b2ap3_thumbnail_email_gaffs_400.jpg

Tip of the Week: 4 Common Email Mistakes and How to Avoid Them

b2ap3_thumbnail_email_gaffs_400.jpgEmail is a staple in offices around the world, but many organizations are finding it easier than ever to make simple mistakes that can be easily avoided with proper training procedures. It’s a best practice to ensure that your team is adequately trained on how to efficiently use your chosen email client to its maximum potential. Here are four of the most common email mistakes that the average employee can make, and how they can easily be avoided in the future.

Avoid Major Spelling and Grammar Errors
The importance of spelling and grammar in both internal and outgoing communications cannot be stressed enough. While a minor error here or there is acceptable, anyone who wants to be considered a professional in their industry should take the time to put together messages that are both grammatically correct and easy to read. This is especially true when dealing with prospective clients. You want to be seen as the expert, and showing that you’re a well-rounded and educated individual will reinforce this thought.

Most email clients like Outlook and Gmail have a built-in spell checker that can be used for a quick idea of how many corrections need to be made, but it’s often better to compose an email in a word processor like Microsoft Word. This lets you use the powerful spell checker that the program provides, and allows you to use a copy/paste tactic where there’s minimal room for error.

Don’t Accidentally CC the Wrong People
If you’re dealing with a medium-to-large workforce, you might find it easier to communicate with all of your employees by simply clicking the “carbon copy” option when issuing statements via email. However, this comes with a risk. When you’ve received a CC of a message, and you have some input, you want to make sure that you don’t reply to all, especially if it’s something that’s only meant to be seen by the recipient. Always be aware of what you’re sending, and who you’re sending it to.

Or, better yet, don’t complain about one of your coworkers through email at all. Email should be a formal type of communication in the workplace, and you shouldn’t be using it like it’s your personal account. If someone is checking up on your email messages, it could come back to haunt you later. Still, letting off some steam in the workplace is often a necessity, so if you feel you absolutely have to get something off your chest, do it in person rather than through email.

Make Sure Your Email is Finished Before Sending It
This seems like a given, but you’d be surprised how often some folks forget to finish an email before hitting the “send” button. Again, you want to ensure that you’re retaining your professional presence with both your staff and your prospective or current clients, and sending half-finished emails isn’t going to help this goal. It’s relatively easy to hit the “send” button before your message is actually complete, especially if you’re multitasking and distracted by your other responsibilities.

This is especially why it’s important that you give your message a thorough proofreading that helps you ensure that the message is complete and ready to be sent. It’s an important part of the email process, and shouldn’t be overlooked if you’re in a hurry.

Be Absolutely Sure Who You’re Sending Your Message To
While the other mistakes we’ve mentioned thus far have somewhat trivial repercussions, sending a message that potentially reveals sensitive information to the wrong person could have far-reaching complications. If it’s internally, it’s possible that it’s no big deal, and can be resolved by simply asking the recipient to disregard the email. However, if the message is sent to an external party, and it contains sensitive information, you should immediately put yourself in damage control mode.

In the event that you accidentally send company information to an unknown email address (which you shouldn’t), it’s important to assess how important this information was and take action as soon as possible. For example, if you sent passwords or usernames (which you shouldn’t), promptly change the credentials. You should also make an attempt to notify any party involved, especially clients. While it might be embarrassing, it’s better than the alternative.

For more best practices and tips, be sure to subscribe to our blog.

b2ap3_thumbnail_cia_hacked_400.jpg

If a Teenager Can Hack the CIA, You Can Be Hacked Too!

b2ap3_thumbnail_cia_hacked_400.jpgWith new threats emerging all of the time, it’s no wonder that cybersecurity is such a major part of any technological endeavor. Your should be using the most powerful security solutions on the market in order to avoid intensive hacks. Despite the emphasis that our society places on security, it takes a high-notoriety hack to truly shake the public into action; for example, what if the Central Intelligence Agency were hacked by a teenager?

Well, that kind of happened. As reported by WIRED, CIA Director John Brennan had his email broken into by the hacker in question. By posing as a Verizon worker, the hacker was able to gain access to Brennan’s AOL email account. The hacker used a targeted spear phishing tactic, where he posed as a worker to trick real Verizon employees into handing over sensitive information about Brennan’s account. Surprisingly, all they needed were the last four digits of Brennan’s bank card.

Then, to add insult to injury, the hacker and his associates changed the password on Brennan’s account, locking him out of it and gaining access to his inbox. Since this was his personal email account, you’d think things wouldn’t be any different from a normal hack; well, the problem here is that Brennan’s inbox contained secret government documents from Brennan’s work email address, which he forwarded to his personal inbox. You don’t need us to tell you that this was a bad move on Brennan’s part. According to WIRED:

After providing the Verizon employee with a fabricated employee Vcode—a unique code that he says Verizon assigns employees—they got the information they were seeking. This included Brennan’s account number, his four-digit PIN, the backup mobile number on the account, Brennan’s AOL email address and the last four digits on his bank card.

“[A]fter getting that info, we called AOL and said we were locked out of our AOL account,” he said. “They asked security questions like the last 4 on [the bank] card and we got that from Verizon so we told them that and they reset the password.” AOL also asked for the name and phone number associated with the account, all of which the hackers had obtained from Verizon.

The most unnerving part of this entire situation is the fact that Brennan wasn’t necessarily at fault for the hack itself. The only thing he did wrong was send sensitive information from his work email to his private email address. The real issue at hand should be the fact that these hackers easily wound up accessing an important government worker’s email address. Simple security questions aren’t going to be enough to stop hackers from accessing your accounts. If they really want to, they can get whatever information they need.

Therefore, taking advantage of several security layers is the best way to protect your accounts. Part of this is practicing a quality password security protocol. You should be using secure passwords with several different types of characters, including upper and lower case letters, numbers, and symbols. Strong passwords help keep hackers from cracking your login credentials.

Another best practice is to integrate two-factor authentication into your account logins. This type of solution requires a secondary credential in addition to your normal username and password, making it much more difficult for hackers to attack your accounts. These credentials are usually sent to your smartphone in the form of a SMS message, an automated voice message, or even to your secondary email account. In other words, hackers need physical access to your device in order to obtain this credential.

You don’t want to be stuck in an embarrassing (or potentially incriminating) situation like the one the CIA Director is in now. Give NuTech Services a call at 810.230.9455 and ask us about how we can improve your business’s network security.

b2ap3_thumbnail_cloud_management_400.jpg

3 Ways to Make Sure that Your Technology Doesn’t Get Stuck In the Past

b2ap3_thumbnail_cloud_management_400.jpgThe purpose of business technology is to propel an enterprise into the future. Yet, too many businesses are reluctant to make major adjustments to their current IT systems, wrongly believing that it’s not worth the investment. The best way to approach upgrading is to use an IT roadmap that lays out a plan for your technology’s future. This way, you won’t be surprised by what the future holds.

Here are three easy ways that you can “future-proof” your IT infrastructure.

Lease Whatever Computer Hardware that You Can
Generally speaking, it’s easier to upgrade when you’re leasing equipment, rather than having to pay for new equipment outright. Often times, a hardware refresh will even be included in the terms of the lease, and at no additional cost. This way, you won’t have to worry about the consequences of hanging on to your old technology for too long because your hardware refresh will already be scheduled and taken care of by your vendor.

At first glance, it may seem like the monthly expense of leasing hardware will end up costing you more than if you paid upfront for the equipment, but the cost-savings of leasing hardware can be seen in that the cost is now an operating expense, instead of a capital expense–which is very advantageous for your company’s future budget.

Layout Your IT Infrastructure to Accommodate Your Company’s Growth
One mistake that a non-future-minded company does with their technology is to set up their IT infrastructure to only accommodate their current computing needs, instead of designing the system to handle their organization’s growth. An IT system that’s designed for the future will have enough open access points to accommodate new users stemming from an increase in staff numbers, as well as enough available hard drive space and computing power to handle the IT trends that consume a lot of network resources, like BYOD (Bring Your Own Device) and The Internet of Things.

By not planning for future growth, you’ll be caught off guard by something that should be simple, like adding a new workstation. Also, you don’t want to get stuck not having enough bandwidth for an important video conferencing meeting with a client, due to too many users participating in the meeting.

Make Sure that Your Cloud Service is Flexible
A business that’s taking advantage of the cloud will often have an outside company host and manage their cloud services, either partially or exclusively. Due to the unpredictability of your company’s future computing needs, you’re going to want to commit to a cloud agreement that’s flexible, instead of locking you into some strict terms. NetworkComputing explains:

Cloud deployments tend to be dynamic — not static — and must grow or shrink depending on the requirements of the client. Any agreement with a managed service provider (MSP) needs to cater to the variability that the consumptive nature of the cloud provides.

Before implementing technology for your business, NuTech Services will take the time to discuss with you the future of your company’s computing needs so that your IT systems will be prepared for anything that the future will throw at you. We can assist you with finding the right hardware, laying out an IT roadmap, managing your cloud services in a way that best suites your current and future needs, and much more.

Call us today at 810.230.9455 to prepare yourself for whatever the future’s got in store for your organization.

b2ap3_thumbnail_distractions_at_work_400.jpg

Tip of the Week: 3 Ways to Take Back Your Day From Workplace Distractions

b2ap3_thumbnail_distractions_at_work_400.jpgIn today’s competitive workplace environments, productivity is at a premium. Although, thanks to our gadgets, the allure of the Internet, and of course, having to interact with people, working at the modern office isn’t without its fair share of distractions, which hinder productivity. Here are three tips that you can use to tune out the distractions so you can get more work done.

Active “Airplane Mode” On Your Smartphone
When you really need to hunker down and focus, having your smartphone nearby may not be the best move. Unless you’re an extremely disciplined individual, it can be very difficult to ignore the slew of notifications periodically hitting your phone. Yet, it’s likely that you need your phone for what you’re working on, like to access your contacts, calendar, and clock. One way to still access basic apps like these while eliminating the distractions of the Internet is to set your phone to airplane mode. When you’re done with your project, simply turn off airplane mode and any notifications that you missed will promptly appear, as well as voicemail messages.

Bonus productivity tip: If you use your smartphone as your alarm clock, use airplane mode while you sleep in order to avoid being awakened by notifications and even phone calls.

Headphones Keep People at Bay
By putting on a pair of headphones, you’re essentially communicating to the world, “I don’t want to be bothered.” Of course, not everyone will take the hint and you’ll still have a few people tap you on the shoulder to ask a question. Hopefully, the inquires will be essential and they’ll think twice about offering you their opinions regarding what’s trending on social media.

Using your headphones, you might be able to listen to music in order to help you focus better (if you use Spotify, check out their Focus playlists). Although, not every worker has this ability. Therefore, you can also try listening to white noise in order to drown out the noisy distractions in the room. If neither of these options agree with the way you’re wired to work, then you can simply wear the headphones without actually using them for music as a way of communicating to your coworkers that you’re not to be bothered.

Schedule Times For Checking Your Email
If you’re one to keep your inbox open throughout the day, then you’re going to keep one eye on it while trying to be productive. This spells trouble for any project you’re working on because you’ll get slammed with notifications often and at random times. Actually, this applies to other forms of digital communication as well, like social media. Instead, try scheduling times throughout the day to check your email so that you can focus better on the task at hand. You can even take advantage of an email autoresponder tool that lets people know what time you’ll be checking your email. This way, people won’t wonder what’s wrong with you or their computer because they didn’t get an instant response. Remember, if it’s an urgent matter, they can always just pick up the phone and give you a call.

These tips may seem overly simple, but they’ve got the potential to enhance your focus and revolutionize productivity in your office. Try them out and let us know in the comments how they work for you!

b2ap3_thumbnail_sharepoint_information_400.jpg

SharePoint Brings Dynamic Collaboration to Your Business

b2ap3_thumbnail_sharepoint_information_400.jpgEvery business needs a platform they can use to securely store, organize, share, and access the mission-critical information needed to keep operations running smoothly. SharePoint is Microsoft’s intranet solution for enterprises of all shapes and sizes, and it’s worth looking into for your data needs.

SharePoint is part of the Microsoft Office 365 family, which means that it works seamlessly with all of Microsoft’s productivity applications. Yet, SharePoint isn’t a Microsoft-exclusive product. For example, it easily integrates with popular enterprise software from third parties. The integration of a valuable tool like Yammer, a corporate-style social network, is a great example of this.

Additionally, SharePoint can be accessed by non-Microsoft web browsers like Chrome and Firefox (and of course, it works great with IE and Edge). In fact, this is probably SharePoint’s strongest selling point; the fact that it can be accessed from the web browser of virtually any Internet-connected device. This is possible thanks to SharePoint’s ability to be hosted on the cloud, or on-premises (in your own IT infrastructure).

Another advantage of SharePoint comes from its versatility. As explained by the Microsoft support page, here are four ways that SharePoint can benefit your business.

  • SharePoint Online. A cloud-based service, hosted by Microsoft, for small and large businesses. Instead of installing and deploying SharePoint Server on-premises, organizations can subscribe to an Office 365 plan, or to just the SharePoint Online service. Using SharePoint Online, your employees can create intranet sites for the purpose of sharing documents and files with colleagues and customers.
  • SharePoint Foundation. SharePoint Foundation is available for on-premises deployment. You can use SharePoint Foundation to create a variety of sites that let your team collaborate on documents, lists, calendars, and other mission-critical data.
  • SharePoint Server. Organizations have the option to deploy and manage SharePoint Server on-premises. SharePoint Server also offers additional features and capabilities like Enterprise Content Management, business intelligence, enterprise search, personal sites, and a news feed.
  • OneDrive for Business folder sync. A desktop program that allows you to sync offline versions of your files to a folder on your computer.

The primary benefit of SharePoint is that it allows everyone on your team to share corporate data with each other. SharePoint is essentially the ultimate team collaboration tool for enterprises. Here are just some of the ways it can benefit your operations:

  • Share documents and files with employees and partners.
  • Host internal training guides.
  • Manage and organize projects.
  • Keep commonly updated documents in order.
  • Build and maintain repeatable processes.
  • Use it as a single, central location for everything going on internally.

Do you think that SharePoint is the intranet solution that your company needs? Whatever data-sharing platform you go with will affect operations in a major way. Therefore, you’re going to want to make sure that you consult an IT expert before making such an important decision regarding your company’s mission-critical technology. Give NuTech Services a call at 810.230.9455 to have a discussion about your data-hosting options, and to find out if a solution like SharePoint is right for you!

b2ap3_thumbnail_fight_night_it_400.jpg

The Wolfman is an Executable Virus and 3 Other Monster/Malware Comparisons

b2ap3_thumbnail_fight_night_it_400.jpgIt’s the time of year when we reflect on scary things. For an IT company, it doesn’t get much scarier than an organization’s network getting slammed with a malicious computer virus. There are a variety of really bad viruses out there, each one with its own unique ability to cause some scary results. The way we see it, each computer virus is kind of like a classic monster.

An Overwrite Virus is The Fly

  • What an overwrite virus does: Deletes information in the infected files. In this case, the infected files would be rendered totally or partially useless. Additionally, the only way to effectively rid a system of this virus is to delete the file, which would cause the original content to be completely lost.
  • Why The Fly is an overwrite virus: Before The Fly was a monster, he was a scientist who successfully developed teleportation technology. Unfortunately, during a teleoperation test run involving the scientist, a fly found its way into the teleportation pod, causing his DNA to slowly become overwritten with fly DNA. This turned him into a hideous monster. He was no longer useful as a productive scientist and the only way to stop his reign of terror was to “delete him.”

An Executable Virus is the Wolfman

  • What an executable virus does: An executable virus is a nonresident computer virus that stores itself in an executable file and infects other files each time the file is run. Until the file is executed, it remains dormant–until a predetermined command activates it. Activating the file could require something simple like opening a specific program, or even a remote activation by a hacker.
  • Why it’s the Wolfman: The thing about the wolfman is that he’s an average dude during the day, and even during most nights when the moon isn’t full. All the while, he’s out mingling in the real world like a normal person and nobody’s the wiser. Then, the full moon happens, his werewolf side is activated (or “executed”), and he goes on a path of destruction. This is what the an executable virus does; it sits dormant on your PC, waiting to be remotely activated by a force that’s beyond your control.

Botnets are Zombies

  • What a Botnet does: A botnet is programmed to spread its destructive malware to other systems. This, in turn, creates more bots, and these systems bond together into a botnet. These entities can mask their presence and creep into your system disguised as everyday Internet traffic. It can then proceed to collect as much information as it needs to spam you, steal your company’s data, or overwhelm your system and shut it down with a DDoS attack.
  • Why it’s a zombie virus: A zombie virus spreads from person to person by completely taking over their body, forcing them to do something that they wouldn’t normally do–eat brains. This, in turn, only serves to spread the virus and create even more zombies that want to devour even more brains. Botnets have the capability to take over your company’s computers in the same zombie-like way.

Ransomware is an Alien Conquest

  • What Ransomware Does: Once a computer is infected with a ransomware like CryptoLocker, the virus will encrypt the files on the computer. It will then lock the user out of their PC and demand that you pay the hackers money for an encryption key. Additionally, CryptoLocker displays a clock that counts down. If the clock hits 0:00 and the hackers haven’t received their money, then all of the PC’s files will be deleted.
  • Why Ransomware is Aliens: Ransomware like CryptoLocker is one of the nastiest viruses that we’ve seen, and it actually combines a variety of different viruses. Therefore, we’re going to chalk this one up to aliens. One reason for this association is because there are so many different types of aliens that attack Earth in so many different ways. When it comes to aliens, we see two common themes that coincide with ransomware, 1) The complete takeover of our planet (like the complete takeover of a PC), and 2) the abduction of people (which is similar to the abduction of a user’s data). Even though alien races don’t seem particularly interested in exchanging their human captives for Bitcoins, we feel like we can still make a connection because some hackers have been known to delete a user’s data even after the user has paid the ransom–now that’s scary!

Mutants, werewolves, zombies, and aliens, all of these fictitious monsters are nothing compared to the scare you’ll receive if your business were to be hit with any of these viruses. To prevent scary viruses like this, you need a proven network security solution in place like NuTech Services’s Unified Threat Management appliance, and you need to have a data backup solution that allows you to recover a version of your data before your files were infected. Call NuTech Services today at 810.230.9455 to implement these solutions and take the fear out of computing!

b2ap3_thumbnail_guest_wifi_400.jpg

Tip of the Week: Improve Customer Experience With a Guest WiFi Hotspot

b2ap3_thumbnail_guest_wifi_400.jpgAs a business owner, you rely on your WiFi router to reliably broadcast a network connection to your entire office. This is generally a private network that you won’t want to share with just anyone. The only problem with this is that guests visiting your office might want to use the wireless Internet, and allowing them to do so can improve guest relations. So, what’s the solution to this dilemma? It’s simple: integrate a guest WiFi hotspot specifically for visitors.

When you consider the prevalence of public WiFi hotspots, you’ll realize that this is a great idea that can dramatically increase customer satisfaction. Fast food restaurants and cafes are seeing this, as customers come in to use their wireless, but in the process also wind up purchasing food or coffee. Guest WiFi hotspots work for the service-type industries, and translating this to the professional environment might be a bit of a stretch. Although, you’d rather have only trusted users accessing your organization’s private wireless network, so it’s best to set up a guest wireless network that they can use to access the Internet, but not the rest of the network.

Here’s a process that you can use to approach the idea of a guest WiFi hotspot.

How’s Your Internet Connection?
It goes without saying that your business wants a strong, stable wireless connection that it can use for Internet access. So, before you consider allowing even more users to connect to your wireless, you want to make sure that your Internet connection can withstand more traffic on it than normal. How many users will be taking advantage of it at any given moment? Is it going to be meant for just simple web browsing, or will it be used for streaming music, videos, and other content? Consider these questions carefully, and ensure that your Internet can accommodate more users than you anticipate. This will minimize any risks of the network speed grinding to a halt when you need it most. Some guest WiFi solutions even let you restrict bandwidth per user, allowing you greater control over your bandwidth.

Use Consistent Security Measures
Just because you have a wireless signal for guests, doesn’t mean it needs to go without security protocol. It should be set up to require a password that is provided by someone in your office. Otherwise, you might get any number of miscreants trying to leech your wireless signal without your consent. This gives your organization a semblance of control over the network while still having it available for users when the need arises. Similarly, you should keep an antivirus, firewall, content filter, and other security measures active on your network to prevent incriminating content from being browsed from your WiFi location. There are even WiFi solutions that enforce users to have antivirus running on their device before letting them connect, as added protection.

Contact a Professional IT Technician
When you think you’re ready to set up your guest WiFi hotspot, you will want to contact an IT professional who understands the individual needs of your business’s computing infrastructure. They will make sure that your hardware can handle the extra traffic, and discuss exactly what your business needs. NuTech Services can help your organization set up and utilize a guest WiFi solution that’s designed to keep your organization safe, while allowing your guests to benefit from the web. Give us a call at 810.230.9455 to learn more.

b2ap3_thumbnail_risk_factors_for_employees_400.jpg

You Might Be Surprised At the Ways Your Employees Put Your Data At Risk

b2ap3_thumbnail_risk_factors_for_employees_400.jpgOctober is Cyber Security Month and we want to use this time to bring awareness to the different aspects of cyber security. One often overlooked element of cyber security is employee risk management. What level of risk does your staff pose to your network’s security? You can easily find this out by taking an online test.

This employee risk assessment tool is brought to you by StaySafeOnline.org. It’s a quiz designed for employees to take so they can better understand how their use of technology may be putting their organization at risk. The quiz asks employees questions about how they use their mobile devices in the workplace, how they share data, along with other questions meant to reveal security best practices. The employee risk management test can be found here:

http://www.emc.com/microsites/workplacesecurity/index.htm

At the end of the test, the online tool will calculate the test taker’s risk score, and every manager knows how powerful a motivator it can be to rank people. What makes this tool so valuable is that it’s designed to educate your workers about best practices. Once they understand exactly how their “bad behavior” is putting the company at risk, they’ll then feel compelled to change their ways. This is a much more effective tool than yet another memo to read about why cyber security is important.

As great of a security tool as this is, it won’t solve all of your cyber security woes. Even if you’ve got your entire staff lined up on how to properly use their technology, you’re still putting your business at risk if you don’t have the proper protections in place. If your business doesn’t have a strong firewall or up-to-date antivirus software, then even the most careful workers can put your network at risk. Implementing proven security solutions like a mobile device management solution or a Unified Threat Management tool will make your network virtually impenetrable when combined with a workforce that’s educated on security best practices.

For a security assessment that goes even more in depth than an online quiz, give NuTech Services a call at 810.230.9455. We offer businesses a security service called penetration testing where we seek out every weak point of your network for the purpose of offering solutions to best protect your company’s data. Call us today and quiz us about what we can do to keep your information safe!

b2ap3_thumbnail_fax_server_400.jpg

3 Hidden Fax Machine Expenses That Really Add Up

b2ap3_thumbnail_fax_server_400.jpgDo you have a functioning fax machine in your office? The technology is outdated; yet, there it sits, churning out faxes. Before you keep your fax machine around for another decade, you may want to first consider how it’s chipping away at your company’s operating budget.

Here are three ways that the fax machine can cost you more money than you may realize. Thankfully, none of these expenditures come with its replacement, a fax server solution.

The Need for a Dedicated Phone Line
Any business with a fax machine must have a dedicated phone line to go with it. Otherwise, callers won’t be able to get through whenever the fax machine is in use; a situation that could potentially lead to a lost sale. If you use a traditional phone service, then a fee for this phone line shows up on every bill, which can really add up over time. A fax server solution utilizes your Internet connection (something you’re already paying for), allowing you to finally cut the cord on your ancient dedicated fax line.

Paying for Paper and Ink Toner
Like the previous example, paying for paper and ink toner is a small expense that can really add up over the years. For example, did you know that one gallon of HP 02 Black ink adds up to $4,294.58 per gallon? Over the years, think for a moment about how many times you’ve replaced your fax machine’s ink cartridge. And now, try not to think about what else you could’ve done with that money. When implementing a money-saving paperless strategy for your business, a fax server solution is a must.

Fax Machine Upkeep
Fax machines are just like any piece of technology, they’re prone to breaking down. When this happens, you’ve got to contact an IT technician for a repair, and it may cost you more than you’d like due to the fix requiring an on-site visit for a specialty item. Also, don’t forget about the daily maintenance that comes from simply keeping a fax machine operational. Tasks include:

  • Replacing ink cartridges
  • Refilling paper
  • Taking care of paper jams
  • Tending to the sending and receiving of faxes
  • Filing the faxed paperwork

Essentially, all the time that your staff spends doing fax machine upkeep tasks like these equates to time not spent working on more meaningful and profitable projects; AKA, lost productivity.

A fax server solution from NuTech Services will eliminate all of these fax machine expenses for your company. Instead of dealing with ink and paper, you can send and receive digitized faxes in the form of PDF files, all from your email inbox. And don’t forget about finally getting rid of that bulky fax machine! To learn more about how a fax server solution works, along with more ways that it will benefit your business, reach out to NuTech Services at 810.230.9455.

b2ap3_thumbnail_do_you_share_too_much_400.jpg

Tip of the Week: How to Protect Yourself, Your Staff, and Your Kids From Sharing Too Much Online

b2ap3_thumbnail_do_you_share_too_much_400.jpgAttention people of the Internet, October is Cyber Security Month! Make sure that you share this information with everyone on the Internet that you know. In a situation like this, sharing content with everyone to raise awareness of a worthy cause is perfectly fine. Although, what’s not alright is the sharing of your personal information online.

Out of all the different aspects of cyber security that we can hit on, talking about the problem of oversharing is one of the most important because it affects everybody–you, your family, and your employees. The worst place for this problem is on social media, but it extends to anywhere on the Internet where content can be shared and posted. You may know that oversharing personal information can lead to identity theft, but you may not have known that oversharing can also attract cyber bullies and the eyes of your competitors.

Being mindful of what information you share online is the best way to prevent the dangers of oversharing, and the best way to do this is through education. Here are some proven ways that you and others can be intentional about not oversharing:

Your Employees
The alluring thing about social media is that it makes you want to share whatever it is you’re feeling at that very moment. For example, the first thing you see when opening Facebook is the question, “What’s on your mind?” What tends to happen is that, for many workers, their ill feelings about their job are exactly what’s on their mind–and these thoughts find their way to social media. This is a classic example where oversharing can have some dire consequences as far as one’s career goes.

Additionally, an employee who’s used to sharing all the details of their life online may accidentally share company secrets that they’re privy to. What’s worse, their social network may include someone associated with a competitor. This is why you shouldn’t brag about a big sale online until the check has cleared.

Your Teenagers
For teenagers and Millennials, sharing their personal information on social media is second nature. In fact, they’re probably doing it using apps and in ways that you as a parent may not fully understand (there’s much more to social media than Facebook and Twitter). Young people will want to be mindful of revealing too much information to predators, as well as leaving behind a digital footprint that they’ll regret later.

Unfortunately, the Internet is full of people who would like to do harm to your child. This can come in the form of a classmate who acts as the school’s cyberbully, or even predators who are looking to abduct your kid. Young people especially need to be careful online, and this starts with only befriending and sharing information with people online who they know and trust. Also, another way to prevent your kids from oversharing to the wrong people is to monitor their online activity and educate them on what red flags to watch out for.

Additionally, every career-minded young person needs to be mindful of their “digital footprint.” Today, when a potential employer or educational institution investigates a person’s application, they do more than make phone calls to the listed references, they will also perform and Internet search on the applicant’s name and scan their social media profiles. Therefore, you will want to teach your kids to view their online activities from an employer’s perspective.

Here are five tips from Net Nanny on how you can help monitor your kid’s digital footprint:

  1. Check their digital trail by searching for them on Google. View the results from a college or employer’s perspective and make sure it coincides with the application.
  2. Limit profile visibility to friends only.
  3. Make sure profile photo is appropriate.
  4. Remove any past Facebook posts from public view.
  5. Take control of tagging (i.e. don’t allow friends to tag your teen because it is uncontrollable).

Yourself
One of the biggest risks from oversharing comes from having your identity stolen. Obviously, you’re not dumb enough to post your credit card number online for all to see, but you may be surprised to learn that posting seemingly-innocent information about yourself can actually lead to identity theft. Information like:

  • Your mother’s maiden name.
  • Your high school.
  • Where you got married and where you met your spouse.
  • Your favorite hobbies and sports teams.
  • The names of your pets and children.
  • Your home address (including pictures of your home).

Now, you may be thinking, “What’s wrong with posting fun facts like this?” Well, if you’ve ever forgotten your password for an online account, you may recall that you will be asked intimate questions of yourself like these in order to confirm your identity so you can be sent a new password. A hacker that knows both your account’s username and the answers to these questions will be able to access your account. Don’t be fooled by social media “fun quizzes” that ask these questions under the guise of “How well do you know your friend?”

Following these tips, you will decrease the dangers of oversharing. For more tips on what information you shouldn’t share online, check out https://www.staysafeonline.org, and be sure to subscribe to NuTech Services’s blog.

b2ap3_thumbnail_microsoft_office_400.jpg

Microsoft Office 2016 is Here and It’s Got Something For Everyone

b2ap3_thumbnail_microsoft_office_400.jpgIt’s only been a few months since Microsoft introduced Windows 10, but the world’s largest software company is now updating their wildly popular Office productivity suite. Office 2016 takes the fully-featured productivity apps that users are used to and adds in significant improvements, especially to the integrated collaborative capabilities. Applications like Word, Excel, PowerPoint, Outlook and the other apps that make up the Office suite have all seen improvements.

Microsoft Word
Microsoft Word is one of the most utilized word processing programs on the market, and has been for over three decades. Word 2016 has built-in dynamic features that help users collaborate, share, and remain productive, in real time. With integrated features that allow users to edit any kind of text file, including classically-stubborn PDFs. Improvements to Read Mode allow for a reconfiguration of text to provide an easier-to-read interface, while the “Tell me what you want to do…” bar is a great addition for users that want to utilize the software to its maximum benefit. Whether you use a centralized SharePoint interface or simply store your files using OneDrive or a local repository, Microsoft Word will continue to be the go-to program for all of your word processing needs.

Microsoft Excel
Excel is the most useful spreadsheet application on the market with dozens of features that no other major spreadsheet application offers. Like Word, the Excel program has been improved to include dynamic collaborative options, while maintaining the trusted and powerful interface millions of users already know. Some of the more useful new options that Excel 2016 delivers include more access to charts and graphs than ever before, as well as improved pattern recognition. Like the other apps in the suite, Excel adds the “Tell me what you want to do…” box, to help users completely utilize the app’s features.

Microsoft PowerPoint
For anyone that needs to produce the perfect presentation, Microsoft PowerPoint is on the short list of applications dedicated to that purpose. PowerPoint 2016 provides users with a higher degree of access than ever before, allowing users to team up to edit, manage, and create presentations in real time. The new PowerPoint offers improved revision history and better conflict resolution, keeping users on task and efficient.

Microsoft Outlook
Outlook is one of the most utilized email interfaces in the world, and Outlook 2016 makes certain that won’t change in the future. Again the major theme of Office 2016 is collaboration, and Outlook makes it easier than ever to send and receive files and keep messages organized. Outlook, has also integrated the “Tell me what you want to do…” box, giving users a robust interface to assist them with whatever issues arise.

Other improved applications that are a part of the Microsoft Office 2016 suite are:

  • Microsoft OneNote – Office’s note-taking application
  • Microsoft Access – Office’s database management software
  • Microsoft Project – Office’s project management software
  • Microsoft Visio – Office’s diagramming software

Each will get the “Tell me what you want to do…” box integration as well as subtle improvements over their previous versions.

If you are looking for a comprehensive productivity suite, look no further than Microsoft Office 2016 through Microsoft’s Office 365 offering. With Office 365, users get all of these powerful apps complete with OneDrive integration for a simple and affordable monthly rate. Call NuTech Services at 810.230.9455 to get an idea of further benefits Microsoft Office 2016 and Office 365 can offer your organization.

b2ap3_thumbnail_meeting_about_meeting_400.jpg

3 Ways To Buck the Trend of Unproductive Meetings

b2ap3_thumbnail_meeting_about_meeting_400.jpgRunning a business means going to meetings. There’s really no way around it. And while you can’t run a business without meetings, you can run your meetings as efficiently as possible so that they’re not a complete waste of time. Unfortunately, according to a recent study by Blue Jeans Network, the worldwide trends for meetings show that they can hinder productivity more than help it.

The study is an annual report released by Blue Jeans Network, a cloud-based video conferencing company. They analyzed the data from more than five million video meetings in 177 countries, of which more than a third had an in-person component. When compared to similar studies done from previous years, patterns were spotted that showed people are wasting more time in meetings than they should. Here are a few of the more noteworthy findings.

Most Meetings Are Taking Place at the Most Unproductive Time
In separate studies, it’s been proven that different parts of the work day are better for meetings. For example, morning meetings are ideal because that’s when people are most alert, and the worst time for a meeting is in the middle of the afternoon because that’s when office workers tend to feel the most dull-brained. According to the study, the most popular meeting time is mid-afternoon, sometime around 3 p.m.

Solution: Schedule your meetings during the mornings, preferably right after the coffee kicks in.

It’s Normal For Meetings to Start Late
One of the most annoying aspects of meetings is waiting for people to show up. While waiting for Johnny-come-lately to make an appearance, everyone is forced to participate in small talk–and get paid for it. This kills productivity. According to the study, a whopping 81 percent of meetings start late, up 30 percent from the previous year. Inc. describes how tardiness is dangerous because it’s a self-perpetuating problem:

If you arrive five minutes late to a meeting and it hasn’t started yet, you’ll figure you haven’t missed anything, so you’ll likely do the same next time, or maybe show up even later. Meanwhile, the punctual people who’ve sat around waiting for you will figure they have better uses for their time, and next time they’ll come five minutes late as well, or maybe even later.

Solution: Be strict about your meeting times and have consequences for late comers.

Bad Weather Equates to More Meetings
The study shows that Winter, with all of its blusteriness and bitter cold, sees twice as many meetings as other times of the year–when it’s presumably warmer and nicer outside. It’s also the case that, the worse the weather is, the more likely that a meeting will take place. The study shows that “meetings were up by as much as 26 percent during the recent Texas flooding, and an impressive 35 percent during the Boston blizzards last winter.”

Solution: Consistency is key to not wasting too much time during meetings, and to not have unnecessary meetings. By having regularly-scheduled meetings, you will decrease the number of unnecessary meetings that take place, simply because someone feels a strange connection to the weather patterns.

Meetings are kind of a necessary evil, but if you plan them right, you can make them more productive and less, well, evil. In addition to being on time and intentional about how often you meet, you can take advantage of technologies like video conferencing and cloud-based scheduling software that will keep your meetings as productive as possible. To schedule a meeting with NuTech Services about this, give us a call at 810.230.9455.

b2ap3_thumbnail_tablets_for_works_400.jpg

Tip of the Week: 3 Essential Bluetooth Devices for Your Smartphone

b2ap3_thumbnail_tablets_for_works_400.jpgIf you’ve ever taken your gadgets on the go for work purposes, you might have found that it’s somewhat difficult to get anything done with the limited computing potential of a smartphone or tablet. However, with the right technology, you can take full advantage of your mobile devices, especially if you’re using Windows 10 with its full Microsoft Office suite (Want to know if Windows 10 is right for your business? Reach out to us before you upgrade).

Being able to perform work remotely is especially important in today’s work environment. This is why it’s preferable to have a tablet or smartphone that one can work on while out of the office. As of 2015, it’s estimated by Pew Research that 64 percent of all American adults own a smartphone. Here are three technologies that you can use to get more productivity out of your mobile devices.

Bluetooth Keyboard
How long was the last message you typed on an on-screen smartphone or tablet keyboard? It’s clear that this isn’t the most efficient way to write out longer emails or documents. While it might be great for a quick text message or email update, you’ll want a more comprehensive solution that helps you spend less time messing around with autocorrect errors. You can give your thumbs a break by purchasing a Bluetooth keyboard. This essentially turns your device into one with laptop-like functionality.

Bluetooth Mouse
Anyone who uses a tablet understands that navigating productivity applications like email and document editors with a touch screen can be frustrating at times. You can remedy this by using a Bluetooth-connected mouse that gives you the feeling of a desktop with an itty bitty screen. It might only be a slight convenience, but whatever helps your productivity, right?

Many tablets today are compatible with Bluetooth mice, which, when combined with a keyboard, give you more of a traditional laptop experience with the mobility of a slim, light tablet.

Bluetooth Headset
One of the core functions of a telephone is to allow you to communicate over long distances with your voice. While you could easily stop whatever you’re working on to make a phone call, it’s unnecessary and takes away from the task at hand. If you’re using a Bluetooth headset, you can use your mobile device for phone calls without interrupting your work process, and without bothering the people around you by putting your phone on speaker mode.

Besides the obvious use of being able to talk on the phone, you can also use a Bluetooth headset to listen to music, view webinars, or listen to podcasts that are designed to help you boost productivity or learn new best practices. If you’re on a plane and have several hours left of your flight, it might not be a bad idea to check in on what’s hot and upcoming in your chosen industry. While some airlines have concerns over the safety of Bluetooth, the FAA has confirmed that Bluetooth will not interfere with critical airplane communication systems (in other words, it depends on your airline).

What are some of your favorite ways to stay productive with your mobile devices? Let us know in the comments, and be sure to subscribe to our blog for more productivity hacks and technology tips.

b2ap3_thumbnail_hold_up_in_gmail_400.jpg

How to Block and Unsubscribe from Users with Gmail’s New Features

b2ap3_thumbnail_hold_up_in_gmail_400.jpgWe all know how annoying spam and unwanted emails can be when you’re trying to navigate your inbox. While a quality spam filter can go a long way toward eliminating these irritating time-wasters, Gmail now has a feature that lets you dodge some of this pain. With the ability to block selected users and unsubscribe from email campaigns, you can reclaim plenty of time that you might have been wasting weeding out your inbox.

Before we dig into the details, though, it should be mentioned that, while Gmail’s new feature is indeed a good first step towards eliminating spam in your inbox, it’s by no means a guarantee that you’ll see a significantly less amount of time-wasting messages. A comprehensive spam-blocking solution is often necessary to keep malicious emails and other time-wasting junk out of your inbox. Just because you block or unsubscribe from a particular email address doesn’t mean that emails won’t start pouring in from another source. If you have concerns over your current levels of spam and junk mail, feel free to contact NuTech Services at 810.230.9455.

Still, Gmail is taking strides to make it easier for the average consumer to take advantage of the benefits of email, without the negative side-effects, like spam. If you happen to be receiving an alarming number of messages from a specific person that you don’t want to hear from, or if something just looks plain sketchy, you can block anything further from the sender. Any blocked messages will immediately be sent straight to your spam folder. To block someone, all you have to do is open an email from the sender you want to block, click on the down-arrow next to the reply button, and select Block “user.”

Gmail’s unsubscribe feature works in a similar manner to the unsubscribe links that you might find in various advertisement emails, like ones you might get from Amazon or other big-box retailers. On the Android Gmail app (the most recent version – this feature isn’t on the desktop version of Gmail yet), open a message from the user you want to unsubscribe from. Click the three-dot More button next to Reply and select Unsubscribe.

While this doesn’t necessarily block spam completely, it’s a good step in the right direction. Your goal shouldn’t be to send all spam to the spam folder; in order to achieve maximum productivity and email security, you want to prevent spam altogether. For more tips on how to accomplish this feat, give NuTech Services a call at 810.230.9455. Also, be sure to subscribe to our blog, where we often post about the latest security developments, security how-tos, and much more. When it comes to securing your email from spam, and protecting your business from hackers, you need all of the help you can get.

b2ap3_thumbnail_facebook_security_400.jpg

Tip of the Week: 3 Facebook Security Tips to Protect You and Your Friends

b2ap3_thumbnail_facebook_security_400.jpgWith social media playing such an important role in everyone’s day-to-day lives, one has to wonder to what degree this affects the security of online accounts and profiles. Social media might have revolutionized the way we communicate with others, but it’s also revolutionized the way that hackers stalk their victims. How vulnerable are you and the people you love when it comes to your Facebook settings?

Imagine this worst-case scenario. Hackers can impersonate your friends or the people you trust easily enough. If your profiles are set to public, nothing is stopping them from browsing your personal information (phone number, email, address), posts on your wall, pictures, videos, and more. This is all information that helps hackers determine how and when they will target you, or worse, the people you know.

The unique issue with social media attacks is that hackers can take advantage of both digital and physical variables in their favor, making it extra important that you take the proper precautions with your approach to social media. To avoid these unnerving possibilities, try these three tips to lock down your Facebook account.

Use the Privacy Checkup Shortcut
Upon clicking the padlock icon in the top-right corner of Facebook (near your notifications), you’ll notice that there’s a new feature called privacy shortcuts. These allow you to quickly and efficiently access some of Facebook’s best privacy and security features. By clicking on the Privacy Checkup button, a friendly bipedal blue dinosaur will guide you through a short process. You can set your default post status (public, private, etc), the apps that have access to your account, and certain parts of your profile information. You can then choose to view your profile as either one of your friends, or a stranger, to see if the changes you made were to your specifications.

The privacy shortcuts also provide you with opportunities to access other settings, like who can contact you via inbox or friend request, and how you can get someone to leave you alone. At the bottom of the drop-down, you can access even more privacy settings.

Enable Login Notifications
You probably know someone who has had their Facebook account hacked. This happens because people are unaware that their accounts have been compromised. Facebook has a measure dedicated to informing you of when someone logs into your account, and from where. You can receive these notifications either through your Facebook notification bar, email, or text messaging.

Facebook also allows you to see where your account is currently logged in, as well as the last location the device connected from. This includes device, operating system, and physical location, effectively allowing you to eliminate suspicious activity before too much damage is done. Click End Activity, which will give them the boot and give you some time to change your password.

Take Advantage of Two-Factor Authentication
Facebook has two-factor authentication, too, which uses a PIN sent to your smartphone to act as an additional login credential. You can also access the Code Generator application on your mobile phone, which gives you a security code that lets you access your account. This helps keep your account open to you, and only you.

Security is more important than ever, especially when we’re all connected through the Internet. It’s important to always keep the security of both yourself, your friends, and family in mind, by spreading best practices related to security protocol. Share this article on Facebook to get the word out.

b2ap3_thumbnail_upgrade_your_it_400.jpg

Think Strategically When Upgrading Your Workstations

b2ap3_thumbnail_upgrade_your_it_400.jpgWith technology growing faster than most businesses can keep up with, organizations have to continuously upgrade their solutions in order to maintain a semblance of modernity. The only issue with this is that many businesses can’t keep up, simply because they don’t have a team that’s dedicated to this important task. What technology upgrades should be made a top priority, and why?

Naturally, the first thing you need to know about workstation and technology updates is that you need to integrate them periodically in order to ensure optimal security for your organization. Most viruses and malware will attempt to take advantage of weaknesses in your infrastructure in order to infiltrate it. These weaknesses in your software and operating systems’ source code will ultimately allow these threats to force their way into your network, putting any contained information at risk.

These flaws are often addressed in software patches and system updates issued by the software developer, but tackling the updates in a timely fashion is a whole other monster. Managing all software updates is easier said than done, especially without a dedicated IT department watching over your technology. Regular maintenance is often pushed to the back burner, and dangerously close to being forgotten by all. Therefore, the best way to make sure that your systems are prepared to handle the threats that are found in today’s computing environment is to make upgrading your technology a priority for your organization.

Software Updates
There are several applications that your organization needs in order to stay functional, so your software updates aren’t limited to just your workstations’ operating systems. The fewer unnecessary security flaws that can be found in your IT infrastructure, the safer your information will be. Furthermore, users who are working with top-notch, optimized technology will be far more productive than they would be if they were using sluggish, bogged down computers. It doesn’t make any sense to let your employees use machines that hold them back from achieving their maximum productivity. In fact, sometimes you might encounter a situation where using a different software will be better for your business strategy. It’s always recommended that you consult with a professional technician before making drastic changes to your business’s software infrastructure.

Antivirus Updates
Your antivirus solution is often a software solution, but it’s worth mentioning on its own for the sole purpose that virus and malware definitions are continuously being updated. If your antivirus and other security software solutions aren’t properly maintained, it’s like you’re basically “leaving your keys in the front door,” so to speak. Your antivirus solution needs to be managed on all workstations, or better yet, centrally controlled from the server to ensure that all users are protected and up to date.

Hardware Updates
Older hardware that’s been around the block a time or two might have proven reliable, but it eventually starts to show signs of its old age. Hardware failure grows more likely, and you run the risk of losing information due to the degradation of your technology. This is why monitoring your systems for faulty tech, and periodically upgrading to more recent models is preferable, if not necessary.

Granted, all of the software and hardware upgrades your business might need may feel overwhelming. This is why NuTech Services offers our remote monitoring and maintenance solution that’s designed to administer patches to your mission-critical systems remotely. This helps your organization ensure that your systems are always up-to-date. We can also monitor your infrastructure for any irregularities that might be caused by hardware malfunctions, hackers, and much more. Give us a call at 810.230.9455 to learn more.

b2ap3_thumbnail_keyboard_cleaning_400.jpg

Tip of the Week: How to Save Your Keyboard After Spilling Your Drink On It

b2ap3_thumbnail_keyboard_cleaning_400.jpgYou know that you shouldn’t keep a beverage near your computer, but how good are you at actually abiding by this best practice? Due to the busyness of our modern lives, it’s likely that most office workers eat more meals at their computer than away from it. Inevitably, this will lead to a drink spilt on your keyboard, which can put you in a rather sticky situation.

When your keyboard takes an unintended plunge, what can you do about it?

First off, don’t just sit there with your keyboard sopping wet and try typing into Google, “How to clean Mountain Dew off my keyboard.” The liquid will only seep further into your keyboard, making it extremely difficult to type. Actually, a sugary substance like Mountain Dew will cause your keys to stick, which means that your Google Search query would actually look something like this:

not good ib1

Don’t lollygag when faced with a liquid-on-your-keyboard crisis or you’ll just make the problem worse. Instead, take immediate action by following these five steps:

Power Off Your Computer and Disconnect the Keyboard
By far, your computer is way more important than your keyboard (and quite possibly your outfit that also took a Mountain Dew bath). Therefore, as soon as you can, be sure to either disconnect your keyboard. Most modern keyboards are USB, so they can be unplugged with the computer on, but other keyboards use round connectors. Unplugging the round connectors while the PC is on could cause damage, so if you aren’t sure just shut the PC down before disconnecting the keyboard. Act quickly, the liquid may seep into the keyboard’s circuits and cause some problems (and not the good kind like we saw from Coca-cola’s spilt-soda-on-computer scenario).

Flip the Keyboard Upside Down and Give it a Good Shaking
When you encounter a spill, your first instinct is to get up and grab a towel. Before you do that, flip your keyboard over and shake it. Basically, when dealing with a spill, you’ve got precious little time to locate a towel while the ill-fated beverage seeps deeper and deeper into your circuits.

Wipe Down Your Keyboard
After gravity has done its job and drained as much liquid as possible, now is the time to use a dry cloth to wipe down your mess. Do what you can to get in between the keys, but don’t do anything drastic like apply too much force or pop off the keys, yet. For now, the goal is clean up, not detailing.

Let it Dry Overnight
Next, find a dry place to let your keyboard sit upside down overnight. When you come back to it the next day, look for any additional moisture that may be left and give it a wiping.

Check for Stickiness
Before plugging in your now-dry keyboard, press on every key to check for stickiness. This will most likely be the case if you split a sugary substance, like Mountain Dew. To clean out the stickiness, you’ll have to remove the keys to really clean underneath. Computer Hope offers some solid advice on how to do this:

Removing a standard keyboard key is simple. Start by pressing down on the key in front of the key you want to remove and insert a flat object such as a car key… or a small flathead screwdriver below the key. Once below the key twist it or push down until the key pops off. If you want to remove more than one key, repeat this process until all keys are removed.

Once you’ve got your keys removed, using a tool like a Q-tip will really help with those small and hard-to-reach places, with both your keyboard and your ear canal.

Lastly, with your keyboard fully cleaned and dry, plug it in and give it a spin. If you were fast-acting enough to catch the mess, then you might have been able to save it. Although, if the spill was too great, then your keyboard might be toast and you’ll have to replace it. You’ll know for sure when you sit down with your cleaned keyboard and try it out.

We hope that you’ve found this week’s tip helpful. For more great technology tips, subscribe to NuTech Services’s blog and check back every week.

b2ap3_thumbnail_business_sabotage_400.jpg

4 Scenarios to Consider On Disaster Preparedness Day

b2ap3_thumbnail_business_sabotage_400.jpgSeptember was National Disaster Preparedness Month, and as such, it’s important to consider the state of your business’s current backup and disaster recovery practices. Different disasters pose various threats for your organization, but many of them have one thing in common: they’re going to ruin your physical IT infrastructure, and, depending on your backup practices, could potentially bring down your entire operational infrastructure.

Here are four of the most common natural disasters that drastically affect IT systems, and what you can do to prevent them from causing permanent damage.

Power Outages
Fierce storms are often enough to cause quite a bit of damage to businesses that haven’t taken the proper precautions. If power lines go down, you run the risk of losing electricity. This could result in your machines unexpectedly powering down, and you losing information or even causing damage to the hardware. Using an uninterrupted power supply, or UPS, can help to keep your systems up and running long enough to save any files that are being worked on. This helps to prevent damage from unexpected power-downs.

Floods and Tropical Storms
Again, storms, hurricanes, and heavy rainfall in general is enough to create problems for businesses along the coast, on bodies of water, or near rivers. Unexpected flooding is enough to cause extensive water damage, wash out foundations of buildings, and, of course, fry any technology it comes into contact with. This means that floods can potentially cost your business in not just physical repairs to your building, but also in replacing vital hardware systems.

To avoid water damage to your office’s equipment, consider placing your vital technology components in an elevated location, away from the floor. This will help keep them safe from a couple inches of water, if the flood infiltrates your building. Still, the best way to prepare for flood damage is to keep an off-site backup of your data infrastructure. This makes sure that your data isn’t wiped out by an unpredictable natural disaster.

Earthquakes
Earthquakes have the potential to be even more devastating for businesses, especially if you’re located somewhere that is known to experience periodic violent quakes. With the power to level entire buildings, your business could be at constant risk of both physical infrastructure damage and data loss.

Implementing a reliable backup and disaster recovery solution is required if you want to ensure that your data is safely stored off-site, somewhere earthquakes shouldn’t be able to reach it. You can also switch to cloud computing and virtualization tactics for your primary mode of data and application distribution, which decreases the amount of physical infrastructure networking you need to stay productive.

Fires
Just like earthquakes, a fire is one of the more damaging disasters that could hit your business. If your building were to catch fire, there’s a risk of everything you hold dear being destroyed: data, hardware, and even your physical location. Thankfully, you can at least save your data from destruction by using a backup and disaster recovery solution.

These are only a few disasters that could strike your business’s IT infrastructure. If you want to optimize your chances of making it through disasters like these unscathed, give NuTech Services a call at 810.230.9455 for more information about our backup and disaster recovery solutions.

b2ap3_thumbnail_implement_cloud_solutions_400.jpg

Study: The Cloud Can Double Small Business Profits

b2ap3_thumbnail_implement_cloud_solutions_400.jpgIf your business has put off embracing cloud computing as a legitimate method for data distribution and application deployment, it might be time to reconsider why you haven’t integrated a cloud solution yet. A recent study from software companies Exact and Pb7 Research shows that the cloud can provide your organization with a significant increase in both profits and net growth, proving once and for all that cloud business is better business.

Specifically, the study shows that the cloud can potentially double small business profits and help them achieve an additional 25 percent revenue growth compared to businesses that don’t take advantage of any cloud solutions. This study, which was published on August 19th, contains findings that are based on 750 interviews with small businesses, all of which have less than 50 employees. 51 percent of all respondents claimed to use at least one form of cloud computing software, while nearly 30 percent of small businesses in the United States admitted to using three or more cloud applications in the workplace.

In other words, most businesses are adapting to the cloud and using it to improve the way they operate. When asked why they chose to implement cloud solutions, businesses gave these top five reasons:

  1. Security: 32%
  2. Lower IT costs: 26%
  3. Low maintenance requirements, less physical infrastructure: 23%
  4. Easy mobile access: 23%
  5. More productivity and efficiency for end-users: 21%

Additionally, when asked to rate certain aspects of the cloud on a scale of 1 (low) through 5 (high), the average results were:

  1. Easy to use: 4.0
  2. Easier to find information: 4.0
  3. Easier to share information: 3.9
  4. Increased productivity: 3.9
  5. Easier to add and remove users: 3.8

While the reasons why cloud users implement the cloud vary, this proves that there are a number of benefits that this type of computing infrastructure can provide. When considering integrating a cloud solution for your business, you need to ensure that your organization can handle this change in protocol. Changing the way you deploy and manage your data and vital technology systems requires the attention of a knowledgeable professional. Contact NuTech Services at 810.230.9455 to learn more.

b2ap3_thumbnail_cryptolocker_400.jpg

CryptoLocker Strikes Again: This Time, It Hits Gamers Where It Hurts

b2ap3_thumbnail_cryptolocker_400.jpgCan you believe it’s already been two years since Cryptolocker, a particularly nasty strain of ransomware, was released into the online environment? By encrypting files on a victim’s computer, and forcing them to pay a fee for their safe return, Cryptolocker has been a significant threat to both business and personal environments. Now, however, a particular strain of Cryptolocker is making gamers look like cybersecurity rookies.

Cryptolocker has single-handedly changed the cybersecurity scene by ushering in an era of ransomware unlike any seen before. In fact, it will probably remain a key player for many years to come, simply because it’s an unprecedented threat that businesses are still learning to fight against.

By taking advantage of anonymity technologies like cryptocurrency and a network called Tor, authorities are finding it exceptionally difficult to track down and silence. The fact that Cryptolocker continues to evolve is a testament to its tenacity. Since Cryptolocker was taken down two years ago, a new variant called Cryptowall, which is capable of encrypting an entire network infrastructure, has been causing trouble for small businesses. Even now, Cryptolocker continues to adapt and find new targets.

While the business environment is indeed a lucrative market for these kinds of malware due to the importance of a business’s mission-critical data and applications, hackers are always looking to take advantage of all sects of the computing industry. Even innocent gamers are falling prey to Cryptolocker. In fact, according to Bromium Labs, this brand new strain of Cryptolocker is almost exclusively targeting gamers, making them pay for access to games that they’ve already purchased. The malware is distributed through an unidentified WordPress-based site, but the URL that distributes the malicious flash file is always changing, making it difficult to locate. Upon visiting the malicious website, the user downloads the malware unexpectedly.

In fact, according to ZDNet, the majority of files targeted by this particular strain of Cryptolocker consists of games.

graph ib 1

So, if there are any gamers in your lives, be sure to tell them to stay cautious. This strain of Cryptolocker is known to hit games that have a massive following, like Minecraft, World of Warcraft, League of Legends, and many other games that are distributed through the PC-gaming platform, Steam. The researchers claim that this malware can also detect company-specific files, like those from EA Sports, Valve, Bethesda, and more. Just think of the effects that this could have on the business sector if this strain decides to target new markets.

If there’s anything that you take away from this article, we hope that it’s the possibility that Cryptolocker could be found in other, more focused strains that might directly affect your business. If your business were to be struck by ransomware, would you be able to recover? Call NuTech Services at 810.230.9455 today to find out how you can protect your PC from the clutches of Cryptolocker, Cryptowall, and other types of ransomware.