158961356_VoIP_400.jpg

Is 2021 the Year Your Business Embraces VoIP? (It Should Be)

158961356_VoIP_400.jpg

Since its widespread adoption, the telephone has proved to be a hugely beneficial tool for businesses of all kinds… despite the considerable costs that it can incur. Fortunately for your business’ budget, however, there is a far more cost-effective means for you to enjoy the benefits of telephony: VoIP, short for Voice over Internet Protocol. Let’s go over some of the reasons why VoIP is just a better option for any business.

What is VoIP?

At first glance, VoIP is almost indistinguishable from the telephone services you are used to using—in fact, you’ve likely used it before.

Basically, instead of using the network of telephone wires that stretches from your service provider to your location, VoIP uses your broadband connection to transmit your call data to and from the recipient. In doing so, you eliminate the need for a pricy telephone service, instead getting double duty from your Internet.

Like we said, you’ve likely used VoIP technology in some form. Skype, Facetime, and Facebook Messenger all operate as VoIP solutions, albeit more for the personal user than an organization. For the organization, many VoIP platforms are available that provide a hefty list of features and options, leading to greater advantages.

The Advantages of Using VoIP in a Business Setting

The benefits of using VoIP are straightforward for the business:

Cost

This is perhaps the most visible (and, for that matter, impactful) benefits that Voice over Internet Protocol offers. A POTS (Plain Old Telephone System) requires a sizable investment for the infrastructure alone, never mind the additional features that aren’t included by default. Comparatively, VoIP needs very little up-front investment, and these additional features are almost always included.

Simplicity

VoIP is a perfect example of a plug-in-and-play solution, with very little else involved in its setup besides signing into your solution and literally plugging in the device. Similarly, starting up and operating the additional features incorporated into VoIP is a very user-friendly experience as well. This ease of use helps to motivate your team to use the platform’s conferencing capabilities and mobile-friendly softphone, and for your part, adding users is a simple enough task.

Function

Finally, these additional features further support your business’ capacity to communicate effectively. Here’s a general idea of what VoIP solutions will offer:

  • Call forwarding
  • Personalized extensions
  • Call routing
  • Call recording
  • Automated receptionist
  • Call queues
  • Instant messaging
  • Text messaging
  • Find me, follow me
  • Audio and video conferencing
  • Integrated voicemail
  • Line-of-business integration

Depending on the VoIP solution implemented, many more features will likely be available in addition to these.

In short, VoIP makes your business communications better, benefitting both your internal collaboration and your outreach efforts. Find out more about what VoIP can do, and what’s involved in implementing it, by calling our professionals at NuTech Services at 810.230.9455.

390064020_malicious_browser_400.jpg

Watch Out for Malicious Browser Extensions

390064020_malicious_browser_400.jpg

Browser extensions are nifty little programs that can be implemented into your web browser itself, adding onto its capabilities and utility… at least, that’s the concept. Unfortunately, these programs also give cybercriminals a means of secretly launching an attack. The security firm Avast recently identified 28 such third-party extensions that have been installed—according to the download numbers, at least—by about three million people on Google Chrome and Microsoft Edge combined.

How Do These Threats Work?

These attacks work similarly to how a phishing attack or a spoofed email would, as a user is promised one thing but winds up receiving something very different. While a malicious application may perform the task it claims to, it also may redirect the user to a phishing website or ad (making the cybercriminal some money) or simply steal some of the user’s information, like their birthday or email address.

In the case of these extensions, the code needed for several different malicious operations was present, including:

  • Redirecting traffic to advertisements (falsely generating revenue)
  • Redirecting traffic to phishing websites
  • Collecting personal data
  • Collecting browsing history
  • Downloading additional malware onto a user’s device

Avast’s researchers believe that only the first code was actively utilized, generating ill-gotten revenue for the creators of these extensions. Regardless, these extensions should be removed from any systems on your business’ network that they may be installed on.

The impacted extensions are as follows:

Chrome

  • App Phone for Instagram
  • Direct Message for Instagram
  • DM for Instagram
  • Downloader for Instagram
  • Invisible mode for Instagram Direct Message
  • Odnoklassniki UnBlock. Works quickly.
  • Spotify Music Downloader
  • Stories for Instagram
  • The New York Times News
  • Universal Video Downloader
  • Upload photo to Instagram™
  • Video Downloader for FaceBook™
  • Vimeo™ Video Downloader
  • VK UnBlock. Works fast.
  • Zoomer for Instagram and Facebook

Edge

  • DM for Instagram
  • Downloader for Instagram
  • Instagram App with Direct Message DM
  • Instagram Download Video & Image
  • Pretty Kitty, The Cat Pet
  • SoundCloud Music Downloader
  • Stories for Instagram
  • Universal Video Downloader
  • Upload photo to Instagram™
  • Video Downloader for FaceBook™
  • Video Downloader for YouTube
  • Vimeo™ Video Downloader
  • Volume Controller

Again, we encourage you to check your company’s network to ensure that these extensions are not installed in any of your users’ browsers, and that you encourage your employees to do the same.

Not sure how to go about doing so? NuTech Services can help. As a managed service provider, our services include remotely monitoring your business’ technology and network for threats while keeping abreast of this kind of news so that we can proactively resolve any issues that may influence your operations. 

Find out more today by reaching out to us at 810.230.9455.

184829173_santas_workshop_400.jpg

Even Santa’s Workshop Can Benefit from Managed Services

184829173_santas_workshop_400.jpg

While some places get to take the holiday season off to some extent, other establishments are at their busiest—and as such, don’t have time for any inefficiencies. Let’s meet an employee from such an establishment, located far up north, to learn about how any workplace might benefit operationally from managed IT services.

Taking a sip of cocoa, Trinket leaned back from his computer and let out a long sigh. Here it was, barely after 9:00 in the morning, and his agenda was already impossibly full. Around him, Santa’s Workshop was in full swing, the other elves frantically working to ensure that all the deliveries were prepped for the Boss before the big day came. 

Opening his Glee-mail, Trinket made a face as three new messages appeared, all labeled “urgent.” From experience, Trinket was sure that they weren’t.

Clicking through them, the Manager of Toy Creation and Assembly was soon proven correct. One of the messages had been sent to the entire North Pole team, despite only being relevant to the Coal Department. Another was an email that he had already responded to days ago but had since deviated from its original purpose and was now debating if the menu for the end-of-season wrap party should include non-dairy milk options and gluten-free cookies.

The only message that had anything to do with Trinket was the request from Sleigh Maintenance and Repair to borrow himself and one of his team members to inspect the sleigh’s wish injector. As it turned out, Trinket’s team was well ahead of schedule this year, so the request could be filled with little issue. He called one of his team members over to him.

“Poppy!”

Poppy jumped up from her seat and bounded over to Trinket’s desk. “Yes, sir?”

“How are you with magical engineering?”

“Pretty good, sir. I interned there for a while before being assigned to Creation and Assembly.”

“Excellent. Come with me, they need a few extra sets of eyes in the garage.”

“Okay!”

Trinket and Poppy set off for the North Pole’s garage, where the Boss kept his famous sleigh and Mrs. Claus kept her less-well-known motorcycle. As they walked over, Trinket couldn’t help but sigh once again.

Poppy glanced at him, concerned. “Everything okay, boss?”

Trinket replied, “Yeah, it’s okay. There’s just a lot piling up on my day that it really doesn’t seem like I should be involved in. I mean, I shouldn’t be venting to you about this, but some of the technology we use just seems to get in the way.”

Poppy nodded. “I know what you mean. I couldn’t figure out why my workstation was running so slowly this morning. Cedar had to come over and help me fix it… and I’m not even sure that it helped all that much.”

They continued walking in silence. Almost hesitantly, Poppy spoke up again.

“You know, I have a cousin who works in a shoe factory, and he says that IT isn’t really a problem for them.”

Trinket snorted. “Yeah, maybe after they’ve invested half of their annual magic into it.”

“That’s just the thing,” Poppy persisted. “They don’t have to. They work with this company called NuTech Services, they’re something called a managed service provider.”

“A managed service provider? What’s that?”

“Well, you know how we usually handle technology issues? We all kind of try to figure it out ourselves, until we need to call someone else in to fix it. Kind of like we’re doing now, for the sleigh?”

“Yeah.”

“Well, a managed service provider handles things a little differently. Instead of us trying to fix problems after they’ve popped up, the MSP keeps an eye on our systems for us, spotting potential issues and fixing them before they interrupt us. According to my cousin, the shoemaking elves managed to up their productivity considerably.

“The MSP has even helped them make their systems more efficient by recommending upgrades and helping them keep up with their updates. My cousin says that the factory is also more secure, to boot.”

Trinket considered it, impressed. “Well, how much does this cost? It sounds expensive.”

“That’s the other thing—it’s a service, so the MSP charges the factory each month. However, that monthly cost covers a lot, so considering what you get, it isn’t so bad.” Poppy shrugged.

“I think I’ll have to bring this up to the bosses. What did you say this company was called?”

“NuTech Services. They’re based in Michigan but since most of their services are delivered remotely, that shouldn’t be a problem. Even if they must make an on-site visit to fix something, their remote operations can save time by giving them a head start.

“They can help prevent viruses and malware, get a better handle on our communications, and help us streamline our processes, too.”

“Not bad, Poppy. I’ll have to bring this up to the Boss before the New Year starts,” Trinket said as they reached the garage. He held the door open for her. “Shall we?”

“Let’s!”

The two elves entered the garage and got to work, as elves do.

Hopefully, this has helped illustrate that everyone needs a little assistance, every now and then. If your business has also seen some IT challenges that it needs addressed and mitigated, give NuTech Services a call at 810.230.9455 to start the new year on the right path.

In the meantime, we hope that your holidays are merry and bright.

238503847_MSP_400.jpg

Where MSP Services Come From

238503847_MSP_400.jpg

For most people, the term tech support is pretty self-explanatory. The terms managed services and MSP… not so much. Let’s go over what makes managed services and what we do as a managed service provider so different from the IT support you may be used to. To start, we’ll review where the idea of an MSP came from, and end with what one like us can do for you.

Defining Managed Services

On a very fundamental level, managed services and tech support are very different due to the way they operate.

Traditional tech support, also referred to as break-fix IT, are those that most people think of. Whenever a piece of technology breaks down or has some other issue, an IT technician is called to fix it. This was the predominant—and really, the only—option to receive any level of IT support for some time, despite the expensive repeat visits and prolonged operational interruptions that came with it. For larger enterprises, hiring full-time IT staff solved this problem. It’s still costly, and often too costly for small businesses, but it does lead to faster turnaround times and ongoing support.

On the other hand, managed services are specifically designed with the small-to-medium-sized business in mind. Instead of waiting around for a company to call with an IT issue, a managed service provider will instead proactively monitor a company’s solutions to ensure nothing goes wrong in the first place. We’ll go a little deeper into how this is particularly beneficial later on, after we review how managed services came to be.

The Development of IT Support Services

Back when computers were first made available to businesses, small regional providers known as system builders that would construct generic computers for companies to use began to pop up. Large companies soon followed suit, and as a result, the high price of personal computers was reduced significantly.

In response to this change, system builders shifted away from the labor-intensive creation of computers to simply reselling those that the larger companies made. This gave them the title of systems reseller and proved to be a lucrative approach… especially without the Internet to facilitate direct-to-consumer computer sales.

Despite this, resellers discovered that they could generate higher profits by adding to what the manufacturers were providing. This led to the development of value-added resellers, or VARs. These VARs would sell the machines to consumers, as well as help install them and add them to existing computer networks. These networks and their needed infrastructure grew in importance as the Internet became a viable tool for businesses to use in the 1990s.

It was then that the VARs became systems integrators, and commonly provided break-fix repair services.

As the 1990s approached the 2000s, IT services were common enough for providers to start to act as advisors to their clients, recommending tools and introducing best practices into the clients’ networks. It was then that the term IT consultant was used.

Finally, with businesses relying on their technology more than ever before, it was no longer sustainable to solve problems after they happened. This helped drive the idea of proactive monitoring, remote maintenance, and online service delivery forward. At this point, the managed service provider was a reality, with the security of proactive support delivered in return for a set monthly fee.

What Can an MSP Do for My Business?

Today, managed services are the right choice for a business that wants to improve its operations while managing their time and budget more effectively. With a single provider taking care of all its IT management and maintenance needs, a business subscribed to these services gets to enjoy clear operational benefits with the confidence that their technology is reliable.

NuTech Services is proud to be known as an MSP, delivering top-notch solutions and services to businesses in a sustainable and beneficial way. To learn more about how we can assist you in your operations, give us a call at 810.230.9455.

343860455_VPN_400.jpg

What Exactly Is a VPN?

343860455_VPN_400.jpg

One of the major shifts we’ve seen in business in 2020 is the establishment of the remote workforce. Stay-at-home orders brought on by the COVID-19 pandemic made it necessary for businesses to find solutions on how to securely transfer information from what could be unprotected networks. The virtual private network is a solution to this problem. Today, we will describe what a VPN is, what its primary use is, and how secure it really is for secure file transmission. 

Defining VPN

The virtual private network is a tool designed specifically to protect data as it is transferred over the Internet. The best way to describe it is as an encrypted tunnel that protects the interception of data that is being sent from one place to another. 

For the remote worker, it can be difficult to get access to the files you need from your company’s central computing infrastructure. This is a big problem when the resources you need to do your job are located on these servers. The VPN gives you a simple means to that end, as it provides the secure environment in which to send and receive data. 

How is a VPN Used?

Traditionally, the VPN is used to set up a secure and reliable network connection between an endpoint and a central server.

Let’s say you were working remotely, where you ordinarily wouldn’t have access to the company’s servers, as we established earlier. Without a VPN, this would severely hinder your capability to be productive—but making this connection under normal circumstances could potentially expose the data you’re working on to external threats.

How the VPN Boosts Data Privacy and Security

The encrypted nature of the VPN is what helps resolve this. Thanks to the encryption, the data that is sent via the VPN is shielded from anyone trying to peek at it while it is traveling. If a cybercriminal does manage to glance at it, it is scrambled and distorted—rendering it effectively useless.

Hence the name virtual private network.

While it isn’t a panacea for your cybersecurity needs, it does allow you to securely communicate from a device to your business’ network from an otherwise insecure network, or one you don’t control.

Want to learn more about VPNs, or other important elements to your business’ information technology? Turn to us for the answers! NuTech Services and our managed services can be reached by calling 810.230.9455.

224417229_managed_service_400.jpg

How Managed Services Developed into What They Are

224417229_managed_service_400.jpg

When you see that we offer tech support, you almost certainly have an idea of what that means. However, upon hearing about our typical service delivery for the first time, many people are really surprised by how different our services—as a managed service provider—are. These differences are not an accident. Let’s go back in time a little while to explore how managed services came about, and what difference they could make for you.

What are Managed Services?

Let’s start off with a very basic description of what “managed services” are, as compared to the common impression of “tech support.” Whenever one thinks about “tech support” or “IT,” they’re likely thinking of the break-fix version: some piece of information technology breaks or malfunctions, so IT is called in to fix it. While this proved effective enough, it also led to a lot of repeat visits… oftentimes for things that were relatively simple to fix.

Managed services are a different approach, tailored particularly for small to medium-sized businesses. Instead of waiting for something to go wrong, a company will enlist a managed service provider—or MSP—to proactively monitor their IT to help prevent issues from impacting it. This brings a variety of benefits that we’ll touch upon later. Right now, we wanted to look back and consider how this approach was first devised and deployed.

The History of Computer Support and Services

As computers were first introduced into the business landscape, so-called system builders—small regional businesses that offered “white box”, or generic computers—would offer other businesses their services. Large companies soon joined in, and this resulted in the prices of personal computers plummeting.

To adapt, system builders quickly shifted from constructing labor-intensive computer systems to reselling what the large companies would offer, making the systems reseller a lucrative thing to be. After all, before the Internet helped link the manufacturer to the end user, these manufacturers needed a go-between to get these devices into a customer’s hands. However, as time passed, these resellers realized that they needed to do more. As a result, systems resellers phased into “VARs”, or value-added resellers.

Basically, VARs were computer resellers who would not only sell the machines but would also assist with the installation and networking of these systems. As the Internet became more applicable to business needs and challenges in the early 1990s, this networking (and the additional equipment needed to support it) only became more crucial.

At this point, the VARs became known as the systems integrators, as this more accurately described their function. This point in time was also the high point for break/fix IT repair services.

As the late ‘90s rolled around, IT services were commonplace enough that providers were frequently stepping into advisory roles for their clients, making recommendations and implementing best practices. With this shift, systems integrators adopted the title of IT consultants.

Of course, as the technology used by businesses became more advanced and capable, repairing issues as they arose became less feasible. This, paired with the remote capabilities that the Internet was able to support, made the idea of proactive maintenance and online solution delivery a workable possibility.

Thus, managed services were born, with service providers delivering up-to-date and optimized solutions in exchange for a set monthly rate.

What Do Managed Services Entail?

Nowadays, managed services have risen to become the preferred choice for businesses in the know, thanks to the improvements that these businesses see to their productivity and operations. With a single provider attending to all a business’ IT-related needs, working with a managed service provider has shown to have clear operational benefits.

At NuTech Services, our team of professionals is proud to provide the best managed services that businesses could ask for at a reasonable, all-inclusive rate. Interested in learning more about our services? Reach out to our team by calling 810.230.9455 today.

244341955_chrome_actions_400.jpg

Tip of the Week: Making Use of Chrome Actions

244341955_chrome_actions_400.jpg

As the most common Internet browser, Google Chrome is in a position where they always need to be coming up with new draws to maintain their hold on the market. Their latest efforts may help them to do so. Let’s take a moment and examine what Chrome is implementing, and how you can use it to your advantage.

Introducing Chrome Actions

Chrome Actions take the familiar address bar of the Chrome Internet browser and add some extra utility to it. Rather than specifying a webpage or network location to visit in the address bar (known as the “omnibar” to very few of us), Chrome now accepts very basic commands as input, and will follow these commands when they are entered.

For instance, opening a window in Incognito mode is as easy as simply typing “incognito” into the address bar.

As of yet, there are a few Chrome Actions that have been implemented:

  • Clear Browsing Data – type ‘delete history’, ‘clear cache ‘ or ‘wipe cookies’
  • Manage Payment Methods – type ‘edit credit card’ or ‘update card info’
  • Open Incognito Window – type ‘launch incognito mode‘ or ‘incognito’
  • Manage Passwords – type ‘edit passwords’ or ‘update credentials’
  • Update Chrome – type ‘update browser’ or ‘update google chrome’
  • Translate Page – type ‘ translate this’ or ‘ translate this page’

Of course, they come with the promise of more being added in future updates.

Is This Something You See Yourself Using?

Leave your thoughts in the comments and tell us why or why not. For more information and assistance pertaining to your business’ IT, give us a call at 810.230.9455.

278522324_backup_400.jpg

Improving Your Backup Strategy Doesn’t Have to Hurt the Bottom Line

278522324_backup_400.jpg

If you are a regular visitor to our blog, you know just how important we think data backup is for any business that relies on data. If your business stores and creates data, you need to have a backup strategy in place. It’s that simple. Today, we want to discuss how to improve your data backup strategies with a BDR.

Why Do You Need Data Backup?

This is pretty self-explanatory. Your business is constantly under threat. You may not realize it because you’ve been fortunate enough not to have any threat be bad enough where your operational and financial data is actively at risk. That may not always be the case, however. Consider how important your data is and think about all the things that could happen where you would have to deal with data loss. Situations that stem from natural disasters, scams and hackers, hardware failure, and human error can all trigger data loss. That’s a lot of variables to cover to keep hoping that nothing will happen. 

The health of your business depends on that data. There is employee data, financial data, vendor and customer data, and most importantly operational data that needs protection. At NuTech Services, we have seen a lot of different solutions to the data redundancy problem. We’ve seen people use tape backups, we’ve seen people back their data up to a network attached hard drive, we’ve even seen businesses neglect the process altogether. Today, there is a better way.

Get BDR From NuTech Services

We take data backup extremely seriously because it makes protecting our clients’ digital assets that much easier. It’s good for us, but it’s really great for our clients. The Backup and Disaster Recovery service we provide works several ways to protect a business’ digital assets. They include:

  • Complete customization of backup – A company has full control over their backed up data. They can choose what data they need to protect and our technicians will build a solution to those standards. This allows businesses to keep costs low if they only have certain data to back up and also allows them to backup everything if they so choose. 
  • Following best practices – In the IT support industry there is something called the 3-2-1 rule. It is considered a best practice because it protects an organization’s data in multiple ways. With our BDR service, we follow this best practice. It means that we keep at least three copies of your data, with two being stored onsite, and one offsite. This means that if your business is hit by a disaster your organization will still have a working copy of your data that you can restore from the cloud, but if you just have to restore data because someone accidentally deleted something that you needed, you can restore it from your network-attached device.
  • Incremental updates – One of the best features of our BDR service is that you don’t have to run your backups after work hours. Once your data is uploaded to the BDR and the cloud, it then can incrementally back up data frequently. This provides an organization the ability to lose less data if something were to go wrong. 
  • Professional support – As with any of our services, the solutions are tested, maintained, and managed consistently to provide the best possible situation for your business. Our expert technicians know that investing in technology can sometimes be a hard decision, but with the BDR, it is an extremely safe investment. 

If you would like to learn more about data backup, data recovery or how it fits into your disaster recovery and business continuity plans, call our knowledgeable consultants today at 810.230.9455.

186842673_tech_flub_error_400.jpg

Some of 2020’s Biggest Tech Flubs

186842673_tech_flub_error_400.jpg

It’s no secret that 2020 has been relatively tough on all of us, down to the technology that so many use and rely on each year. Now that we’re in the home stretch towards a hopefully better 2021, let’s look back at some of the technologies that didn’t deliver as promised and some of the other issues that we saw this year—some relatively harmless, and some decidedly not.

Quibi’s Crash and Burn

In a market already saturated with on-demand streaming services, Quibi offered something at least a little different in its short-form episodic storytelling and big-name casting. It also had quite the financial backing to support it—$1.75 billion in funding. Pair that with a monthly price tag of $5, and on paper, it would seem to be a surefire hit.

Unfortunately, this just wasn’t enough for the platform. With much more time on their hands thanks to the pandemic, short-form content didn’t have the same appeal… especially that which was restricted to a mobile device, and inaccessible on the entertainment systems that many prefer to use while at home. Quibi also had an uphill battle to fight against other options and services for such content, like YouTube and other free and ad-supported platforms.

This ultimately led to Quibi shutting down seven months after it launched, with much of the funding for it returned to investors.

So, what can we learn from this?

Simply put, it is not enough to just have an idea, especially when the timing is wrong. While we can’t say for certain that Quibi would have fared better should circumstances have been different, it is an interesting possibility to consider.

Bitcoin Scam Twitter Hack

In one of the most unsettling attacks that took place this year, many high-profile Twitter accounts—including those belonging to Bill Gates, Barack Obama, Elon Musk, and Kanye West—were hacked in an attempt to push a Bitcoin-based scam.

Fortunately, Twitter jumped into action and locked down these accounts before too much damage was done and has taken further steps to ensure account security… although it did raise some questions as to what might have happened if the motives behind the attacks were more destructive.

Zoom’s Security Missteps

As the world locked down, people and businesses needed to find a new way to communicate amongst one another. While many video conferencing systems like Skype, Microsoft Teams, and others fumbled this opportunity, Zoom was able to embrace it.

Unfortunately, Zoom’s security was lacking early on, which was made abundantly clear once so many had started using it. Hate speech and lewd content was shared in meetings, coining the term “Zoombombing.”

Since then, Zoom has taken steps to improve the platform’s security and users have given more thought to securing their conferences.

The Assorted Coronavirus Myths and Misinformation

Of course, we can’t talk about the technology fumbles of 2020 without bringing up the coronavirus and the various messes created because of it. For instance:

  • Numerous conspiracy theories linking the development of 5G connectivity to COVID-19, resulting in acts of cell tower vandalism and assault against telecom employees.
  • Bill Gates being accused of masterminding COVID-19 or using the pandemic to implant people with microchips—despite his long history of contributing to disease-fighting causes and efforts.
  • Fumbled information sharing efforts on the part of the US Centers for Disease Control and Prevention’s website.

To their credit, many social media platforms took more aggressive efforts against misinformation, flagging some misleading posts.

So, What Does This Have to Do with Your Business?

Simple: while the above examples were obviously larger-scale issues, they demonstrate that technology is far from perfect and how easily it can be turned against your interests. This is especially the case when you consider the technology you utilize in your business.

Here at NuTech Services, we’re experts in all things IT, and lend that expertise to your business’ benefit. Not only can we help optimize the technology you currently use, we can also help you make the improvements needed to advance your operations. Whether it’s helping you keep your work accounts secure or steering you away from an application that will ultimately create bigger problems, we are at your service.

It’s just what a good managed IT service provider does.

To find out more about what our team offers, give us a call at 810.230.9455.

211193007_mobile_businessman_400.jpg

Tip of the Week: 5 Ways to Improve Mobile Business Etiquette

211193007_mobile_businessman_400.jpg

Mobility is important to today’s workers and can be valuable to many different types of businesses; so much so that businesses demand that employees stay connected. Sometimes, especially when in public, this can become a social problem. Today, we will discuss mobile phone etiquette and five ways that you can improve yours. 

Business Doesn’t Stop, But You Should

We’ve all been there. We’re driving or on the train and a phone call comes in that you absolutely have to take. What do you do? Most people will take the call, but the right thing to do is send it to voicemail and return the call as soon as possible. Why? Because you are distracted. It’s best to call back and give the caller the attention they deserve rather than trying to juggle a phone call in the middle of traffic. Okay, this one is pretty basic, but it’s the foundation of all mobile etiquettes.

Don’t Be Rude

One of the biggest problems with mobile business is that there seems to be a continuous amount of communications that come in. This isn’t a problem when you are free to talk or text. It can be a problem if you are with other people, however. If you must take a phone call when you are face-to-face with others, be sure to excuse yourself and go at least ten feet away. This is courteous, and after all, it’s only four more feet than social distancing.

Brevity is often a cornerstone to modern mobile communication, with emails and texts often being short and sweet. Keep in mind though, sometimes being overly short can come across as disarming or even disrespectful to the recipient.

Stop Texting in Important Moments

One of the biggest faux pas that a mobile professional can have is the tendency to text people when other people demand their attention. If there is business going on right in front of you, even if it’s just a meal or an impromptu conversation, do yourself a favor and wait until it is over to return text messages. Again, pretty basic, but it doesn’t hurt to keep it top of mind.

Make Sure You Have Good Reception

This one is a serious problem. A lot of times when people are on the go, their service is not conducive to professional conversation. You can’t do business if calls keep getting dropped or texts don’t go through because you’ve chosen a poor place to conduct a mobile meeting; and nothing ruins your ability to communicate than if people have to stop every few minutes to get clarification or ask you to repeat yourself. Choose your location wisely. 

Sometimes you can’t help it, we get it, but if you are planning on running a meeting and need to participate, try to be somewhere where the service is reliable. It’s a sign that you respect everyone else’s time. If it’s impossible to prevent, simply be forthcoming about it and let everyone know at the start of the call. Perhaps even give an option to resume the call later if things get too difficult for the other participants.

Return Calls as Soon as Possible

When you return phone calls soon after you miss them, it shows professionalism and respect for the caller. If you are going to be out of touch for a bit, whether it be for meetings or personal time, it is solid practice to change your voicemail to state when you won’t be available. Then, when you are available, be sure to reach back out. Nothing is worse than getting a voicemail stating that the person won’t be available two weeks ago.

The mobile device is one of the best business tools available for people today, but knowing how to use them professionally is extremely important. Have you had to deal with a vendor or client that doesn’t adhere to mobile best practices? Leave your stories in the comments section below and return to our blog for more great tips and tricks each week.

188488407_data_privacy_400.jpg

Some Consumers are Aware of Data Privacy, But It’s Not Enough

188488407_data_privacy_400.jpg

With the holidays approaching, and with the global pandemic still underway, online shopping is going to be under even more demand than usual in 2020. With all of these transactions online, it would stand to reason that people would be more keen to follow best security practices than ever before. This week, we take a look at how people are staying secure online and whether or not the need for speed outweighs their security and privacy efforts.

The User Experience and How Security Fits

Let’s face it, the majority of Internet consumers have no idea about data security until something terrible happens. Until they get malware, or get their identity stolen, or their accounts hacked, they assume that there is enough built-in security to facilitate any behavior online. This is not ideal, obviously, but there are a small number of people, around 29 percent, that have enough security awareness to avoid certain websites. 

This actually represents an increase in security awareness, and retailers that are now seeing their sales drop due to security concerns are feeling pressure to improve their security, especially considering that this year online retail sales are expected to climb by nearly 30 percent over 2019.

It is a balancing act. While on one hand, consumers demand a certain level of security while shopping online, they also demand superior usability. A streamlined user experience typically gets in the way of comprehensive security. Think about it this way: a third of users will just delete an application if they experience challenges in usability, including login problems. Therefore, businesses need to weigh what type of authentication measures they use. 

Major Privacy Concerns are Troublesome for Consumers

Another issue that is plaguing online retailers, is how their data is used, stored, and managed. Most consumers are at least cognizant of how important it is to keep their personal and financial information protected and are quick to move past retailers that they deem don’t at least consider their privacy. In fact, 70 percent of consumers view their ability to deny developers of certain apps and websites the right to resell their information as a key consideration of whether or not to use that particular site/app. This goes against user practices, however, as nearly three-quarters of consumers will give over some information for a discount. Some consumers will provide a whole profile for as little as five percent off their purchase.

With this in mind, it is left to the business to figure out how to get the information they seek, while also paying attention to consumer’s growing distrust of online data collection. It’s a tough situation for both parties. Many businesses will try to provide discounts on a user’s birthday, but that is only possible if they actively work to collect that information. Some retailers routinely do business this way, but many are starting to find new ways to get more engagement from their customers. 

Every Business Needs to Be Secure

Every single business can use data to their advantage, but with more people concerned about their online privacy than ever before, it is important to have the security protocols in place to allow them trust enough to do business with you. If you are looking for some help with your business’ security, or would like to learn more about the options available to help you find the happy medium between helping your customers protect their privacy, call the IT security professionals at NuTech Services today at 810.230.9455.

223018647_security_update_400.jpg

Have You Applied the Recent Chrome Patches?

223018647_security_update_400.jpg

Being told by an IT provider how important it is for you to update your software is probably a bit like your grade school teacher telling you how important it is to do your homework: of course they’re going to say it, it’s their job to do so. However, we’re telling you what the Department of Homeland Security announced when they released a warning to update your Google Chrome web browser.

October saw five vulnerabilities patched in Chrome, with two of those vulnerabilities being classified as zero-day threats. A zero-day threat is an attack that is already being used by cybercriminals by the time security researchers identify it. With the head start that the zero-day threat gives them, these cybercriminals have a dangerous advantage.

To add to the issue, two of these zero-day threats were also identified as high severity attacks, one taking the form of a JavaScript engine phishing attack and the other in a corruption vulnerability in one of Chrome’s features. While further details are scarce, the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) have warned us of their significance and their capability to assist an attacker in taking over an infected system.

Both threats have been spotted, so CISA is officially encouraging that all patches be applied, and updates made, to resolve these threats.

What Makes Updates So Important?

Let me ask you this: let’s say that your office’s front door would no longer lock securely. Would you leave it alone in the hopes that nobody would mess with it, or would you prioritize having the lock fixed?

This is the situation that business owners now find themselves in, and far too many of them simply hope that it won’t be a problem. Consider the fact that Google released a patch for one of these vulnerabilities via an update, but only half of users applied the update within a day.

Regardless of whether this is due to negligence or the possibility that the device they are using is simply outdated, this suggests that many companies are leaving their vulnerabilities exposed.

NuTech Services can help through our managed services, as we’ll ensure that your technology is patched and fixed appropriately. To learn more about our services, or to find out how else we can assist you in securing your business’ IT, reach out to us at 810.230.9455.

182791535_mobile_phishing_400.jpg

You Even Need To Worry About Phishing In Your Text Messages

182791535_mobile_phishing_400.jpg

As serious as they are, cyberattacks are not always labeled with the most serious-sounding names. We are, of course, talking about phishing: the use of spoofed email addresses and fraudulent messages to get hold of data, or whatever goal the attacker has in mind. One of the silliest-sounding versions of phishing—smishing—has proven to be of particular risk.

What is Smishing?

When cybercriminals use phishing scams, they aren’t using advanced technologies to crack their target’s digital defenses. Instead, they hack users by exploiting the assumptions, bad habits, and ignorance of the target to get them to release sensitive information.

Attackers circumvent cybersecurity measures by sending messages purporting to be from an authority figure or trusted contact, thereby convincing the user to undermine their protection. A notorious example of phishing is the email from the persecuted royal family, known as the “Nigerian Prince scam.”

Smishing simply applies this principle to SMS instead of the usual email.

You could simply receive an SMS from a number that claims to be a financial institution or service provider, or even if you are doing business with that institution.

This message could contain details that confirm that the sender is who they purport to be, or it could go unnoticed because it is not the kind of message that most people expect to be phished through. More recently, many of these attacks have been sent under the ruse of being from authorities trying to share information about the COVID-19 pandemic.

There is a possibility that a link may be included in the message asking you to log in, but the problem is that this will lead you back to a fraudulent login page where the user’s actual login data is collected. It may prompt you to download a document that hides a variety of malicious programs, and suddenly the attacker has access to all your personal information, such as your phone number, email address, credit card numbers, bank account credentials and other sensitive information.

It’s as simple as that.

Now, think for a moment about how much sensitive data you’re likely to keep on your phones and what data a hacker might extract from them.

Spotting a Smishing Message

To prevent this from affecting your business, your entire team must be able to detect phishing attempts as soon as they are sent via SMS.

  • Just as with suspected phishing emails, opening a suspected smishing message is extremely risky. If the sender is not familiar to you, do not open the message and definitely do not access any links included.
  • If you cannot verify the legitimacy of the message, do not release sensitive information. If you receive a text message from Facebook informing you of a problem with your account, access Facebook separately to confirm before you resolve it.
  • Some mobile devices can block texts, just like email clients can filter messages. So, make sure you block phone numbers that are suspected of phishing and apply settings that might be helpful.

As a final tip, you need to make sure your entire organization keeps an eye on security during the workday and that they know how to identify and respond to threats.

Of course, it does not hurt to apply certain preventative measures to your network, such as anti-virus, firewall protections, and others. We can help! NuTech Services can support your team in its IT requirements for security, productivity, and mobility. Find out about our services by contacting 810.230.9455.