354842023_ai_400.jpg

Artificial Intelligence and the Tools Designed to Improve Business

354842023_ai_400.jpg

AI has been one of the leading innovative topics to hit the technology world over the past couple of years. At first, people thought that AI was only the process of creating machines that will inevitably destroy the human race, and didn’t understand that algorithmic machine learning could have stark benefits for business and society. Today, AI can be found in all types of different pieces of software. Let’s take a look at a couple of ways AI is currently being used in business.

#1 – Cybersecurity

One of the most important uses of AI is for cybersecurity, most of which is identifying actual threats and eliminating them before they can cause any problems for a business. There are a lot of potential threats out there and today, IT professionals are using AI to avoid spending time on situations that turn out to be non-issues. AI can be used to detect intrusions, identify vulnerabilities in software, and find malicious code that has already been installed on the system. 

#2 – Customer Service

AI’s most noteworthy application has been the incorporation into customer relations. Chatbots and other technologies that are fueled by machine learning can provide a lot of value for most organizations that simply cannot afford to employ a complete product or service support team. Users may not even realize that they are engaging with an AI as many newer solutions learn rapidly to provide customers with a fast, reliable interface in which to get support. 

#3 – Operational Efficiency

For some time, automation has been the name of the game when businesses attempt to streamline operations. Today, AI is beginning to provide a more diverse set of companies the opportunity to leverage more sophisticated tools. Since AI is constantly evolving and developing, more and more businesses are able to build tools around AI/machine learning than ever before. AI allows businesses to automate more of the mundane and repetitive tasks that have hindered productivity and progress, reducing costs, and providing a substantive boost in efficiency.

There may not be AI beings peppered among us yet, but AI is making a big push to be the most important emerging technology of the 21st century. If you would like to learn more about getting the results your business wants from its relationship with technology, return to our blog or give us a call at 810.230.9455 today.

229508639_ssd_400.jpg

Solid State Is the Way to Go

229508639_ssd_400.jpg

Whenever you ponder the purchase of a new computer, one important specification that you likely consider is its data storage. This was especially the case when you considered a new machine for family use—there are a lot of documents and photos to store, and any kids you have will want to fill it with games and other apps. Nowadays, it’s a little different. Rather than focusing on storage, you’ll want to focus on the computer’s speed. Let’s get into it a little further.

Storage (Typically) Isn’t a Concern Anymore

For most users, the PC or laptop they’ll purchase will have a decent capacity in its storage drives, for a very simple reason: it costs the factory about the same amount to produce hard drives that hold 256GB, as it does to produce 512GB drives. In this situation, providing more storage just makes more sense… especially once you factor in the exponential increase in demand for storage.

The sheer amount of data that the human race produces is staggering. Estimates say that, as of 2020, each human being on Earth is creating 1.7MB each second. Remember the 3.5-inch floppy disks? One of those could hold about 1.4MB. So, crunching the numbers, humanity is filling the equivalent of eight billion of them every second.

So, how is it that storage isn’t the issue? Simple—we’ve moved beyond these kinds of storage solutions.

Modern drives can now hold exponentially more data and run faster and more efficiently to a similar scale. Taking an average new PC off the shelf, its built-in storage capacity would exceed that of around 750,000 floppy disks. Besides, most data storage happening nowadays takes place in the cloud. Google, Amazon, Facebook, and countless web hosts, businesses, and others now collect and store it on the user’s behalf.

To come back to our point, with all of this taken into consideration, the 1TB drive that was built into your PC really is a lot. Unless you’re using it for specific things—photography, video editing, 3D modeling, or gaming—you’re likely not going to need any more.

If a PC is in the office, this is even more the case. All a workstation’s data should really be stored in a centralized location, whether that’s a server on your network, or in the cloud. Your business’ purposes will dictate which is the better option for you—give us a call at 810.230.9455 to work that out with us.

The point remains: capacity shouldn’t be your final metric for determining the PC you’ll use, unless you know for a fact you’re going to need a lot.

Performance Matters

At the end of the day, your hard drive’s efficiency is really the defining factor. Modern PCs have considerable processing power, with 8-to-16 gigs of RAM being pretty standard. This leaves plenty to run office applications and other daily software titles. As a result, the speed of your hard drive could easily cause the biggest bottleneck in your operations.

For our purposes, there are two different kinds of hard drives.

Hard Disk Drive (HDDs)

Also known as mechanical hard drives, HDDs contain an array of shiny, spinning magnetic platters that are used to store your data. Seen as the standard for decades now, they are generally the most affordable option when comparing price by storage capacity. Capable of storing high capacities of data, they are often used in servers or backup devices nowadays.

Solid State Drives (SSDs)

SSDs use electronic data storage to work, and therefore have no moving parts. Reading and writing this data is much faster as a result, an outcome that impacts all a computer’s processes. These drives are expensive, but as prices have decreased they have become a much more reasonable purchase… especially when you consider the performance, reliability, and stability benefits you see from them.

We always recommend that any new workstation purchased should rely on an SSD as its main hard drive. Most desktops can have secondary drives added after the fact, and centralized storage and/or the cloud can also be considered viable solutions.

If you need more assistance in choosing the technology right for your business and its needs, give NuTech Services a call at 810.230.9455. We’ll help you make the best choice.

264546480_paperless_400.jpg

Is Going Paperless Cost Effective?

264546480_paperless_400.jpg

Printing is costly and those costs come from a lot of different directions. They come from paper and ink and the fact that printers seem to need constant maintenance. For some businesses, it’s all too much and they are actively looking for ways to go paperless and cut out their printing and filing costs. Today, we will examine whether or not forsaking the troublesome printer is actually cost effective. 

A Couple Reasons to Go Paperless

Obviously, if your business is looking to cut out its printing costs, you’ve identified printing as being prohibitive to your business’ operational budget in some way. It’s true that your average employee doesn’t consider your business’ paper, ink, and printing costs when they print off every document they work on; or worse yet, three-dozen NCAA brackets. They just figure that you’ve got it worked out. So one reason is to obviously cut costs. 

Another reason is that it’s basically unnecessary. Today, most employees, customers, vendors, etc. have access to machines that can function better (and faster) than traditional business document filing strategies. Smartphones, laptops, and other mobile devices all can access databases filled with content much faster and more efficiently than the fastest file clerk can deliver it. While this also cuts costs, relying on always-available digital systems just makes sense in today’s business climate. 

What is a DMS?

A DMS, or Document Management System, is effectively a digital database of all the paper files your employees would ever need, and it is how businesses cut costs from traditional methods of paper-filing and retrieval. With a DMS, your paper documents are scanned and digitized. They are then filed away in a computer database that can be accessed around the clock so that the people that need access to that information, have it on demand.

Many people may not understand just how expensive filing can be for a business. Not only do you have to pay an entire staff of people to constantly file and retrieve paper files, you also need to have a filing system in place that is secure and makes files readily available. Industry averages are about 7-to-12 cents per page to scan and upload to a DMS. This is substantially lower than the printing, payroll, and storage costs of keeping an onsite paper-filing system. 

So while there are still costs involved, they don’t recur at the same rate once the file is scanned and stored inside the DMS. Anyone with access to the database will be able to access the file. Best yet, securing the file is as simple as managing user account access; something that most businesses already do with their digital resources. 

So, How Does DMS Save My Business Money?

It’s simple. Once your files are stored in the DMS, you never have to worry about paying people to physically find a file. All they need to do is search the DMS and the document in question is available almost immediately. Not only that, file redundancy is there. The system comes with a comprehensive backup. Studies have shown that large organizations basically lose a file every six seconds, a problem you will avoid with a properly-functioning DMS. 

To talk to one of our experts about the possibility of managing your printing costs, and how a document management system helps in keeping those costs down, give our IT professionals a call today at 810.230.9455. 

247512628_IT_challenges_400.jpg

2021 is Poised to Hold Some Big IT Challenges to Overcome

247512628_IT_challenges_400.jpg

Considering that 2020 was… less than great for many businesses, it should come as no surprise that there will likely be difficulties that carry on for some time into 2021. Naturally, these difficulties will require some new ideas and fresh thinking to properly resolve, as well as an openness to adopting innovative technologies. Let’s look ahead to some of the IT challenges we anticipate that 2021 will hold for businesses.

Reconsidering Where Work is Done

Before the events of 2020, the approach that businesses took to remote work (if any) effectively boiled down to enable 20 percent or so of their workforce being capable of working out-of-office while the remaining 80 percent stayed in the office. Once the various issues and events of 2020 came about, however, these trends effectively flipped for many—if not transitioning to remote entirely.

As a result, companies have needed to make various changes to not only enable their team members to work productively from home, but also to do so safely… a need that will not go away throughout 2021.

Depending on the device that a user is working on—and more specifically, who owns the device in question—different security protocols and processes need to be put in place. Remote monitoring and management will be crucial to continue, especially if remote work of any scale remains once the pressing need to work remotely passes.

Ensuring Uptime and Resisting Burnout

Taking the surge in remote work strategies into consideration, the matter of preserving productivity becomes another particularly pertinent topic to discuss. Uptime becomes the key word, as anything less than 100 percent is seen as a shortcoming… after all, if a business can’t provide that for its clients and customers, the trust that they’ve built up is going to diminish considerably. By maintaining their uptime, the business can instead take advantage of that trust in different ways that advance its operations.

With such an uncertain year just behind us, businesses will need to ensure that these clients can trust in their services.

Furthermore, to accomplish this fully, a business also must ensure that its team members are prepared to deliver these services as needed. This makes work fatigue and burnout a serious threat. To help minimize the potential for this outcome as employees are working from home, the solutions that they’re using must be reliable enough to avoid the chance of exacerbating employee frustration.

Reexamining Budget Allocation

Finally, with business finances in flux after the last year, the investments that businesses make into their tools will need to be reconsidered and adjusted to optimize them. This will require an examination of each solution’s return on investment and how well it serves its intended purpose.

This means that 2021 will likely see some shifts in how businesses invest in cloud-based services as compared to locally hosted solutions, and what level of priority is given to advanced technologies like artificial intelligence and other similar solutions.

From where we stand now, 2021 stands to be a year of shifts and shakeups—make sure that your business has the support it needs to make it through. NuTech Services can help. Find out what we can do to assist your operations by calling 810.230.9455.

245723955_reset_password_400.jpg

You Better Update Your Microsoft Password Today

245723955_reset_password_400.jpg

While we would strongly recommend that you update your passwords more than once a year, now is as good a time as any to do so. Reflecting on this, let’s go over how to fully lock down your Microsoft accounts.

We should start with a bit of a warning. In December, a massive cybersecurity attack targeted the US government via (along with other tools) Microsoft Office. As it was revealed, foreign hackers were monitoring the US Treasury Department and the National Telecommunications and Information Administration through their email accounts.

While Microsoft hasn’t identified any specific vulnerabilities within their cloud services or applications (a good sign, for certain), they have shared some practices to help users properly and comprehensively secure their data. These practices are important to keep in mind for both your personal and business accounts.

What is Included in a Microsoft Account?

Your Microsoft account will include many programs under its purview… basically, anything that Microsoft contributes to will be tied to this account, including:

  • Windows
  • Outlook
  • Office
  • Skype
  • OneDrive
  • Xbox Live
  • Bing
  • Microsoft Store
  • MSN

How to Update Your Microsoft Account Password

Microsoft has made the process somewhat simple and straightforward.

  • Visit https://account.microsoft.com/
  • Click Sign In on the top right if you aren’t already signed in. If you are already signed in, the page will display your name with options about your subscriptions and other services. Once you sign in with your email and password, you’ll be taken to this page.
  • Towards the top of the page, on the right-hand side, you’ll see an option that says Change Password. Click it.
  • If you have Two-step verification enabled, it will walk you through verifying your account with a text, an email, or using the Microsoft Authenticator app. If you don’t have that set up, don’t worry, we’re going to get you set up after you change your password.
  • Once prompted, enter your current password, and then come up with a brand-new password.

An important consideration: You need to make sure that every password you create abides by certain best practices, like not being used for more than one account and involving no personal details or identifiable information. If pressed, select four random and unrelated words, switch up some of the capitalization, and substitute numbers and symbols for some letters—the more complicated, the better.

Helpfully, Microsoft has included a feature that will require a password change every 72 days. While this sounds like a pain to deal with, it can help reduce the chance of your password being breached and therefore can keep your account more secure.

Additional Security Features

While we’re changing your password, let’s go ahead and add another layer to your security in the form of Two-Step Verification. Setting this up will require you to provide proof of your authenticity beyond just having the right username and password. Work accounts may need administrator permissions to activate it, but it is worth doing.

Once you change your password, you should be directed to Microsoft’s account security page, where you will find the option to activate two-step verification. You’ll be walked through the process via on-screen instructions that will tell you how to link an authenticator application on your smartphone (like Google Authenticator, LastPass Authenticator, Duo Mobile, and other examples). If you don’t have one, you’ll be instructed how to set up Microsoft Authenticator, or you can opt in to one of these other options.

You’ll be taken through the setup process and asked to verify your contact information.

From that point forward, you’ll need to use your authentication app to log into your Microsoft account on a new device, or anytime you want to make changes like updating your password. You’ll be able to use other programs, like Word or Outlook, as normal. Make sure that you keep an eye on your emails and text messages for any Microsoft may send you.

This process can take mere minutes but deliver lasting benefits to your security. For more assistance with locking down your work accounts, or any other of your IT needs, make sure you reach out to NuTech Services by calling 810.230.9455.

213170870_password_400.jpg

Hey You… Update Your Google Password, Right Now!

213170870_password_400.jpg

If you haven’t taken the time to go through and update your passwords lately, particularly the one protecting your Google account, you should do so… despite it undeniably being a pain. After all, Google serves various purposes and is attached to many accounts for most. Considering the number of data breaches and other cybersecurity issues this potentially contributes to, you will want to ensure your Google account is properly locked down.

What Does a Google Account Involve?

Seeing as Google has grown to include far more than the original search engine, there are a lot of things that the average user has that involve Google in some way. Anyone who owns an Android smartphone, or surfs the Internet via the Chrome browser, or checks their email via Gmail certainly has a Google account, and this is but a small sample from a considerable list of items.

So, if a user’s Google account were to be compromised, a lot of data could potentially be exposed:

  • Google.com (for custom tailored search results)
  • Gmail
  • Google Drive
  • Google Docs/Sheets
  • Google Maps
  • Android
  • Google Workspace
  • Google Chrome
  • YouTube

Again, this is a brief sample. Chances are that—if it has something to do with Android, Chrome, or of course Google—it’ll be tied to your Google account.

Updating a Google Password

Fortunately, the process to change your Google password is quite simple:

  1. Visit https://accounts.google.com/. If you aren’t signed in already, log in with your email/phone number and password.
  2. Click Security on the left-hand side.
  3. Look for Signing in to Google. Click Password.
  4. Google will usually prompt you to provide your current password, and then have you input a new password.

REMINDER: While password security should always be a priority, the password you use to lock down your Google account absolutely must be as secure as you can make it. Use a unique password that is strong, without any personally identifiable information or other password shortcuts involved. Using a password manager can help make this easier, both by storing all your different passwords for you and assisting you in generating ones that are secure.

Once you have updated your Google password, you may have to log back in on some of your devices.

Adding Some Extra Security to Your Google Account

To really protect your Google account and the data it holds, it helps to take your security to the next level by enabling 2-Step Verification/2-Factor Authentication. This will help protect your account, even if your password was somehow stolen.

After changing your password, on the Google Account page:

  1. Click the Security option on the left-hand side of the page.
  2. Click 2-Step Verification.
  3. Google may prompt you to enter your password again, just to make sure it’s you.
  4. Depending on what Google already knows about you, this might go a few different ways—you’ll either be prompted to set up a phone number to get a text message or phone call, or Google might walk you through setting this up on your smartphone. Either way, follow the on-screen instructions.

You have a few options available to you in terms of the verification process. One of the more convenient is the option to be sent an SMS message with a secondary code required before your account can be accessed from a new device. For more security, there’s the Google prompt, which serves up a notification on your mobile to be tapped to confirm login, or Google’s own Authenticator app.

Fair warning—if your workplace uses Google Workspace, you might need the help of an administrator to enable 2-step verification. For more information on securing your accounts (or any other IT question you have), turn to the team at NuTech Services and reach out at 810.230.9455.

252220513_tech_development_IT_400.jpg

Lessons to Learn From Lego’s IT Development

252220513_tech_development_IT_400.jpg

Businesses of all sizes have been able to successfully overcome operational challenges by rethinking and adapting the technology they utilize. Let’s consider a huge example and look at what The Lego Group (as in the building blocks) has done to address some of their technological challenges with improved solutions—as well as how your business can do the same.

The Lego Group’s Situation

Sharing their story at the AWS re:Invent virtual conference, The Lego Group revealed that their online presence and its Direct Shopper Technology team was encountering issues… particularly when their traffic was spiking during sales events and product launches, reaching levels 9.5 times what was typical and with a 200-fold increase in transactions. Back in 2017, the release of the largest building set to date (the Star Wars™ Ultimate Collector Series Millennium Falcon™ set, with 7541 pieces) and the resulting traffic on launch day effectively shut down the back-end of their website and overwhelmed the sales tax functionality that called back to their on-premise infrastructure.

This made it so that visitors would only see the website’s maintenance page.

This event proved to the company that some changes had to be made, as their growth simply couldn’t be supported through their on-premise solutions and the limited scalability they could offer. Furthermore, making these changes could allow the company to focus more on their customers’ experience on the website, rather than focusing on basic upkeep, while also giving them the resources to adapt to such demand spikes and capitalize on innovation.

Lego’s Growth Trajectory

Lego began their transition to cloud services in 2018 with the migration of their sales tax calculator and three additional processing services. Ten months later, the company had a serverless platform that was capable of everything its on-premise infrastructure could do, and soon after, the cloud had overtaken their on-premise capabilities with new records being established each month.

As of July of 2019, The Lego Group has been able to triple the number of engineers under their employ through remote operations and adopt 36 more serverless services, utilizing automation and monitoring to ensure that issues could be identified and addressed promptly. This approach has also allowed Lego to shift their attention from maintenance to developing new features that will help to further improve their service and the customer experience that results from it.

What Does this Have to Do With You?

While admittedly scaled up considerably, Lego’s transition to the cloud serves as an effective case study for any business that is experiencing IT challenges, as it demonstrates how much a company can grow and innovate by simply taking advantage of the technology that is available.

The best part is that this is the case for businesses of effectively any size—from a consumer retail and manufacturing giant such as The Lego Group to the small mom-and-pop shops who sell the construction sets that Lego produces. Of course, these capabilities also expand outside of the retail industry, with the potential to benefit a company that operates in effectively any vertical where its operations are concerned.

NuTech Services is here to help you put the technology that can benefit your business into place, ensuring that any operational issues are addressed and that all opportunities are embraced. To find out more about the solutions we use to accomplish this, make sure you reach out to us by calling 810.230.9455.

378464120_best_practices_400.jpg

Tip of the Week: Essential Information Technology Practices

378464120_best_practices_400.jpg

Information technology is a critical tool for many businesses today, which means \\it is crucial that your IT is compliant to a few key best practices. Let’s go over these practices so that you have a roadmap to ensure that your operations can remain secure and productive.

Keep Your IT Up-to-Date and Maintained

Here’s the thing: you wouldn’t drive a horse and buggy to the office any more than you would type up a business brief on a typewriter or calculate your business’ budget on an abacus. The reasoning for this is simple: technology has gotten better over time and provided us with improved alternatives to what has been used before. These improvements have also come faster and have been more dramatic in scale.

On the other side of this coin, threats to your business technology have seen similar advancements.

As a result, your operational success depends on you keeping up with these changes. In addition to maintaining the operability of your IT solutions, you also need to prioritize updating and upgrading them when the time comes. These activities will both ensure your team can perform their tasks, and that they are also capable of doing so securely.

Back Up Your Data

With data being so important to a business’ successful and productive operations, you need to have insurance that some circumstance won’t cause you to lose your access to it—especially with so many circumstances potentially leading to that outcome. Infrastructure damage, theft, user error, equipment failure, and more can all lead to data loss at any level.

This is precisely why a backup solution is so important for a business to maintain. With no way of accurately predicting how or when data loss may strike, having some means of preserving your data continuity needs to be considered an essential consideration… arguably above any other. To accomplish this, we recommend that your backup strategy incorporate multiple copies of your data, with a minimum of three copies included. First should be the original copy of your data, second should be an onsite backup, and the rest should be hosted offsite—preferably in the cloud. That way, all your bases are covered, whether you need a quick fix for a deleted file or need to reconstruct your entire infrastructure.

Secure Your Data

Finally, data security must be addressed by all businesses, regardless of their size. Cybercrime nets more profit for its perpetrators than the global trade of illicit drugs does, and an average of 75 records are stolen each second. A bank account is currently available for a few dollars, provided you know where to look.

Businesses are often targeted via phishing attacks, which are only made more effective due to many user accounts having more access than is warranted and internal storage lacking the appropriate security protections. If they manage to fool one of a business’ employees into letting them in, a cybercriminal is given considerable power.

To help counter this, there needs to be a combined effort to both better educate business users as well as reinforce the security measures built into the infrastructure itself. Authentication requirements, role-based permissions, and other means could help prevent some data from being leaked that otherwise could be.

Lean on NuTech Services for assistance in putting these measures—and more—in place.

For our help and more information about your business’ technology, give us a call at 810.230.9455.

99522290_update_400.jpg

Why Is It Super Important to Keep Your Software Updated?

99522290_update_400.jpg

Your business’ software is one of its critical assets, so it really can’t also host many risks to your security and business continuity. Therefore, keeping your software up-to-date and fully patched should be a priority. Let’s go over what patch management entails and why it is so important.

What Causes Software Vulnerabilities?

Many people might incorrectly assume that, once a software is released and paid for, it won’t be the source of any major security issues from that point forward. Unfortunately, this isn’t entirely accurate. As hackers and cybercriminals work to identify vulnerabilities in the code that software developers have created, the software developers will fight back by creating patches to resolve these vulnerabilities.

This pattern continues until the software is eventually abandoned for a new and improved option, much like we’ve seen with the progression of the Windows OS. The reason that we are so adamant that everyone needs to migrate away from the antiquated Windows 7 is because hackers have had years to devise new ways of undermining its security while Microsoft has shifted focus to its later iterations of the operating system.

Regardless, this cat-and-mouse game goes on, with consumers, business owners, and IT admins caught in the crossfire.

Without consistent updates, all software titles can potentially be leveraged against the user—and with so many kinds of software in use within a business, there needs to be a process to ensure that they are all attended to on desktops, laptops, servers, and mobile devices alike. A good rule of thumb: if a software title interacts with the Internet, its software will need to be updated eventually.

Defining Patch Management

Patch management is the process by which a business ensures that updates and patches are applied to all vulnerable pieces of software. Whether it’s a productivity solution, communication and collaboration tool, digital security measure, an operating system, any kind of software under the sun could potentially be a risk that needs to be promptly addressed.

While this makes patch management an essential part of operating securely, it can be notoriously time consuming to dive into. This is why our team at NuTech Services utilizes cutting edge technology to see to our clients’ software solutions and keep them patched and upgraded. As a matter of fact, the technology we use keeps watch over our clients at all hours to ensure that all applicable updates are properly implemented.

Reiterating Why Patch Management Matters

Let’s touch back on Windows 7 once again, as the issues it causes are severe enough to bear repeating. As these words are first being written, almost 20 percent of PC users are still using Windows 7, despite Microsoft abandoning support for it a year ago in January 2020.

This effectively makes Windows 7 a clear and present danger for anyone using it—to the point that the Federal Bureau of Investigation effectively begged users and businesses to abandon it in a press release this past August.

For assistance with your patch management processes and the upkeep of your assorted IT solutions, reach out to the experts we have here at NuTech Services. Our team will be here to assist you behind the scenes, all you need to do is reach out to us at 810.230.9455 for more information.

290218053_phishing_400.jpg

How Not to Teach Your Team About Phishing, Courtesy of GoDaddy

290218053_phishing_400.jpg

GoDaddy—the domain registrar and web-hosting company once famed for its risqué advertisements—is facing some significant backlash for a much different reason. On December 14th, GoDaddy’s employees received an email that appeared to be from the company, promising a holiday bonus. However, while the email was from the company as it appeared to be, it was actually a phishing test that the hosting provider decided to run.

Let’s consider the situation:

GoDaddy’s Phishing Message:

When they checked their email on December 14th, GoDaddy’s employees found an email waiting for them in their inboxes, sent from “Happyholiday@Godaddy-dot-com”. Upon opening it, they found the following message, under a large picture of a snowflake emblazoned with the company’s name and “Holiday Party.” Get ready, it’s a doozy:

Happy Holiday GoDaddy!

2020 has been a record year for GoDaddy, thanks to you!

Though we cannot celebrate together during our annual Holiday Party, we want to show our appreciation and share a $650 one-time Holiday bonus! To ensure that you receive your one-time Bonus in time for the Holidays, please select your location and fill in the details by Friday, December 18th.

US

EMEA

Any submittals after the cutoff will not be accepted and you will not receive the one-time bonus of $650 (free money, claim it now!)

We look forward to celebrating with you again, in person next year!

However, no bonus reportedly awaited the approximately 500 employees who excitedly clicked through the links. Instead, they received an email from the company’s security chief two days later, informing them that they had failed the phishing test and would therefore need to retake the company’s Security Awareness Social Engineering training.

As you can imagine, this did not sit well for many of these employees… especially considering that the “record year” GoDaddy experienced came only after hundreds of employees were either reassigned or laid off entirely. Combining that with the fact that a data breach ultimately exposed 28,000 of GoDaddy customers’ credentials earlier this year, and the comments seem especially ill-advised.

GoDaddy has since released an apology for their mean-spirited bait-and-switch phishing test, releasing a statement. According to a spokesperson, “GoDaddy takes the security of our platform extremely seriously. We understand some employees were upset by the phishing attempt and felt it was insensitive, for which we have apologized.” While the company felt that the lesson was an important one to impart to their team members, there has been some acknowledgement that this was an insensitive means of doing so.

GoDaddy Isn’t the Only Company to Do This

Other companies and organizations have used similar tactics as they have worked to evaluate their internal phishing preparedness. One example came in September, when Tribune Publishing sent out a company email trying to phish employees with the promise of a targeted bonus ranging somewhere between $5,000 and $10,000. The Tribune’s attempt was also derided by the employees affected by it, one reporter tweeting that the level of cruelty was “stunning.” That company also apologized for its use of a “misleading and insensitive” email.

However, Phishing Can’t Just Be Ignored

While these companies certainly took the wrong approach to educating their users, the point still stands that phishing is a very serious risk for businesses today to contend with.

Instead of taking this approach, there are other ways to help educate your team, through seminars or even other internal evaluations. The primary issue really came from the fact that GoDaddy took advantage of a monetary promise to their employees during a time when many people are already financially strapped, with seemingly no intention of giving them this bonus.

Obviously, this is a situation that nobody wants to find their organization in, just as nobody wants their organization to be phished. However, with NuTech Services, there are ways to prevent the latter. Give our team a call at 810.230.9455 to learn more about how we can help you fight back against phishing, without alienating your employees.

93116530_mobile_games_400.jpg

Tip of the Week: Four Tips and Tricks Within the Google Play Store

93116530_mobile_games_400.jpg

The Google Play Store is the Android operating system’s primary source of applications and widgets and can do a lot more than many might first think. Let’s consider a few useful tools and tricks that are incorporated into the Play Store that you should keep in mind.

Using a Password to Restrict Purchases

App store purchases can become notoriously expensive, and fast, so it makes sense to do whatever you can to help prevent any unauthorized purchases from going through. One means of doing so is to restrict the capability to make purchases behind password protection. That way you can avoid unwanted spending on your Android device… particularly if others regularly utilize your device.

Filter Apps Based on their Content

The Play Store has content available meant for a wide variety of age groups, due to the inclusion of gambling, violence, or other adult-themed elements present. While this is certainly a reason to restrict such apps for younger users, it also serves as an excellent reason to restrict what your business users can download—although you should also discourage them from using any apps not intended for business use during work hours anyways.

To filter out inappropriate apps, navigate to the Play Store and access Settings. Once there, tap Content Filtering, and select and deselect the maturity levels that apply to your needs.

View All Application Orders and Purchases

Keeping track of your investments into your applications is much simpler that you might expect, as the Play Store keeps a running record of your purchases. Finding this list is simple: all you must do is visit the web version of the Play Store and, via the Gear icon, access the My orders section.

See All Android Devices

Finally, you can track each device connected to a Google Account and used to access the Play Store, as there is a list in your account that outlines them. Finding this list is also fairly simple: from the online Play Store, click into the Gear icon and from there, Settings.

Have you heard about any other tricks behind the Google Play Store? Share them with us in the comments!

79265714_net_neutrality_400.jpg

Net Neutrality and the Digital Future

79265714_net_neutrality_400.jpg

In the United States, the political atmosphere in 2020 was extremely testy and one element that we typically keep our eyes on is the net neutrality rules that seem to change every few years or so. Today, we thought we’d revisit the issue and tell you what to expect over the first few months of the new administration. 

So, What is Net Neutrality?

Net Neutrality is the theory that the Internet should be viewed as a utility and therefore be regulated in a way where use of it is fair throughout. The debate rages between pro-net neutrality people and pro-business people who believe that by having so many rules in place, innovation of Internet-based technology suffers. Some variables that are part of the argument include how the services are deployed, how telecommunications companies set prices and service packs, and how to get the Internet to everyone who needs it (which is everyone these days).

The Federal Communications Commission, led by FCC director Ajit Pai, successfully oversaw the repeal of the net neutrality regulation in 2017, which effectively re-categorized Internet services from being a utility to an independent service. Of course, this was met with extreme frustration by the masses, who overwhelmingly believe that the Internet should be a universally regulated entity, just as electricity and water services are. 

Where We Stand Now

The Internet has been extraordinarily busy in 2020 as people socially distance because of the COVID-19 pandemic. ISPs, to their credit, did rally to provide some value to customers during the start of the pandemic. Months later they put together a list of how they’ve “Gone Above and Beyond” during the COVID-19 pandemic.

If net neutrality were still in place, who knows what would have happened, but you could bet that the FCC, as a regulatory body would have done what it could to ensure that lines of communication weren’t obstructed because of profitability issues. 

What Will Happen with Net Neutrality in 2021? 

Some people believe that net neutrality will be revisited in 2021; and, while that could happen, with everything that is going on today, and the changes in the FCC mandate, it will be interesting to see if the new administration thinks that it’s a big enough issue to address early on. First thing is first, a new FCC director will be named and that process could take months to iron out. One thing is for sure, the Internet has shown that it is extremely important today and should be protected against any entity that can make it difficult for people to gain access to it. 

What are your thoughts about net neutrality? Are you of the belief that ISPs need oversight to maintain fair practices or do you think that the natural market competition will keep ISPs from taking advantage of their positions? Leave your thoughts in the comments section below.

66905006_alert_breach_400.jpg

What You Need to Know About the Massive Solarwinds Hack

66905006_alert_breach_400.jpg

2020 has been filled to the brim with adversity and just as we’ve mercifully arrived to the end, the largest and most brazen cyberespionage attack ever has been carried out. Today, we’ll tell you what we know about the attack, what problems it caused, and what we should learn from it going forward.

 How Did the Attack Happen?

In short, an IT management company known as SolarWinds was breached back in March, affecting a massive number of organizations—18,000 in all. These organizations include the likes of Microsoft, Cisco, and FireEye, as well as many states and federal organizations, including:

  • The U.S. Department of State
  • The U.S. Department of the Treasury
  • The U.S. Department of Homeland Security
  • The U.S. Department of Energy
  • The U.S. National Telecommunications and Information Administration
  • The National Institutes of Health, of the U.S. Department of Health
  • The U.S. National Nuclear Security Administration

When the attackers gained access to SolarWinds’ network, they were able to use what is known as a supply chain attack to introduce their malware to these departments and organizations by pushing it through the company’s automatic software update system for their Orion products. These kinds of attacks can be particularly effective since the threat is introduced to an environment via a trusted application.

Making this situation worse, many SolarWinds customers had excluded Orion products from their security checks on SolarWinds’ recommendation to prevent their other security products from shutting them down due to the malware signatures that these security products contain.

While (at the time of this writing) it is unclear what the attackers responsible used this access to do, the potential ramifications are truly terrifying. While government departments were targeted, it also needs to be said that this attack could have potentially continued from the major providers like Microsoft and Cisco to their clients, and so on and so forth. That’s why there is still no estimate of this attack’s true scope.

This attack was seemingly only discovered when an employee at FireEye received an alert that their VPN credentials had been used from a new device, and a little digging revealed the much larger situation playing out.

This Wasn’t the Only Attack, Either

Another attack was also discovered on SolarWinds’ network when the company performed an internal audit of its systems. On December 18, a second malware was found to have used the same tactic to infiltrate SolarWinds, but as of this writing does not seem to come from the same source.

What This Needs to Teach Us

Frankly, the most important lessons to be learned here are painfully obvious. First off, cybersecurity needs to be prioritized above all else, and all potential threats should be considered a likelihood. After all, the U.S. government was warned about the viability of exactly this kind of threat back in 2018 by the Government Accountability Office.

Secondly, the concept of your employees being a huge part of your cybersecurity strategy needs to be reinforced. This was only discovered when an employee was alerted of unusual activity and took that alert seriously. Your team needs to know what they are looking out for, and how to proceed if they spot it.

We may not know the scope of these attacks for a while. That shouldn’t stop you from reaching out to the IT professionals at NuTech Services to get an assessment and a consultation. Call us today at 810.230.9455 to get started protecting your network, infrastructure, and data.