b2ap3_thumbnail_spoiler_alert_400.jpg

Tip of the Week: Use This Chrome Extension to Avoid Online Movie Spoilers

b2ap3_thumbnail_spoiler_alert_400.jpgThe Internet is a great and wondrous thing, giving us information about pretty much anything we could ever hope for. However, this is a dangerous thing for those who want to go about their entertainment “spoiler-free.” In other words, you want to be pleasantly surprised when you watch your favorite movies or TV shows. Sometimes the Internet isn’t so kind toward that goal. Well, here’s a somewhat viable solution: the Spoiler Alert extension for Google Chrome.

Especially with Star Wars, Episode VII: The Force Awakens just around the corner, there’s no time like the present to arm yourself against the savage assault of spoilerific Internet content. The extension for Spoiler Alert is capable of blocking certain web content in accordance with your specifications. While the extension asks you to sign up with your email and date of birth, it allows you to browse categories and block content related to specific TV shows and movies. CNet cites that the only movie currently available to block spoilers of is The Force Awakens, but hey, isn’t that all that matters?

Spoiler Alert also works for certain other events, like sports, new episodes of TV shows, and the like. This is particularly helpful for popular dramas that are huge hits in pop culture (think The Walking Dead), or for keeping you from viewing the score of the big game until you’ve watch it. You can even use it to avoid all of the political debates and debauchery, if you so desire.

However, Spoiler Alert is still far from ideal. As explained by Rick Broida at CNet:

One problem I discovered is that Spoiler Alert doesn’t seem to work past the initial page-load. So on Facebook, for example, if you scroll down far enough that the site loads more content, the extension doesn’t block anything in that additional load. That’s a problem. But this blocker is still in beta, so hopefully the developers can address that. In the meantime, I’m just happy to have at least some line of defense against our spoiler culture. Seriously, people, why would you want to know everything (or anything) about “The Force Awakens” before getting to the theater?

In some cases, Spoiler Alert only blocks headings, titles, and text, rather than images, but in other cases it’s capable of blocking the entire site, while offering the choice of entering at the risk of being spoiled. You can change these settings to suit your needs, though, like if you’ve already seen the latest episode of your weekly TV show. Another solution to this dilemma is to completely avoid Facebook, Twitter, and pretty much any online news aggregate, but that’s not really a viable choice. As a business owner, you probably spend a lot of time on the Internet doing research on new solutions and clientele. You shouldn’t have to have your fun ruined by Internet spoilers just because you’re doing your job.

In the meantime, Spoiler Alert might alleviate the problem to a degree, but the fact remains that the Internet is rife with spoilers that can potentially ruin the experiences of folks around the world. If you know of another way to keep spoilers away, feel free to share it in the comments; and please, no spoilers!

b2ap3_thumbnail_more_PC_mistakes_400.jpg

Tip of the Week: Every PC User Should Know NOT to Do These 3 Things

b2ap3_thumbnail_more_PC_mistakes_400.jpgKnowing how to properly use your PC is key to its longevity. Therefore, you should never take for granted basic PC best practices. Here are three basic PC best practices that are easy to overlook.

Don’t Plug Your Computer Equipment Directly Into an Outlet
While it’s likely that you plug a variety of your electronics directly into your outlet, you shouldn’t do this with computer equipment. The problem here is that electricity coming directly from outlets can fluctuate. For example, this is why your building’s lights may randomly get dimmer and then brighter. While your light bulbs can handle these power fluctuations, your computer equipment cannot; and it may lead to irreversible damages.

Instead, be sure to plug your equipment directly into a surge protector. This is a simple power strip that can be found at most any store. Though even a cheap power strip is better than no power strip, a basic power strip will not protect your PC as well as a heavy-duty one. Therefore, it’s worth it to drop some extra cash on a power strip that’s rated to protect your equipment from surges, instead of one that’s designed only to provide you with extra outlets.

For the best solution to these power surges, consider an Uninterrupted Power Supply (UPS). This is a device that both restricts surges in electricity, as well as provides additional power during a surge’s low point.

Don’t Click Next or Ok Without First Reading
Granted, it’s unreasonable to expect someone to read every word of every software agreement, but at the very least, you should skim it over to have an idea of what you’re agreeing to. It may be the case that a shady third-party software company is trying to pull a fast one on you. ComputerHope.com explains:

It is not uncommon for new users to click Ok or Next without reading what they are agreeing to and not making sure there are no check boxes still checked. Make sure you read every prompt before agreeing, or you may be agreeing to install new browser toolbars, a program you didn’t intend to install, or other crapware.

Don’t Open Unknown Email Attachments
A quality spam filter will go a long way to prevent a PC from getting slammed with a virus or malware. However, even the most secure system can be compromised if the user makes the mistake of downloading something that they shouldn’t, like a corrupted email attachment. Viruses that spread through email attachments are among the most common ways that computers become infected. In order to trick you to download the dangerous attachment, hackers will disguise the message as originating from a trustworthy source, like your bank, your hospital, a parcel delivery service, a resume, and much more.

As a rule, never download an email attachment unless you’re absolutely sure of the source, and if something seems sketchy, it probably is. Remember, if the email appears to come from a legitimate source, then you can always call the sender using the phone number that you have on record in order to confirm the message. If your source admits to not sending you the message, then you know it’s a scam.

By following these three best practices, you’re sure to save yourself the headache (and expense) of dealing with PC performance issues. Knowing how to properly use a PC is the best way to prevent issues and breakdowns. To learn more PC tips and best practices, subscribe to NuTech Services’s blog and give us a call at 810.230.9455.

e_waste_management_400.jpg

Why You Shouldn’t Chuck Your E-Waste In the Garbage

e_waste_management_400.jpgToday’s society practices a policy of upgrading to brand-new devices whenever the next big thing drops. We see this all the time when businesses want to keep up with the latest trends by upgrading to new workstations that utilize recent operating systems, or because their old hardware feels slow. However, this can have a negative effect on the environment in the form of e-waste.

E-waste is defined by ewasteguide.info as:

e-Waste for short – or Waste Electrical and Electronic Equipment (WEEE) – is the term used to describe old, end-of-life or discarded appliances using electricity. It includes computers, consumer electronics, fridges etc which have been disposed of by their original users. On this website – the e-Waste Guide – “e-waste” is used as a generic term embracing all types of waste containing electrically powered components. e-Waste contains both valuable materials as well as hazardous materials which require special handling and recycling methods.

In other words, your computers, servers, network components, and other hardware, all contain valuable metals and other materials that can be potentially hazardous to the environment if left unchecked. This wouldn’t normally be a problem if these materials were properly recycled, but the fact remains that e-waste is an exceptionally prevalent problem in many third-world countries that don’t have a specific workflow for getting rid of these gadgets.

Due to it being vastly cheaper to ship discarded devices overseas (rather than properly recycling them), many countries suffer from exorbitant e-waste, just like Guiyu, China. According to Slate, Guiyu has a population of around 150,000, and is known as the e-waste capital of the world. It houses many businesses that are dedicated to dismantling discarded devices for their valuable components, but their processes are often dangerous to both the inhabitants of Guiyu, and its environment.

For example, Slate explains that “to extract metals from a circuit board, the workers burn each part over an open fire; this process releases large amounts of toxic gas into the air and the town’s water supply.” This practice is naturally a cause for concern, especially considering the fact that the pollution winds up in the bloodstream of the inhabitants in the form of metals like lead, copper, zinc, etc.

The first step toward preventing this pollution from worsening is to take the proper steps when recycling your old technology. First, you should take steps to ensure that all private or sensitive data is removed from the device. NuTech Services can help you through this process. The last thing you want is for some stranger to get ahold of your device and tamper with it for information that’s stored on it. Once you’re sure sure that no information is left on the device, we’ll handle the recycling of the device in an environmentally-friendly manner.

To ensure that you always follow the best practices of replacing and recycling your old technology, contact NuTech Services at 810.230.9455.

b2ap3_thumbnail_email_gaffs_400.jpg

Tip of the Week: 4 Common Email Mistakes and How to Avoid Them

b2ap3_thumbnail_email_gaffs_400.jpgEmail is a staple in offices around the world, but many organizations are finding it easier than ever to make simple mistakes that can be easily avoided with proper training procedures. It’s a best practice to ensure that your team is adequately trained on how to efficiently use your chosen email client to its maximum potential. Here are four of the most common email mistakes that the average employee can make, and how they can easily be avoided in the future.

Avoid Major Spelling and Grammar Errors
The importance of spelling and grammar in both internal and outgoing communications cannot be stressed enough. While a minor error here or there is acceptable, anyone who wants to be considered a professional in their industry should take the time to put together messages that are both grammatically correct and easy to read. This is especially true when dealing with prospective clients. You want to be seen as the expert, and showing that you’re a well-rounded and educated individual will reinforce this thought.

Most email clients like Outlook and Gmail have a built-in spell checker that can be used for a quick idea of how many corrections need to be made, but it’s often better to compose an email in a word processor like Microsoft Word. This lets you use the powerful spell checker that the program provides, and allows you to use a copy/paste tactic where there’s minimal room for error.

Don’t Accidentally CC the Wrong People
If you’re dealing with a medium-to-large workforce, you might find it easier to communicate with all of your employees by simply clicking the “carbon copy” option when issuing statements via email. However, this comes with a risk. When you’ve received a CC of a message, and you have some input, you want to make sure that you don’t reply to all, especially if it’s something that’s only meant to be seen by the recipient. Always be aware of what you’re sending, and who you’re sending it to.

Or, better yet, don’t complain about one of your coworkers through email at all. Email should be a formal type of communication in the workplace, and you shouldn’t be using it like it’s your personal account. If someone is checking up on your email messages, it could come back to haunt you later. Still, letting off some steam in the workplace is often a necessity, so if you feel you absolutely have to get something off your chest, do it in person rather than through email.

Make Sure Your Email is Finished Before Sending It
This seems like a given, but you’d be surprised how often some folks forget to finish an email before hitting the “send” button. Again, you want to ensure that you’re retaining your professional presence with both your staff and your prospective or current clients, and sending half-finished emails isn’t going to help this goal. It’s relatively easy to hit the “send” button before your message is actually complete, especially if you’re multitasking and distracted by your other responsibilities.

This is especially why it’s important that you give your message a thorough proofreading that helps you ensure that the message is complete and ready to be sent. It’s an important part of the email process, and shouldn’t be overlooked if you’re in a hurry.

Be Absolutely Sure Who You’re Sending Your Message To
While the other mistakes we’ve mentioned thus far have somewhat trivial repercussions, sending a message that potentially reveals sensitive information to the wrong person could have far-reaching complications. If it’s internally, it’s possible that it’s no big deal, and can be resolved by simply asking the recipient to disregard the email. However, if the message is sent to an external party, and it contains sensitive information, you should immediately put yourself in damage control mode.

In the event that you accidentally send company information to an unknown email address (which you shouldn’t), it’s important to assess how important this information was and take action as soon as possible. For example, if you sent passwords or usernames (which you shouldn’t), promptly change the credentials. You should also make an attempt to notify any party involved, especially clients. While it might be embarrassing, it’s better than the alternative.

For more best practices and tips, be sure to subscribe to our blog.

b2ap3_thumbnail_cloud_management_400.jpg

3 Ways to Make Sure that Your Technology Doesn’t Get Stuck In the Past

b2ap3_thumbnail_cloud_management_400.jpgThe purpose of business technology is to propel an enterprise into the future. Yet, too many businesses are reluctant to make major adjustments to their current IT systems, wrongly believing that it’s not worth the investment. The best way to approach upgrading is to use an IT roadmap that lays out a plan for your technology’s future. This way, you won’t be surprised by what the future holds.

Here are three easy ways that you can “future-proof” your IT infrastructure.

Lease Whatever Computer Hardware that You Can
Generally speaking, it’s easier to upgrade when you’re leasing equipment, rather than having to pay for new equipment outright. Often times, a hardware refresh will even be included in the terms of the lease, and at no additional cost. This way, you won’t have to worry about the consequences of hanging on to your old technology for too long because your hardware refresh will already be scheduled and taken care of by your vendor.

At first glance, it may seem like the monthly expense of leasing hardware will end up costing you more than if you paid upfront for the equipment, but the cost-savings of leasing hardware can be seen in that the cost is now an operating expense, instead of a capital expense–which is very advantageous for your company’s future budget.

Layout Your IT Infrastructure to Accommodate Your Company’s Growth
One mistake that a non-future-minded company does with their technology is to set up their IT infrastructure to only accommodate their current computing needs, instead of designing the system to handle their organization’s growth. An IT system that’s designed for the future will have enough open access points to accommodate new users stemming from an increase in staff numbers, as well as enough available hard drive space and computing power to handle the IT trends that consume a lot of network resources, like BYOD (Bring Your Own Device) and The Internet of Things.

By not planning for future growth, you’ll be caught off guard by something that should be simple, like adding a new workstation. Also, you don’t want to get stuck not having enough bandwidth for an important video conferencing meeting with a client, due to too many users participating in the meeting.

Make Sure that Your Cloud Service is Flexible
A business that’s taking advantage of the cloud will often have an outside company host and manage their cloud services, either partially or exclusively. Due to the unpredictability of your company’s future computing needs, you’re going to want to commit to a cloud agreement that’s flexible, instead of locking you into some strict terms. NetworkComputing explains:

Cloud deployments tend to be dynamic — not static — and must grow or shrink depending on the requirements of the client. Any agreement with a managed service provider (MSP) needs to cater to the variability that the consumptive nature of the cloud provides.

Before implementing technology for your business, NuTech Services will take the time to discuss with you the future of your company’s computing needs so that your IT systems will be prepared for anything that the future will throw at you. We can assist you with finding the right hardware, laying out an IT roadmap, managing your cloud services in a way that best suites your current and future needs, and much more.

Call us today at 810.230.9455 to prepare yourself for whatever the future’s got in store for your organization.

b2ap3_thumbnail_distractions_at_work_400.jpg

Tip of the Week: 3 Ways to Take Back Your Day From Workplace Distractions

b2ap3_thumbnail_distractions_at_work_400.jpgIn today’s competitive workplace environments, productivity is at a premium. Although, thanks to our gadgets, the allure of the Internet, and of course, having to interact with people, working at the modern office isn’t without its fair share of distractions, which hinder productivity. Here are three tips that you can use to tune out the distractions so you can get more work done.

Active “Airplane Mode” On Your Smartphone
When you really need to hunker down and focus, having your smartphone nearby may not be the best move. Unless you’re an extremely disciplined individual, it can be very difficult to ignore the slew of notifications periodically hitting your phone. Yet, it’s likely that you need your phone for what you’re working on, like to access your contacts, calendar, and clock. One way to still access basic apps like these while eliminating the distractions of the Internet is to set your phone to airplane mode. When you’re done with your project, simply turn off airplane mode and any notifications that you missed will promptly appear, as well as voicemail messages.

Bonus productivity tip: If you use your smartphone as your alarm clock, use airplane mode while you sleep in order to avoid being awakened by notifications and even phone calls.

Headphones Keep People at Bay
By putting on a pair of headphones, you’re essentially communicating to the world, “I don’t want to be bothered.” Of course, not everyone will take the hint and you’ll still have a few people tap you on the shoulder to ask a question. Hopefully, the inquires will be essential and they’ll think twice about offering you their opinions regarding what’s trending on social media.

Using your headphones, you might be able to listen to music in order to help you focus better (if you use Spotify, check out their Focus playlists). Although, not every worker has this ability. Therefore, you can also try listening to white noise in order to drown out the noisy distractions in the room. If neither of these options agree with the way you’re wired to work, then you can simply wear the headphones without actually using them for music as a way of communicating to your coworkers that you’re not to be bothered.

Schedule Times For Checking Your Email
If you’re one to keep your inbox open throughout the day, then you’re going to keep one eye on it while trying to be productive. This spells trouble for any project you’re working on because you’ll get slammed with notifications often and at random times. Actually, this applies to other forms of digital communication as well, like social media. Instead, try scheduling times throughout the day to check your email so that you can focus better on the task at hand. You can even take advantage of an email autoresponder tool that lets people know what time you’ll be checking your email. This way, people won’t wonder what’s wrong with you or their computer because they didn’t get an instant response. Remember, if it’s an urgent matter, they can always just pick up the phone and give you a call.

These tips may seem overly simple, but they’ve got the potential to enhance your focus and revolutionize productivity in your office. Try them out and let us know in the comments how they work for you!

b2ap3_thumbnail_meeting_about_meeting_400.jpg

3 Ways To Buck the Trend of Unproductive Meetings

b2ap3_thumbnail_meeting_about_meeting_400.jpgRunning a business means going to meetings. There’s really no way around it. And while you can’t run a business without meetings, you can run your meetings as efficiently as possible so that they’re not a complete waste of time. Unfortunately, according to a recent study by Blue Jeans Network, the worldwide trends for meetings show that they can hinder productivity more than help it.

The study is an annual report released by Blue Jeans Network, a cloud-based video conferencing company. They analyzed the data from more than five million video meetings in 177 countries, of which more than a third had an in-person component. When compared to similar studies done from previous years, patterns were spotted that showed people are wasting more time in meetings than they should. Here are a few of the more noteworthy findings.

Most Meetings Are Taking Place at the Most Unproductive Time
In separate studies, it’s been proven that different parts of the work day are better for meetings. For example, morning meetings are ideal because that’s when people are most alert, and the worst time for a meeting is in the middle of the afternoon because that’s when office workers tend to feel the most dull-brained. According to the study, the most popular meeting time is mid-afternoon, sometime around 3 p.m.

Solution: Schedule your meetings during the mornings, preferably right after the coffee kicks in.

It’s Normal For Meetings to Start Late
One of the most annoying aspects of meetings is waiting for people to show up. While waiting for Johnny-come-lately to make an appearance, everyone is forced to participate in small talk–and get paid for it. This kills productivity. According to the study, a whopping 81 percent of meetings start late, up 30 percent from the previous year. Inc. describes how tardiness is dangerous because it’s a self-perpetuating problem:

If you arrive five minutes late to a meeting and it hasn’t started yet, you’ll figure you haven’t missed anything, so you’ll likely do the same next time, or maybe show up even later. Meanwhile, the punctual people who’ve sat around waiting for you will figure they have better uses for their time, and next time they’ll come five minutes late as well, or maybe even later.

Solution: Be strict about your meeting times and have consequences for late comers.

Bad Weather Equates to More Meetings
The study shows that Winter, with all of its blusteriness and bitter cold, sees twice as many meetings as other times of the year–when it’s presumably warmer and nicer outside. It’s also the case that, the worse the weather is, the more likely that a meeting will take place. The study shows that “meetings were up by as much as 26 percent during the recent Texas flooding, and an impressive 35 percent during the Boston blizzards last winter.”

Solution: Consistency is key to not wasting too much time during meetings, and to not have unnecessary meetings. By having regularly-scheduled meetings, you will decrease the number of unnecessary meetings that take place, simply because someone feels a strange connection to the weather patterns.

Meetings are kind of a necessary evil, but if you plan them right, you can make them more productive and less, well, evil. In addition to being on time and intentional about how often you meet, you can take advantage of technologies like video conferencing and cloud-based scheduling software that will keep your meetings as productive as possible. To schedule a meeting with NuTech Services about this, give us a call at 810.230.9455.

b2ap3_thumbnail_business_sabotage_400.jpg

4 Scenarios to Consider On Disaster Preparedness Day

b2ap3_thumbnail_business_sabotage_400.jpgSeptember was National Disaster Preparedness Month, and as such, it’s important to consider the state of your business’s current backup and disaster recovery practices. Different disasters pose various threats for your organization, but many of them have one thing in common: they’re going to ruin your physical IT infrastructure, and, depending on your backup practices, could potentially bring down your entire operational infrastructure.

Here are four of the most common natural disasters that drastically affect IT systems, and what you can do to prevent them from causing permanent damage.

Power Outages
Fierce storms are often enough to cause quite a bit of damage to businesses that haven’t taken the proper precautions. If power lines go down, you run the risk of losing electricity. This could result in your machines unexpectedly powering down, and you losing information or even causing damage to the hardware. Using an uninterrupted power supply, or UPS, can help to keep your systems up and running long enough to save any files that are being worked on. This helps to prevent damage from unexpected power-downs.

Floods and Tropical Storms
Again, storms, hurricanes, and heavy rainfall in general is enough to create problems for businesses along the coast, on bodies of water, or near rivers. Unexpected flooding is enough to cause extensive water damage, wash out foundations of buildings, and, of course, fry any technology it comes into contact with. This means that floods can potentially cost your business in not just physical repairs to your building, but also in replacing vital hardware systems.

To avoid water damage to your office’s equipment, consider placing your vital technology components in an elevated location, away from the floor. This will help keep them safe from a couple inches of water, if the flood infiltrates your building. Still, the best way to prepare for flood damage is to keep an off-site backup of your data infrastructure. This makes sure that your data isn’t wiped out by an unpredictable natural disaster.

Earthquakes
Earthquakes have the potential to be even more devastating for businesses, especially if you’re located somewhere that is known to experience periodic violent quakes. With the power to level entire buildings, your business could be at constant risk of both physical infrastructure damage and data loss.

Implementing a reliable backup and disaster recovery solution is required if you want to ensure that your data is safely stored off-site, somewhere earthquakes shouldn’t be able to reach it. You can also switch to cloud computing and virtualization tactics for your primary mode of data and application distribution, which decreases the amount of physical infrastructure networking you need to stay productive.

Fires
Just like earthquakes, a fire is one of the more damaging disasters that could hit your business. If your building were to catch fire, there’s a risk of everything you hold dear being destroyed: data, hardware, and even your physical location. Thankfully, you can at least save your data from destruction by using a backup and disaster recovery solution.

These are only a few disasters that could strike your business’s IT infrastructure. If you want to optimize your chances of making it through disasters like these unscathed, give NuTech Services a call at 810.230.9455 for more information about our backup and disaster recovery solutions.

b2ap3_thumbnail_lost_devices_can_be_a_major_problem_400.jpg

Tip of the Week: My Company Device Has Been Lost or Stolen, Now What?

b2ap3_thumbnail_lost_devices_can_be_a_major_problem_400.jpgMobile devices are one of the hottest items for thieves to target. According to reports from Consumer Reports and LoJack, 2013 saw the theft of two million laptops and three million handsets. What this means for you is that having your mobile device stolen is probably a lot more likely than you would think.

The loss of a mobile device means much more than just losing a piece of pricy technology (which can be replaced). It also means the loss of the data stored on the device, and easy access to all the accounts associated with the device if the thief doubles as a hacker (which could lead to identity theft). Not having access to one’s data is why, in a recent survey by IDG Research, 50 percent of phone-theft victims said they would pay a ransom of $500 just to get their phone back, while another one-third would pay $1,000.

Obviously, having your mobile device lost or stolen is a big deal, especially if the device contains corporate data. If you happen to find yourself in this predicament, what are you going to do next? Let’s assume for a moment that you didn’t have the foresight to install any of the great security apps on your device, allowing you to track down the phone’s location or remotely shut it down. Without the assistance of any preventive security solutions, a thief will only have a lockscreen standing between them and your data.

Here are four steps that will let you control the damage caused by a lost or stolen mobile device.

Contact Your Mobile Service Provider
Contacting your phone’s service provider about the theft is a good move because, depending on the make and model of your phone and the details of your service contract, your service provider may be able to remotely access your smartphone and “brick it” (render it useless). At the very least, notifying your service provider will prevent the thief from making calls using your account. Also, it’s important that you quickly contact your mobile service provider about the missing device. Otherwise, the thief will be able to bypass this “bricking” feature by removing the SIM card and still have access to the data stored on your device.

Change All of Your Passwords
If the thief happens to gain access to your smartphone or laptop, they’ll easily be able to open all accounts associated with the device. We don’t have to tell you how devastating this can be, especially if your bank account or corporate network were to be accessed. One of the best ways to keep a thief like this out of your accounts is to login to all of them and change the passwords. You’ll want to do this sooner than later so that the thief doesn’t have enough time to figure out your passwords.

Report the Theft to the Authorities
While it’s unlikely that reporting the theft of your mobile device will lead to a full-scale investigation, it will give them information they can use to spot patterns, which might be enough to eventually get your device back. You never know.

Notify Everybody Affected
The toughest part comes next: notifying everyone that the device is gone. It can be embarrassing to contact everybody about your negligence, but you may be actually legally obligated to do it. The reason why it’s so important to do this is because the data connected to the lost device could lead to stolen identities. As humbling as it will be to write that email to your clients, they will appreciate the fact that you’re taking proactive measures to protect their sensitive information. To help smooth things over, paying for a year’s worth of identity theft insurance will go a long way.

By taking these four steps, you should have a good grasp on damage control. Moving forward, the best way to protect yourself and your business from this all-too-common event of mobile device theft is to reach out to NuTech Services at 810.230.9455. Call us to learn more about proactive mobile security solutions designed to give you a fighting chance.

b2ap3_thumbnail_it_maintenance_400.jpg

Overcome IT Performance Issues with These 4 Proven Practices

b2ap3_thumbnail_it_maintenance_400.jpgIs your network running a little sluggish? Computing hardware isn’t perfect and requires a certain level of maintenance in order to keep everything running at capacity. Before you swap out your old server units for new ones, try these maintenance best practices.

Update Your Software
For whatever software you use, it’s best practice to run the most up-to-date version. In addition to providing your system with improved security, software updates will often include fixes to bugs that tend to slow things down (not to mention put you at risk for viruses and other online threats). In order to take full advantage of the benefits of running updated software, it’s best practice to have a solution in place that upgrades your system in a timely fashion. With NuTech Services’s managed IT service, we remotely provide upgrades for your network so that you don’t have to.

Corrective Maintenance
One of the most unpleasant hardware maintenance practices is fixing an issue that’s disabled your system. Performing corrective maintenances like this can be expensive, and breakdowns always seem to happen at the worst possible time. Regardless, fixes like this must be done so your business can function. At NuTech Services, we’ve found that the best way to approach corrective maintenance is to prevent these breakdowns from happening in the first place. This is the route we take with our preventative IT care.

Server Virtualization
Depending on how old your problem-prone server unit is, and depending on if you possess another server unit that runs well and is underutilized, you can migrate the data off your older server unit to your newer, more powerful one. This is a solid practice that will save you money by not having to pay for maintenance on two separate units, as well as free up space. However, it’s important to know what you’re doing before making such a move because over-consolidation with excessive virtual machines on a physical server can lead to deteriorating performance and system instability.

A Hardware Refresh
For network equipment like server units, it’s standard to get three to five years of use out of them before experiencing performance issues that cause you to seriously consider replacing them. Depending on the severity of your issues, you may be able to extend the life and improve the performance of your server with a hardware refresh. This includes installing additional CPUs or RAM, as well as upgrading the storage. It’s a tough call choosing whether or not to go with a hardware refresh or to replace the unit altogether. For this reason, it’s always a good idea to first check with your IT consultant.

Implementing these best practices will minimize performance issues and extend the life of your server units, and NuTech Services is here to assist you with all of these recommendations. Of course, technology isn’t perfect and every piece of hardware will eventually fail. When it does, you’ll have to purchase replacement hardware that meets the needs of your business and NuTech Services can assist you with this too.

For help with all of your company’s technology-related needs, give us a call today at 810.230.9455.

b2ap3_thumbnail_rogue_employees_400.jpg

2/3 of Fired Employees Can Access Their Former Company’s Cloud Data AFTER Leaving

b2ap3_thumbnail_rogue_employees_400.jpgAs an employer, you understand that employees come and go. The same group of professionals who helped you build your business will probably be drastically different ten years, or even five years from now. While employee turnover is a natural occurrence, it also presents a certain risk. Believe it or not, a surprising percentage of employees will leave your business one day, and they’ll take some corporate information with them.

A survey from SailPoint shows that a quarter of your employees might take copies of corporate data with them upon leaving a company. The survey, which specifically dealt with cloud computing usage, was issued to at least 3,000 employees worldwide. As explained by SailPoint president Kevin Cunningham, “The survey results are an eye-opener of how cloud applications have made it easy for employees to take information with them when they leave a company.” With so many employees taking advantage of their mobile technology (aka Bring Your Own Device, or BYOD), IT administrators need to be more cautious than ever in how their information is deployed throughout for their business.

A slightly more disturbing statistic is that one in five employees upload this corporate data to a cloud application (Google Docs, Dropbox, etc.) with every intention of sharing it with others. It might feel impossible that your employees could possibly think about stabbing you in the back like this, but it happens more often than you might think. Some people just don’t leave on a positive note. If they storm off with a flurry of curses, it’s fair to consider that they might attempt to sabotage your business.

Here are some more statistics from the survey:

  • 66 percent of employees said they were able to access a business’ cloud storage applications after they left their last job.
  • 60 percent said they were aware that their employer strictly forbids taking intellectual property when they leave the company.
  • Only 28 percent said their employer’s corporate policies describe who can access mission-critical software-as-a-service (SaaS) apps.

These issues pose a unique challenge for IT departments, as it forces them to consider what happens with your business’s corporate data outside of the network. When an employee is terminated or simply leaves the company, it’s more important than ever to ensure that their permissions to access restricted company files are revoked. This can make it easier to protect your business’s data.

If this is a primary concern of your business (as it should be), give NuTech Services a call at 810.230.9455 to determine the best approach to protecting your confidential corporate information from rogue employees and other malicious entities.

b2ap3_thumbnail_xp_logo_for_navy_400.jpg

Microsoft Salutes the US Navy for Sticking with Windows XP

b2ap3_thumbnail_xp_logo_for_navy_400.jpgHave you already arranged for your upgrade to Windows 10 on July 29th? If so, good for you. You’ve made a decision that, last year, several Windows XP users went without. However, those who went without upgrading to a more recent operating system are now feeling the effects of having to purchase custom support from Microsoft following Windows XP’s expiration; including the United States Navy.

As reported by ZDNet, the US Navy is planning on spending an estimated $9 million this year on custom support for Windows XP. The problem here is that unsupported software is a major security risk, and custom support is so expensive that small and medium-sized businesses can’t afford it, even under the best circumstances.

Also, $9 million is an obscene amount of money for just about anything, especially when you consider that it’s going toward a system that’s literally getting replaced as soon as possible.

The proposed deal is said to run for a maximum of three years, and offers critical security patches and updates for Windows XP, Office 2003, and Windows Server 2003, the latter of which is set to expire this year on July 14th. The reasoning behind the agreement is that the Navy takes advantage of numerous legacy applications that aren’t compatible with more recent operating systems. This complicates the process of upgrading, and forces them to rely on expensive custom support. The deal is expected to run until July 2016, but just in case, they have plans to continue until 2017. You don’t need us to tell you that it’s a huge expense that could have been avoided.

If your business hasn’t upgraded from Windows XP yet, you’ve taken some very serious risks that could easily be avoided if you simply upgraded your operating system to one that’s supported by Microsoft. Of course, it’s not always so simple, as the navy’s predicament shows. When you run older software like legacy applications, you might encounter compatibility issues.

In fact, some software is so out of date by today’s standards that newer technology completely forsakes it for more recent (and, quite frankly, better) solutions. Some of these applications might be mission-critical, where they’re vital to the day-to-day operations of your business. Furthermore, if you’re not a technology expert, it can be difficult to judge which applications will be obsolete upon your upgrade.

This is why NuTech Services’s technology consultation services are so valuable. We provide the foresight needed to understand which software is compatible with your new operating system. This is especially important, as the Windows Server 2003 expiration date is fast approaching. Give us a call at 810.230.9455 to learn more.

b2ap3_thumbnail_world_backup_day_4_400.jpg

Got Big Plans for World Backup Day? You Should

b2ap3_thumbnail_world_backup_day_4_400.jpgInternet users today are a little spooked, and for good reason. Stories of major hacks seem to perpetually be in the headlines. A hack attack can lead to stolen or compromised data, which is why backing up data is a crucial piece of every business continuity plan. For this purpose, World Backup Day 2015, March 31st, is an important day.

The goal of World Backup Day is to have everyone in the world back up their data. In fact, there’s even an official website for WBD where you can take a data backup pledge and then share it on social media. “I solemnly swear to backup my important documents and precious memories on March 31st.” Ultimately, the point of WBD is to get everyone to consider how often they back up their data so that they will implement measures to do it more frequently.

One important aspect about WBD is that it highlights the need to back up all of your data. Business owners in particular need to take this message to heart because they have a tendency to spread out important business-related files across their personal devices, like their home PC and smartphone. This is a dangerous move, due to the fact that a business owner may have an efficient data backup solution for their company’s network, but not for their personal data. If something were to happen to their personal device that compromises its data, and the only copy of a business-related file was on the lost or stolen device, then the company would experience a major setback. This is why it’s crucial for all of your data to be backed up, not just the data on your company’s server units.

In honor of World Backup Day, here are two recommended backup solutions for your personal data backup needs.

An External Hard Drive
One popular consumer backup solution is the external hard drive. These drives can be found at virtually every electronics store and at an affordable cost of around $100 for a whopping one terabyte of storage space. 1TB should be plenty for the average computer user’s personal needs; it’s enough space for approximately 750,000 MP3s or photos, or 230 movies.

The Cloud
The versatility of the cloud provides consumers with a host of computing options, including data backup. Popular consumer cloud backup solutions include Google Drive, Microsoft OneDrive, Apple’s iCloud, and much more. All of these services are offered at affordable rates. The cloud is proving to be the preferred backup solution to the external hard drive because it allows users to automatically backup and sync all of their devices, which is much more convenient than having to take time and connect a device with a hard drive.

However, one aspect about consumer cloud solutions is that, while they’re great for personal computing needs, they fall short when it comes to serving the data needs of businesses. NuTech Services’s cloud computing solution is designed to fit the computing needs of enterprises like your own. Plus, we can take the time to safely integrate your company’s cloud solution with your personal devices.

Backup and Disaster Recovery from NuTech Services
There is no greater way to honor World Backup Day than getting the ultimate data backup and recovery solution for your business, BDR. NuTech Services’s BDR solution can be customized to specifically meet the needs of your business, and it’s easy to manage. In fact, BDR automatically backs up your data, meaning that you won’t have to oversee the process or even remember to do it. Essentially, if enough businesses implement BDR, then World Backup Day would no longer be a thing, since no one would ever need a data backup reminder. As sad as that would be to no longer have a WBD, it would be worth it if it meant that all of the world’s data would be secure.

So, what are your plans for World Backup Day? If you’ve got BDR, then this day is cause for celebration because you’ll feel good about your data being secure. To celebrate World Backup Day with NuTech Services’s BDR and cloud computing solutions, give us a call at 810.230.9455.