chrome_shortcuts_that_work_400.jpg

Tip of the Week: These Shortcuts Can Make You A Google Chrome Power User

chrome_shortcuts_that_work_400.jpg

Do you use Google Chrome? While it’s a great option in and of itself, you can make your experience with Chrome much better simply by using many of its keyboard shortcuts. Here are some of the best shortcuts that you can use to get more out of your Google Chrome web browser.

  • Alt+Tab: Move through your open tabs.
  • Alt+Home: Open your homepage.
  • Alt+Left Arrow: Move backward a page.
  • Alt+Right Arrow: Move forward a page.
  • F11: Show the current website in full screen mode.
  • Esc: Stop a page from loading or a file from downloading.
  • Ctrl+(+) or (-): Zoom in or out on the screen.
  • Ctrl+0: Reset the zoom to normal.
  • Ctrl+1 through 8: Jump to the corresponding tab in your web browser.
  • Ctrl+9: Jump to the last open tab.
  • Ctrl+Shift+B: Hide or show your bookmarks bar.
  • Ctrl+D: Make the currently opened tab a bookmark.
  • Ctrl+H: Show history in a new tab.
  • Ctrl+J: Show downloads in a new tab.
  • Ctrl+F: Find something on the page.
  • Ctrl+N: Open a new window.
  • Ctrl+Shift+N: Open a new window in incognito mode.
  • Ctrl+R or F5: Refresh the page.
  • Ctrl+T: Open a new tab.
  • Ctrl+W: Close the currently open window.
  • Ctrl+Shift+T: Open the most recently closed tab.
  • Spacebar: Move down a page at a time.
  • Shift+Spacebar: Move up a page at a time.

Will you use these shortcuts to get more productivity out of your workday? We hope so! To learn more about how you can take full advantage of your organization’s business technology, subscribe to NuTech Services’s blog.

continuity_plans_keep_business_alive_400.jpg

Prepping For A Weather Event Needs To Happen In Your Business

continuity_plans_keep_business_alive_400.jpg

Running a business requires the ability to stay in control, especially when others couldn’t. However, there are some situations–like major weather events–that simply will not be controlled. In cases like these, you need to make sure your business is prepared to withstand the worst. A business continuity plan can help you do so.

A business continuity plan is a comprehensive strategy that, when enacted, will allow business operations to continue despite some detrimental circumstance that would have otherwise derailed them. For example, a lightning strike killing the power to your office building, a flood leaving it inaccessible, or a hurricane wiping your place of business off the map–any of these events would severely hinder, if not halt, your ability to do business if you are not prepared.

In short, without a business continuity plan in place, you’re vulnerable to chance–a risk that no business owner should take if they can help it. That is why it is so important to have a plan before it’s needed.

The first step to creating a plan is to establish what that plan needs to address. To do this, you will need to identify where your greatest losses would be if disaster befell your business. What would the costs be if you were to suddenly lose all business function? How would the additional expenses of a disaster influence your cash flow? How long would it take you to recover? This is what is known as a Business Impact Analysis, and it can help you to prioritize your most pressing concerns to ensure they make it into the plan.

Your plan should address the following six considerations:

  1. Establish the plan’s reach
  2. Identify your key business areas
  3. Establish which business functions are critical
  4. Outline which business areas and functions are interdependent
  5. Establish a limit to how much downtime each function can experience
  6. Plan to continue operations

Once your plan is developed and documented, with responsibilities properly distributed, you need to train your staff and test the procedures that were just laid out.

Of course, you also need to be sure that your data is preserved, despite what may happen to your in-house equipment. A reliable backup solution is an integral part of any business continuity strategy. This backup should be incrementally updated throughout the day, and preferably, hosted in the cloud. At the very least, it needs to be in a disparate location than your original data, as a backup that is destroyed along with the original data will do you no good.

Unfortunately, we can’t control the weather. We can, however, control how we prepare for it. NuTech Services can help you put solutions in place to protect your business-essential data. Call 810.230.9455 for more.

haas_money_savings_400.jpg

Your Business Can Use HaaS

haas_money_savings_400.jpg

Just like how your organization relies on hardware solutions to keep operations moving, this hardware relies on regular refreshes which keep it in proper working order. If you fail to replace or maintain the solutions that you have in place, you’ll be more likely to experience downtime, or at least hardware failure. Managed IT has provided SMBs with a way to bypass many of the frustrations involved with acquiring new hardware in the form of Hardware as a Service.

HaaS helps your organization keep its critical hardware running. This includes servers, workstations, networking components, and more. While these technology solutions require daily maintenance in order to run at maximum efficiency, they often need to be replaced after a certain amount of wear and tear. By working with a managed service provider to implement HaaS, you can maximize the amount of mileage you get out of your hardware solutions, all while obtaining new technology without breaking the bank. We believe that your organization shouldn’t have to suffer due to an unforeseen hardware failure.

Chances are that your organization doesn’t upgrade its hardware as often as it should. While your technology budget might be limited, this mindset will hold your organization back from implementing new hardware solutions that can boost productivity and improve operations. It’s often difficult to know when it’s time to invest in new hardware, but unexpected hardware failures can throw a wrench in your plans. In other words, you’re paying to both replace your hardware, and to make up for downtime that can cause trouble for your organization.

Hardware as a Service addresses many of the problems that businesses have with hardware management. Thanks to monthly payments and a service level agreement, you can expect new hardware when it’s needed at an affordable cost. Here are some of the many benefits of HaaS.

  • An IT roadmap: Knowing where you’re going in on a trip is great, and so is knowing when your hardware goes through its next refresh. We can help you plan out a special IT roadmap that includes hardware refreshes and overall maintenance of your network’s health. This keeps your network from going too long without a proper upgrade.
  • Lower upfront costs: Since you only pay a flat monthly rate for new technology, you’ll be able to afford it much more easily. HaaS providers can also take future upgrades and management into account when picking equipment for your organization, allowing you to save money down the road.
  • The latest hardware, now: You’ll be using the latest hardware solutions that help you stay one step ahead of the game. This means that you’ll be able to take great strides in productivity and functionality that may not have been initially available for your organization.

Do you want your business to take full advantage of the latest and greatest hardware solutions on the market? NuTech Services can help. To learn more, reach out to us at 810.230.9455.

adobe_flash_google_400.jpg

Tip of the Week: How To Enable Flash In Google Chrome

adobe_flash_google_400.jpg

Flash is going the way of the dodo, with support from Adobe expected to end in 2020. Many popular browsers like Google Chrome have started to do away with Flash by default. However, there are still websites and online tools that use it. Here’s how you can enable it when you need to.

Keep in mind, Flash is being phased out due to compatibility and security issues, so under most circumstances it’s best to have it disabled unless you really need it.

The first step is to check the current Flash settings for your Chrome browser. To do so, navigate to a new browser tab and type chrome://flags into the search bar. You want to make sure that a pair of settings are set to Allow instead of Default. These settings are Prefer HTML over Flash and Run all Flash content when Flash setting is set to “allow.”

Next, open another Chrome tab and type chrome://components into the search bar. Look for the Adobe Flash Player selection and click the Check for Update button. Once you’ve done so, open Chrome’s Settings. Scroll down to the bottom of this page and select Show Advanced Settings. Scroll down further and you’ll see options for Content Settings in the Privacy tab.

In the box that pops up, scroll down until you see the option for Flash. Be sure that the Ask first before allowing sites to run Flash (recommended) is selected. If you’d rather just block Flash on your browser completely, make sure that the Block sites using Flash box is checked. You should never allow sites using Flash to run automatically, as it could be a security issue.

But what if you want to allow specific sites to allow Flash without being blocked? You can create exceptions to this by clicking on Manage exceptions, which is found under Content Settings – Flash. You then enter the URL and select Allow under the Behavior column. A shortcut to this can be found by clicking in the left-most section of your address bar, and under Flash, selecting Always allow on this site.

For more great tips and tricks, be sure to subscribe to NuTech Services’s blog.

phishers_man_400.jpg

Someone’s Trying To Phish You… Do You Play Along?

phishers_man_400.jpg

Phishing scams have been popping up for years–their most infamous attack vector has even become a punchline: some long-lost relative stuck in a far-off country suddenly reaches out, offering riches, but only if so-much money is provided first. People from all walks of life have been duped by these scams, and while not all of them are this transparent, most are pretty easy to spot.

There may be some temptation to strike back in retribution against the criminal who targeted you, in the form of driving them crazy by wasting their time. Unfortunately, as tempting as such activities may be, they are not a good idea. Take it from the cyber security researchers who have tried–cybercriminals do not take well to mockery, or having their time wasted. A researcher from Malwarebytes, Jerome Segura, found out firsthand when he used a virtual machine to follow a scam to see where it would lead.’

With his device recording everything that played out, Segura first interacted with a female who claimed to have found many, many issues on his device that needed to be resolved before his system was corrupted. Not only that, but Segura was told that his software warranty had recently expired, and he would have to pay the $299 renewal fee to another representative.

Of course, Segura didn’t supply the correct payment credentials, which tipped off the hackers. The hackers then seized control of Segura’s computer, deleting all of his files and his Ethernet adapter driver before calling Segura a rude word and disconnecting.

While these sorts of stories may seem comical in hindsight, they are no laughing matter. This is especially true when things get much more serious.

Take Jakob Dulisse’s story. The wildlife photographer received a call to his home in British Columbia from “Windows Technical Support” in Los Angeles. Coming to the conclusion that this was an attempt to scam him, Dulisse played along before accusing the caller of being “a scammer, a thief, and a bad person.”

The person on the line did not react well at all. Describing himself as a killer, the caller claimed that his group had people in Canada who would cut their victims into pieces and dispose of them in the river.

Other scammers will simply install remote access software as their target decides to mess with them, opening the door for them to come back later, as other cyber security professionals have found.

It is important to remember that these are, in fact, professionals, which means they are better equipped to deal with such threats. It is their job to discover what means of attack cyber criminals are using, and share the best response. This is not how the average business user should handle this situation, the business owner should file a report with the authorities and alert both their Internet service provider and their managed service provider.

An MSP can help make sure that you are fully prepared to handle any cyber security threat that darkens your business’ door. Give NuTech Services a call at 810.230.9455 today.

virtualize_and_save_400.jpg

Virtualization Has A Place Everywhere In Your Business

virtualize_and_save_400.jpg

Virtualization is a key player in today’s efficient workplace. Businesses of all kinds are looking to expand and enhance the way that they function on a fundamental level, and virtualization offers never before seen opportunities to cut down redundancies and implement new methods to improve operations.

First, an explanation of what exactly virtualization is. In essence, virtualization is taking a service or solution and abstracting it to the point where it can be run or accessed through the cloud or another centralized location. Examples of virtualization include digitizing servers or workstations, eliminating the need to manage and maintain hardware; storing applications or data in the cloud to allow for more efficient and dynamic access; and so much more. How can your business benefit from this new way of working with business technology?

Here are some of the most effective ways to utilize virtualization for your organization.

Virtualized Cloud Hardware
Businesses often virtualize servers so that they don’t necessarily have to provide the same maintenance and management required of a physical server unit. Virtualizing servers through a service provider like NuTech Services lets your organization store its servers on our infrastructure so that we can directly administer maintenance and management as needed. You can access your information remotely through the cloud. Other benefits include the ability to create specific environments for legacy applications and reducing the overall costs of operations due to fewer resources spent on air conditioning or electricity.

Virtualized Desktops
Just like servers, your desktop infrastructure can also be virtualized in order to preserve energy and assets for your organization. For example, let’s say that you replace all of your business’s workstations with thin clients. Thin clients are sort of like basic desktops that call their resources and applications from a virtualized infrastructure. Thin clients consume far less electricity than an ordinary workstation, allowing you to invest these resources elsewhere. This means a user’s desktop and applications are all processed centrally on a server or in the cloud. If your user needs to access their desktop environment from a laptop or another computer, they can typically do so securely without skipping a beat.

Virtualized Software
Storing software solutions in the cloud is a great way to improve their versatility. If you store them in the cloud, you provide access to any approved device through a mobile app or web browser. This can help your employees stay productive both in and out of the office by staying connected to a number of different software solutions, including your productivity suite, email, and even your phone system.

If you can imagine virtualizing a solution, chances are that it’s a possibility for your business. The only way to know for sure is to call NuTech Services. To learn more about virtualization, reach out to us at 810.230.9455.

tech_tips_400.jpg

Tip of the Week: 10 Technology Practices To Improve Business As Usual

tech_tips_400.jpg

In a business, some jobs belong to certain people: managers make sure that work is done when it needs to be, human resources make sure the workforce is accounted for, and so on. However, some jobs belong to everyone in the modern workplace who works with technology, For our tip of the week, we’ll go over some of these shared responsibilities.

Use the Network
As an insurance policy for your data, make sure that everything is saved to the network, and not on your local PC. This is simply a function of risk management–the network is backed up, while it’s much less likely that your individual PC is. Therefore, by storing data on the network, it won’t be lost if your workstation breaks down–and if your network is properly backed up, your data will still be safe.

Check Email Cognizantly
It is only too easy to click through email messages without really getting the message, which only helps those who use email as a cyber weapon. The easiest way to avoid falling victim to such attacks is to avoid opening attachments from unfamiliar senders. This is a favorite method of cyber criminals to introduce malware into their victims’ networks, so your best bet is to avoid any unexpected attachments.

Let Data Be
Keep your data safe by keeping it in-house where it is secured and backed up, and not uploading it onto your portable device or media storage. Without the protections put in place by the network, your data is much more vulnerable to peeking eyes or meddlesome actions.

Leverage Cloud Technology
If you must access data from outside the network, use a secure cloud solution to do so. The cloud has much more to protect it than a pocket-sized media device does. Ideally, you would also be accessing the cloud via a company virtual private network, as well.

Use Secure Passwords
As much as you love your dog or can remember your make and model of car, these don’t make secure passwords. It wouldn’t take long for someone who knew a little about you to try those exact variables. Instead, use a unique sequence of letters, numbers, and symbols for each account. If you can’t remember more than one password, try using a password manager. At the very least, use passphrases instead of passwords–instead of using a password like ‘FidoMazzerati,’ make a passphrase like ‘FidoLovesToRideInTheM@zzer@ti.’

Keep Passwords To Yourself
After going through the trouble to create a password that is complex enough to satisfy the previous rule, why share it with someone who could easily take advantage of it, or pass it to someone who will? As an example, take your Social Security Number, or other unique form of identification. You wouldn’t pass that around to people, but it essentially serves the same purpose as a password.

Lock Your Workstation
It doesn’t matter whether the risk is of someone stealing data or of someone messing around with your workstation as a prank–either way, productivity and focus in the office will suffer. One of the easiest means of avoiding this is to develop the habit of locking your workstation whenever you step away.

Take Note Of All Issues
Computer problems are bound to happen at some point. It helps to be prepared to fix them when they do. Whenever you encounter an issue, take notes that describe exactly what you were doing so the IT professional can figure out if there’s an underlying issue, and when possible, include a screenshot of the error.

Let IT Handle It
Your computer and the software it relies on will need to be upgraded and, eventually, replaced. When that time comes, don’t take it upon yourself to make any changes in the attempt to save someone else the trouble. Call IT in to help — it is one of the reasons they’re there.

However, many businesses don’t have the resources to hire the IT staff they need. That’s why managed services are part of our offering here at NuTech Services. We can help you monitor and maintain your IT–we’re just a call to 810.230.9455 away.

patching_information_400.jpg

Security Terms That Every User Needs To Know

patching_information_400.jpg

Chances are that you’ve seen quite a lot of stories on the Internet, or in the news, about the many security threats out there. Some of these, including ransomware, exploits, and reluctance to update software, might fly over your head if they’re not part of your everyday business vocabulary. Knowing what these terms mean is of the utmost importance in today’s workplace. We’re here to help you understand what some of these security terms mean for your organization.

Ransomware like WannaCry are one of the primary reasons why it’s so important to understand how network security works, and all of the terminology behind it. After all, hackers understand how to exploit your network’s weaknesses, so you’ll want to know all about the primary way to protect your business’s data from them: security patches.

These patches are issued by software developers to resolve certain issues or troubles found in their products. For example, a patch might be designed to address a recently found vulnerability in the program’s code, or resolve a particularly troublesome issue with the user interface. Understanding how these patches work is critical if you want to ensure the security of your business, your personal computer, and everything in between. Here are five of the most common terms used when speaking of security patches.

Patch Tuesday
Even if you allow your computers to update and install patches automatically, you should still have an idea when these patches are installed. Microsoft has a set schedule that they use to release these patches. They are released on specific days of the week, including the second Tuesday of each month, and sometimes the fourth as well. Perhaps in the future, data exchange will allow newer operating systems to be updated more frequently, or at the very least in real time, keeping your systems more secure.

Security Patching
Patches are basically issued to fix something that’s wrong with a computer application or program. It is these patches and updates that are provided on all of the official patch days, like Patch Tuesday. Of course, immediate patches to imminent threats of Microsoft’s software are issued for release as soon as one is created. These zero-day threats are so dangerous that they need to be resolved as soon as possible, making them top-priority for your organization.

Hotfixes
These are sometimes called quick fix updates, quick-fix engineering updates, and general distribution releases. These hotfixes generally include a patch that fixes just one small thing wrong with your application. These small issues are usually important enough that they need to be issued immediately without waiting for the next batch of patches. Even though Microsoft has long since forsaken the term “hotfix” specifically, it’s still used as a common way to refer to these fixes in the technology sector.

Zero-Day Threats
These types of weaknesses are those that are being used by hackers even before they are discovered by security professionals. The name “zero-day” refers to the fact that the software developers have no time, or zero days, to develop a patch to resolve the issue. These are some of the most dangerous threats out there, and need to be a priority for companies trying to keep damage to a minimum.

Whitelisting
Whitelisting is the process through which a patch or application is deemed secure or safe for your business. This allows your whitelisted app to access information found on your network. Contrary to whitelisting, blacklisting is the process of banning network access to certain apps. Whitelisting was a popular term used to discuss the security patch resolving the issue with the WannaCry ransomware, as IT departments wanted the patch to be “whitelisted” first to guarantee that the patch would be enough to stop it.

Is your business security-savvy enough to identify major problems with your network infrastructure? To learn more about how you can protect your business, reach out to us at 810.230.9455.

windows_server_08_end_of_life_400.jpg

Will These End Of Life Events Affect Your Company’s IT?

windows_server_08_end_of_life_400.jpg

One of the best ways your organization’s network can remain secure is to always use the most recent version of any critical software solutions on your network. Unfortunately, making the jump to a more recent operating system is easier said than done, particularly for small businesses that have limited budgets. The problem of security becomes even more pressing for businesses that need to upgrade multiple servers and workstations, as failing to do so could prove to be fatal for your organization.

Windows software products eventually reach an End of Life event, which is when they stop receiving patches and security updates that keep the software functioning smoothly. These updates generally fix vulnerabilities which could be exploited against your business, as well as operational problems which can keep your organization from running at 100 percent. Using software that’s out of date could result in your organization being put into a dangerous situation. In fact, if you are using out-of-date software, you are putting your network, and all the data on it, at risk.

Just a few months ago, Windows Vista reached its End of Life event. Microsoft no longer supports either Vista or Windows XP, though the two couldn’t be further from each other in terms of popularity and usage. The lack of support for XP just goes to show that even the most popular operating systems eventually have to come to an end of support. The next Windows OS to reach an End of Life event is Windows 7, on January 14th, 2020. Another common server OS that is also reaching its end of life on the same day is Windows Server 2008 R2 Enterprise.

The time is now to evaluate your systems and know which operating systems your organization relies on. Businesses will have to take a considerable jump to the next stage, upgrading their workstations and servers so as not to fall off the support bandwagon. Not all businesses have the time and resources to ensure this happens, though, so it’s best to keep this issue at the top of your mind, as Windows 7 and Windows Server 2008 RN will be rendered obsolete in the near future.

We recommend that you don’t wait until the last minute to implement a solution to your end of life event situation. The reason for this is that the upgrading process could come with hidden troubles that only make themselves known when the process has started. If your legacy applications stop working properly, any processes that rely on them in order to stay functional will cease. This downtime can have considerable effects on your business, so it’s best to keep your implementation as seamless as possible.

You need to think about upgrading your soon-obsolete technology before its end of life event hits. This goes for both Windows 7 and Windows Server 2008 RN. We are purposely informing you of these dates now, so that you have plenty of time to think about how you want to approach this elephant in the room. To learn more about how to upgrade away from your business’s obsolete technology, reach out to us at 810.230.9455.

excel_tips_400.jpg

Tip of the Week: Making Your Excel Use Easier

excel_tips_400.jpg

When it comes to making a spreadsheet, Microsoft Excel is the go-to program for many users. However, many of these users spend much more time creating and formatting these spreadsheets than they have to. For today’s tip, we’ll outline some experience-improving shortcuts that can improve how you use Excel.

Auto Sum Shortcut
You can use Excel as a quick-adding calculator. This can be made even easier with a quick shortcut. Once you’ve highlighted all the cells you’re trying to total up, pressing Alt and = will give you the final result.

Multiple Cells with the Same Text
We’ve all been there–arduously pasting the same text into cell after cell. Fortunately, there’s a shortcut that will let you do the same thing. Again, after highlighting all the cells that need the same text, you simply type the desired input, but press Ctrl and Enter rather than just hitting the Enter button on its own.

Speedy Data Sorting
Sometimes, we need to order the data in a spreadsheet by a particular variable. The Microsoft Auto Filter is a handy way to do so. Once your data is in the spreadsheet, you can select the columns you want to Auto Filter by clicking the top rows. Once that’s attended to, click Data. You will then see the option for Filter and then Auto Filter. This adds drop-down option menus to the top rows of each column, allowing you to sort them based on that column’s data, alphabetizing or grouping the data by its value.

What are your favorite Excel shortcuts? Let us know in the comments, and be sure to come back to the NuTech Services blog for more handy tips and trick!

it_services_cheatsheet_400.jpg

Is Your IT Holding Up Its End Of The Bargain?

it_services_cheatsheet_400.jpg

As you design your business’ IT infrastructure, it is important that you look months and years into the future, rather than just what you need in the moment. A good managed service provider will understand that–which makes it your job to find a good one. The following questions will help to more quickly narrow down your search to find the best provider for your needs.

What is included in the service level agreement we would have?
There is nothing that requires all companies to promise or provide the same things. This means that a provider can offer services A and C, but will have nothing to do with anything involving B. The same could just as easily be possible of services A or C. Some providers will have some sort of offering for all services, but offer so little that A, B, and C are more accurately described as a, b, and c. That’s not even taking response times into consideration. It wouldn’t matter if your provider could deliver A through Z, if it took them weeks or days to provide them, rather than hours.

Ideally, you will find a provider that will offer comprehensive services designed to resolve any pain points you may encounter in a swift and professional manner. In order to be sure that you have, you need to know what that provider will provide.

How to you approach network management?
This is an important consideration for a few reasons, first and foremost to ensure that you will not run up an obscene bill on what another provider would include in their basic IT support package. If your management costs are going to hold you back going forward, it makes a lot of sense that your provider can adapt with you to save you some much-needed capital.

Since making a profit is the primary goal of business, the more your organization grows the more agile you need your service provider to be. More technology to monitor and manage, the more time it will take, so choosing a provider that has shown success helping small businesses grow is advantageous.

How will you help us protect my network and data?
An IT disaster is usually a data disaster. Losing data can present all types of problems for your business; and, can happen in a number of ways. Hardware failure, malware, or user error can all result in critical data being lost.

As a result, along with the IT provider’s continuous monitoring and their use of automation to keep everything managed around the clock, an MSP has to be able to have a plan to protect the digital assets a company may have. A good amount of an organization’s data is useful, and having a plan to back it up, and recover it quickly can keep your business going. After all, a staff that is battling downtime from data loss (or any other IT-related reason) is less productive, and less engaged (leading to further productivity and revenue loss).

These are just a small number of the issues you have to be able to trust your IT Services provider to prioritize for your business. If you are looking for a comprehensive partner to protect your business from IT-related downtime, call the certified professional as NuTech Services today at 810.230.9455.

spam_protection_400.jpg

Why Spam Is So Bad For Your Inbox

spam_protection_400.jpg

Spam. It’s detrimental and all businesses have to deal with it. But many don’t know the first thing about how to identify it, or how to work around it. The truth of the matter is that spam can be dangerous for your organization if it’s not dealt with properly, but dealing with it can also be a major waste of resources. We’ll walk you through what constitutes spam, and how you can identify it from legitimate messages in your inbox.

Defining Spam
At its very core, spam consists of messages that are either insubstantial, wasteful, or dangerous to your organization. Spam generally takes the form of a message that you find in your email inbox, but you can often receive spam through various other media, including social media platform messengers (though these platforms usually have pretty good filters that keep most away from you). Spam can range from being a simple annoyance to a real problem, depending on the nature of the messages received.

How Spam Happens
Spam is a naturally occurring part of having an email account, primarily because spam can happen for a number of reasons that aren’t under your control. Perhaps your email address appeared somewhere online and it has been entered into a database that sends out emails at regular intervals about certain topics. Maybe you signed up for a subscription to a certain newsletter and now you get emails from multiple services that you hadn’t anticipated. Either way, you’re getting messages that you neither need nor want.

Other times, spam takes the form of a message that tries to get you to click on a link or download an attachment. These spam messages are most likely to be malicious in nature, as they are urging immediate action and are trying to get you to download malware on your device.

Keeping Spam Out of Your Inbox
There are two ways you can keep wasteful or dangerous messages out of your inbox: 1) Unsubscribe from email newsletters that you no longer wish to receive, and 2) Implement a spam blocking solution. Most legitimate newsletter emails will have an unsubscribe link at the bottom of the message which you can use to unsubscribe, preventing you from receiving any further messages from the sender. In order to keep the truly dangerous emails from being sent to you, you need an enterprise-level spam blocker. This will keep any messages that resemble spam out of your inbox in the first place, keeping you from having to deal with them at all. It’s the best way to keep spam away from your inbox.

To learn more about our enterprise-level spam blocking filter, reach out to us at 810.230.9455.

outlook_tips_400.jpg

Tip of the Week: Using Shortcuts Can Improve Your Microsoft Outlook Experience

outlook_tips_400.jpg

Microsoft Outlook is a great tool that can help your business stay in touch with clients and vendors, as well as stay updated regarding your internal operations. However, did you know that you probably aren’t using Outlook to the best of its abilities? We’ll walk you through some of the easiest ways to help you take even greater advantage of Microsoft Outlook for your organization: keyboard shortcuts.

Many of the shortcuts that work in Microsoft Word, like bolding or underlining text, remain unchanged through the Office 365 productivity suite, but the following are exclusive to Outlook. Here are some great shortcuts that you can use in Microsoft Outlook versions 2013 and 2016. In fact, you can print out this blog and place it on your desk so that you’ll never have to look up another Microsoft Outlook keyboard shortcut again!

  • Alt + S: This will send an email.
  • Ctrl + Enter: Send the message you’re currently writing.
  • Ctrl + R: Reply to an email.
  • Ctrl + F: Forward an email.
  • Ctrl + K: Complete the name or email you are typing into the address bar.
  • Ctrl + N: Create a new email folder.
  • Ctrl + Shift + A: Create a new appointment on your calendar.
  • Ctrl + Shift + O: Open your Outbox.
  • Ctrl + Shift + I: Open your Inbox.
  • Ctrl + Shift + C: Create a new contact.

As previously mentioned, many other shortcuts exist, and they all function in similar ways to the way they work in other Microsoft products.

By using all of these shortcuts to your best advantage, you can cut down on time wasted by fumbling through Outlook to click on several buttons that can be replaced by keyboard shortcuts. To learn more about how you can take full advantage of your business technology, be sure to subscribe to our blog.

game_of_thrones_two_factors_400.jpg

A Few Security Lessons Your Business Can Learn From Game of Thrones

game_of_thrones_two_factors_400.jpg

Security is a major concern for anything successful, and television programming is no different. Game of Thrones, the BBC’s epic production based on George R.R. Martin’s book series A Song of Ice and Fire, has always been concerned with their security–and with the television series overtaking the book series, that concern has only grown as the production has brand new secrets to keep safe. As a result, the production has seen a steady increase in security.

Last season, scripts were handed out much more sparingly, and code words were assigned to characters and scenes. The network has also stopped the tradition of distributing advance copies of the program to members of the press, which is normally done so that reviews may be written.

With the action in the show finally overtaking the action in the books this season, the concern for the show’s security has leapt to new heights.

This year, two-factor authentication had to be set up on every cast member’s email account, where they would receive their copy of the script. According to Nathalie Emmanuel, who plays the role of Missandei on the show, these copies were not to be printed out. Even the notes that the cast members received during rehearsal were not to leave the set, and had to be turned in before the actors could leave.

This dedication to secrecy only makes sense. Game of Thrones is a bona fide cultural phenomenon, and more importantly has generated an astonishing amount of revenue. This is mainly because subscribers to HBO’s content repeatedly tune in every week to find out who is next on the chopping block–the show’s version of critical data. If that data was to get out ahead of schedule, subscribers would have less of an incentive to subscribe and would quickly transfer their focus (and capital) elsewhere.

Your business’ data needs to be secured for similar reasons–just substitute ‘subscribers’ for ‘clients’ in the situation above, and you see the importance of keeping your data secured.

Taking a page from Game of Thrones’ production can help you here. Two-factor authentication is a method of ensuring data security by requiring a secondary form of authentication to access an account, for example, a unique code sent to a mobile device. If the password were to somehow be guessed by some other party, they wouldn’t be able to access the account without the secondary code. There are many businesses that are already using this method, both as a means of compliance with various regulations and to reinforce their security.

So, tell us: are you looking forward to the rest of this season of Game of Thrones? Tell us in the comments, but please don’t spoil anything!

bring_your_own_device_400.jpg

Bring Your Own Device Is Great…When Applied Properly

bring_your_own_device_400.jpg

If you let your employees use their own devices for work purposes on the company network or wireless Internet, you might be seen as “the cool boss.” Your employees love this privilege, but this can be a dangerous practice if done so without moderation. Here are some of the many benefits that your organization can reap from a well-thought-out BYOD policy, as well as some of the pitfalls you could fall into if you’re not careful.

It’s understandable to imagine that your team will be getting more done using their own devices for the reason that they are simply more comfortable with certain products. For example, if you force someone who is used to Apple products to use a Samsung smartphone, they might be a bit frustrated until they get the hang of how it works. Furthermore, if you have your employees provide their own devices, you don’t have to purchase devices for everyone who needs them. Even something as simple as a little bit of freedom is invaluable for your employees, but you still want to dodge the many problems associated with BYOD if you want to safely allow it.

Ultimately, the goal should be to implement a BYOD policy that takes security into account, while also allowing employees to do their jobs properly. Here are some features that you will want in your BYOD strategy.

Application Blacklisting
It’s important to keep in mind that not all applications found on the Google Play Store are going to be safe and secure for your employees. You can’t let them just download any apps that they want. The risk of user error could mistakenly expose any company-owned data on the device to threats. Some apps are so sneaky that you can’t even tell they are stealing data from you while fulfilling a different purpose. A perfect example is a flashlight application that wants access to your device’s contacts, email, text messages, and so on. Since apps will usually ask for permissions before installing, it’s an ideal time to see if they are pulling some ulterior motive. Application whitelisting and blacklisting can also help you control which apps can (and can’t) be installed on a device, and what information can be collected by them. When in doubt, have your employees submit their app download requests to IT for review.

Remote Wiping
An employee losing a device could be a dangerous situation to be in. After all, you don’t know who will find it. For all you know, they could be a hacker or identity thief. If the device contains sensitive information, they may be able to access it somehow. It is situations like these that make remote wiping a necessity for SMBs, especially if employees take your data on the road. Remote wiping allows your business to immediately erase any data located on the lost device, helping you secure your business’ data even in the worst of times.

User Access Restriction
Not all of your organization’s data should be available to the entirety of your workforce. After all, why would the average worker need access to documented information from human resources, or financial data from accounting? You need to ensure that your BYOD policy reflects this kind of thinking by restricting data access according to work role. By doing so, you can limit how much data a potential thief has access to right off the bat. It might not be a perfect solution, but it helps you solidify security for the future–and it beats having your entire data infrastructure available to all onlooking eyes.

Do you have a solid BYOD strategy implemented for your organization? NuTech Services can help you choose what’s best for your business. To learn more, reach out to us at 810.230.9455.

tabbed_browsing_400.jpg

Tip of the Week: How to Use Tabs to Their Full Potential

tabbed_browsing_400.jpg

Tabbed browsing–it’s so commonplace that some might not even think about what it was like to use the Internet before tabs became a thing. Believe it or not, even this seemingly simple feature has a lot of depth to it. There are all sorts of tips and tricks that you can use to better use the tabbing features of your favorite web browser.

Open a Link in a New Tab
There are several ways to open up a link in a new tab. The first is to use the middle button of your mouse, which can be found by clicking in the mouse wheel used for scrolling. You can also right-click the link and select Open in a new tab. Furthermore, in Internet Explorer and Firefox, you can simply hold down Ctrl and click the link to open it in a new tab.

Close a Tab
The middle button on your mouse is great for closing out of a tab as well. You can just click the X, too, but what fun is that? After all, shortcuts are placed in order to make your life easier, so why not use them to the best of your ability?

Open a New Tab
There’s a keyboard shortcut to open up a new tab. To do so, just use Ctrl+T.

Reopen a Closed Tab
Let’s say that you accidentally close a tab that you wanted to keep open. You can use the keyboard shortcut Ctrl+Shift+T to reopen a closed tab. If there are multiple tabs that you want to reopen, just repeatedly use the shortcut until you are content.

Switch Between Open Tabs
You can even use your keyboard to jump quickly from one tab to the next. Just hold down Ctrl and press the corresponding number on your keyboard. For example, if you use Ctrl+1, you’ll be directed to the first tab from the left.

BONUS for Edge Users
Do you use Windows 10’s Edge browser? If so, there is a great new tab feature for anyone who tends to have way too many tabs open at any given time (you know who you are). Edge users can make groups of tabs and set them aside for later. Click the icon to the left of your tabs (it looks like a window with a back arrow) and it will move all of your open tabs into the menu on the left. You can click on the far-left icon to view all of your stored tabs.

For more great tips and tricks on how to take full advantage of your business technology, subscribe to our blog.

outdated_software_400.jpg

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

outdated_software_400.jpg

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage–namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

BitSight found that out of 35,000 companies from over 20 different industries, over 2,000 of them were running on operating systems that are out of date. Furthermore, 8,500 of these companies also ran out-of-date Internet browsers. This particular study focused on organizations using Apple and Microsoft operating systems, as well as the Internet browsers Internet Explorer, Firefox, Safari, and Google Chrome.

It’s clear that organizations that rely on outdated operating systems are three times more likely to suffer from a data breach. Likewise, organizations that use outdated web browsers are twice as likely to suffer from data breaches. While these numbers don’t necessarily show that this outdated software were directly responsible for data breaches, it’s still an important factor that cannot be ignored.

Granted, this shouldn’t be a surprise for any security-minded business professional. It’s been noted for a long time that software, while invaluable, can create any number of issues for organizations. Chief among these is outdated software. As more businesses remain in operation for extended periods of time, they continue to use unsupported software rather than upgrade to more recent versions. Examples of these business software include Windows XP and Windows Vista. What can you do to keep your own business from falling victim to these unfortunate side-effects of using outdated software?

The solution is simple–update your software. This is easier said than done, especially when time and resources are two pertinent issues. The easiest way to get a feel for how your business stands on this issue is to get a network audit from a trusted technology service provider. This will provide an unbiased analysis of how you can shore up weaknesses in your network infrastructure–including outdated software applications. The importance of such an audit cannot be underestimated, especially considering the amount of high-profile threats that like the WannaCry ransomware.

How does your business rate regarding network security? To get an understanding of this important aspect of running your organization, reach out to us at 810.230.9455.

discovery_risk_400.jpg

Are You Making Your Business Vulnerable to Project Failure?

discovery_risk_400.jpg

When implementing a new project, expectations run high and deadlines must be met. The temptation is to feel so pressured to get the project finished that the planning phase is rushed. If even a small detail is overlooked and a shortcut is taken in this early stage, it can come back to bite you in a major way–perhaps even derailing the project altogether. This is especially the case for an IT project.

CIO.com provides a working ratio of why such oversight is important for IT projects of any size, especially during the more risk-prone discovery phase. “Discovery is the crux of project risk. Although the discovery and architecture phases of a project may represent only 15 percent of the overall effort, an error or omission early on can cause cost overruns of 150 percent or more.” Have you experienced an issue of this scope in any of your company’s previous projects?

In order to prevent your next IT project from facing a disastrous end like this, you’re going to want to invest the time needed to perform the discovery and architecture phases correctly, the first time. But how can you make sure this happens?

For starters, working closely with your vendors and service provider is a must. If you detect that they’re not thoroughly answering your questions or that they’re trying to rush the project in any way, then you’ll need to speak up about it, before it’s too late. Instead, you need to make sure your vendors are guiding you through each step of the process, and that they’re assertive enough to present you with options and tough choices when it comes to unpleasant tradeoffs.

Secondly, you need to know what it looks like when a project is being rushed or shortchanged. This can be difficult to catch for a busy business owner with only a surface-level knowledge of IT. At NuTech Services, we know what this looks like and we want to pass this information onto you. When in the discovery/architecture phases of your next (or current) IT project, look for a vendor taking these four shortcuts.

  1. The documents prepared for the project are based less on what your company’s specific needs are, and instead are overly influenced by industry jargon and sales propaganda. The idea here is to overwhelm a business owner with features and benefits that sound great, but may not be precisely what the project needs and what real users would actually use. Classic snake oil sales strategy.
  2. Project requirements aren’t prioritized adequately. This shortcut will provide poor guidance when it comes to the step-by-step implantation of the project, and the hard trade offs that are sure to pop up when dealing with a budget and a deadline will hit unexpectedly.
  3. The project requirements are lacking important steps, like transitions in the end-to-end business process. If these gaps are uncovered during the implantation phase instead of the discovery phase, then meeting these unplanned requirements will push back the schedule, and may even change the entire scope of work needing to be done.
  4. The needs of the business evolve dramatically enough over the course of the project that the project proves to be insufficient upon its completion. Keep in mind that technology itself is prone to becoming obsolete by newer solutions. Shortsightedness in both areas can make it frustrating to have to go back and redo the project much sooner than expected.

These four shortcuts can devastate an IT project, or any project for that matter. One way that you can safeguard your business from these risks is to hold consultation sessions all throughout the course of the project–as opposed to leaning heavily on the original project roadmap, which may grow more unreliable as the project progresses from phase to phase. NuTech Services can provide this kind of project oversight for your next IT initiative, as well as spend the time needed in the early phases of the project. This will ensure that no stone is left unturned and every possible circumstance is accounted for.

Give us a call at 810.230.9455 and don’t plan your next IT project without first consulting with the pros.

drive_backup_400.jpg

Tip of the Week: Google Offers Personal Users A Backup Solution

drive_backup_400.jpg

Let’s say that you are a consumer looking to take advantage of data backup in an affordable way. You want a way to keep your data safe in the event of a disaster. For the average PC user, Google Drive now allows users to take backups of specific files and folders via the Backup and Sync application on their desktop PC.

Keep in mind that we are only discussing the possibility of Google Drive as an adequate backup solution for the average PC user. For businesses that want to ensure minimal downtime and maximum data recovery, your best chance is to implement an enterprise-level backup and disaster recovery solution. If you want a powerful backup solution, be sure to reach out to us and ask about your options.

In essence, Backup and Sync is the latest version of Google Drive, and allows users to back up specific files or folders on their desktop PC, and send them to Google Drive. This is particularly great for consumers who want to keep backups of their photos, videos, and other media. Google understands that this feature is primarily meant for consumer use, and encourages their G-Suite customers to wait patiently until their Drive File Stream feature is available.

In terms of availability, Backup and Sync can be implemented by users using Google Drive for PC, as well as for Mac. Just keep in mind that using Backup and Sync to store your videos and photos will likely result in your exceeding the free Drive space offered by Google.

One thing to think about as a business owner though; you shouldn’t let employees store company data directly on their workstations. Files should be stored centrally on the server where you back it up. If your workstations have a lot of sensitive company data on them, a disgruntled employee could easily set up Google Drive Backup to grab and steal all of your data. It doesn’t hurt to be a little paranoid over your data and where it’s stored.

As always, you can count on NuTech Services to inform you about the latest and greatest business technology solutions for your organization’s needs. If you need help with managing data backup and recovery, you’ll find no one better suited to the task than us. To learn more about your business’s data backup options, reach out to us at 810.230.9455.

network_maintenance_400.jpg

A Maintained Network Is Better For Business

network_maintenance_400.jpg

It can be challenging and costly to maintain your business’ network system, but it doesn’t necessarily have to be. A managed service provider can help your business achieve all of its technology-related goals, including regular network maintenance. You might be surprised by how many benefits proactive network maintenance can provide for your organization.

Less Support Needed
Maintenance is loosely defined as ensuring that something can continue to operate without any issues. Therefore, it makes sense that continued maintenance will allow your business to preserve functionality for your operational technology. Regular maintenance is practically necessary in order to keep issues from cropping up at inopportune times, and even further ruining operations with greater problems. You’ll need less support because, naturally, fewer problems will happen in the first place.

Monitoring Leads to Threat Detection
If you are monitoring a system for potential issues, you can detect issues before they can cause major problems. When you maintain technology, issues that can cause downtime can be detected before they even happen, which gives you time to resolve problems and prevent catastrophe. A perfect example of this is applying patches and security updates, as they can block issues easily, so long as you take a proactive approach to network maintenance.

Greater Decision-Making Abilities
An unstable network that is prone to failure makes it difficult to make important decisions, like how to implement new technology or components. After all, how can you make improvements on something if you don’t know what’s wrong in the first place? By taking proactive measures to prevent issues in the first place, you won’t have to make the difficult choice to overlook a vital flaw in preference to resolving another major, possibly more important flaw. Managed service providers can often resolve problems before they are even known or felt by your organization, and since most problems can be resolved without an on-site visit, you’ll save time and resources that are better spent elsewhere.

To take advantage of proactive technology maintenance today, reach out to NuTech Services at 810.230.9455.