walk_with_vr_400.jpg

How Virtual Reality Could Help Paraplegics Walk Again

walk_with_vr_400.jpg

Virtual reality is a major contender for the next big technology to hit the business industry, and it’s been able to accomplish what modern neuroscience could not. In the medical sector, virtual reality has been tested on paraplegic patients in attempts to help them walk again using brain-controlled robotic limbs. However, these innovations have yielded unexpected, astounding results.

The project, called the Walk Again Project, was first introduced in 2013. Scientists from all over the world have gathered to help paraplegics walk again through the power of technology. The study examined eight patients who had been diagnosed as being entirely paraplegic; as in, they can’t move or feel their legs at all. The project involved several simulations that featured the use of a haptic feedback device, which issued sensory feedback to the patient when their thoughts translated to movement.

The first experiment they performed consisted of using a brain-machine interface therapy combined with virtual reality. The patient wore a device that sent brain signals directly to an Oculus Rift (a commercial VR headset). On the device, the patient would see themselves walking. The other type of therapy used involved a robotic walker to assist with walking therapy. The patient was suspended over a treadmill while their legs were controlled by the robot. This activity was sent to a computer where the data could be analyzed.

The most interesting method of therapy involved the use of robotic legs to send brain signals directly back to the patient. The legs utilized electronic sensors that were placed at key locations along the leg. These sensors sent signals to the patient and offered stimulation to the user whenever their legs were supposed to be moving.

Thanks to the ongoing brain machine interface therapy, the patients found that they could sometimes feel–or even move–their paralyzed limbs. In particular, the treatment improved bladder and bowel function, which is a significant first step toward providing some semblance of autonomy back to those who suffer from paraplegia. The treatments were so successful that in many cases the doctors changed their diagnoses to only partial paralysis.

Though scientists still aren’t sure what has caused this development, it’s thought that it could be the first step toward discovering a way to completely restore mobility to those who suffer from paraplegia. Technology has given these victims a second chance, and it’s one that can (hopefully) improve their lives.

What do you think about this development? Let us know in the comments, and be sure to subscribe to our blog.

best_practices_for_security_400.jpg

Tip of the Week: 5 Steps You Can Take to Foil the Plans of Hackers

best_practices_for_security_400.jpg

Hackers have the ability to cripple systems and steal important (or sensitive) data, and if you’re not careful your business could become their latest victim. Here are five ways that you can make it more difficult for hackers to infiltrate your systems and steal your data.

Protect Important Security Credentials
Hackers naturally target the credentials of important figures within an organization. This could entail stealing the usernames or passwords from someone who has access to crucial, mission-critical information, like the administrator of your IT department or your business’s C-Suite staff. Therefore, it’s important that you ensure these credentials are protected by encryption, and that they’re as long and complex as possible. If you store them anywhere, it should be in an encrypted password manager, where only they can access them.

Restrict Admin Access
Similar to the above point, you want to restrict access to certain locations of your network on a per-user basis. This means keeping the average joe from peeking at information like financial credentials and personally identifiable information, among other things. The fewer people who have access to important information, the less likely it is that this data can be stolen. Therefore, your users should have access to only information that they need to do their jobs properly, and nothing more.

Augment Password Security with Best Practices
If you’re using a password manager, you can implement all sorts of password best practices to further augment your organization’s security. For one, password managers make it so that you can feasibly use different complex passwords for every single one of your online accounts. This is important, seeing how long, complex passwords that utilize upper and lower-case letters, numbers, and symbols are very difficult to remember on their own.

Cut Down on Shadow IT
Hackers love to take advantage of forgotten-about technology solutions to infiltrate networks. While you might be patching all of your organization’s crucial software solutions, you might be neglecting that open source word processor that an employee downloaded one day. You should emphasize to your team that if they need a solution to do their job properly, they should go through the proper channels (like through IT or management) before implementing an unapproved solution.

Train Your Staff on IT Best Practices
While it’s helpful that you understand IT best practices, this can only get you so far. You should make IT security a part of company culture by thoroughly educating your staff on how to stay safe online. Teach them what to do if they suspect that they’ve been hacked, and help them avoid dangerous threats, including malicious links, spam phishing attacks, and unsolicited email attachments.

To learn more about cyber security, reach out to NuTech Services at 810.230.9455.

fbi_encryption_400.jpg

According to FBI Director, Privacy is a Misnomer

fbi_encryption_400.jpg

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

Do you remember the controversy concerning Apple and the FBI? It was a case that swept the country and encroached on unprecedented ground. The FBI demanded that Apple release information on how to unlock an encrypted iPhone that was connected to a terrorist attack, but Apple chose to vehemently refuse the FBI, stating that it would be endangering the entirety of their consumer base by doing so. The FBI threatened Apple with lawsuit after lawsuit, but in the end they were able to unlock the device without Apple’s help.

The popular trend of providing mobile devices with encryption has led to increased complications during investigations, and Comey chose to clarify the Bureau’s stance on the privacy of the typical American citizen. While there has to be a reasonable expectation of privacy in houses, vehicles, and even mobile devices, Comey claims that these expectations can reasonably be revoked in a court of law. He says: “With good reason, the people of the United States–through judges and law enforcement–can invade our public spaces.”

This statement prompts yet another question: how does a personal device qualify as a public space? According to Comey, a mobile device actually can be considered a public space: “Even our memories are not absolutely private in the United States,” Comey said. “Even our communications with our spouses, with our lawyers, with our clergy, with our medical professionals are not absolutely private. Because a judge, under certain circumstances, can order all of us to testify about what we saw, remembered, or heard. There are really important constraints on that. But the general principle is one that we’ve always accepted in the United States and has been at the core of our country: There is no such thing as absolute privacy in America. There is no place outside of judicial authority.”

Additionally, Comey made sure to point out that the FBI has no business telling American citizens how to live and govern themselves, and that the tech companies don’t either. You might recall the open letter that many tech companies addressed to the the FBI last April, demanding that the government cease issuing mandates that would require tech companies to provide encryption keys for their software.

It’s natural that these Silicon Valley giants don’t agree with Comey. In fact, there are even those amongst his peers who don’t believe he’s right on the matter. Nuala O’Connor, the President and CEO of the Center for Democracy & Technology, as well as the first Federal chief Privacy Officer for Homeland Security, is one of them. She says, “He could not be more wrong on encryption.”

O’Connor is hardly the only one of his contemporaries who disagree with Comey. Two other notable former government officials had something to say about the FBI’s stance on encryption, and they both spoke at the RSA Cybersecurity Conference. Former Department of Homeland Security Secretary Michael Chertoff claims that forcing Apple to provide software that can hack into an encrypted iPhone would be like “creating a bacterial biological weapon.” Similarly, Mike McConnell, a former Director of National Intelligence, claimed that “ubiquitous encryption is something the nation needs to have.”

This isn’t a problem that only technology companies have to deal with. It’s something that all users of smart technology (and most technology in general) have to endure. After all, any rulings in favor of the FBI’s stance could be detrimental to user privacy. For example, in the case of Apple creating a software that can crack their iPhone’s encryption, what would happen if this software were stolen and exploited by hackers? It would become a major problem, just like the NSA’s surveillance vulnerabilities that were stolen and sold on the Black Market just this past summer.

In light of Comey’s response, what are your thoughts on the FBI’s stance on encryption? Do you think that government agencies have the right to access devices, despite invading the privacy of its citizens? Do you think that this “greater good” argument holds water? Share your thoughts in the comments.

education_smartphones_400.jpg

How One Major Government Department is Revamping Its IT Infrastructure

education_smartphones_400.jpg

After implementing their current infrastructure for almost a decade, the U.S. Department of Education have plans to upgrade, directing their attention toward ensuring that the new initiative keeps mobile capabilities as a high priority.

The current infrastructure, EDUCATE (Education Department Utility for Communications, Applications, and Technology Environment) was the first to move away from an IT environment owned by the government and operated by contractors, to one that’s owned and operated as a service by the contractor–in this case, Perot Systems.

Perot won the contract bid in 2007 for $400 million, and has since provided comprehensive managed service solutions to the Department of Education. Now, however, the Department is ready for a change.

Jason Gray, Chief Information Officer for the Education Department, cited the numerous changes made to IT technologies and capabilities since EDUCATE was implemented in 2007 (when he announced that there was interest for new proposals), as well as changes to goals shared the Department of Education.

The objectives of the new infrastructure, dubbed PIVOT, or the Portfolio of Integrated Value-Oriented Technology, were described in a request for information (RFI) distributed to potential providers. The new infrastructure should, according to the RFI, encourage innovation, optimize the cost to benefit ratio, and show flexibility to make integrating changes in requirements simple. As part of the new initiative, each aspect of the infrastructure (like oversight, hosting data, printing, network services, technical management and integration, and mobile services) will have its own contract written up.

Most of all, however, the Department of Education wants to focus on the mobile capabilities of their solutions. The RFI predicts a shift from a permanently established office space to an increased utilization of teleworking and hoteling (where workers gather temporarily in a shared space) as a result of the National Strategy for Reducing the Federal Government’s Real Estate Footprint. This would cause a shift of over 6,200 users away from an office environment, certainly achieving the objective of the National Strategy.

Migrating technology into a new workspace or implementing mobile and teleworking solutions clearly takes considerable planning, and in such cases, it’s best to consult with an expert in the field. NuTech Services has the experience necessary to ensure that your IT initiative goes off without a hitch, and that your solutions are optimized for maximum performance. Give NuTech Services a call today to see what we can do for your solutions for a lot less than $400 million.

android_doze_400.jpg

Tip of the Week: Use Android Doze to Help Save Battery Power

android_doze_400.jpg

How often have you grumbled as you’ve reached for a charger at 2 in the afternoon as your smartphone clings to its last moments of life? If you’re anything like the typical user, quite often, but Android has attempted to reduce that number with the Android Doze feature.

Doze accomplishes this by disabling an application feature known as a wakelock. These wakelocks keep the device from entering its energy-conserving deep sleep mode, as deep sleep can interfere with some applications and functions.

While wakelock was originally intended to allow fitness trackers and similar applications to continue functioning with the screen deactivated, app developers began to apply wakelock to all of their applications, whether they needed it or not. This is precisely the reason that many apps are notorious for being battery-killers–we’re looking at you, Facebook.

So, the useful functionality of wakelock was spoiled by these app developers, essentially eliminating the power-saving capabilities of deep sleep mode. However, the implementation of Doze looks to fix all of that. By disabling wakelocks and network access after the phone hasn’t been used in a while, Doze prevents applications from pointlessly draining energy while still allowing these apps to update during periodic “maintenance windows.”

Android has even enabled users to customize their Doze settings, so that a user can dictate which apps are affected by the feature. To access this customization:

  • Open Settings.
  • Navigate to Battery.
  • Select Battery optimization from the Menu button.
  • Select All apps from the top-of-screen drop-down menu.

Doze will automatically set almost all of your applications to optimize your battery by default. If there is an app, however, that you need to have connected, you can always switch the setting to Don’t optimize for that app in particular.

Doze even has third-party apps designed to customize its functionality even further. With apps like Doze Settings Editor, a user is able to set Doze to turn off when a phone moves a certain distance–but only if the phone is running Android Marshmallow.

With all of this additional battery life available, do you think you’ll ever have to worry about missing an important call or notification? Let us know in the comments.

windows_10_kindle_fail_400.jpg

Latest Windows 10 Update Has Kindle Users Feeling Blue… Screen of Death

windows_10_kindle_fail_400.jpg

Have you have recently plugged in your Kindle and received a blue screen of death? Many Kindle users have found that Windows 10’s anniversary update is creating an issue in the way that Kindle transfers books and charges via a USB connection. Some users are reporting that connecting a Kindle to a Windows 10 device will cause the device to lock up and display Windows’ infamous blue error screen before rebooting.

Users who have experienced this issue have taken to the Microsoft support forums hoping to find a way to resolve this issue. Unfortunately, what happens seems to vary by the user–some claim that the problem is rooted in the anniversary update, while others seem to think that it’s due to the pre-release software testing service Microsoft Insider.

The fallout of the issue also seems to vary. Some reports claim that the device can be restored to normal functionality after the reboot, but the problem comes up again with the next reboot. Some users have found that leaving their devices asleep as they plug in their Kindle can prevent the error from happening. Yet, even this doesn’t prevent the crashing, as many users report that the issue happens regardless of what they do.

All of these issues are in response to what users did to troubleshoot their own individual problems, yet nothing that they did could resolve them, despite elements like the USB cable being used as variables.

Worse yet, this isn’t the first problem that Microsoft has had to deal with since they released Windows 10’s anniversary update. While the update brought an enhanced usability and interesting new features, it also brought a bug that has led to some Windows 10 users being unable to use their webcams.

So far, neither of these issues have been resolved, though Microsoft claims that the webcam fixes will be available in September. In regards to the Kindle issue, there have been no hints as to how long these issues will persist. Kindle users may have to avoid causing the blue screen error in the first place, and tolerate the problems until the official fix is issued.

For the latest tech news and tricks, subscribe to our blog.

cloud_migration_initiatives_400.jpg

3 Lessons We’ve Learned for a Successful Cloud Migration

cloud_migration_initiatives_400.jpg

If you’ve recently decided to implement cloud computing for your business, then we commend you. You’ve chosen to use a powerful and dynamic solution for your computing needs. However, choosing to use the cloud and actually implementing the cloud are two entirely different monsters. Now that you have your sights set on the cloud, what do you have to do to get your infrastructure ready for migration?

The first thing you need to know is that a cloud migration is much more involved than moving a file from one location to another. We’re talking about your entire data infrastructure getting migrated to a new location in the cloud. This involves a lot of prep work, not unlike moving all of your belongings from your home to a new house. The better prepared you are for the move, the smoother the transition, and the lower the probability that you’ll misplace important items of value.

ITProPortal provides some insight into what migrating properly to the cloud takes: “It involves a complex infrastructure migration process. Good preparation is the key to success. Those organizing the migration process should ensure that all data is ready for the move and that the company network has the necessary capabilities to interact with the cloud.” This is the biggest reason why you want a qualified professional to assess your IT infrastructure before you start your move to the cloud.

Consider these aspects of cloud migration before making the big move:

Sort and Label Your Files
Over the many years you’ve been in business, your organization has collected countless files and documents. It’s crucial that you take the time to determine which files are worth saving and moving. Otherwise, you could waste valuable time and resources moving files that you no longer need, which could drag out the migration process.

Prepare Your Network Infrastructure
Cloud migration may come with changes that need to be made to a network infrastructure. In general, when migrating to the cloud, you need to consider two major additions; setting up a direct Internet breakout in order to distribute traffic across external networks, and multiple firewall instances in order to secure the various Internet connections.

Have a Migration Timetable
Even the most thorough planning for a cloud migration can yield results that take weeks or months to fully realize. Therefore, you need to provide your staff with an accurate timetable for the transition to ensure that their workflow isn’t disrupted. One way to do this is to plan for how user settings are migrated, like profiles, address books, calendars, and so on. To help with this, ITProPortal advises: “Instead of moving all their data to the cloud, more and more companies are opting for a hybrid solution. This means that some users and storage locations stay with Exchange on-premises, while the rest move to the cloud.”

Once all of your data is successfully migrated to the cloud, you’ll want to focus on security, archiving, and data backup to ensure that you’re ready for anything. NuTech Services is happy to help your business with

wifi_is_dangerous_400.jpg

Tip of the Week: Why You Should Be Wary of Using Public Wi-Fi

wifi_is_dangerous_400.jpg

Wireless Internet connections, often referred to by the moniker Wi-Fi, have become a popular offering from public businesses. Even organizations that have no real need for an Internet connection to conduct business, like restaurants and coffee shops, now offer Wi-Fi for their customers. However, public Wi-Fi can be dangerous, especially for the business professional.

The biggest problem, however, is that most people who use public Wi-Fi are fully aware of the risks, yet, still continue to use it. The Identity Theft Resource Center claims that 78.5 percent of users who connect to free Wi-Fi understand that there are major risks involved, and only 26.7 percent use a VPN to keep themselves safe. Free Wi-Fi is dangerous, and we’ll show you how using a series of examples.

Anyone Can Access It
Unless the Wi-Fi router is protected with a passcode, chances are that the network is vulnerable to hacking attacks and other threats. Even then, if the router isn’t configured properly, the passcode doesn’t necessarily help. Since anyone can access it at their leisure, nothing is stopping a hacker from connecting to the router and spying on others who might be connected to the network.

It’s worth mentioning, although we use the term ‘hacker,’ even a mischievous child with a bit of curiosity and know-how could get access to your files if the connection isn’t secure.

Free Wi-Fi is Highly Used
This goes without saying, but the more people who use an Internet connection, the lower the quality of the connection, and the more likely it is that a hacker will be on it. Hackers know that free Wi-Fi draws crowds, so they use the search for the convenience to find new targets for their treachery.

Data Isn’t Encrypted
You can think of encryption as an extra layer of protection for any data that’s sent to and received from the Wi-Fi connection. When routers have encryption, hackers have a more difficult time stealing data of substance.

What You Can Do
While unsecured public Wi-Fi routers aren’t something that you have direct control over, you can certainly take steps to be mindful of using them when you’re out and about. Here are three best practices for avoiding a potentially risky Wi-Fi network in a public place.

  • Only connect to networks that require security codes.
  • Set your phones and devices so that they don’t automatically connect to any new Wi-Fi network.
  • Use a virtual private network (VPN).

If your business needs its employees to stay safe while on the move, reach out to us at 810.230.9455. We’ll help your team understand the best way to work around potentially threatening situations.

deployment_of_nsa_malware_400.jpg

Exploits From the NSA are Now on the Black Market

deployment_of_nsa_malware_400.jpg

If you panic in the event of a hacking attack, imagine how the National Security Agency (NSA) feels knowing that some of its exploits are for sale on the black market. While there isn’t any proof that the NSA has been breached, there’s evidence to suspect that their exploits are available for purchase on the black market. This means that a willing hacker could get their hands on government-grade hacking tools–a dangerous concept.

Granted, there’s no proof that the tools are legitimate exploits used by the NSA, and they certainly won’t admit to being hacked. Yet, some security professionals hint that the hackers might actually be telling the truth this time. Researchers have found sample files provided by the hackers to contain some legitimate exploits that could realistically be used to launch hacking campaigns. In fact, some of the stolen exploits take advantage of widely-used security services and firewall solutions, which could be used to infiltrate countless infrastructures around the world.

The hackers responsible for this crime claim to have stolen the exploits from the Equation Group, which is a cyber espionage organization that supposedly has ties to the NSA. The Equation Group is most notorious, perhaps, for their probable role in the development of the Stuxnet computer worm and other advanced malware. The group of hackers who stole the NSA’s exploits–aptly titled the Shadow Brokers–desire to auction the exploits to the highest bidder on the black market.

More specifically, the exploits for sale target the firewall technology of some big names in the cyber security industry, such as Cisco, Juniper, Fortinet, and Topsec (a Chinese brand). Despite suspicions, many security professionals are labeling the code as legitimate, and one has even managed to confirm that one of the exploits uses an IP address that’s registered to the United States Department of Defense. However, rather than the exploits being stolen directly from the NSA, it’s thought that they were discovered on another system that the NSA was in the process of monitoring and that the hackers stole the code in order to turn a profit off of it.

These hackers are currently selling the exploits on the black market in exchange for Bitcoin, but even if they were to receive a value proposition, who can say if it’s likely that they’ll actually hand over such valuable information? There are some researchers who believe that it’s nothing more than an elaborate scam, primarily due to the fact that the NSA hasn’t confirmed any affiliation with the Equation Group or the exploits. Perhaps the Shadow Brokers aren’t telling the truth, but either way, we can expect some dire consequences of such powerful exploits being leaked to the world.

The Shadow Brokers have claimed that they will publicly expose the exploits if they can acquire one million Bitcoins, which presents an interesting (and terrifying) gambit; what would happen if these exploits were to be made public? Hackers around the world would be able to exploit government-grade malware for espionage and network infiltration. It’s a nightmare just waiting to happen.

What are your thoughts on this development? Let us know in the comments.

is_there_good_stress_400.jpg

4 Reasons Why You Should Quit Stressing Out About Stress

is_there_good_stress_400.jpg

Stress is a natural part of the workplace. It’s almost impossible to make it through the workday without getting stressed out about at least one thing or another, especially when you’re a business owner. In these stress-filled circumstances, it’s important to remember that stress isn’t always a bad thing; it has some redeeming factors that are often lost amongst the cacophony of shuffling papers and constant phone calls.

However, this needs to be mentioned before anything else; stress created for the sole purpose of being stressed cannot possibly become a good motivator. Inc states that “stress that comes from not having enough information or that’s based on an irrational fear is a poor motivator.” Therefore, it makes the most sense to keep stress to a minimum whenever possible, as there’s no good reason to be stressed out all of the time. Remember, stress without control can be dangerous, and you can’t let it take over your life.

That being said, there are some benefits to be gained from the occasional bout of stress. Here are four of them.

Stress Provides a Much-Needed Energy Boost
We often think of stress as a draining factor that can sap energy right out of you, but it’s hard to argue that a sense of urgency comes from being in conflict with something or another. You’ll notice that you’re more aware of your surroundings, and you actually have the energy required to complete your work.

Stress Proves that You Do, In Fact, Care About the Project
If you’re stressed out about a certain project, at first you might hate yourself for it. You might fool yourself into thinking that you don’t care how it turns out, and that you just want to get it done. This is actually the opposite of what’s really happening. If you’re stressing about the project, you care about its outcome. Otherwise, why would you be stressed? Make this connection yourself and you can harness the frustration and channel it into energy.

Stress Teaches You to Enjoy the Times You’re Not Stressed
Imagine working outside in absurdly hot weather, under incredible physical duress and on an empty stomach. You then walk into an air-conditioned home with a delicious meal waiting for you on the dinner table. Working with stress can be absolutely awful, but it will teach you to enjoy the little things in life that much more.

Stress Inspires Quick Action
Stress is something that literally nobody wants to deal with, so naturally, people will move toward a solution in order to absolve themselves of the pain it brings. This doesn’t mean that you should make stress to create that sense of urgency; rather, you should think of the stress as an unfortunate advantage, like falling out of an airplane and into a giant pit of pillows.

Despite its advantages, stress is still something that must be properly managed if you want your team to succeed in their endeavors. One of the main reasons why employees might be stressed in the workplace is thanks to using outdated or dysfunctional hardware and software solutions. Think about it; if you weren’t able to work in multiple browser tabs at once, or open your mission-critical apps, you would probably be in a tight spot, and may actually begin to feel stress.

NuTech Services’s managed IT services can make it so that you never have to feel stressed about your technology or IT budget ever again. To learn more, reach out to us at 810.230.9455.

double_search_tips_400.jpg

Tip of the Week: 3 Expert-Level Search Tips to Help You Find Exactly What You’re Looking For

double_search_tips_400.jpg

These days, being able to find the exact information you need online is a valuable skill. However, sometimes a website’s search capabilities aren’t robust enough to be of much use. For this week’s tip, we’ll show you how to combine a website search feature with your browser’s search tool so you can easily find exactly what you’re looking for.

To begin, let’s go over one of the most valuable tools for online searching, quotation marks. If you need to locate a specific phrase, then enter it into a search engine like Google Search and bookend the phrase with quotation marks. Google will then show you results meeting your criteria exactly, word for word, instead of giving you a bunch of random results pertaining to each individual word of the phrase (which would be the case if you didn’t use quotation marks).

While using a major search engine like Google Search to find what you’re looking for is one thing, using the search feature of an individual website is completely another. For example, not every website allows you to use quotation marks to narrow down a search within its pages.

If you run into this problem, try instead using the website’s search feature to look for one of the two keywords, like “email,” and then use your browser’s search function to search for a second keyword, “hosting.”

To access your browser’s search function, simply select Ctrl+F. A drop down menu will then appear where you can enter the second word you’re looking for. Next, hit Enter and the browser will automatically highlight every instance of the second word you’re looking for that’s located on the open webpage.

When these two searches combine, you’ll essentially be able to weed through all the irrelevant search results provided by the website and use your browser to find exactly what it is you’re looking for.

Another Way to Search: One way that you can skip having to use a website’s search tool altogether (and keep in mind that not every website offers a search tool) is to search the content of an individual website using Google Search.

To do this, type into the Google Search form “site:” followed by the website URL, minus the “http://” and the “www.” Following this entry, add what it is you’re searching for. So the form should read something like this:

site:website.com email hosting

Add Quotation Marks: To help narrow down your search even further, Google allows you to search individual websites this way and use quotation marks so you can find an exact phrase. For example, site:website.com “email hosting” will provide much more specific results than site:website.com email hosting.

Ultimately, utilizing Google this way may be more effective than combining the website search and your browser search as previously suggested. Although, you’ll still want to keep this double search tip in mind for when you do use a website’s search tool and find that it’s not working for you. Also, keep in mind that not every website makes its content available to Google Search; using a website’s search tool for a site like this will yield results that Google won’t.

If you’ve found this tip helpful, let us know in the comments and check back with NuTech Services’s blog every week for more great tips!

windows_10_black_hat_400.jpg

According to Hackers, Windows 10 Security Passes the Test

windows_10_black_hat_400.jpg

Windows is perhaps the most common workplace computing tool, and hackers have been trying for decades to uncover holes in its security. In some cases, like with unsupported operating systems, they’ve succeeded. However, Microsoft’s latest addition to their OS family, Windows 10, seems to have exceptionally potent built-in security measures, many of which have the hackers at the Black Hat conference scratching their heads and scrambling to find threats to talk about.

During Black Hat, the annual hacker convention in held in Las Vegas, Windows 10 was lauded as perhaps the most secure Windows operating system in decades. It was agreed that Windows 10 is much more difficult to break into than its older brethren, but like any software, nothing is impossible with enough funding and research. The Black Hat presenters discussed potential ways that Windows 10 could be hacked, and how Windows 10 makes it more difficult for attackers to breach its systems.

Windows 10 Uses Built-In Anti-Malware Tools
Windows 10 has what’s called the Antimalware Scan Interface (AMSI), which is designed to identify and capture malicious scripts in its memory. Your applications can access the information stored in the AMSI, and can use it to protect your systems. For example, Windows Defender and AVG use AMSI. The primary reason why the AMSI is a huge problem for hackers is because most of their attacks utilize some sort of script. Of course, the AMSI is a valuable tool, but it still needs secondary security protocol (like antivirus or remote monitoring and maintenance) to keep your network safe. While it’s great for detecting scripts executed in PowerShell (since PowerShell records logs), it still requires someone to regularly monitor the logs in order for it to be most effective.

Active Directory
Active Directory has long been a critical part of how Windows administration works, and recent innovations have allowed for the management of workloads through the cloud and identity and authentication management on in-house networks. Microsoft Azure puts Active Directory to good use, allowing for quality security for any Azure-based cloud platform. The problem with AD, though, is that any user account can access it unless the administrator has limited these permissions. Your IT administrators need to restrict access to AD and control authentication procedures for it.

Virtualization
Virtualization-based security features a set of protocols that are built into the hypervisor of your Windows 10 OS. Basically, Hyper-V can create a virtual machine that stands separate from the root partition. This machine can then execute security commands as needed. Hyper-V creates a machine that can’t be compromised, even in the face of hacking attacks that target the root partition. It’s a way to minimize the damage done by data breaches, but it only works if the credentials aren’t found in the root partition. IT administrators, therefore, need to ensure that these systems cannot be compromised.

Eventually, there may come a day when Windows 10 experiences a dangerous flaw that’s exploited in the wild. Hackers are always trying to undermine security measures, but Microsoft engages these attacks with patches of their own, so it’s an endless cycle. Hackers will inevitably find ways to crack Windows 10’s innate security, so it’s your responsibility to complement your OS’s security with your own solutions.

To secure your business’s devices, reach out to us at 810.230.9455.

secure_mobile_payments_400.jpg

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

secure_mobile_payments_400.jpg

Payment via mobile devices is still a relatively new concept. With newer smartphones, it’s now easier than ever to pay your bills or send money on a whim. However, this also brings up an important topic; what’s the best way to handle mobile payments, and how can those who accept and process these payments ensure maximum security?

The answer might lie in two-factor authentication.

Specifically, MasterCard wants to introduce biometric-based two-factor authentication to its system, starting with the UK this summer. The technology discussed is a “selfie” based system that allows users to take a picture through an application, which is then compared to an image stored. The idea is that selfie-authentication, and other methods of biometric technology like fingerprint scanning, can help to prevent credit card fraud.

More than anything else, MasterCard is attempting to limit how many legitimate transactions are being declined while users are traveling abroad. Apparently, this is a bigger problem than actual credit card fraud. As reported by The Financial Times, there’s roughly $118 billion worth of false declines every year, which is considerably more money lost than is the case with credit card fraud–13 times more, to be specific. By using biometrics technology, MasterCard is looking to handle both the fraud and false decline problems.

Of course, the question that needs to be asked is whether or not these technologies are secure for users. Phones, tablets, and other mobile devices can be hacked just as easily as any desktop infrastructure. ITProPortal offers some insight into what will be necessary for mobile payment systems to take off:

“User devices are notoriously prone to penetration by cyber criminals – whether that’s as a result of users adapting their devices or overriding device security parameters, or using unsecured public WiFi when transacting online. Which means biometric data will need to be encrypted to ensure it cannot be stolen – otherwise we open a whole new vector for identity theft. What’s more, rigorous PCI standards already exist to protect users and merchants, especially where liability is concerned should things go wrong. What’s not clear in this scenario is whether liability will shift – and to whom. Quite simply, we’re in new territory here.”

What’s most interesting here is the liability aspect; if a user isn’t securing the mobile device used for payment, can they be considered at fault for the theft of their data? If so, it completely changes the way that financial institutions and payment compliance works. Also, what happens if biometrics are hacked? You can’t exactly issue a new face or a fingerprint with a new credit card number. These are critical possibilities that need to be addressed before biometric two-factor authentication for mobile payment systems can be implemented.

What are your thoughts on mobile payment authentication using a selfie-based system? Let us know in the comments.