cloud_solutions_business_400.jpg

How to Get the Right Cloud Solution for Your Business

cloud_solutions_business_400.jpg

As technology has become a greater part of today’s working environment, the need for a business to have somewhere to procure the requisite devices from has increased. This is why many businesses serve as vendors, the go-between for the producers of these devices and the businesses looking to purchase them. For obvious reasons, these vendors are essential to the success of many businesses.

There are a few kinds of vendors, offering various things to businesses like assorted supplies, equipment, and services. One kind of vendor that has grown increasingly crucial in particular, is that which delivers cloud services to businesses. Due to the expansion of the cloud’s utility in all kinds of business purposes, the choice of a vendor has also expanded in importance.

How to Select the Right Vendor, for Cloud Services and Otherwise
This is going to require some preemptive research and consideration of your own goals. Once you’ve determined your priorities in both the short and long-term, you and your IT resources should examine your available options to see which vendor is most compatible – and that’s in more ways than one.

Not only should your vendor offer what you need at a reasonable rate, there should be some consistency in the goals that your organization and theirs have. You also need to be able to trust your vendor to attend to the services agreed upon, whether that’s a managed agreement or a simple equipment procurement.

How Cloud Services are Different
However, your vendors for your cloud services should be held to a somewhat higher standard – after all, your data is going to be at stake. Therefore, it is important that they be graded differently than your other vendors would be.

Before committing to a cloud service provider; or a cloud strategy in earnest, there are two considerations that must be examined. First, what data is your vendor going to be able to access, and second, what applications can your vendor access as well?

After this initial consideration, you need to also take other factors into account, like how business-critical a said process is, how compliant they are to certain policies, and how much risk is involved in a given action. From there, you can establish if a particular cloud vendor is a good fit or not.

At NuTech Services, we can technically be considered a vendor ourselves, as we provide our managed services to other businesses. As such, we’d like you to consider us a candidate for your IT needs. Give us a call at 810.230.9455 for more information.

google_account_important_400.jpg

You’ll Be Glad You Protected Your Google Account

google_account_important_400.jpg

Computer users today more than likely have a Google account, either for business or personal use. Not only is it accessible and convenient, it offers a versatile assortment of features. Regardless, no amount of accessibility, convenience, or versatility are worth your security. However, many users put precisely that, their security, at risk… often without even realizing it, or why this is such a big deal.

Today, we aim to fix that. We will review why a Google account is so important to keep secure, as well as a few means and methods of doing so.

How a Google Account Can Be So Valuable
The purpose of the Internet has evolved greatly in the relatively few years it has been around. Today, the Internet is largely used as a communications and information sharing tool – true to its roots. This is where the name Internet comes from: inter (reciprocal or shared) and network (a system of connected things). However, as new purposes for the Internet emerged over time, circumstances changed, and the view of the Internet shifted.

The Internet was always meant for sharing information, from the very first inklings of an idea. In 1962, J.C.R. Licklider of MIT wrote up a series of memos that illustrated a system of interconnected computers, intended to share programs and data the world over, that he coined the “Galactic Network.” This idea of sharing information was also the driving force behind Sir Tim Berners-Lee’s development of the World Wide Web. As Sir Berners-Lee said:

“Had the technology been proprietary, and in my total control, it would probably not have taken off. You can’t propose that something be a universal space and at the same time keep control of it.”

In many ways, these ideals are retained in today’s environment. Online sharing is at its peak, social media and collaboration fulling leveraging a network that is, for the most part, still free of control by any central source. These are ideals that have developed into the demand for net neutrality and open-access information. However, while these ideals have been largely upheld, there are a few notable caveats that give us a more accurate view of today’s Internet.

As the Internet grew in capability, it also grew in utility… many of which featuring the need for greater security and privacy. With the confidential information that only select users should be accessing growing in popularity within Internet-based communications, this spurred a balance to the Internet that both individuals and businesses can appreciate, and that Google has shaped its offerings around.

From its beginnings as a dissertation project by two Stamford doctorate students, Google has grown into the dominant force online today. Businesses use its G Suite applications every day, as private users leverage some of their other services to their own benefit. Many people, both for business and personal use, leverage Gmail. Let’s face it, Gmail is just useful, whether you use it for work, or just maintain an account to open accounts with other web services.

It is this last point that makes your Google account’s security so important to maintain.

How many of your online accounts are accessible by Google? On the subject, how many of your accounts would be compromised if your Google account was first?

The Impact
This is the double-edged sword of a Google account. On the one hand, it only makes sense to use a Google account to create others, either using your associated Gmail address or linking it directly. The convenience is inarguable, and Google does equip these resources with reasonable security standards. So why not use a Google account?

Unfortunately, there’s one critical consideration that doing so adds into your security equation, that many overlook:

Linking an account to your Google account ties your Google account’s security to it directly.

This means that, if your Google account was to be compromised, all of the accounts you had connected to it are also compromised by association. Depending on what you had saved in this way, that could have some devastating ramifications.

Finding Out How Devastating
If you’re on your desktop right now, you can access your Google account by clicking here. In the Security section, you can review all the devices that your Google account has been active on, all the third-party applications with access to your account, and all the websites that are utilizing Google Smart Lock.

Is this list longer than you would have expected? Does it include your bank?

If it does, all it would take for someone to defraud you would be to access your Google account–or even lock you out of your own bank, resetting your bank credentials by using your Gmail account to activate an account recovery process.

A Solution
Again, this creates a conflict between two priorities: convenience against security. While the convenience could make anything that you use online more efficient in both your professional and personal life, nothing is worth compromising the security of either. So… where do we stand?

Like any conflict between two interests, the ideal place to meet is in the middle. In this case, it is the conclusion that you can have the best of both worlds–you just have to make sure that your Google account is secured properly.

While it would be great if there was, there just isn’t an option somewhere in Google you can select to make everything perfectly secure, just like that. Having said this, it is just a matter of taking a few precautions.

Securing Your Google Account
The first thing to securing any account is to understand that it isn’t a one-time activity and will need to be revisited periodically to make sure that everything remains secure. You should keep an eye out for news stories that discuss breaches among any of the organizations you have an account with, as you will still need to alter your credentials for these accounts.

Once this is set, there are a few best practices that it would be in your best interest to follow.

Passwords and Account Security
While all of your accounts should have the protection of a strong password, the fact that your Google account serves as a repository for your others make it only more crucial to implement one to its authentication measures. To accomplish this, make sure the password or passphrase you select is well in keeping with best practices, and that your Google account is the only account secured with it.

You should also be careful about what you are using to access your account. Any device that is available to the public should be avoided, as they are not only magnets for viruses and other digitally-based cyberthreats, but a cybercriminal could potentially retrieve your credentials from the device you used and thereby gain access to your account. Public Wi-Fi signals can have very similar issues, so use a secured, private connection whenever possible.

Two-Factor Authentication (2FA)
There is also the option to make your Google account ask more of someone trying to access it, a secondary code sent to you in a text message, delivered in the Google Authenticator application, or dictated through a direct call to your mobile device. By enabling 2FA, you can greatly decrease the likelihood that a cybercriminal will have everything they need to get in, assuming they don’t have access to your phone as well. We generally recommend that you utilize Google Authenticator, as it is the most secure of those three options.

You can also use your Google account to access a list of one-time authentication codes that you can print out and keep with you. This way, if you need to access your account and don’t have your phone handy, you can reference these to get in. If you run out of codes or lose the list, you can easily reset them and start over.

To set up these features, log in to your Google account.

At the end of the day, you don’t have to sacrifice the convenience of Google, as long as you have protected it responsibly. NuTech Services has the expertise to help you manage this security, as well as the rest of your business’ IT solutions and infrastructure. Call 810.230.9455 to learn more.

kyt_pdf_400.jpg

Know Your Tech: PDF

kyt_pdf_400.jpg

For computer enthusiasts one of the major questions has always been Mac vs. PC. Most people prefer one over the other, while some are fine using either. The problem with having two popular non-compatible computer systems is that they each use proprietary file types. For documents, the answer was developed by Adobe: the PDF. Today, we’ll take a look at Portable Document Format.

The Development of the PDF
The PDF is best known for promoting the sharing of information as it was created. A PDF looks the same whether it is in digital format or if it is printed to paper, no matter what OS is being used. Before this format was created, sharing information between the two was extremely difficult, but in 1990, Adobe co-founder John Warnock wrote a paper titled A Camelot Project, in which he described the limitations of sharing information. He would go on to found Team Camelot, the group of software developers that created the PDF, a file that can be universally shared across all computing platforms.

At first, however, it held very little utility as users had to purchase Adobe Acrobat in order to use the file type. Team Camelot, however, built additional functionality as the Internet got more popular, and as its utility increased, it was eventually adopted by the International Organization for Standardization and opened up to the masses.

Advantages of the PDF
Nowadays, there are multiple types of PDFs, and their utility is tied to their makeup. The types are as follows:

  • Digitally Created PDFs – PDF files created in a digital environment, whatever that environment might be (Windows, Mac OS X, Linux, Android, etc.). These PDFs are fully customizable and editable.
  • Scanned PDFs – A Scanned PDF is effectively an image of a document. They are not inherently customizable, but there is software that can be utilized to change that.
  • Searchable PDFs – Thanks to Optical Character Recognition (OCR) software adding an editable text layer to an image layer, a PDF becomes searchable. This process enables greater interaction with PDFs like this. In a document management system, many document scanners come with the kind of software users need to convert a scanned PDF into a searchable PDF. As such, it is a core component of a paperless office.

PDFs have shown to be extraordinarily useful for businesses. They are convenient to use, universally compatible, and can be extremely secure.

For more great technology information, return to our blog regularly.

an_it_christmas_2.5_400.jpg

An IT Christmas Carol

an_it_christmas_2.5_400.jpg

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

Scrooge, not missing a beat, and never altering his demanding demeanor, laid the responsibilities that were, up to last month, Jacob’s, at the feet of poor old Bob; with, the expectation that Bob would be able to produce more. Bob was ever the diligent worker, and he never complained, regardless of how much unwanted attention and responsibility was forced onto him. As the holidays approached, Bob was looking forward to the respite from work, even if it was for a day. He was going to spend time with his family. You see, Bob’s daughter Grace fell ill and since Scrooge didn’t believe in offering benefits, the burden of keeping her well fell on Bob’s shoulders.

Just as he did the best that he could for Scrooge, he did the best that he could for his family. The problem was that Christmas is tomorrow and there has been no mention of him getting the day off. At about 1 p.m., after he had eaten the soup his wife had made (the same soup he had been eating for five consecutive working days), he went to Scrooge.

“Mr. Scrooge, I was wondering if I could have the day off tomorrow for Christmas?”

“No, Bob,” Scrooge answered immediately, “We just can’t afford it if you missed any time. It’s not fair or convenient to the business for you to miss any time.”

“But Mr. Scrooge,” Bob pleaded, “My wife is making a roast and I am hosting Christmas.” He went on to observe that it was only one day a year.

“Bah! Humbug.” Scrooge crowed, “It’s a poor excuse for picking a man’s pocket every twenty-fifth of December! You’d better be here in the morning, or you can find yourself another job.”

Bob, not wanting to put his job in jeopardy dejectedly answered, “Yes, sir.”

Bob went back to work and toward the end of the day, Scrooge emerged from his office, put on his coat and meandered over to Bob’s desk with a box. He stopped, placed the box on the desk and placed his hand upon the box.

“Bob,” Scrooge started, “I was thinking about your request for time off, and I wanted to tell you that since Jacob left, we just can’t have anyone missing any more time, so just tell your family to come after you get out of work.” Bob was upset, but said nothing.

“I’m headed to my club, I need you to stay tonight and install this new router.” Scrooge tapped the box, “I’m having trouble streaming in my office and want this installed and working before you leave for the day.”

Without saying goodbye, the old miser walked out the door and shuffled up the street toward his car. Bob felt crestfallen. He knew his brother and his family would be at the house when he got home, but not wanting to disobey Mr. Scrooge’s demands. He stayed until just after 8 p.m. making sure that the router was installed properly and that it did, indeed provide Mr. Scrooge’s office with the wireless signal he demanded.

After he finished with the router, he locked up the office and meandered down the street toward his car. Since Scrooge has kept both parking spots in front of the office for himself, Bob had to walk a half a mile to the parking garage. As he made his way there he went into the store to buy his family their Christmas roast. Knowing he wouldn’t be around to enjoy the company of his loved ones, he could at least get a beautiful roast.

He started pricing the meat and realized that he couldn’t afford a roast that was big enough for eight people. He checked his balance, and when the numbers came up on the screen he felt like he wanted to cry. He picked up a small roast and a large chicken, paid, and left for his home.

When Bob got home, his entire family was there. The sadness he was feeling melted away and the Christmas spirit that had escaped him returned with aplomb. His brother’s family had arrived a few hours before and so, after tucking their children in for Christmas, the adults sat around the Christmas tree telling stories and laughing, stuffing stockings, and putting out gifts. Bob didn’t know exactly how to explain that his boss wouldn’t give him the day off, but waited to reveal this sad truth for after the pleasantries of the evening were finished.

As he got ready for bed he shared the news with his wife.

“That Scrooge is a real piece of work,” his wife proclaimed.

“He’s a real piece of something,” Bob returned.

The couple talked about it a bit more, said goodnight, and went to sleep.

—-

Scrooge, was sitting alone, as was his custom at a table in his club’s bar. His scowl was a solid deterrent to keep people away. He sipped his scotch and water and sat there watching the television that was mounted above the bar. The financial news was on. As the stock prices raced by and the attractive, yet muted 30-something gave the audience the recap of the money that had been made and lost during the day’s trading, his concentration was broken.

All of a sudden a man was standing, drinkless, in front of his table. “Hello Mr. Scrooge.”

“What?!” the ill-tempered codger snapped.

“Merry Christmas.” the man said joyfully.

“Bah!” Scrooge responded sharply.

“My name is Fred Rappuhn, and I’m with NuTech Services, and it’s come to my attention that your IT administrator, Jacob, is no longer with your company. I was wondering if you had a few minutes to talk about how my company can help you manage your…”

Scrooge responded, “Let me stop you before you go any further. I wish to be left alone. I don’t know how you know my business and I don’t care, I’ve got it handled.”

The conversation went on like that for a few minutes and Fred Rappuhn left his card on the table and wished Scrooge a merry Christmas. Scrooge predictably scoffed at the sentiment. In solitude he finished his drink, paid the bill with no tip, and left the club.

When he got home, he locked the door behind him and put on his dressing gown and nightcap. Just as he was getting comfortable in his bed, he heard a tapping, which he ignored. A minute later a banging came from the front room. He got up to investigate, grabbing his cane. Discovering nothing, he returned to his bedroom, only to find Jacob sitting at the small writing desk he had up against the far wall.

“What the hell are you doing here?!” Scrooge said aggressively.

“I’m not here, Mr. Scrooge. I’m not. I am a figment of your imagination.” Jacob stated matter-of-factly.

Scrooge charged at him and swinging his club to accost the intruder only served to break the lamp on the desk.

“How now!” said Scrooge, “What do you want with me?”

“Much” Jacob replied, “but first I have to see that you believe in me.”

“Believe in you?” Scrooge said, “Humbug, I tell you! Humbug!”

Just then Jacob let out a wail that got Scrooge’s attention. He then asked Scrooge to check his account balances, and after a little back-and-forth, Scrooge placated the spectre. The look on Scrooge’s face was of pure terror.

He began to plead, “Mercy, dreadful apparition, why do you trouble me?”

“Your life is tied to your business, Scrooge, but your repulsive avarice has left you exposed; left it exposed.”

Jacob walked up to a terrified Scrooge. “Hear me! Tonight you will be haunted by three spirits.”

“Three spirits?” Scrooge asked, terrified.

“Yes, without their visits you can’t expect to understand the danger your belligerence has caused.”

Just then, the room was silent. Scrooge was horrified. He turned every light on in his house and turned on the television. After at least an hour of trepidation, he finally started to get tired, and even though his home was lit up like a jack-o-lantern on Halloween, he dozed off on his sofa.

—-

“Wake Up!” the spirit shrieked.

Scrooge arose from his peace-less slumber quickly and alertly. He took a swipe with his cane, but was rebuked by the large ethereal man standing before him. The ghost was around six-foot-four, but had a golf shirt embroidered with Scrooge’s company’s logo on it tucked into a pair of khakis. Its hair was seemingly an ethereal mist that looked like there was smoke coming up from his glasses. His eyes were ominously white behind thick black glasses.

“Are you the Spirit, sir whose coming was foretold to me?” Scrooge asked.

“I am. I am the Ghost of Christmas Past.”

“Long past?” asked Scrooge who was trembling with fear.

“No, man, your past,” the spirit returned

The spectre put his hand on Scrooge’s reluctant shoulder and led him to the door of his home. Instead of opening the door, they traveled through it only to find on the other side a vision. The vision was of Jacob talking with Bob. They were talking about how Jacob had went to Scrooge, and asked him to consider getting on a firewall installed on the business network.

“You would have thought I asked him to go steady,” Jacob started, “He screamed at me and told me that if I don’t do my #$%^*& job and stop coming to him for money, I won’t have a job to come to.”

“I remember that. He was asking for too much money!” Scrooge said defiantly.

The spirit said nothing and put his hand on Scrooge’s shoulder again. They walked back through the wall they had just come through and this time it was a school. It seemed to be sometime in the 1960s. There was a little boy who was trying to open a padlock with paperclips.

As the lock sprung open, Scrooge growled, “Tommy Hulse!”

The boy opened the locker that was being protected by the padlock and took out a small bag.

“It was him!” Scrooge screeched. He got emotional and explained that he had brought his dad’s watch into school the day before Christmas and he had kept it in the bag. When he returned to the locker that day, it was open and his father’s watch was gone.

“I bet he skinned your hide,” the spirit said arrogantly.

Scrooge, despondent, looked at the spirit, “He died soon thereafter.”

“My time is running short, Scrooge. Let us go,” the spirit said, as he put his hand on his shoulder and walked through the wall.

He was back in the front room of his house. No one else was there. He called out to the spirit but nothing answered. Just then there was a banging coming from the bedroom. He went to investigate and there was a larger spectre standing in front of his bed.

“Scrooge!” the new ghost bellowed. Scrooge turned around and shut the door, only to turn around to see the giant ghastly man. This spirit was nearly seven-feet tall, his head was covered in a hood. He couldn’t make out any of his features, except two glowing eyes that seemed to puncture a hole through him.

“Scrooge! I am the Ghost of Christmas Present.”

“No! No more hauntings!” Scrooge plead. The ghost lifted his right arm and snapped his ethereal fingers. The snap was the loudest noise the miser had ever heard.

Scrooge, who had closed his eyes to avert his gaze from the newest spirit, opened them and found himself alone in a dark room.

‘Where am I?” Scrooge called out. No answer.

He noticed a light coming from an adjacent room. He made his way toward it. As he entered the doorway he could see the ghost standing over what looked to be Jacob, his former IT administrator. Jacob was typing at a computer.

‘Come, Scrooge,” the spirit said in his baritone tenor.

Scrooge walked over and looked on the screen. It was indeed Jacob, he was typing in a chat on his computer. He began to read:

When I bailed on old man Scrooge, I left a hole in the network. Tomorrow, I am going to go in and put this ransomware I just purchased. When he gets back from his Christmas break, he’ll have a surprise waiting for him.

“What is this? What is ransomware?” Scrooge asked the spirit timidly.

“I can’t tell you that, but I can tell you that it is not good for you or your company.” The ghost replied.

“Tell him to stop! Tell him to stop!” Scrooge began pleading.

“No one can hear you, Scrooge.” The spirit said as it walked out of the room.

Scrooge followed, but as soon as he got into the next room, there was no one there. He turned around and seemed surprised to be in his office. He walked through his office door to see the spirit standing over Bob’s desk. Bob was sitting at his desk working away, gently sighing every once in a while and checking his phone repeatedly. All of a sudden his desk phone rang.

“Hello.” Bob answered.

“Merry Christmas to you too…Mr. Scrooge needed me to work today, so I am…Well I have my brother and his family…She’s doing well…It’s okay…I’ll think about it…Have a merry Christmas.” Bob hung up the phone and went back to doing what he was doing.

“He’s a good worker.” Scrooge admitted to the spirit.

“You just couldn’t give him the day off for Christmas?” the spirit asked directly.

“I…I…We’re so short-staffed as it is…” Scrooge stammered. Bob’s cell phone rang.

“Hey…What?!…I’ll be right there,” Bob stood up with a panicked look on his face. He put his coat on and walked out the door without turning his computer off.

“Where is he going? Where is he going, spirit?” Scrooge plead.

The spirit again snapped his fingers and the pair were standing in the waiting room of a hospital. Bob was standing at the desk filling out paperwork. A doctor came up to him and started to talk. Bob’s face succumbed to the pain of the situation.

Scrooge started in, “What is it? What has happened? Tell me what has happened, please?”

The ghost looked at Scrooge with his searing red eyes and said, “His little girl is ill, Scrooge. I’m sure you knew that.”

“Yes…Yes, but what has happened to her?”

The spirit lifted his arm again. SNAP.

The pair were on the front lawn of Bob’s house. A car pulls into the driveway. Bob’s wife got out of the passenger seat. She had clearly been crying. Bob got out of the front seat and made his way around the car. His wife muttered something to him while he opened the back door of the car. Bob lifted his tired and weak daughter out of the car seat and followed his wife in the house.

“Not very Christmasy,” the tall spirit said, mocking a relieved Scrooge.

Before Scrooge could say anything else there was a huge bang and he was back in his home. Feeling tired and emotional, Scrooge sat down on the settee in his front room. He sat there in contemplation for a few minutes. He was worried about the virus that Jacob was going to unleash, he was worried about his business, and about Bob and his family. He realized that he hadn’t treated these people with a lot of respect. Just as he was coming to the conclusion that he had to do something about it the room filled with a blinding light.

Scrooge couldn’t see a thing. All of a sudden there was a high-pitched scream that startled him further. He started to plead:

“Please spirits, no more! I have learned the errors of my ways! No more, I beg you!”

A silhouette emerged in the light.

“Come,” it screeched.

Witless and afraid, Scrooge complied. The spirit was no more than a shadow that moved independently through the ether like bolts of lightning.

Scrooge followed the spirit into the light and emerged in front of a Best Buy. There were giant “Christmas Sale” banners hanging from above the revolving doors. Scrooge walked into the store where he was confronted by himself. He was wearing a Best Buy shirt and tan slacks, staring aimlessly across the vast expanse of the retail establishment.

From the side he spotted Bob walking up to his likeness.

“C’mon Scrooge, get to work,” Bob said as he walked by future Scrooge. He was older than he was by a few years and looked malnourished and feeble.

“No! This can’t be! I am an old man. I cannot work retail!”

As future Scrooge made his way toward the warehouse modern Scrooge followed. Two younger workers were standing near the loading dock as the Scrooges approached.

“What’s the matter, Grandpa? Don’t remember where you should be?” one of the young men said as the other laughed.

Scrooge looked around helplessly as the two younger men continued to snicker and jest.

Just then the light returned, covering everything. It brought Scrooge to a grave marked “Here Lies Scrooge”. Sensing his mortality Scrooge began to wail:

“Stop! Spirit, no! Oh no! Your nature intercedes for me, and pities me. Assure me that I yet may change these shadows you have shown me, shadow! I will live an altered life!”

The light returned and Scrooge woke up. He wasn’t on the settee or in the front room, but his bed. He leaped from the sheets.

“I don’t know what to do! I am light as a feather, I am as happy as an angel, I am as merry as a schoolboy, I am as merry as a drunken man. Merry Christmas to everybody!” Scrooge cried laughing aloud. Without getting dressed he grabbed his coat and rushed out onto the street. Dawn was just breaking. He saw a young man walking on the sidewalk, he stopped him and asked, “What’s to-day?”

“Why today is Christmas, sir!” the young man replied.

“It’s Christmas day? Of course. Merry Christmas to you my fine fellow.” Scrooge said with enthusiasm.

“A merry Christmas to you, too, sir,” the man replied and walked on.

Scrooge, went back in his home and started making calls, the first call he made was to Bob, telling him to take the day and spend it with his family; and, that he was going to get a significant raise. The next call was to Jacob, who didn’t answer, but Scrooge left a voicemail that said he was sorry and would like to make it up to him. Finally, he called NuTech Services’s Fred Rappuhn to tell him that he would be happy to learn more about how he could keep his IT safe and make his business more efficient.

From all of us at NuTech Services, we’d like to wish you a very merry Christmas and the happiest of holidays!

google_play_removes_infected_400.jpg

Infected Applications Removed from Google Play Store

google_play_removes_infected_400.jpg

We all download apps. There are literally millions of apps to choose from and sometimes nefarious developers can get their application published with ulterior motives. A situation has just happened as Google has removed twenty-two apps that were found to contain automated click-fraud scripts from the Google Play Store. We’ll take a short look at what these developers were up to, and how the fraudster would affect you if you were one of the two million users that happened to download these apps.

What Apps?
First, we’ll start with a complete list of the apps that had been infested with this nefarious code:

  • Sparkle FlashLight
  • Snake Attack
  • Math Solver
  • ShapeSorter
  • Tak A Trip
  • Magnifeye
  • Join Up
  • Zombie Killer
  • Space Rocket
  • Neon Pong
  • Just Flashlight
  • Table Soccer
  • Cliff Diver
  • Box Stack
  • Jelly Slice
  • AK Blackjack
  • Color Tiles
  • Animal Match
  • Roulette Mania
  • HexaFall
  • HexaBlocks
  • PairZap

What Did These Apps Do?
SophosLabs found a cache of apps that feature what they call “Andr/Clickr-ad” malware. These applications are engineered with maximum flexibility in mind. They could contact a common attacker-controller server to download what is called an ad-fraud module. It does this every 80 seconds. The malware simply opened a non-visible window and would repeatedly click on ads, making the network look like it was getting more traffic, fraudulently enhancing the developers’ revenue.

No specific ad network was specified by Sophos, but users who had downloaded these applications would see a decrease in the battery life and/or an increase in the amount of data their device would use. One strange part of this is that some of the ad traffic was able to identify itself as from coming from iPhones, despite this appearing on Android-only apps. They came from “Apple models ranging from iPhone 5 to 8 Plus and from 249 different forged models from 33 distinct brands of Android phones.” This ploy was used as a way to increase revenues further as some advertisers will pay a premium to get their ads onto Apple devices. iOS versions of the apps, largely by the same developers, didn’t have the malicious code integrated.

Download Legit Apps
How can you go about making sure that you aren’t part of this problem? Download legitimate applications. Some of the best ways to make sure the apps you are downloading are legit, include:

  • Read a lot of reviews – Much of the information you will need to see the legitimacy of an application can be found in the review of the app in the store. If you make a point to read eight or more reviews, you will quickly get a good idea about how functional the application is.
  • Check app permissions – Applications need permission from a user to use the core functions of the phone. If the application in question tends to need access to functions that it shouldn’t, you should be skeptical about the application.
  • Check the terms and conditions – Most people don’t go through the terms and conditions of anything, let alone an application for their smartphone. Even if you do make a point to read them, the amount of legalese found is akin to a lullaby or a warm glass of milk. The problem for users is that there is a lot of good information about the applications, and specifically how it uses data. If you do set aside some time to read about it, check out some language that is relevant to the way you use the application.
  • Research the developer – Nowadays, software development is filled with people that are looking to make a name for themselves. This type of ambition can lead to bad decision making. If you take some time to do some basic research about the developer of an app you have reason to question, you’ll likely find the truth of whether they can be trusted or not. If they want to be known, they likely promote their work via social media, so, start there.

Android has millions of legitimate applications on the Google Play Store, so worrying whether or not you’ve downloaded one that will put your data at risk shouldn’t be too worrisome as long as you stick to our best practices. To learn more about technology, security, and mobile strategies, call NuTech Services today at 810.230.9455.

how_to_find_lost_phone_400.jpg

Tip of the Week: Locating a Misplaced Smartphone

how_to_find_lost_phone_400.jpg

The great thing about smartphones, in a business sense, is how portable they are – you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen – and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of NuTech Services.

it_wish_list_400.jpg

Your IT Wish List: How to Improve Your Business

it_wish_list_400.jpg

The holiday season is upon us, and with it comes the spirit of gift giving. Your IT department would certainly appreciate receiving a few gifts of their own to dabble with over the next business year. We’ve compiled a list of the best technology you can get your IT department to save them both time and resources.

Wish One: Security Awareness
Some IT professionals feel like their job never ends, particularly in the realm of cybersecurity. They might feel that training employees to be aware of their actions is an uphill battle that just never stops. Increasing awareness of security is one of the key roles that an IT department plays for your organization, and if you can make their lives easier by shifting any of this responsibility from them, they’ll greatly thank you for it.

Wish Two: More of the Cloud
The cloud is a great way for organizations to get more out of their technology as it allows them to access services that might be exceptionally time-consuming to manage in-house. Saving this time is something that your IT department would relish, as they likely have their hands full with their current responsibilities. The cloud alleviates many of these pains, as it improves operations by enabling your business’ employees to access solutions on any device they want. The cloud gives your organization the opportunity to eliminate waste and deliver assets in a much more convenient and accessible way.

Wish Three: Improved Working Relationships
IT often has to deal with much more than just keeping your business running; it also involves communicating with other workers in your office. To put it in simple terms, the IT department is going to be on the receiving end of all your employees’ frustrations. You can give your IT the gift of a policy in which they must hear IT out. This gives them the ability to learn a little bit about the process, and it could potentially save several contacts with the IT department, meaning more time for them to spend on other initiatives. An outside perspective is helpful for helping people understand each other.

Does your business need the gift of managed IT? NuTech Services can help. To learn more, reach out to us at 810.230.9455.

smart_phones_hot_400.jpg

Powerful Smartphones That are Currently On the Market

smart_phones_hot_400.jpg

With the new innovations made to smartphones every year, you’d be hard-pressed to understand how the global smartphone has hit the skid. While Apple and Samsung sit pretty with large market shares, manufacturers that we’ve come to expect near the top of the smartphone market: Blackberry, HTC, and Nokia are but bit players. Their largest competition is now coming from Chinese companies Xiaomi, Huawei, and OnePlus.

Many of the largest-growing smartphone manufacturers set their eyes on untapped markets in Africa, the Middle East, and southeast Asia. Regardless, the smartphone market has now showed negative growth for four consecutive fiscal quarters and the manufacturers are feeling the heat. The new flagships show off how the world’s most successful smartphone manufactures plan on altering their market’s forces. The new flagships include:

Apple iPhone XS Max
The world’s most profitable company’s newest flagship smartphone looks a lot like last year’s, but there are some major upgrades made to this year’s version that you may not be able to miss out on. The iPhone XS Max features Apple’s new A12 Bionic chip that improves device performance by 15 percent and a vastly-improved neural engine that accelerates machine learning on the device.

The newest iPhone has a 6.5-inch edge-to-edge display built on an aluminum chassis. The back of the device is all glass and comes with two separate 12-megapixel (MP) cameras. There is a single 7 MP camera on the front. The iPhone XS Max’s Battery is a 3,174 mAh that has an endurance rating at 78 hours. With a hefty price tag of $1099.99, consumers are paying a premium price for a premium device. It is available on all major carriers in Pace Gray, Silver, and Gold.

Specifications
Build – Stainless Steel with Glass Front/Back
Display – 6.5” Super AMOLED with ~458 ppi
Chipset – Apple A12 Bionic
Memory – 4GB RAM
Storage – 64/256/512 GB
Software – iOS 12/iOS 12.1
Cameras – 12 MP (26mm); 12 MP (52mm) with 2x optical zoom and optical image stabilization; 7 MP front-facing
Battery – 3,174 mAh (78 hours)
Additional Features – Face ID

LG V40 ThinQ
The newest LG flagship, the V40 ThinQ builds on what was LG’s best-reviewed smartphone to date: the LG V30. The V40 ThinQ offers users a 6.4-inch display that is inline with the other devices on this list. Their OLED display sets the standard for any LG-manufactured device and the build quality, a problem LG has had over the years, is premium.

One of the major upgrades of the LG V40 ThinQ is its camera setup. The device comes with two 12-megapixel cameras (one wide angle and one telephoto), as well as a 16 MP ultra-wide-angle lens. The camera app features a ‘triple-preview” that does exactly that: provides an active look through all three lenses so the user can choose which one works best. At $900, it is at least a hundred dollars cheaper than the Samsung or Apple flagship. It is available on all major carriers and can be had in New Platinum Gray, Carmine Red, New Aurora Black, and New Moroccan Blue.

Specifications
Build – Aluminum with Glass Front/Back
Display – 6.4” P-OLED with ~537 ppi
Chipset – Qualcomm Snapdragon 845
Memory – 6 GB RAM
Storage – 64/128GB, microSD up to 512GB
Software – Android 8.1 Oreo
Cameras – 12 MP (27mm) optical image stabilization; 12 MP (52mm) with 2x optical zoom and optical image stabilization; 16 MP (16mm); 8 MP (26mm) and 5 MP (21mm) front-facing.
Battery – 3,300 mAh (64 hours)
Additional Features – Rear-mounted fingerprint scanner

Samsung Galaxy Note 9
Samsung has been making upper-crust mobile devices for much of the past decade, and the Galaxy Note 9 is no different. The Note 9 is made from aluminum and a whole lot of glass, Gorilla Glass 5 to be specific. On board it has a Qualcomm Snapdragon 845 and up to eight gigs of RAM and 512GB of storage space. There are many Ultrabooks that don’t have those specs.

Running on Android 8.1 Oreo, the Note 9 features two 12 MP camera lenses and an 8 MP front-facing camera. With a 4,000 mAh battery, the Note 9 seems to outpace the rest of this year’s devices in battery life and sustainability. With available colors including Metallic Copper, Lavender Purple, Midnight Black, Ocean Blue and Pure White; and, availability on all major carriers, the Note 9 can be found for $1000.

Specifications
Build – Aluminum with Glass Front/Back
Display – 6.4” Super AMOLED with ~516 ppi
Chipset – Qualcomm Snapdragon 845
Memory – 6 or 8 GB of RAM
Storage – 128 or 512 GB of onboard storage and microSD up to 512 GB
Software – Android 8.1 Oreo
Cameras – 12 MP (26mm); 12 MP (52mm) with 2x optical zoom; optical image stabilization; 8 MP front-facing
Battery – 4,000 mAh (97 hours)
Additional Features – Samsung S Pen, rear-mounted fingerprint scanner, iris scanner.

Huawei Mate 20 Pro
Huawei isn’t the type of manufacturer that is typically on a list like this. This is because the company has run into hot water with some in the west who believe that the stake that the Chinese government has in the company is a security threat to users. Whether you believe that or not, Huawei sure has made an impressive phone with the Mate 20 Pro.

Created with a Kirin 980 octa-core processor that comes in at seven nanometers, Huawei has built the Mate 20 Pro with a 6.4-inch AMOLED display, 6/8 GB of RAM and 128/256 GB of storage space. The 4,200 battery provides some of the strongest high-usage results of any manufacturer, but like the LG V40 ThinkQ, it comes with three rear-facing cameras. One is a powerful 40 MP fixed wide-angle lens, another is a 20 MP ultra-wide-angle lens, and the other is an eight MP telephoto lens with a 5x optical zoom. It’s also the first device from a major manufacturer to have an in-display fingerprint reader. It may be difficult to find in the U.S., but for those who can, it comes in Emerald Green, Midnight Blue, Twilight, Pink Gold, and Black, and can be had for a hefty lot of $1,100.

Specifications
Build – Aluminum frame with Glass Front/Back
Display – 6.4” AMOLED with ~538 ppi
Chipset – HiSilicon Kirin 980
Memory – 6/8GB RAM
Storage – 128/256GB with Nano Memory slot up to 256GB
Software – Android 9.0 Pie, Huawei UI
Cameras – 40 MP (27mm); 20 MP (16mm); 8 MP (80mm) with 5x optical zoom and optical image stabilization. Front facing 24 MP.
Battery – 4,200 mAh (85 hours)
Additional Features – Face ID, In-display fingerprint scanner, Qi wireless charging broadcasting, 40-Watt fast charging

Google Pixel 3 XL
The Pixel 3 XL has a crystal clear, OLED display that comes in at 6.3-inches. Currently, the Pixel 3 XL runs Android’s newest OS, 9.0 Pie. The Pixel 3 XL picks up where the Pixel 2 XL left off in terms of camera functionality. Largely lauded as the best camera on any smartphone, the Pixel 3 XL is great for content creators and consumers, alike.

The Pixel 3 XL is available in White, Black, and Not Pink; and has a few neat features that aren’t found on many other phones. With a price tag that is at least $100 less than its direct competitors it will be a popular choice for the next year.

Specifications
Build – Aluminum with Glass Front/Back
Display – 6.3” P-OLED with ~523 ppi
Chipset – Qualcomm Snapdragon 845
Memory – 4GB RAM
Storage – 64/128GB
Software – Android 9.0 Pie
Cameras – 12.2 MP (28mm) with optical image stabilization
Battery – 3,430 mAh (69 hours)
Additional Features – Rear-mounted fingerprint scanner, squeeze to call Google Assistant, Call screen feature, Flip to quiet notifications

Smartphones continue to be a major part of people’s lives. As long as that continues, expect manufacturers to keep improving their best devices every year. What smartphone do you use? Would you consider getting one of these flagship devices? Leave your thoughts in the comments.

computer_novice_tips_400.jpg

Tip of the Week: 4 Really Simple Tips for the Computer Novice

computer_novice_tips_400.jpg

If you work with a computer, you know that if you can find shortcuts, you use them. Not only do they help you be more productive by making your tasks easier to complete, they can actually help you be MORE effective at completing those tasks. Today, we have four simple tips that can help you build better computer skills.

Tip #1: No Fear
Sometimes technology can be a tad bit intimidating, especially when people are expecting you to quickly grasp a concept with little-to-no experience. The best thing you can do is not be afraid of screwing up. After all, there aren’t many actions you can take with a computer that will break the machine, the applications you are using, or the file you are working on. If you don’t have much experience with the computer and you want to learn anything from this blog today, learn that Ctrl+Z will undo. Having a good understanding that Ctrl+Z will undo your last action in almost every application you are going to use should give you the confidence you need to stop worrying about possible failure.

Tip #2: Liberally Use Search Engines
For the computer novice, it can sometimes be intimidating to try to find applications and files within an operating system. No matter what problems you come across, keep in mind that the Internet is the world’s greatest troubleshooting guide, and you only need to know how to open your browser to get at it (on modern machines, you may not need even that). Once you have your browser open, simply type your search query in the address bar. It will return results. You may have to dig through the results, or alter your search perimeters slightly, but you will be able to find the answers to the problems you are having with the help of a search engine.

Tip #3: Learn Keyboard Shortcuts
This is typically for speed. If you can quickly learn a few basic shortcuts, you will enhance your ability to control your computer tenfold. Here are a few suggestions to get you started:

  • Ctrl+A – Select all
  • Ctrl+C – Copy selected content
  • Ctrl+X – Cut selected content`
  • Ctrl+Z – Undo (Seriously, this one is crucial.)
  • Ctrl+Y – Redo

There are many more depending on the application you are working in. Most applications will provide their shortcuts under their Help menu. Learning these will quickly make you a much more proficient user.

Tip #4: Find Your Comfort Zone
When Michael Jordan first picked up a basketball, he wasn’t a natural, so how can anyone expect to use something as complex as a computer proficiently right off the bat? If you are a new user, or just someone that isn’t proficient with a computer yet, stick to what you know. If you have a series of applications you feel some level of skillfulness with, stick to them. While our first tip suggests that you shouldn’t have fear, that mainly pertains to navigating your way around a computer, not the frustration a user can build when they continuously make mistakes. If you want to enjoy your time on the computer, stick to the applications you know, and you will have a good time.

We want everyone to remember that there was a time when we were all new to the computer; and, since computer skills are now an expectation of almost any career path (not to mention a major form of communication), learning your way around a computer will improve your standard of living. Do you have any other tips you could suggest to new users to keep them engaged and improving? Leave them in the comments section below.

managed_service_provider_benefits_400.jpg

Clearing Up a Few Common MSP Misunderstandings

managed_service_provider_benefits_400.jpg

Let’s be real: the title “managed service provider” doesn’t cast much insight into what we do on a daily basis. Even when people understand what we do, there are a lot of parts that confuse them and lead them to false conclusions. As a result, we wanted to take a few minutes and go over what it is that we do for our clients.

Breaking Down Managed Service Providers (Also Known As MSPs)
First, our title throws a lot of people. What are managed services, and why do you need a provider at all?

In a lot of ways, we’re just like the internal IT team that you may or may not have. We look over and manage your technology solutions as a part of the service we provide.

Again, just a part.

Yes, part of our role is that of a remote monitoring service, but we can provide much more than that. We can advise you on your technology solutions, assist you in procuring and maintaining them, help you implement technologies like cloud computing, help keep your data secure and your solutions compliant to industry requirements, and a lot more than just that.

We Won’t Replace In-House Staff (Or Vice Versa)
When they learn the extent of what we do, many business owners (and eventually, their staff) may start to wonder if they can outsource all of their IT responsibilities to us, essentially eliminating the need for an internal IT resource. While we appreciate the confidence, we wouldn’t recommend that, unless you don’t currently have an IT resource.

The truth is, we work as well in tandem with an organization’s IT staff as we do as a standalone management solution.

Most internal teams or resources face the same problem: an overwhelming workload. Between day-to-day problem mitigation, managing your current technology, and planning for your business’ future strategy, there isn’t enough time for them to do everything that they have to… and that’s where we come in. Our job is to pick up the slack, wherever it may be, so that all responsibilities are attended to.

However, if you don’t currently have an in-house resource and have been entirely relying on the services of break/fix by-the-incident providers, we can replace those, adding much more value than you could expect otherwise.

We Can Handle Most Anything You Throw At Us
Finally, you might be hesitant to reach out to us because you’re anticipating that your particular industry has needs that we just couldn’t keep up with. Compliances and minutely specialized solutions may be a key factor to your success, and you don’t want to risk it all on the expertise of an outside source.

We have one thing to say to that:

Try us.

It is our job to assist businesses with their solutions. This means that, as these solutions evolve and develop, we have to continually educate ourselves. How does this problem need to be handled? Is there a better option that we should learn more about?

As a result, we’re pretty up-to-date on most things IT.

To discuss your particular needs further, reach out to us at 810.230.9455, or read some of our other blogs to learn more about how we can help you.

2018_end_mobile_cyber_400.jpg

As 2018 Ends, Mobile Cyberthreats Won’t

2018_end_mobile_cyber_400.jpg

Mobile devices have made conducting business much more convenient, as the right application can allow transactions to be made from anywhere you may be reading this blog. However, this increased accessibility has come with a price – threats to mobile security – which requires any business to be aware of the state of cybersecurity, especially concerning mobile devices, now and in the foreseeable future.

The Now:
It’s the holiday season, which means that many will find that themselves traveling, either to visit family and friends or to seek out more agreeable climates. However, business being what it is, many will also still be trying to get work done during their travels.

Thanks to the incredible capabilities of the mobile devices we have today, this is made much easier. A business that leverages cloud solutions offers mobile users an exceptional amount of maneuverability, and the popularity of Bring Your Own Device policies have made it so that the resources needed to accomplish work goals are never too far away. Yet, this access is a catch-22, as it also means that data can be easily lost, far from the business’ location and the protections it should have in place.

Resultantly, there are a multitude of ways that a cybercriminal can come into possession of your data, either personal or professional. Fortunately, there are some ways to help prevent this from happening as well.

  • Public Wi-Fi is Too Public: When out in public, you’ll want to avoid connecting to public Wi-Fi networks when shopping or accessing sensitive information. We all know that hunting for the best deals is made much easier when you can look up prices online, but you’ll want to use your data instead. Public signals make hackers’ jobs that much easier with their typically insufficient security standards.
  • Charity Good, Charity Scams Bad: These phishing variants can come in via all avenues, but very commonly take the form of calls and text messages. A scammer pretends to be working for some charity, but in actuality, just wants your money and data for themselves. If you receive what you believe to be a charity scam attempt, you’d be wise to do some research into who is asking for it before handing over your data, payment information or otherwise.
  • Charge Carefully: Whether you’re at the airport during a layover and trying to eke a few more minutes out of your device, or you’re deal-hunting online as you’re wandering the mall, you need to make sure you’re being smart about how you’re keeping your device charged. Many attackers will hide attacks in charging stations, waiting to strike whomever connects.

The Then:
Of course, these hacks and threats aren’t going to end after the holiday season is over. Moving into 2019, the above threats are still going to be just as large of a problem, along with many other threats. Much of this will be in part due to our reliance on mobile devices.

Hackers will still be able to intercept data exchanged on an unsecure network, more devices will become outdated and insecure (you may want to peek at some of those holiday deals for an upgrade), and yes, more people will enable these threats through uninformed decisions. You need to make sure that your business isn’t influenced by threats like these.

NuTech Services can help. Get your business a holiday gift by calling 810.230.9455 and speaking to us about our managed IT services.

how_microsoft_certified_400.jpg

How You Can Get Microsoft Office Certified

how_microsoft_certified_400.jpg

There are many reasons, both personal and professional, that you may want to consider adding a few certifications to your expertise. Today, we’ll discuss how you and your staff can become certified Microsoft Office Specialists on Microsoft Office 2016, and why you may want to consider doing so.

Why You Want An MOS (Or Any Other) Certification
The more your internal staff can handle, the less they have to lean on others for assistance.

Chances are, these “others” would be the members of your internal IT team (assuming that you have more than one person in the first place). Otherwise, they’ll likely spend a bunch of valuable time trying to Google the answer to their question.

Therefore, it only makes sense to have your staff be capable of as much as possible independently, without the need to turn to someone else or an Internet search. That way, everyone’s time is used more efficiently, maintaining productivity and allowing everyone to focus on what needs to be done.

When a solution is as commonly used as Microsoft Office is, this only becomes even more evident.

Certifications are effectively seals of approval from an authority. If someone was to be certified as a Microsoft Office Specialist, it more or less is just proof provided by Microsoft that this someone does indeed know their stuff when it comes to the Office software suite. Having certified people on staff means that a business is able to handle more advanced situations.

The Operational Benefits Of A Microsoft Office Specialist
Microsoft’s productivity software titles are among the most commonly used in the business world, to the point where many of their applications’ names are now synonymous with the documents they produce – how often have you heard someone call a presentation a “Powerpoint” instead of a “slideshow?”

As a result, chances are fairly high that your business is one that uses at least one of the applications included in the “Microsoft Office” suite.

Like we said before, a lot of time can easily be wasted trying to do something in an Office program, especially if the person is having difficulty remembering how to perform a task that they do not need very often, or have never encountered before.

However, if your team has a few Microsoft Office Specialists on it, they would be able to assist with a quick message, reducing the stress put on your IT staff and allowing them to continue their other duties without interruptions coming in (at least, interruptions from Microsoft Office requests).

How to Become Certified
To learn more about this certification, visit Microsoft’s official page describing it. The official test is exclusively administered by Certiport testing centers, who provide a useful test center locator to help you figure out where and when your next testing opportunity is.

To otherwise assist your staff with their technology issues, and take some more of the workload from your internal IT staff’s shoulders, NuTech Services is here to help. Reach out to us at 810.230.9455 to discuss our solutions with one of our professionals.

voip_phone_solutions_400.jpg

VoIP and Other Business Phone Options

voip_phone_solutions_400.jpg

Telephones have been around for so long that nobody alive today lived in a time where they weren’t in use. While the general use for the telephone has remained the same, the major difference between older telephone systems and many of the telephone platforms available today is how they are deployed. Businesses have more options for telephone services today than they have ever had before, and with so many options at your disposal, we’re happy to help you weed out the right one for you.

Selecting the Right Type of Phone
It might be tempting to discredit the importance of telephony for your organization, but you should resist this notion. Businesses still rely on the phone to communicate both internally and externally, and eliminating it can create a situation where your clients have one less way of getting in contact with you. Therefore, the importance of the telephone in the office cannot be understated, as your reputation with your patrons hangs in the balance. As you can imagine, there are several different kinds of phones out there, each with their own pros and cons. It’s up to your organization to determine which solution best suits your needs.

Landline
For a long time, the landline was the only kind of telephone solution for businesses. This utilizes the connections provided by a telephone company which consisted of private branch exchange (PBX) hardware in the office. This would give businesses the option to create extensions for employee and office, as well as opportunities for other services like call transferring and directories. Even though these are so familiar, many organizations are ditching landlines in favor of other solutions that are more flexible and efficient. It just so happens that the Internet and all its developments are much better at accommodating the needs of businesses, including new telephone solutions.

Virtual Phones
A virtual phone system can be considered a middle ground between the traditional form of telephony and a Voice over IP system. Incoming calls can be processed through a traditional telephony method, and they are then forwarded to the right employee through a VoIP system. This gives a business with both in-house employees and remote workers the opportunity to unify their communications. Additional features can also be added in for a more dynamic solution.

Voice over Internet Protocol
Voice over IP is a system that aims to cut out the need for traditional telephone solutions entirely. VoIP fully utilizes the Internet connection of your organization’s office to fulfill all of its telephony needs. The right solution can give your business all it needs to be functional on any device from a desktop to a mobile device. There are some different ways to use VoIP, so you’ll want to make sure you select the right method out of the gate to get the best return on your investment.

  • An in-house VoIP system will be an expensive up-front cost, as the equipment needed to host the system can be quite taxing on any normal budget. There will also be a monthly fee for the components needed to make calls, and any maintenance the solution requires must be administered by your in-house staff. The benefit to all of this is that you’ll have complete and total control over your business’ telephone system–something that no other solution can offer.
  • A cloud-hosted VoIP system means that everything is taken care of so your organization can instead focus on remaining productive with your time. This means that there is no need to buy hardware or maintain it on your end. In the event your phone system goes down, the provider is the one responsible–not you–meaning that you’ll be somewhat reliant on others, but the productivity spike can mean all the difference. In the event your Internet goes down, you’ll also be left without service, but again, this isn’t something that’s directly yours to influence.

It’s easy to see why VoIP is such a great solution, but is it right for you? Find out by giving us a call at 810.230.9455.