be implemented in one comprehensive solution called a Unified Threat Management (UTM) tool.

For more information about proactive IT measures, remote monitoring and maintenance, or IT security, give NuTech Services a call at 810.230.9455.

b2ap3_thumbnail_new_green_technology_400.jpg

Tip of the Week: 2 Ways Your Business Can Reduce Its Environmental Footprint

b2ap3_thumbnail_new_green_technology_400.jpgTechnology has provided humanity with the ability to make stupendous advances in the way we live our lives. However, it has also given rise to a wasteful society that neglects old technology, tossing it to the side in favor of the latest and greatest gadgets. As you can imagine, considering the rate at which modern technology advances, this trend has proven especially difficult to break, and it’s having extremely negative effects on the environment.

We know what the solution looks like; a bunch of tech nerds talking about how to keep the environment clean. However, this situation isn’t just ironic. It’s also incredibly important to sustain the future of our planet, and to ensure that it continues to thrive for our loved ones in the future. Individually you might not feel like your actions are making a big deal, but if every business were to take green initiatives, it could make a significant difference.

To this end, here are two ways your business can reduce its environmental footprint:

Properly Recycle Unused Devices
With so many devices being manufactured every year, it’s only natural that some older devices get replaced by new ones. Normally, those who don’t know the proper way to dispose of a device will just throw it in the trash without a second thought. However, computers and other devices contain valuable metals and materials that, if not properly recycled, can have disastrous effects on the environment. These devices usually get shipped to developing countries that dismantle and acquire these materials with unsafe and unsanitary practices. This is why it’s so important to make sure that you’re properly recycling your old, dilapidated technology.

Another note on recycling your old technology: be absolutely sure that it’s been wiped of all data before committing to the recycling process. This includes hard drives in desktops, laptops, and storage in mobile devices that at one point contained sensitive information that can’t fall into the wrong hands. Simply deleting the data doesn’t cut it – there’s a chance the data could be recovered. NuTech Services can help with this by thoroughly wiping your unnecessary technology of any important data, and disposing of it in an environmentally friendly manner.

Reduce Printing Costs
One of the greatest ways you can reduce your carbon footprint is by limiting how much paper you waste printing documents out. Your business no-doubt prints several pages worth of documents on a daily basis, but recent innovations in technology have allowed for businesses to limit their printing and decrease their overall printing expenditures.

Limiting your printing costs also has a great benefit for your budget, considering that you don’t have to invest as heavily in paper, ink, and toner. With digital file storage and signature software, you don’t need to print out documents in order to store them in your office’s physical space. This leads to less clutter, and will ultimately lead to a more organized office with fewer resources wasted.

Doing business with the environment in mind has its benefits, but only if you approach it with the necessary knowledge. NuTech Services can help your organization approach green innovations in an organized, efficient manner. To learn more, give us a call at 810.230.9455.

b2ap3_thumbnail_byod_comprehensive_400.jpg

5 Ways to Get a Grip on Mobile Devices in Your Office

b2ap3_thumbnail_byod_comprehensive_400.jpg

Did you know that a whopping two-thirds of U.S. adults own a smartphone? This figure is still climbing and the presence of employee-owned smartphones has dramatically changed the face of office. Businesses that aren’t prepared for this major influx of devices are setting themselves up for some major problems.


Employees bringing their devices to work is an IT trend known as BYOD (Bring Your Own Device). In order to make mobile devices in the workplace work for you, you’re going to need to implement a comprehensive BYOD strategy. If you don’t, then your IT network will be a virtual Wild Wild West of sorts as different devices across the entire technology spectrum access your company’s sensitive data. If some of these devices contain malware or data is downloaded to an employee’s device, and the device becomes lost or stolen, you’d be toast. Crises like these can easily be prevented by having a solid BYOD strategy.

To be sure, the benefits of having mobile devices in the workplace make BYOD worth the effort; employees that use their own devices are more innovative, more productive, and are generally happier about their job. To take advantage of these benefits, you’re going to want to cover all of these bases with your company’s BYOD strategy.

  • Identify potential risks: Unsecured devices can easily contain viruses and malware, which can damage your system. Plus, an employee-owned device without privacy protections can pose the problem of hackers stealing the data on the device, which would essentially be stealing your data. By taking into account and protecting your network from every possible risk, you’ll be able to use mobile devices with confidence.
  • Define a clear BYOD policy: As is the case with any policy, the clearer you are, the better. A solid BYOD policy encompasses your entire IT infrastructure, along with every possible access point. Additionally, if you’re able to clarify your IT goals and what you’re looking to achieve with mobile devices, then you can draft a BYOD policy that can maximize these goals.
  • Consider regulations and compliance issues: If confidential information, like medical records, aren’t stored properly and get leaked by way of mobile devices, it can carry a hefty fine from laws like PCI and HIPAA. Concerning data of this sensitive nature, your BYOD policy needs to follow these laws down to the letter.
  • Keep track of used devices: Every device that accesses your network needs to be accounted for. For example, you can’t have random devices logging on, accessing files, and then disappearing with that information. If an employee loses a device with company information on it, or even sells it to a third party, then you would have no idea who would get to see your data.
  • Train your staff: When it comes to BYOD, educating your staff is key. If they’re on board with your BYOD policy and fully understand the ramifications of breaking it, then you will be able to rest assured that all of the devices popping up around the office are helping your organization, not hindering it.

As you can imagine, BYOD policies are not a one-size-fits-all policy for every business. Each business has different needs, IT goals, and security risks. Therefore, in order to get the most comprehensive BYOD strategy for your company, you’re going to want to consult with the IT professionals at NuTech Services. We know what questions to ask and what to look for in your IT network so that your organization can take full advantage of this trend.

Additionally, we have great tools at our disposal, like our mobile device management solution that can help you control what all of the devices are doing on your network, like adding permissions regarding which files these devices can access. To implement an airtight BYOD strategy for your business, call NuTech Services today at 810.230.9455.

b2ap3_thumbnail_backup_system_400.jpg

The Strict Security Measures of Nuclear Power Plants Can Benefit Your Business Too

b2ap3_thumbnail_backup_system_400.jpgTechnology, while a great asset that can be leveraged for your benefit, can also frighten businesses due to how unpredictable it can be at times. The constant threat of data loss, identity theft, and hardware failure can cripple your business’s ability to retain operations. Specifically, businesses can learn about risk management by analyzing the processes used by an industry where risk management is absolutely critical: nuclear power plants.

In the wake of two of the most destructive and violent nuclear disasters, nuclear power plants have begun to crack down on how they approach risk management. The Chernobyl incident of 1986, as well as the tsunami-induced disaster at Fukushima in 2011, are the only nuclear disasters to reach the peak of the International Nuclear and Radiological Event Scale (INES) at a rating of 7. This means that they had an immense impact on the immediate vicinity, as well as the environment on a worldwide scale.

The meltdown at Chernobyl was the result of an uncontrolled nuclear chain reaction, ending in an enormous explosion that resulted in fire raining from the sky and radioactive core material being ejected into the vicinity. A closer inspection of the incident revealed that the explosion could have been prevented, had the plant practiced better safety measures and risk management, like having a containment system put in place for the worst-case scenario.

In comparison, the Fukushima plant was prepared to deal with a failure of operations. The problem that led to a disaster was one which couldn’t possibly have been prevented: the 2011 Tōhoku earthquake and the resulting tsunami. The Fukushima plant had a contingency plan to shut down the plant in the event of a disaster, but of course, the tsunami prevented this from happening properly. Flooding damaged power lines and backup generators, which led to heat decay, meltdowns, and major reactor damage.

Disasters like these lead to professionals searching for ways to prevent emergency situations in the future. For example, the Fukushima incident kickstarted thought for how to prevent problems caused by the unexpected issues. In response to emergency power generators being flooded or destroyed, off-site power generation will be implemented as soon as November 2016.

One other way that nuclear plants have chosen to approach these new risks is by outsourcing this responsibility to third-party investigators, whose sole responsibility is to manage the reliability of backup solutions. In a way, these investigators function similar to a business’s outsourced IT management, limiting risk and ensuring that all operations are functioning as smoothly as possible.

What we want to emphasize to you is that businesses in industries of all kinds expect the worst to happen to them, and your business can’t afford to be any different. Taking a proactive stance on your technology maintenance is of critical importance. While your server that suffers from hardware failure might not explode and rain impending doom from the sky, or expel dangerous particulates into the atmosphere, it will lead to significant downtime and increased costs.

In order to ensure that your business continues to function in the future, NuTech Services suggests that you utilize a comprehensive backup and disaster recovery (BDR) solution that minimizes downtime and data loss risk. BDR is capable of taking several backups a day of your business’s data, and sending the backups to both the cloud and a secure off-site data center for easy access. In the event of a hardware failure or other disaster, the BDR device can act as a temporary replacement for your server. This lets your business continue to function while you implement a suitable replacement.

Plus, NuTech Services also offers a remote monitoring and maintenance solution that allows us to work just like the investigators who work for nuclear plants. We manage and maintain your IT in a way which is designed to detect and prevent major problems, allowing you to work unhindered. We can remotely administer patches and security updates to ensure the continued functionality of your hardware and software solutions.

For more information, give us a call at 810.230.9455.

b2ap3_thumbnail_chromecast_stories_400.jpg

Tip of the Week: 4 Google Chromecast Features that May Surprise You

b2ap3_thumbnail_chromecast_stories_400.jpgGoogle is known for coming up with fun new technologies that change the way society consumes entertainment and performs their day-to-day responsibilities. One of Google’s best new gadgets is the Google Chromecast, which can change the way you view media and share content while both at home and in the office.

Google’s Chromecast is a neat device that allows you to turn your television into a smart TV. Chromecast uses your WiFi network to stream content from the Internet to your TV. You can then use a mobile device, or any laptop or desktop that’s connected to your WiFi, to control the Chromecast. A Chromecast can even be used in the office to add a sense of flair to any room with a TV, and to make collaboration easier for presentations and other media.

Without further ado, here are four great uses for your Chromecast device.

What a Chromecast Can Do

  • Stream music: If you’re hosting a get-together at your home, the Chromecast lets you stream music directly to your TV. Apps like Spotify now work seamlessly with Google Chromecast, making it a great way to lighten up any situation. Plus, some smooth jazz or soothing music might be just enough to calm your staff or impress a prospective client who wanders into your office.
  • Stream video: Whether you want to stream a simple YouTube video, watch television shows through Hulu or Netflix, or watch a movie, you can do so with Chromecast. There are plenty of entertainment apps that are ready to use through Chromecast, so it’s only a matter of finding one you want.
  • View pictures: If you want to liven up your TV when you’re not using it to stream media or content, you can have it display backdrops in between sessions. The Chromecast pulls images from all sorts of online libraries, including NASA, 500x, and several others.
  • Mirror your device’s browser: Whether you’re using your Chromecast for entertainment or work purposes, you can mirror your device’s screen to your TV. All you have to do is open your Chrome browser and use the Chromecast extension to cast the screen. This is particularly useful for sharing documents or presentations.

There are countless other uses for the Chromecast, but instead of spoiling everything about the device, we think it would be fun for you to find them out for yourself. With so much entertainment and content at your fingertips, you’ll be able to spice up both your home life and your office.

Bonus tip: One of our favorite Chromecast apps is VideoStream, an extremely simple app that lets you drag video files to your Chrome browser and play them on your Chromecast-connected TV.

Do you have a Chromecast? What’s your favorite use for it? Let us know in the comments, and subscribe to our blog for more great technology-related tips and tricks.

b2ap3_thumbnail_man_in_the_middle_sphero_400.jpg

Man-In-the-Middle Attacks Find App Users Off Guard

b2ap3_thumbnail_man_in_the_middle_sphero_400.jpgThe Internet of Things is practically omnipresent in today’s environment, and many commercial products not only connect to the Internet, but they also come with an app. Due to this type of integration growing more popular, the world is starting to see Internet-connected products that really don’t have much to gain from their connectivity.

One such device is BB-8, a Star Wars-based droid toy built by Sphero. The toy isn’t much different from your typical Sphero toy, with the primary difference being that it’s painted after the insanely popular BB-8 droid from Star Wars Episode VII: The Force Awakens. It’s an app-controlled robotic ball that’s marketed to children who want to control their very own droid.

While this toy might seem to be irrelevant, it’s been reported that there’s an exploit which can hack into a BB-8 via its wireless communication systems. By injecting code into the smartphone controlling the droid, hackers can essentially control BB-8 through the phone, since it acts like a remote for the toy. This kind of hack is called a man-in-the-middle attack. In BB-8’s case, the hack is of little consequence, but man-in-the-middle attacks can be dangerous if targeting valuable information.

What Are Man-in-the-Middle Attacks?
In order to understand how a man-in-the-middle attacks works, let’s compare it to a traditional game that you may have played when you were a kid: “telephone.” One person sends a message and the recipient listens to it, but in the process of delivering the message, someone adds or omits an important part of the message. Just imagine that instead of the sentence, “Jane runs through the forest,” that the message that’s interrupted and manipulated is a customer’s credit card number.

Wireless systems have made it much easier to perform man-in-the-middle attacks, simply because wireless communications are subject to plenty of risk while in transit. This is why it’s especially important that your business implements security measures that can protect your data while it’s moving from one system to the next, be it from a smartphone to an in-house device, or an essential file from a PC to your server. You need to make sure that these commands are sent securely, and as accurately as the sender intended. Remote monitoring and management solutions can help your business by offering intrusion detection, along with several other protocols that work together to provide a comprehensive network security solution.

Attacks Require More Powerful Solutions
Wireless technology is extremely convenient at times, so much so that cumbersome, wired systems are waning in popularity. Despite this huge advantage, people still have to determine whether or not their wireless systems are secure from external threats. If their system security is subpar, there are plenty of solutions available that are capable of shoring up weaknesses for both mobile devices and PCs working on a wireless network. Unfortunately, all it takes is one seemingly inconsequential piece of technology to leave your entire network exposed.

This is where NuTech Services comes in. Our professional technicians can help your business improve its protection from Internet of Things threats. We can do this by performing a thorough analysis of your current IT infrastructure, your projected growth, and the current needs of your business. Together, we can keep your technology from going over to the dark side. To learn more, give us a call at 810.230.9455.

b2ap3_thumbnail_radio_narrow_band_400.jpg

A Look at the Glue That Holds the Internet of Things Together

b2ap3_thumbnail_radio_narrow_band_400.jpgWith millions of new and exciting devices connecting to the Internet every day, the Internet of Things is an IT trend that has the potential to dramatically improve society. Yet, the most significant change brought about by the IoT may actually come from devices that aren’t really that exciting.

Even though sexy devices like smartphones, smart cars, and smart homes are getting all the press when it comes to IoT, it’s the forgotten-about, behind-the-scenes devices which drive the IoT forward, like gas meters, water gauges, trash cans, soil moisture sensors, and more. Instead of having these devices be used to download the latest apps and post to social media, they’re primarily tasked with a singular purpose, like collecting and transmitting data so that work can get done more efficiently.

Devices like these actually present a unique technical challenge: how does one connect these devices to the Internet in such a way that little (if any) maintenance is required (like swapping out a device’s battery), and in locations without a reliable Internet connection? Having these devices achieve such requirements is necessary in order to enjoy the desired benefits. Otherwise, implementing small IoT devices on a wide scale wouldn’t be worth it, due to the expense of providing power, device maintenance, and Internet coverage to remote places. For example, installing an Internet-connected gas meter to a log cabin in the middle of the woods would prove most difficult due to poor 3G coverage, and it would be inconvenient to send a technician to service the meter. How then does one equip important IoT devices to hard-to-reach areas?

The answer lies in narrowband Internet of Things technology (NB-IoT), a development that allows for billions of obscure devices to be connected to the Internet, earning it the reputation by experts as “the glue that holds the IoT together.” NetworkComputing explains:

NB-IoT, originally called the cellular Internet of Things, is an emerging industry solution designed to enhance the global deployment of low-power wide area (LPWA) networks. Through licensed operator spectrum, in-band, guard band and standalone deployments, NB-IoT can provide connectivity to devices in hard to reach places without requiring much power to do so.

The ways that NB-IoT technology expands the IoT breaks down barriers and opens up a whole new world of Internet connectivity. Think for a moment about IoT devices in basements deep underground, or even attached to buried pipes, or about those on islands that lie beyond the services of normal infrastructure. NetworkComputing cites further examples:

This is where NB-IoT and LPWA technology come in, because they can provide a long-range mobile connection with low power consumption. This combination of connectivity and low-power needs means a utility company can install connected flow meters around a water distribution network to automatically detect leaks without worrying about whether or not the sensor will work.

This is just one example of how technology can provide organizations with new possibilities of productivity. At NuTech Services, we’re excited about how the IoT has the potential to dramatically change things, and with more than five million devices being added to the Internet every day, you’re going to want to fully leverage the IoT for your business. The best way to do this is to have a technology professional in your corner who has the know-how you need to succeed. Give us a call at 810.230.9455 and let’s discuss ways that technology can expand your business to new horizons.

b2ap3_thumbnail_animate_your_gifs_400.jpg

Tip of the Week: How to Make an Animated Image From Your Favorite YouTube Video

b2ap3_thumbnail_animate_your_gifs_400.jpgGIFs. What are they? If you’ve spent any time perusing the Internet, you’ve definitely come across a GIF or two. Essentially, a GIF (Graphics Interchange Format) is an animated picture that loops a few seconds of a video clip (without playing any audio). In addition to GIFs being fun, they can serve as a great way to enhance digital communications. How can you take advantage of GIFs?

Actually, GIFs can be shared easily enough. Regarding most forms of digital communication, you would download, upload, and share a GIF in the same way that you would with any digital image, like a JPEG and PNG file. It’s finding the perfect GIF, or making one, that takes a bit of luck and skill.

peak look down

Searching the Web for a GIF
You might be surprised to find out just how many GIFs exist on the Internet for your downloading pleasure. You can use Google Search to easily find the exact animated picture that you have in mind. To do this, simply type into Google’s search bar what it is you’re looking for and hit Enter. Next, select Images > Search Tools > Type > Animated.

From here, you’ll see a web page populated with relevant images. Note: you won’t be able to see what the animation looks like unless you click once on the image (be careful, clicking twice on an image will take you to the page it’s found on). To download the GIF for future use, simply right click it, and select Save image as… just as you would with any digital image.

Making Your Own GIF From YouTube
It’s astounding just how many GIFs there are on the Internet, but what if you can’t find the exact GIF you’re looking for? If this is the case, you can use a video clip posted to YouTube to make the GIF you need.

To do this, you’ll first want to go to YouTube and find a video containing the desired clip. Next, copy the URL of the video, located in either the form at the top of your browser, or below the video after selecting Share.

From here, go to gifs.com and paste the video’s YouTube URL in the provided form. Next, select Create GIF. This will take you to a new page displaying your YouTube video in what appears to be crude video editing software. As prompted by the text boxes, assign your GIF a title in the top form, and then move the slider to the spot in the video at where you would like your GIF to begin and end. You can also manually enter in the GIFs start time in the Start time form.

Next, you’ll want to select the duration of your GIF. By default, it will be set to five seconds, so be sure to adjust the clip’s time span more or less as needed. You can also fine tune the timing of your GIF even further by hovering over the Duration form and selecting the up and down arrows. If desired, you can also add captions to the GIF by selecting Add Caption to the left of the video and following the directions.

As you make adjustments to your video, you will see a preview of the GIF. Once you’ve got everything set to how you want it, select Create GIF. From here, Gifs.com will generate your file and take you to a new page displaying your GIF. To the right of the GIF is the GIF’s URL, file path (if you wish to download it and save it on your PC), and the embed code if you wish to add it to a website. You will also notice the various social media icons if you want to share your GIF creation over your favorite social media sites.

b2ap3_thumbnail_cloud_computing_lessons_400.jpg

3 Ways Businesses Can Get the Most Out of the Cloud in 2016

b2ap3_thumbnail_cloud_computing_lessons_400.jpgAs the cloud becomes widely adopted by SMBs the world over, companies have come to expect more from their cloud services. If you’re not taking full advantage of cloud computing, then you may be missing out on the many ways that it can help you meet your company’s goals.

According to Forrester Research, there are three goals in particular that the cloud can be leveraged for in order to enhance the operations of SMBs. Consider the following:

  • Decreased administrative burden: One of the biggest advantages of the cloud is its ability to outsource its required maintenance and management to someone outside of your company. Considering how stressed for time most managers are in SMBs, they will appreciate having yet one more responsibility taken off their plate. Think for a moment of all the other, more profitable things that your managers and IT team can do for your business if they’re not being bogged down by managing company files and software solutions.
  • Increased implementation speed: When a business chooses to implement a new solution, they want it ready to go as soon as possible. With the cloud, taking advantage of its many services is as easy as setting up an account for you and your team. Compare this to the effort it takes to install hardware and cables if you want to add a new solution to your in-house IT network.
  • Enhanced security, with minimal expense: Cloud security has improved vastly over the years, along with its affordability. When working with IT professionals like those at NuTech Services, you can protect your cloud offering with as little, or as much, security as you feel you need. This is yet another responsibility that the cloud removes from a manager’s plate.

The one thing that all of these benefits have in common is that they’re part of the public cloud computing option (which is different than the private and hybrid cloud options). While the hybrid and private cloud options have their own sets of benefits, the strength of the public cloud is that it provides organizations the most functionality, while only requiring a minimal amount of maintenance and oversight on behalf of you and your staff.

For the average SMB, the public cloud is the right fit, due to its ease of use. However, don’t let that discourage you from considering other cloud options. For example, a private cloud option is best for a business dealing with sensitive data, like health care records or credit card information. Additionally, the private cloud is good for businesses that have an adequate amount of capital on hand they can use to purchase in-house IT equipment.

At the end of the day, what it comes down to is going with a cloud solution that’s the right fit for your company. After talking with the IT professionals at NuTech Services, you may even decide that the hybrid cloud option is the right fit for your business (which combines the features of both the private and public cloud offerings). Whichever cloud computing option you go with, NuTech Services is here to help with its implementation and maintenance. To go with a cloud computing option that will be utilized to the fullest, give us a call 810.230.9455.

b2ap3_thumbnail_remote_working_400.jpg

3 Technologies That Will Give Your Remote Workers the Edge

b2ap3_thumbnail_remote_working_400.jpgMore businesses than ever before are finding value in allowing their workers to work from the comfort of their own homes, rather than have them drive all the way to the office to do a job that can be done from anywhere with an Internet connection. More importantly, it’s much more cost effective for businesses to allow for remote workers. How can you make it as easy as possible for remote workers to get their jobs done?

Wait, why would you want to let your employees work from home in the first place? A lot of it has to do with cutting utility costs and other expenses, like hardware purchasing and energy expenses. If your team isn’t in the office, you can save on electricity and (depending on your location) heat or air conditioning. Plus, when employees feel good, they’re more likely to work hard, improving the quality of their work.

Here are three technologies that can help your remote workers get the most out of their workday.

Virtual Private Networks (VPNs)
One of the most common problems for remote employees is that they need to access files that are stored locally on their company’s network. Since these employees aren’t based out of the business’s office, they won’t be able to access them in the traditional method. This can prevent them from doing their jobs properly, especially if there are critical files that need to be used for their daily tasks. A VPN allows your remote employees access to files on the company network securely. This helps to ensure that your team stays productive, without compromising your data’s security.

Cloud-Based Applications and Virtualization
The cloud allows for information and applications to be deployed via the Internet, which means that anyone with a stable Internet connection can access files or applications necessary to complete their day-to-day tasks. The cloud, in general, is a handy tool that can help you minimize your in-house IT footprint and improve data deployment, allowing your team to work from anywhere in the world that has an Internet connection; including on the road or on business trips.

Voice over Internet Protocol
Communication is yet another pain point that remote workers have trouble with. If your team needs to make frequent outbound calls, you want them to have a phone number that can be tied to your business. Furthermore, if you need to contact someone on your remote team, you expect them to be available through email, instant messaging, or via phone. With a Voice over Internet Protocol (VoIP) solution, you can transfer your voice over the Internet, essentially providing instantaneous communication via both voice or video chat.

Ultimately, it’s your responsibility as a business owner to provide your team with the tools required to perform their daily duties, even if they work remotely. If your business is trying to achieve better operations via a remote workforce, contact NuTech Services, we can help! 

b2ap3_thumbnail_windows_10_pin_400.jpg

Tip of the Week: How to Add a PIN to Your Windows 10 Login

b2ap3_thumbnail_windows_10_pin_400.jpgThe fact that so many businesses are rushing to take advantage of two-factor authentication displays how the password has lost its edge as a security credential. Passwords simply aren’t good enough anymore, and hackers are always finding ways to crack even the most complex passwords. This is why many businesses are looking to improve security through alternative means.

Windows 10 has a built-in PIN system that helps to keep your workstation secure from would-be hackers that want to take advantage of a simple password. Here’s how to set up your PIN, as well as how to change it or reset it if need be.

Why Bother with a PIN?
Using a PIN offers several benefits over traditional password security. For example, Windows 10 uses your Microsoft account password to access your PC. If this password were to be obtained by a hacker, they could access your other Microsoft accounts. If you’re using a PIN to access your PC, the PIN is specific to the device. This makes it less risky to use a PIN than a password.

Adding the PIN
First, click on the search bar at the bottom of the screen and type Settings. Select Sign-in options in the left column, and scroll down to the PIN section in the right column. Next, select Add. You’ll be prompted to verify your password, so just enter your current credential into the form and click OK.

Once you’ve finished that, you’ll be taken to the Setup a PIN page. Now, all you have to do type out your PIN in the provided forms. While the only criteria for creating a PIN is that it needs to be at least four characters long, and no more than nine characters long, a simple PIN is easy to guess and could be almost as bad as not having a PIN at all. Be sure to keep these tips in mind when selecting your new PIN:

  • The longer the PIN, the better the security: You’ve heard all about how using a complex password is a best practice, and the same can be said for your PIN. Make it as long as possible– this makes it more difficult for hackers to guess.
  • Refrain from using PINs from other accounts: Everyone has credit cards that they use a PIN for, but these numbers shouldn’t be used for every single account you have. You should have individual PINs for each of your different accounts. Otherwise, one compromisation could lead to multiple breaches.
  • Use as many different numbers as possible: In much the same way that a password should contain variable letters, you want to stay away from short PINs with largely the same number.

Changing or Resetting Your PIN
To change your PIN, you’ll need to go back to Settings > Accounts > Sign-in options. Tap Change underneath PIN, and you’ll be taken to the Change your PIN screen.

If you simply need to reset your PIN, you can do this easily enough. Just click I forgot my PIN next to the Change button, and you can reset your PIN. Keep in mind that you’ll need your current account password to do so.

For more great tips, be sure to subscribe to NuTech Services’s blog.

b2ap3_thumbnail_baseball_hacker_400.jpg

Baseball Executive Pleads Guilty to Hacking Rival

b2ap3_thumbnail_baseball_hacker_400.jpgIT can be like baseball. When a team is up to bat in a game of baseball, the team at bat is allowed to keep two coaches on the field. They are called the first base coach and the third base coach. While both coaches’ responsibilities mostly have to do with baserunning, the third base coach also takes on the responsibility of relaying “signs” from the manager in the dugout to the batter at the plate.

buck ib 1

These signs represent orders or suggestions from the manager, who is in charge of implementing the strategy each pitcher or batter throughout the baseball game. The third base coach is just an intermediary. He relays the orders to the batter, and it’s the batter’s job to execute the direction that’s given. Each team will try incessantly to steal the other team’s signs, as doing so will give them a distinct advantage on the field of play. For instance, if a hitter somehow was tipped off that the pitcher will be throwing a curveball, there is a better chance the player will let the pitch go by because it’s hard to throw a curveball for a strike, and even harder to hit a curveball.

What does this have to do with IT? It suggests just how much your competition gains from having information about your company; the information that only you should have access to. While “sign-stealing” on the diamond is looked on as gamesmanship, stealing information over your business’ network is a crime (or at the very least unethical), and should be thwarted if at all possible. The former scouting director for the St. Louis Cardinals is finding that out the hard way.

Christopher Correa, the former scouting director for the St. Louis Cardinals has plead guilty to five counts of unauthorized access to a private computer for using a former employee’s login information to access a Houston Astros’ secure database that was filled with data that could provide useful information. Correa had accessed both employee emails and the team’s database to gain information, an action that he admitted was, “stupid,” to U.S. District Judge Lynn Hughes.

Correa, who accessed information mainly to gain a competitive advantage over a rival team, was fired from the St. Louis organization after his improprieties came to light. Ironically, Houston, who had been playing in the same division with St. Louis since 1994, moved to the American League before any of these hacks had taken place.

Correa’s former boss, and current Astros General Manager, Jeff Luhnow is likely the “Victim A” from the indictment, and the likely owner of the passwords that Correa used to access the Astros’ system. Luhnow seemingly used the same credentials to sign into the Astros’ environment as he did when he handed over his laptop and password to Correa when he left to take the GM job in Houston in 2011. Luhnow made the following statement:

“I absolutely know about password hygiene and best practices. I’m certainly aware of how important passwords are, as well as the importance of keeping them updated. A lot of my job in baseball, as it was in high tech, is to make sure that intellectual property is protected. I take that seriously and hold myself and those who work for me to a very high standard.”

In this case, however, Luhnow seemed to be lacking somewhat in his conscientious efforts to protect his organization’s intellectual property by using the same credentials he was using while a member of the St. Louis staff five years prior. When someone leaves your company, especially if he or she is leaving for a competitor, it’s important that you get all the credentials that they used to access all data systems. Conversely, when someone joins your company, it’s important to make sure they understand your organization’s cyber security protocols, to keep you from having to deal with data breaches and other situations that may put your business at risk.

Network security, including password management and intrusion detection are essential for every business that doesn’t want to their network hacked by their competition, or by random hackers out to make a quick buck. For more information about the best practices for comprehensive network security, or to talk with a technician about the options we offer to help you protect your network, call us today at 810.230.9455.