AdobeStock_80613642_400.jpg

Big Data for the Small Business

AdobeStock_80613642_400.jpg

Today, large companies typically use their data to help them make more educated business decisions. This strategy can actually benefit smaller businesses as well. However, they often don’t think they have enough data to facilitate analytics or BI (Business Intelligence) platform. Let’s take a look at how small businesses can use their big data. 

To Identify Trends

The number one thing you need to know about data analysis is that the data you use needs to be structured in a way to allow you to get the most accurate information possible. This isn’t always easy. In order to put your business in the right position you can’t just rely on decision makers to go with their gut reaction, you need a definitive plan fueled by empirical data so that you avoid huge costs to solve small problems. The simplest way to do this is to identify trends inside and outside of your business. You can do this through a dedicated business analytics platform, using your organizational data to help you make sound business decisions. 

Improving Operational Effectiveness

Another part of the business that can be improved through the use of analysis is operations. Traditionally, the more efficient your business is, the more effective it is. This doesn’t change because you have data; but, with the data you can get a better perspective about how your business works, how your customers interact with your company, and a lot more. The better you understand the separate parts of your business the more you can confront its pain points and build effectiveness. 

Shifting Your Revenue Generation Strategies

Since you are in business to make money, it stands to reason that using any resources to help you do that is beneficial for the company. Combing through your operations and marketing data can provide opportunities that you didn’t know were there. It can make all the difference for the small business that needs to transition quickly in order to sustain operations. 

It’s been said that data is the new oil. That may or may not be true, but for the small business, drilling into your data to see the best way forward is a solid practice that will become commonplace before long. To get out in front of it, call the IT professionals at NuTech Services at 810.230.9455 and we will help you get started using your data to benefit your business today.

website_228145272_400.jpg

URL Manipulation and What to Do About It

website_228145272_400.jpg

Most people know what a URL is. It’s the address of a website, typically starting with http:// or https://, and it is essentially the location of a web page or application that can be accessed through a web browser or application. Nowadays, URLs are being manipulated by actors for both positive and negative means. Let’s take a look at URL manipulation and how it could affect you.

The URL

Before we get into the manipulation of the URL, let’s define its parts. 

The first part of the URL is called the protocol, which tells the computing network which language is being used to communicate on said network. Most of the time, the URL will use the protocol “HTTP”. The HyperText Transfer Protocol makes it possible to exchange web pages. Other protocols that are used include File Transfer Protocol, News, and Mailto. 

The second part of the URL is the ID and password, which makes it possible to access secure servers on the network. This part is typically removed because the password will be visible and transfer unencrypted over the computer network.

The third part of the URL is the server name. It allows users to access information stored on specific servers whether through a domain or the IP address associated with the server. 

The fourth part of the URL is the port number. This number is associated with a service and tells the server what type of resources are being requested. The default port is port 80, which can be left off the URL as long as the information that is being requested is associated with port 80.

Finally, the fifth, and last, part of the URL is the path. The path gives direct access to the resources found tied to the IP (or domain).

Manipulating the URL

By manipulating parts of the URL, a hacker can gain access to web pages found on servers that they wouldn’t normally have access to. Most users will visit a website and then use the links provided by the website. This will get them to where they need to go without much problem, but it creates their own perimeters.

When a hacker wants to test the site for vulnerabilities, he’ll start by manually modifying the parameters to try different values. If the web designer hasn’t anticipated this behavior, a hacker could potentially obtain access to a typically-protected part of the website. This trial and error method, where a hacker tests directories and file extensions randomly to find important information can be automated, allowing hackers to get through whole websites in seconds. 

With this method they can try searching for directories that make it possible to control the site, scripts that reveal information about the site, or for hidden files. 

Directory traversal attacks, also known as path traversal attacks, are also popular. This is where the hacker will modify the tree structure path in a URL to force a server to access unauthorized parts of the website. On vulnerable servers, hackers will be able to move through directories simply.

What You Can Do?

Securing your server against URL attacks is important. You need to ensure that all of your software is updated with the latest threat definitions, and keeping a detailed configuration will keep users in their lanes, even those who know all the tricks. 

The IT experts at NuTech Services can help you keep your business’ IT infrastructure from working against you. Call us today at 810.230.9455 for more information about how to maintain your organization’s network security.

history_249687757_400.jpg

Cybersecurity: An Origin Story

history_249687757_400.jpg

The way a business handles network security is directly related to what problems will arise from their use of information systems. Cybersecurity has become a major part of all businesses, of all geographic locations, and all sizes. Because the better your cybersecurity is, the less problems your business will have to overcome, cybersecurity has grown into a multi-hundred-billion dollar a year industry. Cybersecurity hasn’t always been a concern for businesses. After all, the internet hasn’t been around for THAT long. However, the history of cybersecurity has a fascinating story behind it, and today we’d like to share it with you. 

Let’s start with where we are now. History is best told on a timeline, so let’s start from the present. Cybercrime today is profiting over $1.5 trillion each year, and that figure continues to climb. Some have predicted that this figure will nearly quadruple by 2021. Security breaches are up by 67 percent over just the past five years.  

How is this figure climbing so quickly? Well, let’s examine the most popular form of cybercrime: phishing. The method that cybercriminals are using are able to deploy all types of malware, yet also has data-stealing abilities. Whether that data is your sensitive personal information, or login credentials to your bank account, phishing gives a cybercriminal direct access. The worst part for people who have fallen victim, is until something dramatic happens, they are clueless that they have even become a victim. Phishing attacks have led to billions of records being exposed, stolen, or corrupted each year.

Cybercrime has become a real concern for all business owners. So how did all of this start?

The Beginning 

This information NuTech Services is about to reveal may be hard to believe, but cybercrime was Bob’s fault. This trillion-dollar criminal trend is the result of a research project held by a man named Bob Thomas. Bob Thomas made the observation that a program is able to move across a computer network, leaving a trail behind. He then proceeded to write a code that was named “Creeper”. This code resulted in a program that was designed to travel between Tenex terminals on the ARPANET. The message that came across? “I’M THE CREEPER : CATCH ME IF YOU CAN”. 

The research project sparked the attention of email inventor Ray Tomlinson. Tomlinson altered this program into a self-replicating one. This resulted in the first computer worm. Immediately after this discovery, he wrote an additional code which was titled “Reaper”. This chased down the Creeper code, and deleted it; which resulted in what was effectively the first antivirus software. 

So how did Bob’s experiment start all of this? Well, in the 1980s Soviet hackers considered the applications of this experiment. Academics designed applications that could be used to infiltrate other networks. This ideology quickly spread, and in 1986 German hacker Marcus Hess hacked into an internet gateway which was hosted at the University of California at Berkeley. This hacked connection was then used to piggyback onto the ARPANET. He hacked into a total of 400 computers, including mainframes hosted at the pentagon. 

How did this turn into such a profitable “business”? Hess planned on selling the secrets found on these computers to the Soviet KGB. Before he was able to do so, he was caught by the group effort put forth by the FBI and the West German government. His conviction was the first of its kind — cybercriminal activity sentencing. The abnormality of the case resulted in a 20-month suspended sentence. 

At the same time as this was occurring, computer viruses started to become a serious threat. With the exponential growth of the internet, there were more connections that viruses could infect. The virus started to become a real problem.

The Middle

In 1988, Robert Morris woke up and decided he wanted to see just how big the internet had become. Morris, a software engineering student at Cornell University, wrote a program designed to spread across various networks, work themselves into Unix terminals, and begin replicating. The software replicated so quickly that it actually slowed down the early Internet, which caused major carnage. This carnage become known as “the Morris Worm”. Morris’ worm resulted in the formation of the Computer Emergency Response Team, known as US-CERT today. Morris was the first person convicted under the Computer Fraud and Abuse Act (CFAA). This act was introduced with the intentions to protect against unauthorized access. 

After Morris’ worm was handled, viruses began being developed at an absurd rate. The antivirus industry, which started in 1987, began to grow as a result. By the time the Internet was an accessible user-product in the 1990s, dozens of solutions were available to prevent devices from being infected. These solutions scanned the binaries on a computer, and tested them against a database of known virus-code. There were major problems with this protection method, such as the abundance of false positives. They also had a tendency to use a lot of the systems’ resources to scan for these viruses. Remember how slow dial-up used to feel? Your anti-virus could have been the culprit. 

The mid-90’s to late-2000’s were a prospering time for the world of viruses. While the figure was estimated to be a few thousand known viruses in the mid 90’s, that figure was estimated to be around five million by 2007. These different malware strains were either worms, viruses, trojan horses, or other forms. By 2014, 500,000 different types of strains were being created daily. This time truly was the malware boom. 

Who was stopping this boom? Well, nobody. Cybersecurity professionals needed to make an effort. Antivirus solutions simply couldn’t keep up, and while they might detect malware, they had a hard time preventing it. Innovations in cybersecurity developed quickly. First, endpoint protection platforms (EPP) that didn’t just scan for known code, they also scanned for code similarities. This meant that unknown viruses could be detected.

The End?

With advanced malware defeating endpoint protection regularly, it was time to further innovate cybersecurity measures. The timeline innovators had was cut short with the deployment of WannaCry. WannaCry was, at this point, the most devastating piece of malware that existed. WannaCry even shook the world of the most capable security professionals. It encrypted the data on a computer and forced the computer owner to pay in Bitcoin to regain access to these files. This deployment sparked an explosive increase in the cybersecurity industry. It was time for cybersecurity to surpass the capabilities of cybercriminals, instead of being constantly behind.

The only way anyone was able to determine if they were being infiltrated was to have a transparent network. Administrators began using endpoint threat detection and response (EDR) services to monitor their networks. This solution is still cutting edge by today’s standards. While this isn’t the end for cybersecurity, EDR services are extremely capable of keeping malware out of your network. 

If you would like to learn more about cybersecurity, or are interested in keeping your business’ data safe, call NuTech Services today. Our professionals can be reached by calling 810.230.9455.

outsource_102117857_400.jpg

There’s Value in Outsourcing Your IT, Part V

outsource_102117857_400.jpg

Information technology continues to play a more significant role in businesses, and as technology changes, so should yours. IT procurement is a critical part of any business’ success, which means that your business can greatly benefit from a managed service provider. They have the know-how to procure all of the best technology. Today, we will discuss how your business can acquire the IT it deserves. 

Businesses Depend on IT

There are a lot of different pieces of technology that go into a business, and like a puzzle they all need to fit together and work. So where do all of these puzzle pieces come from? Let’s examine different types of technology.

Servers and Networking

Here are two scenarios, and the different methods businesses use to handle them:

Walter’s business is growing extremely quickly, but his servers are the same ones he’s been using for years. He realizes he is running low on storage space, and his increasing staff puts pressure on him to upgrade his server. Walter manages to cobb something together, hoping it will suffice for the time being. When Walter attempts to merge his servers into one slightly larger server, he misconfigured a few components resulting in downtime for his entire staff. Not only has he wasted his own time, but now he is experiencing the most expensive segment of downtime he has ever experienced. 

Jesse, on the other side of town, also is experiencing extraordinary growth. Jesse however, makes a simple phone call to his managed service provider. He is connected to a professional, who advises Jesse on server options that will sufficiently support his growing business. His managed service provider not only points him in the right direction, but also comes on site to install this new technology. Jesse knows he isn’t a tech know-it-all, so he leaves deployment of servers to the professionals. His business is ready for increased data storage that same week he decided it was time to expand. 

Workstations

Your business’ employees are only capable of what their technology can handle. When it comes time to upgrade or add additional workstations, there are a few options one can take. Let’s see how our two business owners handle these situations.

Walter, who is an impulse spur of the moment shopper, sees what he believes is a fantastic deal on eBay. He decides that these second-hand computers will be able to handle all of his employee’s programs without issue. However, upon arrival Walter notices that his computers are missing a few components. It turns out that the eBay listing was actually for five home-made computers that the builder was never able to get to operate properly, rather than complete working PCs. Overlooking the description just set him back a large amount of money, and the computer repair shop charges nearly as much as a brand new PC would have. 

Jesse, has a few empty desks he would like to fill with capable computers as well as a few new employees. He reaches out to his managed service provider to discuss which computer might fit the needs of his business. The professionals are able to use their connections to get Jesse a fantastic deal, and most importantly, the purchase of the computers comes with free installation.

Software as a Service

What good would a computer be without the necessary software? Businesses should be utilizing the latest and greatest software. There are a few different approaches a business owner can take to procure the necessary software to boost productivity within the office.

Walter knows that software can be expensive, so he decides to torrent a few versions hoping that he doesn’t get caught. Unfortunately, however, Walter is exposed as a fraud and his business is the center of attention for all things media. His business suffers massively, and he wishes he had spent a fortune on the software instead. 

Jesse too knows how expensive software can be. Unlike Walter, he once again leans on his managed service provider. They offer what is known as software-as-a-service. This service gives you all the latest and greatest software, for a low monthly cost. It’s like renting a tool, as opposed to buying it outright. Not only does this tool come with free installation as well as support, but it doesn’t set Jesse back a large sum of money. He is able to give his employees all of the programs they need to proficiently do their jobs. 

Which Experience Sounds More Enjoyable?

If you had a choice to be Jesse or Walter, which would you choose? Managed services truly offer support for all of your business needs. If you would like to learn more, reach out to our professionals by calling NuTech Services at 810.230.9455 today!

managedIT_118394944_400.jpg

There’s Value in Outsourcing Your IT, Part IV

managedIT_118394944_400.jpg

Many businesses are capitalizing on the vast amount of benefits Managed IT services can bring to the table. These service providers are able to assist your business in obtaining, and managing the technology that you rely on. Working with one of these providers can help your business simplify data management practices, as well as make them much more secure. Today we will go over how they are able to do so.

As we have done throughout this series, we will compare the experience that a managed service provider is able to deliver, compared to the alternative.

Cloud Services

Brennan’s business gathers and stores a substantial amount of data, as most businesses do. His business relies heavily on this data, as he runs an organization which depends on client contacts. To store all of this data, Brennan decides to do some research and build his own server. He understands the basics, and begins work. Not only does this take up a large amount of space, it also requires an absurd amount of power to operate. This makes the office unbearably hot. Furthermore, Brennan hooks up connections incorrectly causing equipment failure. This is not covered under warranty, and the initial cost of setting up a server is astronomical. 

On the other side of the town, Dale works in the music industry. His business decides to go with managed services. Dale is quickly connected with a trustworthy, dependable cloud service. He is then able to store all of his data and applications in the space provided by this service. It only costs a minimal monthly fee in comparison to the initial cost a server build would require. 

Backup and Disaster Recovery

Let’s assume both Brennan and Dale are given the same set of circumstances. A flood causes both businesses to be completely under water. How differently will these two business owners handle this disaster?

Brennan, panic stricken, attempts to grab whatever equipment he can salvage. His business relies entirely on the information stored within his computers. He is only able to get a small number of computers operating again, and since all of his data was in-house, nearly all of it is destroyed. Brennan’s business is in some truly dire straits. 

Dale immediately begins his backup and disaster recovery plan. His plan has been tested recently, so he is confident that his entire business can operate off-site. All of his data is stored in the cloud, which means it is all accessible anywhere there is internet. Dale’s cloud service also goes the additional mile of storing his data in an additional place. This ensures that there truly is a backup, and the same disaster that causes a backup plan to be utilized does not destroy the backup data. 

Data Warehousing

The process of combining seeming less unrelated data into a singular platform is data warehousing. This process helps businesses fuel their analytics as well as their business intelligence platforms. These platforms are turning into some of the most important tools a business owner can utilize, as they provide immense value by providing decision makers a thorough knowledge base.

This processing requires a bit of computing power. In fact, it requires more computing power than Brennan’s entire home-made system is able to muster up. Since Dale utilizes managed services, he has no issues accomplishing his goals. His provider’s flexibility ensures he is able to adjust his infrastructure as needed. 

Managed IT Value – Up Next 

In the next part of our series, we will be discussing how a managed service provider can assist with IT procurement. NuTech Services is always available to answer any questions you may have, so give us a call at 810.230.9455 today!

consult_245132467_400.jpg

There’s Value in Outsourcing Your IT, Part III

consult_245132467_400.jpg

When you need something done that requires a level of skill or experience or knowledge that you don’t have, what do you do? Generally, you call in someone who has the required skill, experience, or knowledge that is required. Your business’ information technology strategy should be approached in the same way. As we continue our series on how managed services can make a business more efficient, we’re considering consultants.

What is Consulting?

Like we’ve established, it isn’t uncommon for people to recruit an expert or a professional with the capability to assist them with a task that the person cannot do. There are many reasons that people do so: they may not have the skill to safely work on whatever process is required of them, they may lack the technical know-how to complete it. Sometimes, it is simply to ensure that something is done the right way.

Whatever the reason may be, bringing in an expert (often referred to as a consultant), is a great way to help reinforce your chances of a positive outcome.

What You Should Expect When Working with Consultants

First and foremost, the consultants you work with need to have a better grasp on their area of expertise than you do, and should be motivated to give you the value that you are looking for in a provider. NuTech Services qualifies as a consultant for managed services, working with businesses to ensure their information technology solutions are optimized.

As such, we are committed to using the experience and expertise that we have built up to deliver the solutions and services that our clients need to be successful. After all, the success of a managed service provider is dependent on the success of its clients, providing the motivation to deliver services that deliver the positive outcomes these businesses are looking for.

There are a variety of services we offer to help accomplish this shared goal through our consultation. If the technology you use could stand to see an upgrade, following through with us allows the decision makers we work with to take the data on their past and present IT strategies. As a result, we can make the best decisions for them that will help to cement their business’ future.

Here are some of the consulting services that we offer:

Virtual CIO

One of the biggest concerns that businesses come to us with regarding their technology is (predictably) the cost associated with their IT implementations. There are a few reasons that that they’ll do so… some are looking to upgrade, others will want to scale their technology to match their business’ growth without outpacing their budget. Whatever the reason, there is one fundamental motivation why they do so:

In essence, these companies want to make sure that their investment will provide them with the value they require (or really, demand) of it.

Working with you as your Virtual CIO, we can oversee your complete IT strategy. Our seasoned professionals will evaluate your current technology, identify which products and services will serve your needs best without breaking the bank, and work with you to strategize your approach to your IT from top to bottom. As a result, you aren’t saddled with the responsibilities to research and come to decisions – duties that you probably have neither the time nor the practical experience to take on.

Business Process Management

One of the major benefits of any business technology is the positive effect it has on efficiency. When working to streamline your processes, your in-house resources may not have the perspective to see the big picture and come up with an efficient and effective plan. An outside resource, like a managed service provider, has that needed perspective. Pair that with the experience they have in optimizing business resources, and you have a winning combination.

By working with a partner who is committed to equipping you with the processes and tools from start to finish, you can shift your productivity/waste ratio in the right direction – and the better your productivity, the higher your revenue.

Vendor Management

How much time has your business sunk, in total, into working with your vendors? How much has that cost the business? You need to keep in mind that vendors are – in most cases – effectively salesmen. Not to say this is a bad thing, but it does mean that the majority of vendors will prioritize making a sale over ensuring you get what will serve you best. However, with NuTech Services, you will no longer need to deal with vendors … we’ll do it for you. Anything you need, you’ll be able to call us and get it, simplifying and streamlining your procurement.

Find Out How Else We Can Help

By working with a managed service provider, a company has a simpler means of handling their crucial technology. Whenever they need a problem solved, they simply lean on their provider to see to what’s needed… whether that’s support, resource management, or a representative to speak to vendors. NuTech Services can be that for your business.

To learn more about our consulting services, reach out to us at 810.230.9455 – and don’t forget to check back here on Wednesday for part four of this series!

support_108749551_400.jpg

There’s Value in Outsourcing Your IT, Part II

support_108749551_400.jpg

Old-school business information technology support isn’t necessarily wrong, but it most definitely isn’t cheap nor efficient. IT support strategies are developing in ways that some time ago, would have thought to be unheard of. Your business no longer needs a full on-site staff designated to maintaining network security or updating software. In part two of our five-part series, we discuss how your business can have the support it needs through managed services. 

MSP Support

The Managed Service Provider (MSP) provide an experience unlike traditional service providers’ methodology. Let’s take a look at two scenarios:

Tom is emailing his boss in regard to a company project when all of a sudden his software closes. Tom tries to re-open his email, resulting in well, no result. Tom, frustrated at his email software, spam clicks the application which causes his entire computer to freeze. He has to ask his neighbor to contact their IT department for him. Unfortunately, they are out for lunch which results in a massive amount of downtime for not only Tom but for the business itself. 

Jerry, who works for a business on the other side of town, is working on a project when he too is experiencing technical difficulties. Jerry has been working on a new business logo in his graphic design software. While opening his file, he is prompted with a message informing him that his software license is not valid. Jerry wastes no time in creating a ticket with his managed service provider. Within minutes, a technician remotes into Jerry’s computer, reconciling the issue at hand. Jerry is up and working in a timely manner. 

Time is money, so why not save yourself time with managed services? 

Onsite Support Services

Managed service providers leverage remote support simply because of how efficient it is. It doesn’t make sense for a technician to come all the way out to your business to resolve an issue that could have been resolved at their own office. However, when a situation occurs where a technician is actually required to be present, managed service providers have trained staff ready to be dispatched. 

When something goes wrong, IT support needs to be present. It isn’t cost effective to have IT support present when your infrastructure is operating as it should.

Keep Business Moving Forward

Time is a business’ most scarce resource, so why waste any of it? Every moment is valuable, so you can’t afford to sit idle waiting for IT to return back from lunch or wait for them to have a free moment. To ensure you get the most out of every second, NuTech Services offers managed services which can greatly benefit your business.

This is far from the end when discussing the benefits of managed services. Return back to our blog page to read part three of this series. If you would like to discuss additional support options offered with managed IT services, give us a call at 810.230.9455.

lightbulb_259477136_400.jpg

There’s Value in Outsourcing Your IT, Part I

lightbulb_259477136_400.jpg

Computers sometimes appear to have a mind of their own. For businesses, this is less than ideal. If the support structure is not in place to take control of your business’ infrastructure, your business’ profitability may be negatively impacted. In this five-part series, we will discuss how being proactive keeps your technology in check. 

A Proactive Approach 

Which scenario which would you prefer to be in:

You take your car to a shop for a tune up. A technician calls to inform you that your engine has hardly any oil in it due to a leak. However, he replaces a gasket and tops your oil off. The simple fix has cost just $80. 

OR

You notice your car is leaving dark black stains in your driveway, but after a quick google search determine that your car is probably fine, and the money you could be spending on a tune up could be better spent on an iPhone. Once all the oil is gone, your motor has completely seized due to the lack of lubrication, and you have to use your brand new iPhone to call a repair shop. The new motor will set you back $3,000. 

Your answer to the question should be obvious, but how can you take the same proactive approach with IT? The strategy most businesses choose is one that has proven its worth — managed IT services. 

What are Managed IT Services? 

Managed IT services monitor systems through the use of remote monitoring. This strategy is extremely beneficial as an IT staff does not need to be on-site at all times. By using state-of-the-art tools, managed IT providers are able to monitor your business’ network and hardware, ensuring they are operating correctly. If it is not working correctly, a technician is typically able to resolve the issue remotely. This, of course, means you might not even be aware of a potential issue–and most of the time–it will be resolved before you know it. 

Having a fix-it-when-it-breaks attitude has no place in any business. The value that managed IT services delivers cannot be matched. The only comparable proactive solution is having an on-site IT staff working around the clock. How much do you think that would cost you?

Imagine paying staff to sit around waiting for something to break. Now imagine paying the non-IT staff to sit around, while your IT staff tries to resolve the issue. The biggest cost a business faces with malfunctioning hardware is typically the downtime that results from it. 

Avoid Expensive Downtime

NuTech Services provides simple yet effective means which act before little issues turn into operational catastrophes. One solution we offer is a comprehensive patch management service. Not updating software leaves your business susceptible to data breaches. A data breach could put not only all of your data at risk, it could jeopardize your entire business. 

To learn how easily you can adopt proactive measures into your business, give us a call at 810.230.9455. Be sure to check for part two of this series on Friday.

Microsoft365_400.jpg

Taking a Long Look at Microsoft 365

Microsoft365_400.jpg

Microsoft has always offered a variety of business solutions, some which conform to your needs and others that do not. The beauty of this, is you can pick what solution will benefit your business, and leave the ones that will not behind. Here, we will discuss Microsoft 365 and what is offered within the Microsoft 365 package.   

What is Microsoft 365?

Microsoft 365 is a bundle containing Office 365, the Enterprise version of Windows 10, along with Microsoft’s Enterprise Mobility + Security. Microsoft 365 is comprised of all of these solutions, meaning your business will benefit from all of the features that come with these solutions, with just one package. So, what does this package include exactly?

Here are all of these solutions you could or should be taking advantage of with Microsoft 365:

Here at NuTech Services we understand this list is extensive. However, it is worth viewing as there could be solutions your business could benefit from. NuTech Services has the technicians needed to help you procure, implement, and manage the right solutions for you. Reach out to us at 810.230.9455 to learn more.

remote_169201315_400.jpg

Technologies that Fuel a Remote Workforce

remote_169201315_400.jpg

Many companies today are increasing their adoption of remote working strategies, enjoying the operational benefits that come along with them. In order for you to take advantage of these benefits in your own operations, you need to be sure you have the tools needed to optimize remote work. Here, we’ll review what you need to make the most of your remote worker strategy.

#1: Communication and Collaboration Solutions

Let’s face facts… you’re going to have to be able to work with your remote workers in order to accomplish what needs to be done, so you need to make sure you have a solution that maintains open lines of communication between you and your staff. All of the solutions that a business should use to enable communications while in-house should also be leveraged by a remote workforce, including email, chat platforms, video conferencing, and Voice over Internet Protocol.

On top of that, your line of business apps and the everyday software your staff needs should be available to remote workers. A prime example of a necessary solution for your remote employees is a file sharing platform that allows your team to work side-by-side on documents and data… whether or not they’re actually side-by-side.

#2: Project Management Tools

Time management is one of the biggest challenges inherent in remote work, so giving your staff direction through project management software can help your remote workers stay on task, while keeping the team as a whole apprised of progress towards a shared goal. In this way, project management solutions can help your team more efficiently reach their objectives – while keeping all members more accountable for what they need to accomplish.

This can be a considerable benefit, especially if an employee is going from a structured office environment to the more laissez-faire arrangement that remote work provides. Looming deadlines, combined with a fluid schedule, have been known to increase work-related stress. A reliable project management solution can return some of the structure to a remote worker’s day, giving them the purpose, they need to accomplish their goals.

#3: Cybersecurity

Any of the benefits of remote work are rendered moot if this remote work leads to a breach or some other security incident. This means that your remote workforce needs to be equipped with the same cybersecurity measures that you should have protecting your business’ on-premise infrastructure.

As a result, you will want to be sure that you’re having your remote workers utilize multi-factor authentication measures, and that their solutions are equipped with fully up-to-date security software. In order to connect back to your business’ network resource, they should also be leveraging virtual private networks to fully ensure your business’ data remains secure while in transit.

In many ways, a password management system would also be classified as a cybersecurity need – especially where remote workers (and thereby, remote access) are involved. 

#4: Time-Tracking Software

Finally, you need to make sure that your remote employees are spending their time effectively, as well as that you are properly reimbursing them for their time. There are many tools to help track how time is being spent while in the office, and these tools work equally as well for remote workers.

Whether you need to track how long a task took for billing and invoicing purposes, you’re trying to optimize your workflows, or you are simply ensuring that your team is being efficient and productive, understanding how time is spent during the workday is crucial. Implementing time-tracking software for remote workers can simplify payroll, allowing you to focus on other pressing business matters.

NuTech Services can help you out, by introducing the solutions that will make your remote working strategy far simpler. To learn more about what we can accomplish for you, reach out to us at 810.230.9455.

Network_115172954_400.jpg

Essential Network Security Best Practices

Network_115172954_400.jpg

Too frequently, we hear stories about cyberattacks, software vulnerabilities turned tragic, and other pretty terrible situations for businesses. In an effort to help fight this, we’ve put together a list of handy tips for you so that you can be prepared to ward off threats.

Leverage Authentication Measures

One of the first steps to securing your network against threats is to create strong authentication procedures. Most of the devices with permission to access your network will already have an authentication system in place, based on a password. If the passwords used are strong enough, this can actually mitigate most threats – but you still have to worry about the ones that this doesn’t discourage. Leveraging something called multi-factor, or two-factor, authentication can help minimize the chance of something slipping past your security.

Two-factor authentication works in a relatively straightforward way. As with most login systems, a username and password are entered – but instead of being granted access, the user is asked for another credential. This is usually a randomly-generated code that a specialized authentication app will generate. Mobile devices are popular to use with 2FA, as their convenient nature makes them more likely to be available when needed. In order for a user to leverage their mobile device, the 2FA system administrator has to authorize it.

Tip: Make sure that you don’t let your password best practices slip, even if leveraging 2FA. Your passwords still need to be sufficiently complex. If you are one of those who find remembering different passwords difficult, consider using a password management system in conjunction with your 2FA. 

Protecting Your Business’ Computing Environment

Whether you use a Local Area Network or a Wide Area Network, the security practices that you need to deploy are fairly predictable. Once you’ve seen to your authentication needs, you need to combine three approaches to security into one all-encompassing strategy: your software-based security, your physical security measures, and your security awareness and best practice training.

Software-Based Security

There are many examples of how software can help keep your business’ network secure. From firewalls to content filtering to antivirus to spam detection, each of these tools protect your business data from a different kind of threat. You may even want to consider adding encryption to your email solution to make it a lot less likely that the contents of your messages will be intercepted.

Tip: If you aren’t sure which solutions are the right ones to implement, think about how your data moves about your business. The more insight you have into how your data operates, the more effectively you will be able to plan its protections.

Physical Security Measures

Somewhat ironically, we seem to have become so focused on our digital security that it can sometimes seem like we forget that there are very real reasons to protect our physical locations and infrastructure, as well. Consider the damage a bitter ex-employee could do in moments, should they manage to get into your server room. It has become fashionable to leverage biometric authorization measures to protect your server room – and there’s a lot to be said about a good, old-fashioned surveillance system, complete with alarms and cameras (as well as some updates to make this system considerably less old-fashioned).

Tip: Bring in a consulting professional to help you determine your physical security needs. Not only does this save you time by eliminating work you would otherwise have to do for yourself, it ensures that your system will be designed by an experienced professional that knows what will work best in different situations.

Security Awareness and Best Practice Training

Would you be surprised to hear that your employees are likely your biggest vulnerability? Of all of the pieces that make up your network security, the people who use your technology are the leading cause of security issues. With the number of ways that your business could be attacked, your staff needs to be educated on how to identify them and avoid them.

Tip: Both businesses and individuals have experienced difficulties with phishing and it adversely affecting them, so it makes sense to begin your training there. Not only is it a common issue, it is conceptually very simple to grasp, so it is a good starting point before moving on to increasingly complex concerns. The more your staff knows about how they can resist attacks, the more likely they’ll be able to do so if the needs arises.

Remote Solutions Via the Cloud

Modern organizations need to contend with potential threats to their network infrastructures, as businesses always have in some form. The difference is that issues can now come in on the mobile devices owned by their staff, and company resources can be routinely accessed from outside the business’ area network.

This has helped contribute greatly to the growth of cloud computing technologies – although the relative cost savings don’t hurt either. Using the cloud, your staff can access their work data and applications from a remote location, while the resources stored in the cloud are kept secure by the platform’s baked-in security and privacy.

Mobile devices have also been a disruptor to business-as-usual, which means that businesses need to plan on leveraging them if they don’t want them becoming a distraction. Designing a Bring Your Own Device policy and enforcing it through mobile device management solutions is an effective and secure way of reaching a compromise and minimizing the time wasted by mobile devices in the workplace.

Tip: Remember that cloud services are inherently scalable, so you don’t need to worry about overreaching your capabilities. However, you also don’t want to waste capital that doesn’t need to be spent. Auditing your resources is an effective way to identify and eliminate redundant costs leeching from your budget.

Network security can be complicated, but it is an absolutely crucial element to your technology strategy if you want to have any success. NuTech Services can help take care of the technical side of things for you, and help teach better habits to your staff. To learn more, keep reading our tips, and reach out to us at 810.230.9455.

battery_137911906_400.jpg

Your Technology’s Batteries, Then and Now

battery_137911906_400.jpg

The smartphone is quite possibly the most important invention of our era. As time has passed, these devices have only continued to improve. These improvements have led to ever-increasing demands on the batteries that power our devices… batteries that, for about a decade, have changed very little. Here, we’ll examine the batteries that power our smartphones, and what we may see happen to them in the future.

Mobile Phones and Their Batteries 

Cellular phones have been around on the open market for about 35 years. In the 1980s and 90s, these devices were bulky and had considerable heft, as did the nickel-cadmium (NiCD) batteries that powered them. These batteries couldn’t power these phones for very long at all, and had a relatively short lifespan (especially if charged when they still had some juice in them).

This didn’t stop the demand, however, and so improved batteries were manufactured using nickel-metal hydride (NiMH). This material was lighter, charged back up more efficiently, and while they still had a severely stunted lifespan by today’s standards, they degraded more slowly that NiCD batteries. This technology hit the market in the late 1990s, leading to considerable growth in the cellular phone market.

Smartphone Batteries

This growth eventually led to the introduction of the smartphone, making the NiMH batteries an ineffective option – there just needed to be more power in order to run what effectively boiled down to a computer in your pocket. As a result, lithium-ion batteries were developed. These batteries lasted longer, charged more quickly, and didn’t degrade over time. The one drawback to these batteries is the increased price, which helps to explain the sudden increase in the cost of a phone in recent years.

Even more recently, the lithium-poly ion (Li-Poly) battery was developed, offering about 40 percent more power than NiMH batteries. Unfortunately, the cost of production has prohibited them from being used in anything other than flagship devices.

Batteries of the Future

As our technology continues to advance, so must the batteries that power it. Lithium-ion batteries are already being improved by up to three times performance, the graphite they once contained being replaced with silicon. This is far from the most intriguing example of tomorrow’s tech we’re apt to see in our batteries, too:

  • Charging your device with a Wi-Fi signal – What if your Wi-Fi connection could help to charge your phone? Researchers are essentially trying to accomplish as much. By using a rectenna (an ultra-thin and flexible radio wave antenna), the idea is that AC power could be found in Wi-Fi signals and other electromagnetic waves, and harvested. This power could then be converted to DC to supplement a device’s power supply.
  • Literally charging your device by yourself – The human body relies on electricity to function – as in, any and all of its functions. In order to communicate, your cells generate a charge. The reason that lightning strikes are so dangerous to your business’ infrastructure is the same reason they are so dangerous to people – the circuitry is fried. However, research into improvements to triboelectric nanogenerators (TENG technology) implies that we may someday be capable of harvesting the energy produced by the human body and amplifying it, giving us an on-hand (or on-shoulder, or on-foot…) power supply.
  • Lithium-ion batteries will be solid state – The use of solid electrodes and electrolytes to create a battery isn’t a new idea – some devices, like pacemakers, wearables, and RFID sensors, actually already use them. However, due to cost prohibitions, they haven’t yet been incorporated into smartphones… emphasis on “yet.”
  • Batteries will be biological – Proteins are made up of chains of amino acids. Less complicated chains are known as peptides. Scientists have discovered that incorporating peptides into batteries can help improve them further, making them more stable. An Israeli startup, StoreDot, has also used peptides to develop a device capable of charging a smartphone in 60 seconds.
  • Sodium-ion, instead of lithium-ion, will be used – Lithium is abundantly rare, which is why newer devices cost so much – it’s the batteries. Sodium, on the other hand, is just plain abundant, which would make these batteries cheaper to produce, leading to more affordable end-products. 
  • Liquid flow batteries take over – Liquid flow batteries have been shown to be a cost-effective means of increasing power storage in everything from our personal devices to our municipal infrastructures. While there is considerable work yet to be done, these batteries could appear in the near future.

For now, it is probably best to understand the batteries we have around today, and how to best handle them.

Modern Battery Myths and Best Practices

  • Myth: Always let your batteries drain to zero before recharging.
    As mentioned above, this was once necessary, but the batteries we use now no longer have the vulnerabilities that NiCD and NiMH did.
  • Myth: One way to ruin your batteries is overcharging them.
    Again, this isn’t so much a myth as it is a best practice that no longer applies. Modern devices have failsafe defenses built into them to prevent overcharging. However, you still need to be concerned about heat build-up. Make sure your device has some breathing room. 
  • Best Practice: Don’t throw batteries away.
    Many of the materials that go into batteries are hazardous, and have no place in a landfill as a result. Instead, recycle them! We might be able to help with that, depending on what you have to dispose of. Call us at 810.230.9455 to talk more about that.
  • Best Practice: Check your settings to see what uses the most power.
    If you have a device that just doesn’t seem to hold a charge, you probably have some options to go about fixing it. Reducing the brightness of the screen, adjusting how long the screen stays on, and other tweaks can help extend the life. Some of your applications may be a contributing factor as well.

An increasingly mobile world will require the power to be available to support it. We can help support your business’ mobility in other ways, keeping it secure and reliable. To learn more, call 810.230.9455 today.

blockchain_177188095_400.jpg

Your Business Could Benefit from Blockchain

blockchain_177188095_400.jpg

Blockchain is typically associated with Bitcoin. This shouldn’t come as a shocker because primarily that IS what it’s used for. However, blockchain isn’t a program, it’s not a product — it’s a technology. Blockchain technology has endless possibilities when it comes to real world implementation. In the near future it will likely be utilized in many business transactions due to its versatility.

Blockchain technology has virtually changed the internet. The action of creating and distributing digital information, but not allowing the information to be copied or altered, has created a backbone to this new type of network.

What Is Blockchain?

When looking at the word blockchain, it’s clear to see that it is derived from two words: block and chain.

Simply put, a block records recent transactions that have not been started in any prior blocks. This avoids duplicates or falsely initiated transactions. This block has the unique characteristic that it cannot be deleted, and it cannot be altered.

A chain is a sequence of items of the same type, forming a line. Blockchain technology has created an indestructible chain of blocks. Without being “chained” together, it would just be unorganized, unreadable, scattered information. Because of the methodical, organized and unalterable record keeping – it’s ideal for numerous applications.

Where Blockchain is Headed

Blockchains are where digital relationships are being not only formed but secured. Here are just some of the implementations where this technology has been, or could be used for in the future:

Payment processing and money transfers – The first thing that it could be used for is what it’s already being used for. Payment processing and money transfers. After all, this is what the technology was developed for, but what other forms can this take?

Retail loyalty reward programs – We’ve all been asked if we have a rewards card. Blockchain could soon revolutionize rewards programs by replacing standard points with tokens. All transactions at a certain store or company would result in earning tokens, which would be stored in a blockchain. The characteristics of blockchain would stop individuals from fraudulently earning reward points, which is common amongst paper and card-based loyalty programs.

Digital Voting – Have you ever heard rumors or accusations that someone fraudulently won a vote? With the implementation of blockchain, this would be an issue of the past. Blockchain cannot be altered or destroyed. This means if there was some sort of fraudulent activity, it could easily be detected. This brings us to our next use of blockchain.

Audit Trailing – Blockchain can be implemented anywhere an audit trail is required.

There are endless possibilities where this technology can be implemented. Medical recordkeeping, tax regulation and compliance, immutable data backup, even real estate or auto title transfers. Blockchain truly is revolutionizing operations across the globe.

At NuTech Services, we are eager to see where this technology will take us in the near future. How do you think blockchain technology will be used? Leave a comment below.

project_126902702_400.jpg

Tip of the Week: Project Management Software

project_126902702_400.jpg

Project management is an essential part of nearly every business, and good management software can do a lot for you. What it can’t do, however, is actually get your team to complete the work faster, especially if they don’t completely understand why you’ve chosen that particular platform. For today’s tip, we take a look at project management and give you some tips to help your organization improve the success of its projects.

There are a lot of tools used to manage projects. Regardless of what platform your company uses, there are some simple, common sense practices your team can use to enhance its project management proficiency. Here are five:

Tip #1: Hash Out Details Before You Start

Sometimes getting a project off the ground is harder than actually completing it. Depending on the number of stakeholders involved, many projects may find it difficult to get off the ground. Ensuring that the project is viable, has the support it needs to come to fruition, and has the resources in place to be most efficiently implemented are important before a minute of work is done on the project.

You will want to identify what workers will be responsible for what work, while also doing your best to come up with a timeline for the project that will not waste resources.

Tip #2: Choose One Project Manager

Today, there are a lot of collaborative interfaces out there that make managing a project much, much easier. As a result, sometimes a project won’t have a single project lead, it will be carried out with a team approach. You may get through a project or two like this before it becomes painfully evident that there needs to be someone to run point on the project.

The role of project leader will cultivate positive team dynamics and act as a mentor to the rest of the team. Also, you just need one throat to choke when things aren’t done on time.

Tip #3: Define Specific Milestones

For any project, there will be benchmarks it will have to be met. As a project begins, defining the metrics that will have to be met will give any project team a good idea what the expectations are at the end of each phase of a project. By frequently checking in on the status of deliverables, the project manager can ensure that all elements of the product are aligned with what customers will invest in.

Tip #4: Manage Risk

Managing risk is important in any business endeavor. There will be times when, in the course of the phases of a project, where one will go horribly wrong and will put the entire project’s success at risk. One of the best ways to identify and manage risk is by keeping the lines of communication open. Most project management software provides options to communicate, whether they be integrated through an existing system, or if they are localized as a part of the software.

Tip #5: Evaluation

Through success (or failure), lessons can be learned from any project. By reviewing and scrutinizing every aspect of the project, you will get some fuel on how to improve your project management moving forward. Identifying what went right, what went wrong, and how they make up the final result. One way to ensure that a project was a complete success is to determine its return on investment (ROI). Often, project managers will provide a planned ROI to stakeholders at the beginning. By comparing the two after the end of the project, you can establish whether it had the value you were planning for.

At NuTech Services, our technicians thrive on project management. Whether it is running cable, building, testing, and deploying hardware, or simple proactive maintenance, we have an answer for all of your business’ computer problems. Call us at 810.230.9455 to learn more.

server_101536916_400.jpg

Are You Looking to Buy a New Server?

server_101536916_400.jpg

So your small business needs a new server. What are your options? Do you know what they are? Today, we’ll try to shed some light on how you should look at the server-buying process and what your organization’s options are. 

Business Servers

When you are looking for servers, there is a pretty good chance that you need to centralize application delivery, file storage, or some other core function of your business. A server is a high-powered computer that runs specialized software that is used to support the multiple users that your business has on staff. Some of the multi-user applications that servers are used for include email, some type of messaging, print servers designed to manage company-wide print jobs, and customer relationship management (CRM). If your business already uses one or multiple servers, you need to establish whether you need to upgrade and migrate; or, if you’ve outgrown your hardware and need to set up a new server, and where to host it.

Cloud vs. Onsite

If you are looking to set up your first server, you have an interesting decision to make. Do you set up your new server at your place of business, or do you host it with an established cloud provider? Traditionally, companies would be better served to host their hardware locally, but with cloud services from some of the most reputable companies in the world now available with built-in support and anywhere-anytime access, it stands to reason that looking at how each is priced out is a prudent move by any decision maker. 

With the purchase of a server, a company takes on the costs of the hardware, which are often substantial, they then deploy software and have to pay to have that hardware managed. If the hardware costs aren’t enough, the maintenance costs can be multiple times that. When you add in utility costs, you are looking at a large capital cost with a smaller operational outlay.  With cloud computing, however, you can get a reasonably secure server that can be accessed from any place users have access to a high-speed Internet connection. This provides accessibility that many other servers don’t have, while paying per month rather than up front. The costs don’t add up quite as fast (the capital outlay is virtually zero), but the operational costs spike, often exceeding what you would pay for a server over time. 

Let’s make a list of some pros and cons:

Onsite Server 

Pros:

  • Gives you complete control over organizational data.
  • Gives you the ability to alter storage types and amount at any time.
  • Performing onsite backup is much easier.
  • Restoration from onsite backup is much faster.

Cons:

  • Upfront costs of hardware.
  • Exorbitant costs of continued maintenance.
  • Utility costs.
  • Upfront and recurring costs of physical security.
  • Your hardware is only marginally utilized.

Hosted Server

Pros: 

  • Eliminate capital costs of buying and maintaining hardware. 
  • Mitigate server-based utility costs.
  • Cloud server is scalable.
  • Data and application redundancy built in.

Cons:

  • The need for stable and reliable bandwidth rises.
  • Costs of bandwidth rise.
  • Security can become an issue.
  • Lose physical control over the management of the servers.

It all comes down to system control. If you want (or need to have) control over your hardware in order to meet federal, state, or industry regulations, hosting your servers onsite is suggested. If you don’t have these regulations to meet, there’s no reason hosting your servers in a public cloud interface can’t be a viable alternative for your company. 

One option that many businesses are using today is the establishment of a private cloud server. A private cloud server is hosted either onsite or in its own dedicated cloud space, and delivers a business a lot of the pros listed above, albeit at substantial cost. The establishment of the private cloud allows companies that need to have control over the management of their organizations data and applications to have it, while providing the ability for users to access the data and applications outside of the confines of its physical network. 

Regardless of what kind of server you are looking for the experts at NuTech Services can help. Find out more about your server options by calling us today at 810.230.9455.

242008881_400.jpg

The Next Phase of the Internet of Things

242008881_400.jpg

The Internet of Things is growing rapidly, and with that growth there will be a stage where thoughts about IoT technology change forever. From RFID sensors to mobile devices to commercial goods, machine-to-machine communications have already made their way into people’s homes and businesses. What can we expect to happen with the IoT in the future? Today, we take a look to answer this very question.

With global spending on IoT research and integration reaching $745 billion in 2019, the IoT is primed to be one of the largest single industries in the world in the future. Individuals, businesses, and governments are looking at the IoT for solutions to their problems. After all, the more information people have, the better decisions can be made. From the outset, it was said that this technology will transform the way we interact with machines and the way they will interact with each other, and only a few short years into a worldwide implementation, that mantra has proven to be true. Let’s look at where the IoT is growing most.

Industry

The huge annual jumps in IoT spending is largely driven by manufacturers, transportation, and utilities. Industrial IoT solutions provide companies and municipalities, alike, the link between their cloud-based software systems and their analysts, salesmen, and decision makers. This relationship is tenuous, however, and is closely monitored as a result. If a huge IoT strategy breaks even once, confidence in the platform is destroyed, leaving it an unreliable solution, regardless of the strengths of the technology. 

Manufacturers and process managers that utilize IoT solutions absolutely need their systems to be as reliable as possible. That means security, which is the number one improvement that the next phase of IoT has to make. For years, IoT was only somewhat trustworthy because of the lack of integrated security many IoT devices were manufactured with. Today, with security an absolute must for the major undertakings it is being used for, security has improved, but only slightly. A dedication to creating IoT devices that have hardware and software systems that are secure and reliable will dictate just the ceiling of IoT effectiveness.

The Smart City

One of the most intriguing places the IoT has been utilized thus far is in the integration of automated utility systems inside what has been termed, “the smart city”. The smart city uses what are known as low power IoT connections. These devices deliver low bandwidth and power saving features that are perfectly suited to asset monitoring. They can be implemented for a variety of uses, including: 

  • Sensors built into city roadways to sense things like the subsistence of traffic congestion and wear and tear of roadways.
  • Sensors built into bridges to sense degradation and the effect of seismic forces caused by geographical and traffic-based events.
  • Sensors built into buildings to measure wind force, foundation subsistence, or seismic activity.
  • Sensors in the interior of buildings to control foot-traffic, lighting, heating and air, and other systems humans rely on. 
  • Sensors on the street or on entryways that will provide facial recognition and reporting.

Unlike IoT-connected consumer goods, every IoT device deployed in a smart city would have a purpose that is beyond convenience. Every device would be placed to achieve a goal, improve the usability, longevity, and management of infrastructure, boosting resident safety and improving their access to services, cutting costs and limiting energy use, improving communications, and more.

One thing is for sure, the next phase of IoT implementation is going to challenge conventional thinking and deliver solutions that only a short time ago, were only imaginary. At NuTech Services we find technology fascinating. For more great technology information about innovative new tech, return to our blog regularly. 

cloud_400.jpg

Tip of the Week: Cloud Decisions for the SMB

cloud_400.jpg

In a nod to the strength of modern cloud networks, businesses are now able to gain significant flexibility when making their IT decisions. There are innumerable solutions designed to speed up business, transfer cost, and provide businesses with workable computing platforms they once paid tens of thousands of dollars per year for. For today’s tip, we will look at how using hosted computing solutions provides significant business benefits.

Countless Options

The cloud provides a myriad of options for any-sized business. In the cloud, you can host applications, communications, storage, and even full-platform infrastructure. With so many options available, your business can get the computing power and tools it needs, when needed. 

User Tip: When trying to determine which cloud platforms are right for you, you may find the cost/benefit analysis won’t give you the definitive answer you are looking for. Your best bet is to prioritize which information systems would work best hosted onsite and which one brings the most value hosted in the cloud. The best decision for your business’ bottom line may not be the best decision. 

Productivity Improves

One of the most important aspects of cloud computing is the possibility that it provides a modern business. With all of the options the cloud presents, a business can pick and choose how to leverage them to produce increased productivity. Of course, the computing platform itself isn’t going to produce more, but with the data and application accessibility and the collaborative options the cloud provides a business, they are able to get more done, faster.

User Tip: Cloud computing may provide the ability for your team to collaborate better, but it isn’t going to produce anything on its own. One tip to ensure for efficient collaboration and enhanced teamwork using cloud interfaces is to assign one person to manage the files and data inside your cloud solution so that everyone knows who to go to if they need answers. Running a project is a lot like running a basketball team, one person has to run point.

Monetary Benefits

Implementing cloud computing can absolutely help save a business money off the bat. A shift to the cloud works to eliminate huge capital costs. Say you need a server. If you bought, powered, and supported the hardware yourself, you are looking at a bill that’s likely in the five-to-six-figure range. If you choose a cloud, you can fire up a new server for a monthly fee that gives you a lot of the same computing power your business commands, without the waste of computing resources and the upfront expense you would see by running your own hardware.

User Tip: The cloud may help you transfer cost, but if you jump in with both feet it can get pricey quick. That’s why it is important to migrate your processes, data, and infrastructure to the cloud in small, incremental steps. It keeps operational costs down and keeps your IT administrator sane. 

At NuTech Services, we understand the value of cloud computing, but we also recognize that the cloud isn’t right for every situation. If you would like to meet with our knowledgeable consultants about a shift to the cloud, call us at 810.230.9455 today.

275832801_400.jpg

Biggest Data Breaches Since May

275832801_400.jpg

Has your business’ network been breached? If not, you will need to continue to prioritize network security to keep hackers at bay. With 446 million records compromised in 2018 alone, businesses need to understand what threats they are currently under. Let’s take a look at some of the biggest data breaches that have happened since the beginning of May. 

May

May 2, 2019 – Citrix

Conferencing and digital workplace software company, Citrix, revealed that hackers gained access to the company’s network between October 2018 and March 2019. Data stolen included Social Security numbers, financial information, and data of current and former employees.

May 3, 2019 – AMC Networks

1.6 million users of AMC Network’s Sundance Now and Shudder streaming services had their data left exposed through a database that was left unsecured. Names, email addresses, subscription details were compromised. 

May 9, 2019 – Freedom Mobile

Freedom Mobile, a Canadian mobile provider had an estimated 1.5 million customers’ personal and financial information left exposed on a third-party server. The types of data left exposed included names, email addresses, mailing addresses, dates of birth, and credit card information.

May 13, 2019 – Indiana Pacers

The legal team behind the National Basketball Association’s Indiana Pacers was the victim of a major phishing attack. Employee and customer names, addresses, dates of birth, Social Security numbers, passport numbers, driver’s license numbers, medical insurance information, card numbers, digital signatures and login information. No number of affected individuals has been given by the team.

May 14, 2019 – WhatsApp

WhatsApp has experienced a security flaw that provided access to an Israeli government surveillance agency, NSO Group. NSO Group had limited access to the microphone, camera, and WhatsApp message text of the app’s 1.5 billion users. 

May 20, 2019 – Instagram

Facebook-owned Instagram, fell victim to a data breach that exposed more than 49 million Instagram influencers, celebrities, and brands’ Instagram information when an Indian-based social media marketing company left it exposed. 

May 24, 2019 – Canva

The 139 million users of Canva, a cloud-based graphic design tool, had their names, usernames, and email addresses exposed when hackers infiltrated their server. 

May 24, 2019 – First American Financial Corporation

First American Financial Corp., a leading title insurer for the U.S. real estate market, had 885 million customers’ Social Security numbers, bank account numbers, mortgage and tax records, wire transaction receipts, and driver’s license images compromised for all customers as far as back as 2003.

Other May breaches: Inmediata Health Group, Uniqlo, Wyzant, Flipboard, Checkers (the fast food chain).

June

June 3, 2019 – Quest Diagnostics

Almost 12 million patient records have been compromised when hackers took control of the payments page of AMCA, a major payment vendor for Quest Diagnostics. Data such as financial account data, Social Security numbers, and health information (ePHI) were left exposed.

June 4, 2019 – LabCorp

In the same hack, LabCorp announced that 7.7 million of its customers were impacted. 

June 6, 2019 – Opko Health

In the same attack, Opko Health had 422.600 customer and patient records compromised. 

June 10, 2019 – Emuparadise

The gaming website Emuparadise had their users’ IP addresses, usernames, and passwords exposed in a data breach. 

June 11, 2019 – Evite

More than 100 million users of the Evite event planning app have had their information put up for sale on the dark web. Information that was stolen included names, email addresses, IP addresses, and cleartext passwords. Some even had their dates of birth, phone number, or postal address exposed.

June 11, 2019 – Total Registration

Kentucky-based Total Registration, a facilitator of scholastic test registrations had their entire service compromised. Victims, who were mainly students who had registered for PSAT and Advanced Placement tests, had their names, dates of birth, grade level, gender, and Social Security number exposed. 

June 12, 2019 – Evernote

A security vulnerability in Evernote’s Web Clipper Chrome extension gave hackers access to the online data of over 4.5 million users. Exposed data includes authentication, financial, all private communications, and more.

June 20, 2019 – Desjardins

Over 2.7 million individuals and 173,000 businesses had their data stolen by a single Desjardins employee. Canada’s largest credit union, the hack resulted in the exposure of names, dates of birth, social insurance numbers, addresses, phone numbers, and email addresses of customers

Other June breaches: Oregon Department of Human Services, U.S. Customs and Border Protection, EatStreet, Dominion National

July

July 17, 2019 – Clinical Pathology Laboratories

Due to the AMCA breach that affected Quest Diagnostics, Opko Health, and Labcorp, Clinical Pathology Laboratories had 2.2 million patients’ personal and medical information exposed with an additional 34,500 patients’ credit card or banking information breached. 

July 18, 2019 – Sprint 

A still unknown number of Sprint customer accounts were hacked through Samsung.com’s “add a line” website. Some exposed information included names, billing addresses, phone numbers, device types, device IDs, monthly recurring charges, account numbers, and more. 

Other July breaches: Maryland Department of Labor, Los Angeles County Department of Health Service, Essentia Health, Fieldwork Software, Los Angeles Personnel Department

August

August 5, 2019 – Poshmark 

The online marketplace, Poshmark, has announced that they’ve been hacked. Usernames and email addresses of an unreported amount of clients have been exposed in the breach. Poshmark has nearly 50 million users.

August 5, 2019 – Stock X

The online fashion-trading platform had its over 6.8 million user accounts exposed. Data that was out there included customer names, email addresses, usernames and passwords, shipping addresses, and purchase histories. 

August 9, 2019 – CafePress

A data breach at CafePress, a custom t-shirt and merchandise company, exposed the names, email addresses, physical addresses, phone numbers, and passwords of over 23.2 million customers. 

August 15, 2019 – Choice Hotels

Hackers left over 700,000 guest records exposed in a coordinated extortion attempt on the Choice Hotel chain. Stolen information included names, addresses, and phone numbers. 

August 16, 2019 – Biostar 2

VPNMentor and independent security researchers uncovered a data breach containing over a million individuals’ facial recognition information as well as the unencrypted passwords and usernames of 27.8 million individuals exposed from Biostar 2, a biometric security platform. 

August 27, 2019 – Hostinger

Hostinger, a web hosting company sent out an email to their 14 million clients who had their information hacked through an API server. As a result, first names, usernames, email addresses, IP addresses and hashed passwords were exposed.

Other August breaches: Presbyterian Healthcare Services, State Farm, MoviePass

Before your business has its network breached, data stolen, and reputation irreparably harmed, call the security professionals at NuTech Services to do a full security assessment. We can help you keep your data and reputation intact. Call us today at 810.230.9455 to learn more. 

168387524_400.jpg

Warning Signs that Your Computer Needs Replacing

168387524_400.jpg

Are the computers in your office beginning to show their age? Do you even know how old they are? For the sake of your productivity, it may be time to replace them for a newer model. We’ll go over some warning signs that your computers may be nearing their retirement age.

How to Tell How Old a Computer Is

When a computer starts to get too old, it can become a problem for productivity. In fact, to help avoid this, some even recommend replacing a work computer every four years… but how do you tell how old a work computer is in the first place?

This isn’t always as cut-and-dried as one would think it should be. Some computers and laptops will have a date right on the case, neat the serial number. If there is no date provided, a quick search for the serial number might give you an idea.

You can also check the components of your computer itself, using the System Information tool. In the Search Windows box, type in “sysinfo.’ From the results, access System Information and in the window that appears, you can find plenty of information to help you date the machine. For instance, if the BIOS of the device has never been upgraded, the date will likely tell you how old the machine is, more or less. Searching for other components can help you to confirm this estimate.

As a result, you can get a better idea of whether your computer’s issues are age-related, or if there’s something else creating problems.

Signs That Say It’s Time to Replace Your Computer

There are quite a few factors that can indicate when your computer is due to be retired. While these indicators can each be a sign that something else is going on with your machine, a combination of a few of them is a fairly reliable signal that you and your device will soon have to say goodbye:

  • The computer is huge. In the interest of space, many modern devices are built to be compact, taking up less space than their predecessors did. While this isn’t a hard and fast rule (powerhouse workstations often take up a lot of space out of necessity), a larger, basic-function workstation or laptop is generally an older one.
  • Startup and shutdown take forever. Again, there are a few different issues that could contribute to lengthy startup and shutdown times. Too many applications may be set to automatically run in the background, or your hard drive might be almost full. However, this is another common symptom of an aging device.
  • You’re encountering hardware and software limitations. If your attempts to upgrade your computer’s hardware and software – especially security software – are stymied by a lack of interoperability or support, it’s probably time to consider replacing it. This is even more so the case if your work-essential solutions can’t be upgraded any further or runs slowly, or loading your applications takes notably long and they can’t efficiently run simultaneously.
  • Your computer is loud. If the fans in your device (whether it’s a desktop or a laptop) run loud, it’s a sign that your computer either needs a good cleaning or needs a good replacing. If the issue persists after a thorough cleaning has taken place, that’s a sign that your hardware is working too hard, a sure sign of age-related issues.

If you feel that your hardware is due to be replaced, reach out to NuTech Services. We have the contacts to help you procure the equipment you need to remain productive and offer the support to keep this equipment going. Call us at 810.230.9455.

188933748_400.jpg

Tip of the Week: Best Patch Management Practices

188933748_400.jpg

Patches are a critically important aspect of your technology. As a result, you need to be sure that yours are managed properly. We have three tips to share so you can optimize your patch management processes.

Create Procedures for Both Routine and Emergency Patches

Many patches are released on a predictable schedule, so as to make it easier to keep up on patches – after all, if you know that a patch is going to be released on a certain date, you can set aside time to apply that patch. There are also emergency patches that are released when a vulnerability is discovered and remediated.

As you might imagine, both are important to maintain – one, to keep your business as free as possible from vulnerabilities, and second (and perhaps more obviously), to keep your business secure in the face of an impending threat. That’s why you need to make sure you have set processes in place to ensure that all patches are tested and applied. While it may not always be a pressing security issue, it is better to be prepared for anything that the vendor is concerned about.

At NuTech Services, we always build out and update our procedure, and test updates before they are applied to prevent downtime and other issues. It’s all about working smarter, not harder.

Have a Controlled, but Realistic, Environment for Testing Purposes

Let me ask you a hypothetical question: someone comes up to you on the street and offers you a pill that would make you immune to the common cold, but with no peer reviews by any medical board or the FDA. So, do you take it?

I would hope you would say no, simply because you have no idea of the effectiveness of the pill without it having been tested. Patches are the same way. Without any testing, you simply don’t know how well the patch will work, or if it will interfere with another process. Before you apply any patches to your primary infrastructure, you need to have made these evaluations in a reasonable approximation of it. An effective means of doing so is to spin up a virtualized environment and stress-test the patch there, before actually applying it – just make sure you give your tests enough time to produce trustworthy results.

Keep Track of When Patches Are Released

Depending on the hardware and software you use, patches are going to be released on a different schedule. This is because different manufacturers and vendors manage their schedules differently. Just look at Microsoft and their famous Patch Tuesday (typically the second and sometimes the fourth Tuesday of each month). In order to properly keep your patches up-to-date, you need to know when to expect them.

For assistance with your business’ patch management, you can always turn to NuTech Services. Give our professionals a call at 810.230.9455.