306977000_blockchain_400.jpg

More Industries are Seeing Accountability and Security with Blockchain

306977000_blockchain_400.jpg

Blockchain is one of the most dynamic new technologies, but up until recently, there hasn’t been a lot accomplished in the way of creating viable distributed software titles. In fact, the most recognized technology created with blockchain is cryptocurrency. This says quite a bit. Today, we’ll look at blockchain-enhanced software and how it’s only a matter of time until it is a commonplace addition to most businesses.

What is “Blockchain” Anyway?

Blockchain is defined as a distributed ledger system that creates a single encrypted and unalterable file whenever any transaction is made to help preserve its continuity. As every device involved in the blockchain helps to store it, the blockchain itself is unprecedentedly transparent. This allows business systems to be both more accountable, and secure.

Accountability

Let’s return for a moment to how the blockchain works—each time a transaction of any kind is made, be it adding new data or revising some that already existed, a new “node” (think of it as another link in the chain) is created to document the transaction and encrypt it. As a result, you wind up with a running record of reliable data. As you might imagine, this offers itself quite well to many industries.

Banking and Financial Services

With the importance of the record-keeping that these organizations maintain being so apparent, it only makes sense that blockchain is used to automatically keep track of where funds are being moved.

Real Estate

Real estate processes are notoriously intricate and confusing. Blockchain provides an option that could make the entire experience of buying and selling real estate much more transparent.

Wills and Inheritances

Tragically, wills and inheritances can be very hotly contested, and their veracity may be called into question. The transparent and immutable logs of the blockchain could eventually lead to many fights being averted in the future.

Voting

Elections now face more scrutiny than ever before, as votes are counted, recounted, contested, and recounted again. Using the blockchain could help to eliminate most challenges and issues that call the integrity of an election into question.

Supply Chain Management and Logistics

Managing all the moving pieces of a supply chain could be made much simpler by integrating blockchain technology. Goods and resources could be easily tracked and directed where they need to go, with confirmation when they arrive at their destination.

Security

Communications have gone digital, with unprecedented numbers sent and received each day. As more people than ever rely on these communications for a variety of reasons, data sharing needs to be more reliably secure. The blockchain is well suited for this task, as each transfer of data remains fully transparent, while the data contained in the nodes remains undisclosed. This technology can even be safely used to hold parties to their shared agreements by facilitating proper compensation once certain requirements are met. These capabilities will likely lead to advancements in:

Education

Consider how many files any educational institution needs to maintain and verify, and the amount of personal information shared in these records. Blockchain makes it so that these paper files are no longer necessary, while also making it easier to verify registration, management, and financial aid-related data.

Healthcare

Any patient who needs to see multiple physicians knows the frustration of working with providers who operate in different healthcare networks. However, healthcare has a good track record with embracing innovative technology solutions. Introducing blockchain could ultimately lead to self-managed healthcare records.

Stock Trading

There are many ways that stock exchange processes could be made better with the assistance of blockchain technologies. Two clear improvements: convenience, and of course security.

Public Records

Many states are still overly reliant on paper documents, which are very easy to alter and otherwise manipulate (never mind steal). Shifting to digital documents that are supported by blockchain could do a lot to reduce fraud, ensure accountability, and generally improve security.

The Internet of Things

IoT devices are overwhelmingly insecure, but if they were decentralized through the blockchain, some of this insecurity could be resolved.

To learn more about blockchain technology, feel free to call NuTech Services to discuss it, as well as the options you currently have to leverage for your business. Reach out at 810.230.9455 today!

285758363_voip_400.jpg

VoIP Can Replace Analog Phone Systems

285758363_voip_400.jpg

It’s true that Voice over Internet Protocol (VoIP) is probably going to be cheaper than using an enterprise phone system through your regional phone company. While cost reduction is a good reason to choose a service, VoIP does much more than just reduce communication costs. Implementing a VoIP platform also presents a lot of solid options that can help your business be more efficient and productive. 

VoIP Allows You to Do More

While at its core, a VoIP system is a telephone system, it allows for many more options. Since it uses an organization’s available bandwidth rather than a dedicated RJ-11 connection, there are more dynamic options available. It may raise the cost of the solution a bit, but VoIP can come with instant messaging, conferencing, and call archival built in.  

VoIP is More Secure

VoIP is far more secure to use than the traditional landline because it is easier to secure a digital connection than it is to secure an analog one. The use of encryption protects all information transmitted through the system.

VoIP is More Portable

This is a big benefit. VoIP solutions can be linked to mobile applications. This means that any smartphone can become a work phone, and can be linked to the same number as the user’s business phone. This allows people to get calls on their phone without having to give over their personal number. This is either done through forwarding or by installing a simple app on the phone.

VoIP Offers Automated Client Interaction

A VoIP system can be configured to support an entire business. There are integrated automated menus that can offer a lot of value by directing calls to voicemails, alternative members of your team, and allowing employees to avoid distractions and not neglecting their incoming calls. Call forwarding, parking, and many more options can be tied to a VoIP account for additional costs.

VoIP is a technology solution for all of your business’ calling needs. Call NuTech Services today at 810.230.9455 for more information about VoIP and you can get the telephone system you’ve always wanted for your business.

281737651_automatino_hr_400.jpg

Should Your HR Department Be Worried (About Automation)?

281737651_automatino_hr_400.jpg

Most companies have some sort of human resources department. Some are bigger than others. Some are more effective than others. Typically, the HR department deals with a lot of the stuff that no one else likes to. Today, software is being created using artificial intelligence that will be able to complete many of these tasks. Let’s take a look at how automation is affecting the modern human resources department. 

Automation Isn’t the First Threat

Human resources cover a lot of ground in any business. In fact, many smaller businesses extend the human resources role past the seven core functions of HR. These are:

  1. Recruitment
  2. Payroll Administration
  3. Benefits Administration
  4. Training and Professional Development
  5. Performance Reviews
  6. Labor Relations
  7. Managing Compliance

Over the past several years, the company human resources department, especially at small and medium-sized businesses, has been encroached upon by outsourcing. Like many other outsourced platforms Human-Resources-as-a-Service (HRaaS) services use technology to fill in the gaps left by not having dedicated HR professionals on staff. For the business, it reduces the cost, while fulfilling virtually the same roles through remote help desk and software. 

The Relationship Between Automation and HR

Technology changes things. Does it make it better? That’s a matter of opinion, but for the business owner, not having the human resources department means that they are on the hook to complete the tasks that the human resources department undertakes; and, there is a mountain of it.

That is, unless they can automate them.

The benefits of automation are the same no matter where it is put to use. It opens the way for staff to focus on being more productive, by leaving behind a lot of menial (yet time-consuming) tasks. Aside from enhancing efficiency and productivity, there are many key benefits to automating HR. They include:

  • Reduced employee turnover through improved employee engagement
  • Reduced storage and printing costs
  • Improved risk management and properly managed compliance
  • Improved document management
  • Enhanced business decision making with comprehensive reports
  • Optimized business growth through efficient onboarding

Today, there are plenty of software-based solutions that can keep any business running effectively, but when you get a look at them, these solutions aren’t really human resources platforms, they are human capital managers. 

What is Human Capital Management?

Human capital management is a platform that encourages businesses to treat their workforce as they would any other asset. Its goal is to get the human resources of the business to work as effectively and efficiently as possible. While human resources do more to deal with the individual needs and motivations of workers, human capital management seeks to look for metrics that can be quantifiable and strategically improved upon. It basically aims to change an organization’s view of their workforce from a commodity to an investment. 

What Strategy Is Best for Your Business?

There are multiple ways that automation can be implemented in the HR/HCM process, but depending on what strategy is used, you could be setting your company up for problems from your actual human resources. Most workers don’t like being treated like numbers on a spreadsheet after all. On the other hand, divorcing business decision-making away from typical workforce considerations that aim to sap overall productivity will benefit your organization’s bottom line. 

HR is always a balancing act. 

If you would like to know how automation could help you keep your organization balanced and productive, reach out to the IT professionals at NuTech Services today at 810.230.9455.

147532333_outsourcing_400.jpg

Can Outsourcing Be an Option for Your Business?

147532333_outsourcing_400.jpg

There is a major problem that the owners of most small-to-medium-sized businesses run into: impatience. Their business might not be growing at the rate they like, or they may just have too much work to accomplish in order to grow. Whatever the problem is, outsourcing parts of a business can really bring a whole lot of benefits. Let’s take a look at how outsourcing can help the modern business.

Financial Benefits 

Looking outside your own business to get work done can be intimidating. Can you trust outsourced talent? Will I lose control over my business? Is it really a value? These questions and many more are reasonable to ask, but if there is one sure thing about outsourcing is that there are clear financial benefits. 

The decreased cost of outsourcing is the most well-known feature of the strategy. Obviously, it is extraordinarily expensive to onboard new help, purchase the resources that new hire needs to do the job you need him/her to do, and expand your benefits package (if you offer one) to another person. When you outsource, you may still pay a comparable rate in pay, but you will get someone that has the specific skills you need them for, and you’ll likely save a lot of capital by eliminating the associated costs.

Operational Benefits 

Your organization may see some major operational benefits from choosing to outsource. They include:

Internal Focus

Outsourcing can present a business’ leadership the ability to be more aggressive with their resources. There is a lot to do at the average business, giving regular employees access to trained and reliable resources can free them up to focus on operational issues while speeding up business significantly. 

Access to Skills

Typically, outsourcers come onboard with very specific skills and no long-term employment contract. This gives the organization the flexibility to find the gig-worker that fits the immediate needs of the company rather than committing to one employee over large swaths of time. 

Minimized Risks

In the course of doing business, decision makers are confronted with variable risks. Outsourcing allows many of the risks to be disregarded, although it creates some others. Overall, however, outsourcing will often present a net-positive situation for any business. 

NuTech Services offers high-value outsourced IT services and support for Michigan businesses. If you would like to learn more, call us today at 810.230.9455.

304657402_network_slow_internet_400.jpg

Tip of the Week: Fixing a Slow Internet Connection

304657402_network_slow_internet_400.jpg

The modern business uses IT in so many ways that aim to make a business move faster, be more efficient, and ultimately, produce more than it would have without that technology. Each of these technologies are powerful in their own right, but they depend on two variables: electricity and a reliably fast Internet connection. When your Internet connection isn’t doing your business any favors, you need to look into why you aren’t getting the network speeds you are paying for. After all, your business depends on it. Today, we will take a look at a few ways you can go about troubleshooting a slow Internet connection.

You Don’t Have Enough Bandwidth

When you purchase an Internet package, you get certain speeds. Today, these speeds are faster than ever, but if your business has too much going on, it can wreak havoc with your Internet speeds. There is a situation that happens when too much data is trying to pass through a network connection. This situation is called bottlenecking and it is potentially the reason your speeds are slow. Think about it, if you try to put several gigabytes through a connection that is only rated for a few megabits per second, it’s going to take some time to get all the data through. To check this, audit how many devices are at work. Most of the time you’ll be surprised how much data you are sending and receiving. We can help you with this audit before you make the call to upgrade your Internet package.

Outdated Equipment

Another potential issue is that your networking equipment may simply be old and not be able to use the dual bands that are often necessary to get the most out of your wireless network. If you have enough bandwidth, but your Internet is just slow, chances are upgrading the modem, switches, or routers would be a prudent move and will likely fix any problems you have. 

Misconfigured Equipment and Environmental Factors

Once you’ve made sure that the physical components of your network are working as intended, but your Internet connection isn’t improving, you probably need to reconfigure your software on your devices or move your hardware to avoid interference. Specifically, if your wireless network signal is having problems making it through obstructions, you will want to consider using the 2.4 GHz connection rather than the 5.0 GHz channel. The max speed you’ll see will decrease, but the 2.4 GHz connection makes its way through obstructions better. Unfortunately, however, the 2.4 GHz signal can be a victim of electronic interference more than the 5.0 GHz channel. 

If you need help with your business’ networking, don’t wait and lose more money. Contact the professionals at NuTech Services today at 810.230.9455.

260013401_reset_power_on_off_400.jpg

Is there a Difference Between Restarting and Just Turning It Off?

260013401_reset_power_on_off_400.jpg

In a word, yes. Sure, there’s the obvious difference in that one leaves you with a computer that is turned off while the other results in it being turned on again, but there are other important differences that are present behind the scenes. Let’s go over a few of these differences, and how they impact when you should restart your computer versus when you should shut down completely.

What’s the Difference Between the Shut Down and Restart Processes?

Before Windows 8, there was no difference whatsoever (aside from the obvious fact that Restart would start the device back up). This changed, however, with the introduction of Windows 8, and a new feature: Fast Startup.

Shut Down

Still present in Windows 10, Fast Startup shortens what was once a much longer start process after a user had clicked Shut Down.

While all a user’s files and programs are still shut down, the heart of the operating system is just put into standby mode. Please note that it does power down everything, unlike hibernate and standby. This makes it much easier for Windows to reactivate. However, since not all processes are completely stopped, present issues won’t be affected. Your problem will still be there the next time the workstation is turned on.

Restart

On the other hand, restarting the device actually does put a stop to all processes and resumes operations with a fresh boot on the motherboard level. This is why restarting your computer seems to take so long as compared to manually turning it off and on again.

So, the difference is really in the granularity of the shutdown process. Counterintuitively, “shutting down” a computer leaves more components active than a restart does, which is why restart is the process recommended when troubleshooting an issue.

So, while we may recommend that you “turn your computer off and on again,” or “reboot,” what we really mean is “restart your computer.”

For more assistance in dealing with pesky technology issues, lean on the managed services that NuTech Services provides. Learn more about what we offer by calling 810.230.9455.

69189555_sms_business_messaging_400.jpg

Verified Business SMS Added to Messages

69189555_sms_business_messaging_400.jpg

Now that text messaging is being used for marketing, it isn’t that rare to see messages in your inbox that are from businesses. Most of these messages, however, seem to come from a random number. Google has taken notice and is rolling out a way for businesses to verify that they are the ones that are sending users messages.

Most users that have an Android device use the Messages application to send and receive SMS messages. Companies that use this platform for marketing could have their messages routinely ignored because people don’t trust the content that comes from seemingly random numbers. 

With verified SMS, however, every message that is sent to a prospect or customer is verified to actually come from the company. In fact, the recipient won’t even receive the message until it is verified. The content is transmitted with the business’ name, logo, and confirmed with a verification badge. Google has stated that the content is never revealed to them, meaning that the content is secure and sent privately like any other text message.

How Do You Turn on Verified SMS?

Obviously, you need to have a device that runs a recent version of Android mobile OS. To turn on Verified SMS:

  • Open the stock Android Messages app
  • In the three-dot menu, access your Settings
  • Access Verified SMS
  • Switch on Verify business message sender 

Now you don’t have to waste time with unverified marketing or sales content. 

For more great tips, visit our blog regularly.

179284127_helpful_tips_400.jpg

Tip of the Week: Four Fundamental Small Business Tech Tips

179284127_helpful_tips_400.jpg

Technology impacts the business landscape more than it ever has, and its impact shows no sign of slowing. This is especially the case for the small business, which now has a much larger pool of competitors to deal with. As a result, it is more crucial than ever that small businesses take advantage of technology to assist them. Let’s go over a few tips that every small business should act upon.

1. Adopt Technology Solutions

Regardless of your industry, who your business serves, or even where you operate, there are some universal changes that technology has brought to how the average small-to-medium-sized business functions. Methods of collaboration have shifted to digital formats, “coming to work” is no longer a prerequisite to working, and the filing cabinet has been rendered woefully obsolete by other, better options. Cloud solutions are a major contributor to this. I want you to take a moment and consider something: why were any of these changes made in the first place?

It is for the same reason that the assembly line process was adopted, or why we cook our food before eating it: it provides greater benefits than the old way. It is the same with business technology, and you will see this as a common theme throughout these tips. Don’t disqualify yourself from competing by removing your ability to do so.

2. Don’t Shortchange Email

Email is now the gold standard for business communications, for numerous reasons. While a small business might find it redundant to email an announcement, doing so can prove useful to their operations. For instance, let’s say Mary manages a small office with four or five employees. She could easily just announce an important message to the room, but what if James was at the dentist that day, or Rob had excused himself to the bathroom just before? What if Ellen had just connected for an important phone call?

Email provides an easy way for you to communicate with others in your workplace that ensures everyone gets the message, without disrupting operations too much.

3. Go Mobile

While we’re on the subject, let’s consider Ellen for a moment. In the past, making a phone call would tie her to her desk, so any distractions in the office would be an unavoidable issue. Nowadays, there are many ways that Ellen could hypothetically remove herself from the situation while still fulfilling her responsibilities. For instance, a Voice over Internet Protocol solution could allow her to make and take calls from anywhere she could establish a connection, so she could presumably find a quieter area to work without sacrificing her ability to do so.

Other solutions also offer some form of mobility, assuming they are backed up with enough security. For instance, if James was unable to get to the office after his dental appointment, he could still work on his assigned tasks from home with the right cloud-based solutions.  Again, this helps eliminate his reliance upon getting to the office in order to produce.

4. Don’t Underestimate the Cloud

We’ve already touched upon how the cloud has shifted businesses, primarily focusing on how useful it is for hosting and storing data. However, this isn’t the only thing the cloud can do. Cloud technology enables today’s businesses to make use of tools that would ordinarily be out of reach. Yes, its storage capabilities can help make data more accessible to team members who need it, but it can also assist you in preserving your data in case of some disaster, give you access to computing resources that you couldn’t procure yourself, and provide you flexible access to your business applications.

5. Improve Your Security

A small business’ size once protected it from cybercrime, but nowadays, all businesses are fair game. In order to remain secure against these attacks, the right defenses need to be put in place. Things like firewalls, spam blockers, antivirus, and assorted other solutions help to reduce these risks. Additionally, any employee could potentially let in a significant threat, so all need to be educated on how to spot them, and the proper procedures to dealing with them.

NuTech Services is here to assist you in implementing these modern IT essentials, as well as maintaining them for you through our remote monitoring and access capabilities. To learn more about how else we can help your growing business, give us a call at 810.230.9455.

309758955_business_integration_400.jpg

Integration Brings Benefits to Business

309758955_business_integration_400.jpg

For today’s business, agility is important. Things can change so rapidly that if a business commits to one way of doing business, it could spell curtains for them if they are forced into making changes that don’t work with certain strategies or technologies they’ve chosen to use. These days, software integration can allow businesses to optimize the flow of information and change course quickly, all while keeping their business running effectively. Let’s take a look at this integration.

Planning Stages

Most businesses use some type of management program to streamline things. Whether that be a simple Customer Relationship Management (CRM), a more intuitive Professional Services Automation (PSA), or an end-to-end Enterprise Resource Planning (ERP) software, your company relies on software to get the job done.

Today, there is an opportunity to mix your business’ production software–whether it be communication integration, file sync and sharing, another form of back-end integration, or a customer-facing application–with your management platform. Planning an integration like this can have big benefits, especially if you are beginning to use analytics to help you make critical business decisions. After all, the whole point in integrating your various business components is to make data flow better.  

The main hurdle to accomplishing this is, of course, how do you go about getting this done? If your organization doesn’t have on-staff developers, outsourcing your integration project quickly becomes your only recourse. If you are going to pay someone outside your company to connect your proverbial pieces, then you need to have an idea of what you want to accomplish ready when you start the relationship. It is essential that the outsourced developer knows your needs, and that you provide them with tools and access needed to complete, and thoroughly test, the integration. Most simple integrations can be done cheaply, and can provide massive returns on your investment, while larger integrations may not see the immediate return, but over time can provide massive cost-and-time-saving benefits.

Integration Benefits

Speaking of benefits, we’ve already touched on the main benefit of software integration: Unimpeded data flow. Integration can also result in:

  • Cost savings
  • Increased end-to-end efficiency
  • Organizational growth
  • Improving business with no downtime
  • Enhanced business analysis and intelligence

According to one study, small businesses that build a completely integrated suite can boost sales by upwards of 12 percent, reduce overhead by increasing inventory reporting, and increase revenue-creating situations by almost 50 percent.

If your organization has seemingly tried it all to boost productivity and efficiency, you may be missing out on a great way to improve both, while also providing a way for businesses to better plan for the future. Do you think that integrating your business’ software will help your business? Leave your thoughts in the comments section below.

308186809_smb_tech_400.jpg

IT Trends SMBs Should Focus On in 2020

308186809_smb_tech_400.jpg

Technology is a key part of operating a business nowadays, which is why advancements in business technology solutions are so important for organizations to keep pace with. Let’s review a few solutions and technologies that we predict businesses will (or at least, should) focus on this year.

Business Automation

As businesses have strict cost considerations to take into account, it is likely that automation will grow in popularity. While perhaps more expensive to initially implement, automated solutions can easily provide a return on investment by clearing schedules of the annoying (if necessary) repetitive tasks that otherwise eat up your human employees’ time. This combination of machine learning and artificial intelligence is known as Robotic Process Automation and enables businesses to greatly reduce how often human employees need to interfere in these tasks.

Some professionals have been hesitant to invest in AI-driven solutions, primarily due to incomplete algorithms and the negative opinion towards “replacing human jobs with robots.” However, artificial intelligence has seen some success in reducing HR costs through its inclusion in some software, and so RPA is experiencing considerable growth.

Furthermore, many of the solutions available today can be used in more simple applications, including the improvement of communications, reducing process inefficiency, and eliminating redundancy.

The Internet of Things

“Smart” devices are quickly becoming the new norm, even in the business environment. Many establishments are directing their budgets toward devices meant to improve security, evaluate utility usage, manage supply chains, and other operations.

The prevailing motivation behind implementing and integrating these devices is simple: better cost control. If a business has the tools to track and manage their costs, the entirety of the business can be better optimized. When fewer resources are expended on a business’ crucial interactions and processes, the business inherently becomes more sustainable.

Various Cloud Services

While it may seem like there has been ample time to take advantage of every aspect of the cloud’s capabilities, new services and utilities are still emerging. Sure, most businesses have adopted the cloud to support their email and file sharing needs, but this is the relative tip of the iceberg as far as the cloud’s potential is concerned. Businesses can now consider options like Infrastructure as a Service (IaaS), Security as a Service (SECaaS), and even AI as a Service (AIaaS), confident in the reliability of these increasingly popular utilities and others.

Cloud vendors are also creating new services to see to a business’ needs. The largest cloud vendors can effectively fill any requirement a business has through increasingly specific services. As a result, SMBs definitely have options to help resolve their operational hurdles.

Cybersecurity Awareness

At this point, there is plenty of precedent to establish — without any doubt — that businesses of every size, industry, and resource level need to have a cybersecurity strategy in place. While many may argue that enterprise-grade security solutions are above their means, the aforementioned precedent makes this argument untenable. 66 percent of all SMBs were targeted by some kind of cyberattack in 2019, and 2020 is already projected to be just as bad, if not worse.

Fortunately, there are ways that a business can improve their cybersecurity preparedness, such as:

  • Staff training – It is a simple concept: the more able your employees are to spot and properly handle a potential cyberattack (like phishing), the less likely your organization is to be victimized. Security has improved greatly, thanks to methods like encryption, rendering your employees your most vulnerable point. Properly training your staff to identify and report suspected threats, the safer your network will be.
  • Threat intelligence – If you know how you are most likely to be attacked, based on the vulnerabilities that cybercriminals usually target, you will be better prepared to handle these attacks. Think of this as the practical application of “knowledge is power.”
  • Multi-layering – With all the potential security issues that businesses face today, businesses of all sizes need to have a strategy in place to reduce all risks that face them. Therefore, all businesses and especially small businesses, need to have redundant file backup, DNS protection strategies, and AI/machine learning-enabled security features in place.

Improved Mobility

For the past decade, businesses have struggled with mobilizing their workforce. As a result, with today’s emphasis on remote work and other mobility-related concerns, solutions that enable a mobile workforce while eliminating risk have increased in importance. Now, increased connectivity, improved data security, and data protection policies like Bring Your Own Device (BYOD) allow your operations to be completed from inside and outside of your workplace, with resources safely delivered to your employees as they need them.

NuTech Services can help businesses around Michigan adopt these approaches, or improve their use of them, to assist their operations and boost profitable productivity. To learn more, give us a call at 810.230.9455.

250999058_phising_400.jpg

Tip of the Week: How to Avoid Phishing Scams

250999058_phising_400.jpg

For many businesses, email plays a crucial role in the dessemination of information. Whether it is simply interacting with clients or pushing directions to individuals, email is a simple and efficient way to communicate. One problem that organizations are running into is that individuals are being inundated with social engineering messages called phishing. This strategy is causing major operational problems for businesses, from malware to data breaches to extended downtime. For this week’s tip, we identify what exactly phishing is and how it is used to the detriment of many businesses and other organizations.

What Exactly Is Phishing?

The practice of phishing is not new. It has been used for much of the past decade. The strategy goes like this: hackers use deception to get a user to provide their own credentials, thus giving them unknowingly to the hacker. The hacker then accesses the account legitimately (as the user) and has free reign over the entire account. Sometimes they will go in and siphon data and sometimes they will hijack the entire account, but regardless of the hacker’s intentions a successful phishing attack is a successful transfer of power over an account. 

What’s worse is that you can get phished in multiple mediums. Email is the predominant channel where phishing attacks are carried out, but people can (and do) get phished over social media, instant message, or via text message. There are even phone-based or snail mail phishing attacks that direct users to go to a fake website where they would provide their credentials and/or personal information. 

There are even different forms of phishing based on their intended targets. The general strategy behind traditional phishing attacks is to send emails out to as many people as possible, hoping to snare unwitting recipients into their phishing nets. Today, with more personal information available about people, there is phishing that targets individual people. This is called a spear phishing attack. Then there are spear phishing attacks that are carried out against business and organizational leaders. These are called whaling attacks. The intended imagery aside, phishing attacks are getting more direct, more deceitful, and more serious. 

Spotting Phishing

For all of the bad news surrounding phishing attacks, there is some undeniably good news: with a critical eye, you can tell when you are being phished. You aren’t going to fall for these types of attacks if you know what to look for. Today, we’ve put together a short guide on how to determine if you are dealing with a phishing attack and how to proceed when you are.

Look for Warning Signs

There are a litany of warning signs that will help you spot a phishing attack. Most of them are pretty obvious, and some of the more subdued ones come with telltale signs. 

Does the message have spelling and grammar mistakes? 

Not many businesses will send out official correspondence with grammar and spelling mistakes. This should be the first sign that something is amiss. Most phishing messages come from supposedly-reputable organizations and while a spelling or grammar mistake does happen from time-to-time, several mistakes won’t happen.  

Does the message deal with curious circumstances? 

One of the biggest telltale signs that you are dealing with a phishing attack is the tone of the message that is received. Does the message reference immediate situations that need to be remedied? Does it mention money or illicit a sense of fear or anxiety? If it has these elements, it’s probably not legitimate. Think about it: most organizations that need you to act immediately will have specific ways of contacting you and that correspondence will make it clear that you are dealing with a legitimate organization.

Does this message have a trusted URL?

Most phishing attacks will redirect to a website that is set up by the hacker. You probably shouldn’t be clicking on any links sent to you in an email unless you are sure who sent the email. One way to determine whether or not a link is from a reputable source is to mouse over the link and see where the link goes. If you get an email from Amazon and the link goes to amazorn.com, you are staring at a phishing email.

Protecting Your Assets

There are a couple simple ways to ensure that you or a member of your staff doesn’t fall for phishing attacks:

  • Use technology. A spam blocking filter on your email will go a long way towards removing unnecessary and potentially-malicious emails from hitting employee inboxes in the first place.
  • Training. Make sure your employees are trained to spot and properly handle attempts that may come through. By starting with the end user, you’re taking away a lot of the power that phishing has.

At NuTech Services, we appreciate the importance of secure workplace practices. If you’d like to learn more about phishing, and how we can help stop it from hurting your business, reach out to us at 810.230.9455.

303805582_social_engineering_400.jpg

Social Engineering Isn’t Going Away

303805582_social_engineering_400.jpg

When someone starts talking about social engineering, people often get confused. They think we’re talking about cloning. While having two of something you love may not be terrible, the social engineering we routinely cite is much, much worse. Social engineering is the act of using social interactions to get people to make cybersecurity mistakes. Today, we’ll take a look at social engineering and how it can have a negative effect on your business. 

What is Social Engineering?

Think of it like this: online, you have some type of social currency. Your personal information, your data, your interactions, your profiles, they all add up to your online life. If someone were to use that information to trick you into providing them access to your secure online accounts, you would be the victim of a social engineering attack. 

Basically, a hacker uses what amounts to the fundamentals of human psychology to gain unauthorized access to an account. Rather than exploiting a vulnerability within a system’s technology, a social engineer will take advantage of the human resources to gain access through relatively simple psychology.

Successful social engineering can be the result of many different actions. Some include: carelessness by an individual, perceived kindness, reaction to fear, and business as usual. Let’s take a look at these actions and how social engineering schemes work as a result.

Individual Carelessness

When there is a lack of diligence carried out by an individual, there are openings for a social engineering attack. This includes trash thrown out with information on it, keeping login credentials out in the open, and other careless actions. It’s important that you and your staff understand that the best practices of password protection, such as using a password manager, are crucial to maintaining the integrity of your company’s network and infrastructure.

Perceived Kindness

Many people won’t think twice about helping someone that asks for help. Social engineering attackers take advantage of the better angels of our nature, by using people’s helpfulness to gain access to secure computing resources. Any person can fall for this type of attack. This is why we stress that in order to keep your digital and physical resources secure, a critical eye for potential intrusion works. That doesn’t mean you have to be a jerk, but if a situation is presented to you that’s out of the ordinary, take anyone’s helplessness with a grain of salt.

Business as Usual

When we picture a hacker, we all tend to think about them the same way. They are brooding people sitting in a dark room typing away at a computer. In social engineering attacks, this couldn’t be further from the truth. A popular social engineering tactic is to gain physical access to a large business–where there are often a lot of moving parts–and then spend time at the business looking for ways into secure digital environments. This could also include straight hatchet jobs, where your employees would help people outside of your business sabotage your access control systems. 

Reaction to Fear

Finally, fear is one of the best motivators. By striking fast and threatening all types of negative consequences if a worker doesn’t help them get into a secure computing system, this kind of cyberattack can be a major problem. 

NuTech Services Can Help Protect Your Business

If you are looking to secure your network from cyberattacks, including social engineering, the IT professionals at NuTech Services can help. Call us today at 810.230.9455 to learn more about how we can help you with the training you need to keep social engineering from causing problems for you.

60186117_printer_managed_400.jpg

How Well is Your Printing Managed?

60186117_printer_managed_400.jpg

The dreaded printer is often ignored by business professionals, until they have to use it, and it’s out of ink/toner, has a paper jam deep inside the machine, or they mysteriously disappear from the network for no reason. They are forgettable machines that hardly function properly and need constant maintenance; and, this can get really expensive.

Depending on their needs, businesses might have a series of consumer-grade printers, or they may rely on a centralized network copier/printer. Regardless of how you go about using the printers at your business, ensuring they are managed centrally will help a business cut down on problems. 

You Can Manage and Control the Expenses Tied to Printing

Many businesses don’t manage their printers at all. As ink/toner prices continue to climb, this can produce major, pointless costs. That’s why some businesses have begun to push a paperless strategy, using digital means to store, search, share, and back up organizational files. This strategy, while coming with substantial costs, takes the guesswork out of the whole process.

Reducing the amount that your users print can really make a difference over time. In a recent industry survey conducted by Xerox, it was found that 64 percent of small businesses aren’t tracking their printer usage costs. The report also revealed that nearly half of companies believe that their employees were just printing out their emails. 

Printer Management is Worth Investing In

To avoid the waste that comes with this type of behavior, a small business can deploy tools used to control, report, on, and restrict printer usage. Since every business has different uses and requirements, using a permissions-based system allows for centralized management over your printers.

Additionally, by having a print management platform in place, those endpoints are patched, updated, and protected against threats. There have been many cases over the last couple years where cybercriminals have utilized office printers as an entry-point for spreading malware or breaching data. These types of exploits can cost your business a lot more than another ream of paper or toner cartridge.

Going Paperless May Be Right for You

For some organizations, it may be worth it to reduce your printing costs by going paperless. Going completely digital means that documents can be searched, copied, organized, and shared securely, and backed up without requiring paper, toner, or bulky filing cabinets. Today, even contracts can be shared and signed digitally without a single sheet of paper being used.

Would you like to learn more about paperless office solutions? Contact us today at 810.230.9455.

50010208_onedrive_microsoft_400.jpg

Tip of the Week: Making Microsoft OneDrive Work for You

50010208_onedrive_microsoft_400.jpg

From its very beginnings, Microsoft has been creating devices and software to help users accomplish their goals. This is one reason why their solutions are so commonly found in businesses. Today, we wanted to focus on just one, OneDrive, and highlight some of its features that any business could find useful.

For context, it helps to know that Microsoft OneDrive is a cloud storage platform that just about any business could make use of, regardless of its size. After all, any size of business will have to remain organized.

Speaking of which, our first tip covers how OneDrive can make this organization super convenient for you.

OneDrive Files On-Demand

Files On-Demand gives your users the ability to effectively link their File Explorer to OneDrive, which enables them to work with files found in your OneDrive without downloading all of them to their device. Not only does this save real estate in the device’s storage, it allows work to continue offline through a simple proactive switch in a particular file’s settings.

Known Folder Move

OneDrive can also work as a simple backup option, although it certainly should not replace a comprehensive plan. Regardless, Known Folder Move allows users to have the contents of certain folders automatically synchronize with their OneDrive storage. This can be set up during the initial installation of OneDrive, or at any time you have need for it.

Integration with Microsoft Outlook

Consider what typically happens when you try to share some kind of Office document as an email attachment for someone to work on: you aren’t sending them access to your file, you’re simply sending them their own copy. OneDrive fixes that by enabling a user to share their files as though they were attachments, editing the permissions provided on the fly. As a result, the actual file is being collaborated on, really allowing work to be done.

What has been your experience using OneDrive? Share your impressions, as well as any other questions we can help with, in the comments!

245873693_managed_it_assessment_400.jpg

What’s the Point of An IT Assessment

245873693_managed_it_assessment_400.jpg

In business today, information technology is being utilized in a manner that can make it seem like business isn’t possible without it. In some cases, it isn’t, but then there is technology being deployed that is simply inefficiently deployed, used haphazardly, and could be looked on as more of a liability than anything else. Frequently getting an IT assessment can help keep your IT infrastructure secure, agile, and aimed at solving your organization’s operational issues. Today, we’ll take a look at the IT assessment. 

Promoting Assessment

The purpose of having an assessment done on your organization’s information systems is simple: to gain a more complete understanding of how your IT works in regards to your business. That’s not to say that having an understanding how everything fits will, in itself, make your business’ IT more effective. No, that’s on you, but in order to know that you need to change, eliminate, or reconfigure parts of your IT strategy, understanding what systems do what is essential. 

Moreover, the assessment gives decision makers a look at how inefficient their IT strategy is, and how to make the changes necessary to make those systems work better for the company. A thorough IT assessment will have several parts to it. Today, we are going to go through what to expect when you get an assessment; or, what you need to look at if you want to objectively assess your own business’ IT.

Two crucial metrics that will repeatedly make an appearance are your total cost of ownership, and your return on investment.

  • Total Cost of Ownership (TCO) – This takes a look at the comprehensive cost of a given piece of business technology. Therefore, it goes beyond just the cost of procurement, and also considers how much the solution will cost to operate and maintain, as well as how much additional cost any downtime could create.
  • Return on Investment (ROI) – This familiar metric measures your profit from a single investment, once all procurement and operating costs have been covered.

Let’s look how these metrics come into play during an IT assessment:

At the Start

Typically, if your organization is going to conduct an IT assessment, there is some reason for it, and the results of this assessment (or audit, if you prefer) will likely have more to do with your future investments than many other actions would. This fact dictates that the audit is carried out by IT professionals who have the training needed to recognize inconsistencies, irregularities, and most importantly inefficiencies. 

Action

Any good IT assessment will begin by putting together a comprehensive Asset Detail Report. This will tell you what IT resources you have, when they were implemented and serviced, the latest firmware and software license and much, much more. This will cover all of your IT, including printers, copiers, cloud-based platforms, computing and networking hardware, software, and more. 

Additionally, you might find it helpful (at this stage) to create something known as a site diagram  or network map. This visual guide is used to map out the flow of data through your business.

Analysis

The assessment team will next audit your network by performing a SWOT analysis (which analyzes your business network’s strengths, weaknesses, opportunities, and threats). In this process it will become more clear what potential problems your network has and what it’s doing to function efficiently. There will be investment suggestions aimed to help reduce your organization’s IT risk, while also promoting solid TCO rates and improving your ROI.

Compilation

Finally, a risk report is assembled that combines the results from a variety of factors, including:

  • Network hardware
  • Security configuration
  • Servers
  • VPN/Remote Access
  • Websites, domain names, and hosting provider
  • ISP
  • Phone System
  • Email, messaging, and conferencing
  • Computers, mobile devices, tablets
  • Cabling
  • Printers
  • Software and mobile apps
  • Procedures, policies
  • Technology vendors

There are some other factors included in a finished assessment report. These include the status of domain controllers, the Active Directory settings, other potential vulnerabilities (like weak passwords and missing software updates), and any known network vulnerabilities.

Your finalized assessment will give you a comprehensive report that will be an indispensable tool for decision makers.

If you are looking for help identifying your company’s IT issues, call our knowledgeable technicians today at 810.230.9455. 

team_games_building_400.jpg

Motivate Your Employees with More Playful Work Practices

team_games_building_400.jpg

Workplace engagement has long been a conundrum–how do you maximize the productivity of your business without alienating your team through quotas and ironclad policies? Many businesses have been finding that an effective way to do just that has been to use a concept known as ‘gamification.’  Let’s explore gamification and how it might be useful to you.

Making Sense of Gamification

Many parents have historically used a gamification strategy to convince their young’uns to cooperate better with notoriously less-fun parts of daily life. Take clean-up time, for instance, which many parents will turn into a race between themselves and their children to see who can pick up quicker. Taking an unappealing task and adding game-like elements to motivate people to do it is the concept that forms the foundation of gamification.

This isn’t a new idea, either. Mark Twain knew what he was talking about when he wrote about Tom Sawyer tricking his friends into white-washing a fence for him. By making the activity seem elite and enjoyable, he hoaxed and hoodwinked his friends into completing his chore for him while they all enjoyed proving themselves capable. As was written at the end of that particular chapter:

“If he had been a great and wise philosopher, like the writer of this book, he would now have comprehended that Work consists of whatever a body is obliged to do, and that Play consists of whatever a body is not obliged to do … There are wealthy gentlemen in England who drive four-horse passenger-coaches twenty or thirty miles on a daily line, in the summer, because the privilege costs them considerable money; but if they were offered wages for the service, that would turn it into work and then they would resign.”

If the psychology behind this sounds silly to you, consider the concept of “employee of the month.”

Why Gamification is Effective

Human psychology is a big part of why gamification has been shown to be so impactful in motivating employees. As a species, human beings tend to be strongly motivated by certain desires, namely:

  • Recognition – I want my efforts to be paid attention to.
  • Competition – I want to win.
  • Distinction – I want to be rewarded for my efforts.

While many tasks originally lack the potential for most, if not all, of these desires to be filled, gamification can inject this capability by fulfilling all three of these desires. If an employee were to have the satisfaction of knowing that they performed most admirably, gaining some perks and being looked upon with favor from the higher-ups, it only makes sense that they would continue to strive to that position from that point on. Furthermore, it also helps to motivate your other employees to strive harder, so they may have a chance of receiving the same benefits as well.

Don’t believe me? Just look at Google, where gamification has helped chop down travel expenses by allowing the person with the most budget left over after a business trip to keep the difference.

Adopting Gamification

If you’re now considering a more gamified approach to business-as-usual, you have a great variety of options available to you. Different use cases and different industry types each have their own options to do so, all with the potential to be a great investment.

You can also elect how much you want to put into gamification. Sure, there are solutions out there specifically to gamify common business processes, but you could also come up with your own homespun methods. Maybe an employee who visibly went above and beyond one day would receive an entry into an end-of-year drawing for a desirable prize. You really are only limited by your creativity – or how long you’re willing to spend searching online for ideas.

Just as though you’re the parent trying to convince your employees to pick up their playthings, the key to effective gamification is to turn a rote task into an engaging activity.

Have you ever tried out any gamification methods in your office? Which ones did you find most effective? Share what you did in the comments!

AdobeStock_188630884_400.jpg

Tip of the Week: Why Rebooting Can Fix so Many Problems

AdobeStock_188630884_400.jpg

There is quite possibly no more famous question in IT services than “Have you tried turning it off and on again?” While it may sound like a joke (and has quite often been used as one), could this advice actually work? The short answer: it does. For this week’s tip, we’ll explain why that is.

There are countless examples of IT turning to a reboot as a quick fix for technology issues in popular culture. Going back to August 4, 1999, Scott Adams’ syndicated comic strip Dilbert featured Dogbert working in tech support, interrupting a caller with the instruction to “Shut up and reboot.” The Channel 4 comedy, The IT Crowd, turned it into a catchphrase for one of its characters…

The joke has appeared in countless other places, including Supernatural, the long-running show that airs on The CW…

Even South Park used the concept as a joke, as Kyle effectively saves the world after the Internet stops by traveling to the “center of the Internet” and discovering that it is a giant router. I bet you can guess how Kyle fixes it:

As it turns out, this trope really is an example of art imitating life.

Why is Rebooting So Effective?

Well, let’s consider how much you actually do with your computer (or your mobile device, or your router, or your washing machine, or anything else that now has its own operating system) on a regular basis.

You start processes, you may install new programs, and that’s not even considering the massive amount of computing that goes on behind the scenes. A lot of these processes and activities will start things up in the background that are never really resolved, which means that your system resources are being used up. This usually has the biggest impact on your Random Access Memory, or RAM. Ultimately, your solutions aren’t able to work effectively any longer, and you see the effects.

However, rebooting inherently ends all of these processes, as they all require power in order to work. As a result, once the computer starts back up again, these processes are no longer running and impacting your system’s resources.

As a result, you have a better-working computer, and the IT stereotype is proven correct.

Keep in mind: if an issue seems to come back and persist despite a reboot (or multiple reboots) you likely have a bigger problem at hand. If this is the case, you can always lean on the professionals at NuTech Services to assist you with your technology.

Just don’t be surprised if we ask a particular question.

Subscribe to our blog for more great tips, IT tricks, and best practices!

cybercriminal_400.jpg

Why It’s Paramount to Keep Security in Mind

cybercriminal_400.jpg

Over the last few years, there has been a meteoric rise in cybercrime, with nothing to indicate that rates will decrease anytime soon. Why would they? Bad actors and cybercriminals can make a pretty penny by attacking businesses, and they are only becoming more equipped and experienced in doing so. 

The past few years have seen some of history’s greatest data breaches. For instance, the most notorious of these attacks, the Equifax breach, Yahoo, and Marriott-Starwood, resulted in a combined total of 3.5 billion accounts breached.

This means, statistically speaking, you would have a pretty good chance of picking a data breach victim of the past few years by randomly selecting two human beings from the entirety of planet Earth’s population.

Crunching the numbers, there has been an increase of security breaches of 67 percent since 2014.

What Does this Mean? Is Anything Secure Anymore?

Interestingly, there is a plus side to these enormous data breaches happening in the public eye, thanks to a few key points:

  • It brings attention to these kinds of crimes – Thanks to disasters like the Equifax breach, more Americans are aware of the impact of cybercrime. This kind of awareness is crucial to encouraging improved security.
  • There is too much data for cybercriminals to practically use. This one can be chalked up to statistics… the more data that a given cache has, the less of a chance that your data is pulled up in an attack.

To clarify, we aren’t trying to sugarcoat the severity of a data breach, but having said that, the past few years’ cybersecurity threats have really given us all an example to consider. With new compliances, regulations, and other mandates being put into play, businesses are certainly considering these threats.

What About Small Businesses?

There is a tendency to overlook small businesses when discussing data breaches. After all, the ones that have struck large targets (like Yahoo, Target, eBay, Sony, and many others) almost always get a headline, along with the attacks that focus on municipalities, like the ones that targeted Albany, New York; Baltimore, Maryland; Wilmer, Texas or Lake City, Florida with ransomware.

What aren’t heard about so much, unfortunately, are the attacks that lead to much smaller companies shutting their doors for good… a side effect of the limited number of victims per attack, and the relatively casual approach that many have towards security. Unfortunately, a Verizon survey shows just how misguided the assumption that a smaller business size will protect it from threats, when 43 percent of businesses breached would be classified as small.

Security Needs to Be a Priority

Fortunately, there are ways that you can reinforce your business’ cybersecurity, especially with the help of NuTech Services and our experienced cybersecurity professionals. Call 810.230.9455 to get in touch with us, so we can help evaluate and fulfill your business’ needs.

250968623_smartphones_400.jpg

2020’s Smartphones, in Review

250968623_smartphones_400.jpg

There is no question that smartphones have assimilated into our daily communications, both on a personal level and in the professional sense. Apps allow us to be social, to accomplish work-related tasks, and yes, kill some time with the latest silly trending game. Of course, as time passes, these devices only grow more advanced. If you’re due for a replacement, you may want to examine some of your options before pulling the trigger.

Now, the phones we are reviewing might seem like overkill – and, in fairness, there are many more budget-friendly options that can handle most of what you’re likely to task them with. However, the lure of a new device can be tempting, so we decided to indulge that temptation and go over some of the best smartphones available today.

Samsung Galaxy s10 Plus

If you’re looking for a quality Android device, you’re probably leaning toward the Samsung Galaxy s10 Plus. The newest addition to the line of flagships, the s10 Plus comfortably ranks at the top of many “best phone of the year” reviews.

With an aluminum frame housing the 6.17 oz phone and its Dynamic AMOLED display, the Galaxy s10 Plus is finished in Gorilla Glass 5, and has sharper edges that previous models did, intended to improve the grip of the device.

Looking inside, the phone has some just as appealing specifications. Driven by a Qualcomm Snapdragon 855 processor and between 8-to-12 gigabytes of RAM, this phone makes improvements to the rest of its features as well. There are five onboard cameras, with wide angle, ultra-wide angle, and telephoto lenses. The onboard fingerprint reader for authentication purposes is now cunningly hidden under the display, and the s10 Plus is likely to be the last flagship phone that Samsung produces with a 3.5mm headphone jack.

The Galaxy s10 is now the standard for an Android phone to beat (at least until the s11 comes out) and can be purchased in the following colors for somewhere between $599 and $1,200:

  • Prism White
  • Prism Black
  • Prism Green
  • Prism Blue
  • Canary Yellow
  • Flamingo Pink
  • Ceramic Black
  • Ceramic White
  • Cardinal Red
  • Smoke Blue

Samsung Galaxy s10 Plus
Body: Aluminum frame with Gorilla Glass 6 front, Gorilla Glass/Ceramic back
Display: 6.4-inch Dynamic AMOLED (~522 ppi)
OS: Android 9.0 with Samsung One UI skin
Chipset: Qualcomm Snapdragon 855
Memory: 128 GB/8 GB RAM; 512 GB/8GB RAM; 1 TB/12GB RAM
Expandable Memory: microSD up to 1 TB
Cameras: Three back-facing (12 MP, 26mm wide angle; 12 MP, 52mm telephoto; 16 MP, 12mm ultrawide); Two front-facing (10 MP, 26mm; 8 MP, 22mm)
Sounds: Stereo speakers, 3.5mm headphone jack
Battery (battery endurance rating): 4,100 mAh battery (91 hours)
Security: Ultrasonic, under display fingerprint reader; IP 68 resistant
Miscellaneous: Nano-SIM, Wi-Fi 6, Bluetooth 5.0, 15W fast charging, wireless charging, reverse wireless charging, NFC, FM Radio
Other versions: Samsung Galaxy s10, Samsung Galaxy s10e

Samsung Galaxy Note 10 Plus

You probably remember the dramatic news a few years ago that the battery’s tendency to explode had led to a million-device-plus recall on their Galaxy Note phones, ultimately costing Samsung more than $5 billion. The issues have long since been resolved, and so the Note 10 Plus might just be the best large-factor phone for the business professional on the market today.

Again, enclosed in an aluminum frame with a coat of Gorilla Glass 6, the Note 10 Plus comes with a 6.8-inch Dynamic AMOLED display and an on-board s-pen stylus. Also featuring a Qualcomm Snapdragon 855 processor and up to 12 gigabytes of RAM, it is powered by a fast-charging 4,300 mAh battery. This battery is also QI wireless charging-compatible, and supports reverse-QI charging, which allows you to use it as a wireless charger in a pinch. It has Android 9.0 installed at first, but can now be updated to Android 10 with certain carriers.

Most major carriers stock this phone for between $849 and $1,200, in Aura Glow, Aura White, Aura Black, and Aura Blue.

Samsung Galaxy Note 10 Plus

Samsung Galaxy Note 10 Plus
Body: Aluminum frame with Gorilla Glass 6 front and back
Display: 6.8-inch Dynamic AMOLED, 1,440 x 3,040 (~498 ppi)
OS: Android 9.0 with One UI skin
Chipset: Qualcomm Snapdragon 855 
Memory: 256 GB/12 GB RAM; 512 GB/12 GB RAM
Expandable Memory: microSD up to 1 TB
Cameras: Four Back-Facing (12 MP, 27mm wide angle; 12 MP, 52mm telephoto; 16 MP, 12mm ultra wide angle; TOF 3D VGA camera); Front-Facing 10 MP, 26mm wide angle
Sounds: Stereo speakers
Battery (battery life): 4,300 mAh (~107 hours)
Security: Ultrasonic in-display fingerprint, IP68 resistant 
Miscellaneous: Wi-Fi 6, Bluetooth 5.0, 45W fast charging, wireless charging, reverse wireless charging, NFC, S-Pen functionality
Other versions: Samsung Galaxy Note 10

Apple iPhone 11 Pro Max

Apple is surging back into prominence with the iPhone 11 Pro Max, which consistently ranks in the top three of phones developed in 2019. A stainless-steel frame holds its 6.5-inch Super Retina OLED display, as well as an advanced neural engine-improved A13 Bionic processor to boost the iPhone’s trademark features – namely, Siri’s performance as well as the functionality of its camera and AI. Along with the A13 chip, the inside holds 64 or 512 gigabytes of onboard storage space and four gigabytes of RAM.

Speaking of the camera, the iPhone 11 Pro Max houses three distinct 12-megapixel cameras, featuring a telephoto lens, a wide-angle lens, and an ultra-wide-angle lens. Most major carriers offer it for about $1,100, and it comes in SpaceGray, Gold, Silver, and Midnight Green.

Apple iPhone 11 Pro Max
Body: Stainless steel frame with glass front/back
Display: 6.5-inch Super Retina XDR OLED; 1,242 x 2,688 (~458 ppi)
OS: iOS 13
Chipset: Apple A13 Bionic
Memory: 64 GB/4 GB RAM; 256 GB/4 GB RAM; 512 GB/4GB RAM
Expandable Memory: None
Cameras: Three back-facing (12 MP, 26mm wide angle; 12 MP, 52mm telephoto; 12 MP, 13mm ultrawide); Two front-facing (12 MP, 23mm; SL 3D camera)
Sounds: Stereo speakers
Battery (battery life): 3,969 mAh (102 hours)
Security: Face ID, IP 68 resistant 
Miscellaneous: Nano-SIM, Wi-Fi 6, Bluetooth 5.0, 18W fast charging, wireless charging, NFC
Other versions: Apple iPhone 11, Apple iPhone 11 Pro

Google Pixel 4 XL

This phone marks Google’s latest effort to carve out a portion of the smartphone market. Again, powered by the Qualcomm Snapdragon 855 processor, the Pixel 4 XL really shines where its visual features are concerned. With 537 pixels crammed into every inch, it features a 6.3-inch P-OLED display, as well as one of the best camera setups available today – including a 122 megapixel wide-angle lens and a 16 megapixel telephoto lens with impressive low-light capabilities.

The Google Assistant can be summoned by simply squeezing the Clearly White, Just Black, or Oh So Orange phone.

Most major carriers will sell the Google Pixel 4 XL for between $899 and $999.

Google Pixel 4 XL
Body: Aluminum Frame with Gorilla Glass 5 front/back
Display: 6.3-inch P-OLED, 1,440 x 3,040 (~537 ppi) 
OS: Android 10
Chipset: Qualcomm Snapdragon 855
Memory: 64 GB/6 GB RAM; 128 GB/6 GB RAM
Expandable Memory: No
Cameras: Two back-facing (12.2 MP, 28mm wide angle; 16 MP, 45mm telephoto) Two front-facing (8 MP; 22mm)
Sounds: Stereo speakers
Battery (battery life): 3,700 mAh (~73 hours)
Security: Face ID
Miscellaneous: Bluetooth 5.0, 18W fast charging, wireless charging, NFC, Squeeze for Google Assistant
Other versions: Google Pixel 4

OnePlus 7T Pro

Of course, not all of this year’s “flagship-level” devices are necessarily produced by the biggest companies, as dozens of smaller manufacturers are also developing high-performance smartphones. For instance, the OnePlus 7T Pro. This device is all about the speed of the user’s experience, which is why they augmented its flagship-level specifications with a 90 hz refresh rate, making it seem even faster.

The 7T Pro doesn’t exactly underperform in other considerations, either. With a 6.7-inch fluid AMOLED display that houses a fingerprint reader, it actually runs on Qualcomm’s creme de la creme processor, the Snapdragon 855+. With three rear-facing cameras and a front-facing selfie camera that pops out of the chassis when used, the camera notch has been eliminated. Finally, because price is always a consideration to some degree, this phone does the least damage to your bank account of the ones we reviewed here with the 8 gigabyte RAM model totalling around $699.

OnePlus 7T Pro
Body: Aluminum frame with Gorilla Glass 5 front/back
Display: 6.67-inch Fluid AMOLED, 1,440 x 3,120 (~516 ppi)
OS: Android 10 with OxygenOS 10.0.4 skin
Chipset: Qualcomm Snapdragon 855+
Memory: 256 GB/8 GB RAM; 256 GB/12 GB RAM
Expandable Memory: No
Cameras: Three back-facing (48 MP wide angle; 8 MP, 78mm telephoto; 16 MP, 13mm ultra wide angle); Motorized pop-up 16 MP, 25mm wide angle
Sounds: Stereo speakers
Battery (battery life): 4,085 mAh (~100 hours)
Security: Optical in-display fingerprint reader, pop-up facial recognition
Miscellaneous: Bluetooth 5.0, 30W “Warp” charge, NFC
Other versions: OnePlus 7T

Finally, there are other phones that, while not included in our list, are definitely ones to consider under the right circumstances. These include the Huawei Mate 30 Pro and P30 Pro, the Sony Xperia 1, the LG v50 ThinQ, and the Samsung Galaxy Fold.

We included the “right circumstances” caveat because there is currently a ban on Huawei devices in the United States. Despite their superior hardware, government sanctions have put the kibosh on Huawei products for the time being.

Other devices are also just starting to rise in popularity, like those featuring foldable displays – including the Samsung Galaxy Fold, the Huawei Mate X, and the nostalgia-pumping Motorola Razr. We’ll likely soon see how these foldable devices are received on a wide scale.

Finally, there is also the advent of 5G to consider. A few cities have started to implement the necessary technology for 5G, and so manufacturers will likely start developing 5G-compatible devices before long. While it will likely take years for 5G to become the standard, if you happen to spend time in one of these cities, it may be to your benefit to upgrade.

What device do you currently use? Do any of these interest you, or did we miss one that you’ve had your eye on? Let us know in the comments!

CES_2020_400.jpg

Looking at Business Technology Trends from CES 2020

CES_2020_400.jpg

The Consumer Electronics Show is where people get to see emerging technologies first. Typically thought of as an event where innovations in, well, consumer electronics are put on display, a lot of the technology on display at CES can be big news for businesses as well. Today, we are going to review some trends that CIOs and other business decision makers should be paying attention to.

5G

The first technology that anyone who’s anyone in the technology industry has their eyes on is 5G. If you were to think of a technology that would transform business, 5G might not be on the top of your list, but, rest assured, it will completely alter society, so businesses will be affected. What is 5G? It’s the long-awaited fifth generation of wireless connectivity that is promising ubiquitous gigabit speeds for everyone. While most of the hubbub surrounding 5G has been about sating people’s need for download speeds and autonomous vehicles, the technology will bring big changes for businesses. 

As far as the business goes, 5G will reduce latency to the point where all of the smart devices that have been introduced over the past half-decade can effectively communicate. This presents more dynamic options to use smart technology for business purposes in and out of the office. Since data transmission will see less latency and higher speeds, data and services should be seamless.

At CES, plenty was made of 5G as a mobile-centric technology, but a lot of the technology that was on display at CES shifted past the smartphone and onto devices that are aimed at improving business. Cutting edge computers, apps, networking equipment, and things (a whole lot of things) aimed at impressing CIOs and decision makers with advanced functionality and speed, were on display throughout the event. From supply chain management to transportation to (of course) mobility, the innovators at CES touched on a large cross-section of improvements 5G is going to make for businesses and at home. 

Cloud Analytics, Machine Learning, and Artificial Intelligence

Businesses have been pretty aggressive over the past couple of years implementing tools that claim to have some type of machine learning or artificial intelligence to improve many aspects of their business. The technology has been used liberally to improve customer service, optimize operations and logistics, even to predict customer behavior. Even in its relative infancy, the applications for these technologies seem to be vast.

At CES, visitors got a look at all types of new ways that businesses are going about using these technologies. One of the most impressive uses of these technologies is in new logistics tools. Between the use of autonomous vehicles that speed up businesses and lead to fewer shipping costs, and computer vision that provides transparency in the acquisition and viability of resources, AI is at the center of business-specific applications that will make it to market in 2020. 

Consumerization of IT

At an event called the Consumer Electronics Show, it stands to reason that it would be a treasure trove of new and useful technologies (or in the case of CES 2020, technology-fueled “things”) on display. The consumerization of IT has been ongoing for the past several years, and businesses have reaped the rewards of this. 

At CES, the whole event is dedicated to pushing the consumerization of IT. New solutions to problems, new products incorporating innovative technology, and strategic technology rollouts aimed to take advantage of other innovations were all over CES 2020. New computers, including the first look at some 5G-capable ones, are some of the more noteworthy of the event; and, are definitely aimed to catch the attention of CIOs and other business decision makers. 

With so many prototypes being unveiled at CES, it’s hard to maintain that this technology will even make it to market, let alone be available any time soon. If you want to learn more about CES 2020, visit the event’s website at https://www.ces.tech/. For more great technology-centric articles aimed to help your business, return to our blog soon.