172453146_quick_tip_400.jpg

Tip of the Week: Take a Screenshot in Windows 10

172453146_quick_tip_400.jpg

There is one key on the keyboard that might seem a little odd: PrtSc. It’s not immediately obvious what this key does or why you would want to use it, but we assure you that it is an extremely helpful keyboard shortcut once you understand how it works and why you might want to try it out. In reality, the PrtSc key is important for taking screenshots on your Windows device.

Windows has a lot of keyboard shortcuts, but PrtSc is perhaps one of the easiest to carry out. When you hit the PrtSc key, Windows will take a screenshot of your computer’s monitor, allowing you to save it as an image.

There are many practical reasons for taking screenshots, many of which you might not have considered. Let’s go over your options for taking screenshots on your Windows device.

Why Take Screenshots?

Screenshots are incredibly helpful for a variety of reasons, one of which is to help IT support determine what the root cause of your technology troubles is. Basically, it lets them see what you see on the screen so they can check off boxes for more common fixes before diving into more technical issues. Screenshots are also helpful for documentation purposes, allowing you to put together guides for workflows and processes for more visual learners.

The PrtSc Key

When you hit the PrtSc key, you might notice that there are no pop-ups or anything that appears on-screen to show that you have taken a screenshot. Basically, the PrtSc key captures an image of your desktop screen and copies it to the clipboard as an image. You can then paste it like you would if it were copied or cut text. The problem with this is that it takes a screenshot of the whole screen, not just one part of it, so for more focused screenshots, you have to get a little more creative.

Snip & Sketch

This solution is built right into Windows 10 and allows you to snip specific parts of your screen for a screenshot. To use Snip & Sketch, use the keyboard shortcut Shift + Windows Key + S. There are some options here: Rectangular Snip, Freeform Snip, Window Snip, and Fullscreen Snip. Pick whichever you think best suits your needs. Your selection will then be saved to the clipboard in the same way as PrtSc, allowing you to paste it into an application or edit it in the Snip & Sketch tool.

Third-Party Services, Applications, and Extensions

There are some third-party tools and applications that you can use to take screenshots that let you capture specific parts of your screen in much the same way Snip & Sketch allows. These other solutions may be perfectly effective for taking screenshots, but you should clear any of them with IT first just to make sure that the solution is one that is allowed on your network. Plus, you might already have better tools available to you, so it never hurts to confirm with IT before going all-in on a screenshot tool; and, of course, you have us to fall back on as well!

So, how are you going to use screenshots to take your business to the next level? Let us know in the comments, and be sure to subscribe for more great tips and tricks.

252587124_improve_productivity_400.jpg

Tip of the Week: How to Improve Productivity by Identifying Distractions

252587124_improve_productivity_400.jpg

For all the time we spend promoting productivity-enhancing technologies, we’d be remiss if we didn’t address the source of quite a bit of inefficiency: the user. People get distracted from their tasks all the time and the bounceback rates from these distractions aren’t great. Let’s go over a few tips that you and your team can use to help identify and avoid distractions throughout the workday.

What Is the Impact that Distractions Can Have?

On average, a worker in the United States is distracted about every 11 minutes or so. As if this wasn’t bad enough, it then takes this worker about 25 minutes to return to the task at hand. Of course, more complicated tasks take even longer to refocus on—simply because of the greater mental effort needed to pivot from one challenging task to another.

Naturally, this isn’t a great turnaround rate… particularly when today’s workplaces are so committed to making the most of their available time. Minimizing these distractions is therefore a crucial goal that businesses should emphasize. In order to do so, it is important that we acknowledge that all distractions can be split into one of two categories: external distractions, and internal distractions.

How Are Internal Distractions Different Than External Distractions?

While there is a case to be made that a distraction is a distraction, comparing the differences between those that come from internal sources and those that are introduced by external factors can help us understand what is causing the worst productivity deficits.

We’re all familiar with external distractions, the kind that come in and pull our attention away from the task at hand. Emails, phone calls, instant messages, and impromptu meetings all fall into this category, and each contribute to the problem by some measure.

Adding to these distractions are those that reside internally. These internal distractions are those that are caused by the various mental blocks a person can experience. Oftentimes, these blocks come from an inability to weigh out our choices and prioritize them effectively… particularly when there are a lot of options to choose from. Think about the last time you looked at a restaurant’s menu, for instance. The more items they offer, the harder your choice potentially becomes to make. Smaller menus, on the other hand, give you fewer options to balance and therefore an easier choice to make.

Of course, with so many workplaces setting the schedule for their team members, this isn’t a perfect comparison. It is probably more fair to say that a lot of internal distractions in the professional environment are generated by a lack of prioritization in the tasks that are assigned to team members.

Think of it this way: if everything is marked as the highest priority, who’s to say which task has the highest highest priority?

So, not only are your team members liable to become distracted by the need to identify the most important task to attend to, they also can have a challenge in appropriately arranging these tasks so that they are finished most efficiently.

Other common internal distractions are likely to be familiar to most people: wandering thoughts, and all those moments spent thinking about the other tasks that are coming after the present one is finished. Combined, internal and external distractions can make real productivity difficult for even the most dedicated employee.

Fortunately, sharing a few strategies with your team can help give them the power to overcome these kinds of distractions and reclaim the productivity that may have otherwise been sacrificed.

How to Get Rid of Many Distractions

Rule Out Some Options

Let’s touch back on the menu example we discussed earlier. If too many options ultimately leads to more distractions, encouraging your team members to start eliminating options should help to make them more productive. Whether this means they spent a few minutes clearing their workspace of anything that may draw their attention away from their tasks, or figuring out the most impactful responsibilities they currently have assigned to them and starting with those, investing a little bit of time initially will help to prevent a lot more time being lost later.

Set Limits Before You Start

Remember how we mentioned that a big source of distraction can come from your upcoming tasks and lingering thoughts about them? One effective way to keep yourself focused on the task at hand is to give yourself a concrete stopping point. Perhaps you’ll give yourself an hour and a half of committed time to one project, after which you transition to the next, with a budgeted half an hour. Alternatively, you could set a progress limit—maybe you move to your next task after you’ve completed so many of something, or completed some percentage of your total goal. Establishing these boundaries—and sticking to them, of course—can be a very effective way to help minimize your distractions.

Remove Distractions from Your Area

Where you work plays a considerable role in how you work, with our five senses unfortunately much harder to focus than our thoughts can be. Sounds like background chatter can be intrusive and interruptive, while our sense of touch will exacerbate any discomfort we feel. Many of us rely on sight to see what we are doing, but that also opens us up to visual distractions. Smells (both pleasant and decidedly not so) can very quickly occupy our attention, and everyone has had to try and deal with the distraction of an inexplicable funny taste.

Identifying these kinds of distractions and being prepared to address them when they do appear will help to take away a few sources of distraction, potentially preserving productivity.

What have you found distracts you the most, and what have you done about it? If it isn’t enough, know that NuTech Services is here to help. There are a few things that we can do to help keep your team members on track, and we can make sure your company is equipped to make the absolute most of any time spent by implementing productive and efficient IT solutions. Learn more by giving us a call at 810.230.9455.

423837102_password_management_400.jpg

Tip of the Week: Is Browser-Based Password Management Safe to Use?

423837102_password_management_400.jpg

Passwords are quite literally everywhere nowadays. With so much of modern life now controlled or held within user accounts, keeping your passwords both secure and straight in your head is crucial. Many web browsers now offer some built-in password management utility to help make this process more convenient for the user, but is this option available at the cost of security?

Let’s examine how secure each major browser’s integrated password manager is, as well as how to disable them if you so choose.

How Secure is Your Chosen Browser’s Password Management?

Let’s do a side-by-side comparison of the password managers now built into the major browsers on the market: Google Chrome, Firefox, Microsoft Edge, and Safari. 

Chrome

Tied to the user’s Google account, the password manager found in Google Chrome offers many of the features one would expect of a modern password manager. Not only is it itself protected by two-factor authentication, but it also offers the capability to generate a random password on the user’s behalf whenever they create a new online account. This password generation helps to prevent users from simply recycling the same password over and over which minimizes the chances of a single data breach undermining more than one account.

Firefox

Whenever you access one of your accounts through Firefox, the browser will prompt you to save the username and password you used on that device where it can be viewed through your browser’s Options. From that point on, the credentials will be saved. The default setting for this capability is unfortunately insecure, but you can set a master password to protect its contents, making this the most secure option available to you.

Edge

Microsoft was late to the party concerning its password management, only adding the capability to its browser at the start of January 2021 to supplement its other security features. Among these features is Password Monitor, which helps to alert the user of breaches, as well as the capability to auto-generate a password when creating an account.

Safari

Rounding out our selection of browsers, Safari features a bundled password generator and management tool, enabling you to autofill your passwords into the websites you visit. Taking it a step further, contact info and credit card information can be saved, with all of it accessible on all your devices with iCloud Keychain. Of course, this platform is Apple-agnostic, and is relatively stingy compared to many third-party password management options, with no two-factor authentication available.

So, What’s the Most Secure Offering?

As a general rule, integrated password managers will do in a pinch, but the better option is to instead use a dedicated password manager. The reason that this is the case? Primarily: most integrated password management platforms don’t require the passwords they save to be all that secure. The opposite is usually true of your dedicated management programs, which also offer the convenience of generating sufficiently secure passwords at the click of the mouse.

We also recommend that you supplement your password security whenever available with two-factor authentication, in addition to many of the typical best practices we always recommend, including:

  • Keeping your devices and browsers up to date to ensure security patches are installed properly.
  • Avoiding websites without SSL certificates (which will simply have “http” in the URL, as compared to “https”) or using publicly-accessible Wi-Fi connections. This is noted with a little lock icon in your browser address bar.
  • Being discerning about the browser extensions or software titles you enable.

How to Deactivate the Built-In Password Management in Your Browser

Each option provides its own means of disabling its integrated password manager:

Chrome

In the Chrome browser, access the three-dot menu and select Settings. Under Autofill, click into Passwords and switch off Offer to Save Passwords.

Firefox

In your Firefox browser, access the hamburger menu and select Options. Find Privacy & Security out of the options on the left and locate the Logins and Passwords section. Deselect Ask to save logins and passwords for websites.

Edge

In Edge, access the three-dot menu and click into Settings. From there, select Passwords and then deselect the option to Offer to save passwords.

Safari

In Safari, access the Menu and select Preferences. Accessing the AutoFill category, deselect everything: Using info from my contacts, User names and passwords, Credit cards, and Other forms.

If you’re looking for reliable IT solutions, along with the means to keep them secure, look no further than what NuTech Services provides. Learn more about what we have to offer by calling 810.230.9455 today.

287215660_shortcuts_400.jpg

Tip of the Week: The Letters of the Alphabet, in Windows Shortcuts

287215660_shortcuts_400.jpg

The Windows operating system comes with more than its fair share of capabilities, many of which are accessible through the appropriate keyboard shortcut. Because remembering so many would be a challenge for some (and impossible for most) we’ve put together a list of those associated with the letters found on the keyboard, with a few extras tacked on for good measure. Make sure to take note of any you may find the most useful.

Windows Shortcuts, from A to Z

  • WinKey + A opens the Action Center.
  • WinKey + B highlights the notification area.
  • WinKey + C launches Cortana in listening mode.
  • WinKey + D toggles Show Desktop and the previous state.
  • WinKey + E launches File Explorer in the Quick Access tab.
  • WinKey + F opens the Microsoft Feedback hub.
  • WinKey + G opens the Game Bar tools, for personal use at home.
  • WinKey + H opens the Dictation toolbar.
  • WinKey + I opens your Settings.
  • WinKey + K opens the Connect pane to connect to wireless displays and devices.
  • WinKey + L locks the device.
  • WinKey + M minimizes all open windows.
  • WinKey + O locks the device’s orientation on tablets and mobile devices.
  • WinKey + P opens the Project pane.
  • WinKey + Q opens Search.
  • WinKey + R displays the run dialog box.
  • WinKey + S launches Cortana in typing mode.
  • WinKey + T cycles through the apps on the taskbar.
  • WinKey + U launches the Ease of Access/Display Center to manage attached displays.
  • WinKey + V opens the clipboard app to view things copied to it with Ctrl + C.
  • WinKey + X opens the advanced, Secret Start menu.

Bonus: Adjusting Your Program Windows

A neat workspace is a productive workspace, and if there’s a quick way to arrange your computer’s display, that’s all the better. Fortunately, Windows has a few built-in shortcuts to help quickly accomplish just that:

  • WinKey + Left/Right Arrow will take the active window and adjust it to fill the left or right side of the monitor it is displayed in. 
  • WinKey + Shift + Left/Right Arrow will move the active window over to another display.
  • WinKey + Up Arrow will maximize the active window. 
  • WinKey + Down Arrow will minimize the active window.

Believe it or not, this list is just a small sample of the available Windows shortcuts out there. There are plenty more to explore. We periodically go over a few on this blog, so make sure you’re subscribed so you can be alerted whenever we post something new!

109434737_home_office_400.jpg

Tip of the Week: Designing an Effective Work-from-Home Workstation

109434737_home_office_400.jpg

Working from home has made it clear to many that they weren’t prepared to do so—not by a long shot. In addition to the many other stresses that came with these challenging times, the lack of a sufficient and proper workspace has proved to have its impacts on the human body. To perhaps help remedy this, we wanted to offer a few considerations that might help a remote worker benefit ergonomically.

The Seat

While a comfortable chair will be important to have, there is such a thing as too comfortable. This means that the soothing lull of the bed or even the couch should be avoided. At the same time, most hard chairs won’t give you enough lower back or leg support. The best fix would be to invest in a desk chair intended for such purposes, but short of that, a pillow or rolled-up blanket can suffice.

In an ideal world, your chair would include armrests too, well, rest your arms on. Lacking that, using the tabletop without leaning or slouching would serve the same purpose.

In order to ensure your feet remain planted on the floor, it is also a good plan to keep a footrest nearby. When seated at your workstation, your legs should be bent at right angles at the knee and hip, stabilizing your position.

The Work Surface

Of course, you need a work surface in order to do work. Lacking a desk? Any place you can sit or stand somewhat comfortably will do, whether that’s a table or a countertop. All you need is the room to work comfortably.

The Devices

Modern devices give you a wide variety of options to work with. Need an additional display? Laptops can stream to another device as an external display. Dealing with a lot of distractions at home? Tune them out with some noise-canceling headphones with an integrated mic to keep you communicating with work. Incorporating these tools into your makeshift workstation will keep you ready to work productively.

Ready to talk to an IT professional about your office and team’s technology solutions? Give NuTech Services a call at 810.230.9455 today.

251388032_spying_webcam_400.jpg

Tip of the Week: Stop the Spying Webcam

251388032_spying_webcam_400.jpg

Have you ever been using your computer and you realize the operational indicator light next to your webcam is activated, only to realize that you never closed the video conference you were just on? Well, what would happen if you noticed it and you didn’t have that software up and running? If you are not an exhibitionist, it would likely freak you out to know that someone might be looking at you as you use your computer. Today, we will get into what to do to ensure that you aren’t being spied on through your webcam.

#1 – Update All Software

Of course, the best way to be sure that you aren’t being spied on is to update any software that has access to your webcam. You may just find out that there are some surprising pieces of software on your computer or phone that you’ve given access to your webcam. When you keep your software up to date you keep it from having vulnerabilities that hackers can exploit. Keeping the OS you are using updated is the most important.

On a PC, you will want to go to your Settings app and click on Update & Security. On the next page select Windows Update and select Change active hours to tell Microsoft when is the best time to update your Windows OS.

#2 – Keep Your Firewall Updated and Running

You will want to do your best to keep entities out of your personal network just like the technicians at NuTech Services do for your business. One of the best ways is to keep an up-to-date firewall. Here’s how to turn your firewall on:

Go to your Settings app in Windows and click on Update & Security. In the left sidebar click on Firewall & network protection. Once the menu opens, toggle Windows Defender Firewall. Now your firewall is on and will help you keep threats off your network. 

#3 – Make Sure Your Wi-Fi is Secure

People looking to get into your network (or spy on you through your webcam) may target your wireless router instead of your actual computer. If they get in, they can access a lot of things… including your webcam.  This means you need to beef up your router security.

First, rename your wireless network. Rename it something that isn’t easily associated with you and make sure to make a strong password. We recommend a string of at least three random words with no association to one another and replace some letters with numbers and symbols, and change the case. Make it so you can remember it (because anyone that comes to your house will want access to it), but make it secure enough that it is a strong impediment to unauthorized access. 

#4 – Cover Your Webcam

The most pragmatic (and admittedly simplest) way of avoiding the gaze of someone over a hacked webcam is to ensure that when it is not in use that it is covered. If your webcam is covered, any creep or hacker on the other end won’t see a thing.

Keeping your privacy in mind is always a solid practice. If you are looking for more tips and tricks on how to keep your data safe and your accounts private, return to our blog each week.

220561040_helpful_tips_400.jpg

Tip of the Week: The Better Way to Take a Screenshot on Windows

220561040_helpful_tips_400.jpg

For the Windows user seeking to take a screenshot, there is no lack of options. Most notably, many keyboards today offer a Print Screen key that allows the user to capture an image of their entire display. Having said this, there are better options, such as the platform’s integrated Snip & Sketch tool, with its greater functionality and greater ease of use.

How to Use Snip & Sketch

Snip & Sketch is a utility built into Windows, providing a user with four screenshot-taking options, called up by pressing Windows Key+Shift+S. These options consist of the following:

  1. A basic box selection, allowing you to click and drag to encompass your selection
  2. A freeform selection, allowing you to draw out your boundary
  3. Window snip, allowing you to select an active monitor to screenshot
  4. Fullscreen snip, taking the place of the Print Screen key, allowing you to take a picture of all your monitors simultaneously

This way, you have access to a wider range of utilities that are commonly useful, particularly in the workplace.

With any luck, this tip will help your in-office communication improve. If you’re interested in learning some more helpful IT tips, make sure you check back here often—or give our team a call at 810.230.9455.

325701375_burnout_400.jpg

Don’t Let Burnout Overcome Your Business

325701375_burnout_400.jpg

It can be said that most of 2020 and the first couple of months of 2021 have been difficult for most people. Not billionaires, of course, but most other people have found the past year difficult on some level. That’s why it isn’t surprising to hear people talk about workplace burnout. Today, we’ll define burnout and what is being said about it. 

What Exactly is Burnout?

You probably already know or at least have seen cases of burnout. If someone starts laughing maniacally, screaming uncontrollably for no apparent reason, or crying silently while they sit at their desk, you are probably looking at a case of burnout. Burnout is the feeling of helplessness, frustration, and exhaustion you get when you have had enough.

Some cases of burnout go away quickly, while others fester and stay around for months. Burnout makes a person cynical or even apathetic and is not a good thing to have around your business. With the burden of burnout, you can unwittingly create a toxic work environment. Keeping this from happening should be a priority. 

Spotting Burnout Amongst Your Team

If you want to catch burnout before it creates workplace toxicity, you will need to pay attention. The best way is to have regular conversations with your staff and honest conversations with yourself. By dedicating a few minutes to self-evaluation, you can help identify the triggers that can make all the difference between getting the burnt-out party the help they need before it can negatively affect your workplace culture.

Today, with so many people surely feeling like they are losing control over things in their lives, the risk of burnout is greater than ever and needs to be mitigated so that negativity doesn’t seep into your office and cause more problems. One way to accomplish this is to establish some consistent and predictable routines to be followed in the office, emphasizing control, and decreasing the potency of employee burnout.

Resolving Burnout

If you plan to prevent this type of thing from happening in your office, you have to respect that anyone that is feeling stressed or tired or angry could have a negative impact on your business. The human mind is complex and extraordinarily capable, but it won’t always be able to deal with everything that is thrown at it. 

If you or a member of your staff is on the verge of burning out, you will want to take some time to sort through the issues that are making you feel this way. On an organizational level, incentivized collaboration and other support incorporated into the workday can help prevent burnout even further.

Have you had problems with feelings of exhaustion from just being too stressed, being stretched too thin, or having too many demands on your time? Leave your stories in the comments section below and return to our blog soon for more great content.

174935768_email_400.jpg

Tip of the Week: Rearranging Your Gmail Messages

174935768_email_400.jpg

Email remains a popular tool in the business setting because of its undeniable usefulness in the office—but having said that, it can have its negative impacts on your productivity simply due to how much it can take to manage it appropriately. With so many messages that are crucial for you to keep track of coming through email, let’s go over a fancy trick to help you manage your messages in Gmail.

How Gmail Can Be Hacked to Control Your Message Order

Granted, there are a lot of tools and features that Gmail offers that are intended to help you manage just this. Just consider the filters and labels that can help your sort and contextualize the messages that come in.

While these are undoubtedly useful tools, they don’t always prevent messages from slipping through and being missed. However, with a simple “hack” of sorts, you can effectively reorder your messages so that your most urgent communications can be moved to the top and highlighted for added prominence.

Postponing Messages

Let’s say that you open your inbox to discover an important message that you don’t want to lose track of, but it’s also buried amongst other messages that aren’t nearly as pressing in the moment. Gmail offers a literal Snooze button that allows you to simplify this.

Don’t get too excited—this snooze button won’t let you catch a few extra winks at your desk. Instead, pressing that button allows you to resend yourself an email at a time you dictate so that it reappears at the top of your inbox. Here’s how to use it:

  • (On a desktop/laptop) selecting the box next to an email and clicking the clock-shaped icon at the top of the window.
  • (In the mobile app) tapping on the icon at its left, accessing the three-dot menu, and selecting Snooze.

You will then be prompted to set a time for the message to come back, in the form of the Pick date & time option. Once you’ve sent the message away, it will return at the time you’ve dictated and sit conveniently at the top of your inbox.

What other handy Gmail tricks do you know? Share them in the comments!

264585236_guest_mode_400.jpg

Tip of the Week: Politely Protect Your Data with Android Guest Mode

264585236_guest_mode_400.jpg

For many people, their mobile device contains a mixture of sensitive information and personal details. In some cases, some of the data isn’t even theirs—instead, it belongs to their workplace. Naturally, this makes many people less inclined to share the use of their device, but most people also want to avoid being rude.

For precisely these circumstances, Android’s Guest Mode feature allows you to be courteous without potentially undermining the security of your device or, more accurately, the data stored on it.

What is Android Guest Mode?

First appearing in 2014 as a part of Android 5.0 Lollipop, Android Guest Mode is a way that your team can more easily fight against a scammer. Unfortunately, firewalls and antivirus aren’t exactly capable of protecting a phone if the user hands it over to someone with malicious intent—something that could easily happen if the scammer sold their story well enough.

Should this play out, the phone immediately becomes a direct threat to your data.

Guest Mode offers you a safe alternative to handing a phone filled with sensitive data over to a potential hacker by allowing you to effectively wipe your device before you share it. If the device’s manufacturer supports the Android feature, you can hide away all your settings, applications, accounts, and other data. Activating Guest Mode allows you to still share the use of your device without sharing access to the data that the borrower has no reason to see.

Unfortunately for Samsung users, the phone manufacturer has removed this feature from their version of Android. Otherwise, an Android user should find the task of enabling and disabling this feature easy to accomplish.

Turning Guest Mode On and Off

Enabling Guest Mode is very simple:

  • Access your device’s Settings.
  • From there, access Advanced and Multiple users. If your manufacturer has changed their menu order, search for “Guest Mode.”
  • Switch the toggle to “On” to enable Guest Mode.

After doing this, the Quick Settings panel and profile it shows can be accessed to Add guest. Reverting to your own settings is as simple as returning to Quick Settings and the user profile. Selecting the option Remove guest and providing verification will restore your device.

Security always needs to remain top of mind, so keep coming back to our blog for regular reminders to help keep your business protected. We can help, too, with our managed services, so give us a call at 810.230.9455 to learn more.

94903109_highlight_email_400.jpeg

Tip of the Week: Highlighting Certain Outlook Messages

94903109_highlight_email_400.jpeg

While no email platform is immune to mismanagement, Microsoft Outlook can quickly become filled with outdated and redundant messages that detract from the communication that it is meant to provide. Fortunately, there is a bit of a hack that you can use in Outlook to help prioritize your most pressing messages. Let’s dive into it.

Separating the Wheat from the Chaff in Your Inbox

The average inbox will contain a veritable ton of messages, the important ones mixed with promotions, group messages, and those that have been saved for later. After a short time, this can make it challenging to find the important ones as they are pushed down lower.

However, Outlook offers a means of finding these messages more easily through its conditional formatting capabilities. Basically, by switching a few basic settings, you can make the messages you want to focus on stand out a little more in the crowd.

Highlighting Your Messages

Let’s say, for the sake of example, that you often work with your colleague, Sandra, so her messages are some of the most important that you receive on a regular basis. Setting her messages to stand out is a longer process, but that is just due to the many options you have as you do so:

  • In Outlook, locate the View menu at the top of the window. Doing so will give you access to your View Settings. Click into them.
  • From there, click into the Conditional Formatting option. You’ll see a list of preloaded options included with Outlook, along with buttons that say Add, Delete…, Move Up, and Move Down. Click Add.
  • You’ll see a new rule added to the list of options called Untitled. Rename it to whatever works for your purposes. For this example, we’ll call it Sandra.
  • Click the button that says Condition… to establish when this rule comes into play. This can be based on a variety of options: whether a word or phrase is included in specific parts of the message, who it is from, the time it was sent, and even whether the message was directed to you specifically or to a larger group of recipients. Some of these can be disabled by unchecking the appropriate box or leaving the field blank. Let’s stick to simply specifying that these messages are ones sent directly to you, from Sandra.
  • You’ll be brought back to your list of rules in Conditional Formatting. With your Sandra rule still selected, click the Font button.
  • There, you can adjust the way messages that meet your conditions will appear in your inbox. You can change the font, the font style, its size, add strikeout or underline effects, and even change its color. In this example, we’ll simply say that the messages should be highlighted in green.
  • Click OK once you’re satisfied, continuing to do so until all the dialogue boxes are resolved.

Your inbox should now reflect the changes you have made—Sandra’s messages appearing green in the list—to help you quickly identify those she has sent to you. Simply follow the same process for any other messages you want to easily identify, and your inbox will quickly be more manageable for you.

Speaking of your email, did you know that you can receive a notification there whenever we post a new blog? Subscribe for these updates, and don’t hesitate to call NuTech Services for any of your IT-related questions at 810.230.9455.

308593867_virtual_desktop_400.jpeg

Tip of the Week: Working with a Virtual Desktop in Windows 10

308593867_virtual_desktop_400.jpeg

With Windows 10, you have no shortage of features and capabilities to take advantage of. One such capability: the use of a virtual desktop. Found near the Start button in your taskbar, the Task View button enables you to create and manage these virtual desktops, which we’ll discuss here.

Understanding the Virtual Desktop

Before we go on, we should clarify that we’re discussing a specific variety of virtual desktop.

Most things you hear called “virtual desktops” are the product provided as part of a Desktop-as-a-Service (DaaS) solution. Here, we’re discussing the feature built into the Windows 10 operating system that effectively opens a separate session of Windows 10 alongside your first one. Doing so can provide some significant benefits to your usage of Windows in terms of task organization and application management, along with other use cases that business and personal users alike could find an advantage in.

How to Use These Virtual Desktops

Opening a virtual desktop in Windows 10 almost couldn’t be simpler.

  • Start by clicking on the Task View button in your taskbar. If the button isn’t there by default, right-click on the taskbar and select the Show Task View button. Alternatively, Task View is accessible through Windows Key + Tab.
  • In Task View, you’ll see the option to add a New Desktop. These desktops are your different instances of Windows 10 and can be switched between by either returning to Task View or using Ctrl + Windows Key + Left/Right Arrow to cycle through your open desktops.

When working in these desktops, you should see no difference in performance. Be warned, some apps can only be opened once in a system, so trying to open another version of these will pull you into the desktop where it is already running. Closing one of these desktops will simply cause any open applications to jump to another open desktop instance.

Hopefully, you have a better idea of what Windows 10’s virtual desktop options have to offer. If you have any other questions about the technology that your business relies on, leave them in the comments or give us a call at 810.230.9455.

179946009_email_organization_400.jpeg

Tip of the Week: Keep Track of Your Priority Gmails

179946009_email_organization_400.jpeg

Email is undeniably a useful tool, but it can be a real drag on productivity and a hindrance to manage. Then again, there are some messages that you absolutely need to keep track of as they contain sensitive information. Gmail makes keeping messages under your thumb simple.

Email Can Be Frustrating

Gmail offers a lot of tools to help people organize their email. Features such as filters and labels make dealing with the loads of mail that come in easier, but still some messages might slip through the cracks. Wouldn’t it be useful if your email platform could give you a second chance to be alerted to a direct email? Users can now use a simple trick to reorder messages, so the most urgent ones appear at the top of your inbox. Let’s take you through it. 

Snoozing Your High-Priority Messages

So you’ve identified an important message that you want to return to after you deal with the mountain of other messages. Gmail allows you to do this with the use of the Snooze button.

Unfortunately, it doesn’t really work like your favorite snooze button on your alarm clock. Gmail’s snooze button is simply to resend yourself an email later so that the priority messages are at the top. Here’s how to access this feature:

  • (On a desktop/laptop) selecting the box next to it and clicking the clock-shaped icon at the top of the window.
  • (In the mobile app) tapping on the icon at its left, accessing the three-dot menu, and selecting Snooze.

Once this is done, a prompt will appear that will allow you to set when the message should return. The Pick date & time option allows you to set anytime after now for you to get the message back. Once you send this message, it will come back and sit at the top of your inbox in orange. It is extremely useful for the person who gets a lot of emails, but doesn’t get a lot of important emails. 

For more great tips and tricks, return to our blog regularly. 

110764836_embedding_video_400.jpeg

Tip of the Week: Embedding a YouTube Video into a PowerPoint Presentation

110764836_embedding_video_400.jpeg

If you’re trying to share an idea in a presentation, adding a brief video clip can make it very simple to communicate with your audience. With this in mind, it is quite helpful that Microsoft PowerPoint makes it simple to embed a YouTube video directly into your presentation, whether you’re using PowerPoint 365 or PowerPoint 2016.

Embedding a YouTube Video in PowerPoint 2016

To embed a video into your presentation:

  1. Navigate to YouTube and find the video you want to include in your presentation.
  2. Find the Share option and select Embed from the menu that appears when you click into it.
  3. You’ll see a preview of your chosen video’s thumbnail, along with a series of code and some other options that allow you to control the point from which the video starts, whether your embedded video will provide viewers with controls, and the ability to enable a privacy-enhanced mode (which pertains more to videos that are posted on a website). Copy this code in its entirety.
  4. Back in PowerPoint, click into the Insert tab and select Video. Select Online Video from the provided drop-down.
  5. A box will appear. Paste the code you copied into the From a Video Embed Code field. Alternatively, you could attempt searching for the video you wanted to use using the YouTube search field.

Embedding a YouTube Video in PowerPoint 365

The process when using PowerPoint 365 is very similar:

  1. Find the video you wish to embed on YouTube. Copy its URL from the address bar.
  2. In PowerPoint, click on the Insert tab. Select Video, then Online video…
  3. Paste the URL into the Online Video dialog box.
  4. You can also add various effects to the video preview (not the video that plays) via the buttons in the Video Format tab.

Regardless of the version you’re using, Microsoft PowerPoint has an excellent reputation amongst those who know how to use it. It, like many other solutions, provides much-needed capabilities that no business can fully go without.

Whatever your needs may be, NuTech Services can help you see to them. Give us a call at 810.230.9455 to find out more about what we have to offer.

199361750_lost_mobile_400.jpeg

What to Do Immediately If You’ve Lost Your Phone

199361750_lost_mobile_400.jpeg

In our last blog we gave you some advice on what to do if your phone has gone missing, but if it has been stolen or lost for good, there are more pressing issues than the anger and loss you feel; you need to ensure that you and the people you do business with are protected. Let’s take a look at what you need to do to make that happen.

Step 1: Assume Your Phone is Gone for Good

The first thing you need to be aware of is that you probably won’t be getting your device back. In fact, you should operate like you’ll never see it again. This is unfortunate as you’ll need to fork over hundreds of dollars to replace it, but in order to protect yourself and others and avoid even more cost, you have to take action. 

The truth is that your phone has access to a lot of different accounts. Think about how many apps you consistently use, and how many of them have access to your financial and personal information. Now think about how much data is on there from other people. Instant messages, contact info, social media, and your work profile all are exposed if someone is able to access the contents of your phone. 

Once it’s gone, it’s gone. Forget about that phone and forge ahead. 

Step 2: Remotely Lock and Wipe Your Device

Go ahead and wipe the device. You can do this with Apple’s Find My iPhone setting on iPhone or Google’s Find My Device application on Android. From these hubs you can track the device (if you want) but at this point you should just focus on getting the information off of the device as quickly as possible. 

To do this, Apple users will need to log into their iCloud account, while Android users will need to navigate to Google’s Find My Device page. Either one of these methods will give you the device’s exact location, which can be used in context. If it’s at the restaurant you last ate at, you could just go get it, but if it’s some other place you haven’t been, you will want to wipe it and lock the contents of it down. 

If you haven’t set the tools up, your wireless carrier or phone’s manufacturer may be able to help. Here are some links to information that you will need to get in touch with them:

Step 3: Report It

Now that you’ve come to the conclusion that you’ll never see your device again, you need to report it. If you own the device—not had it provided to you through work—you should contact your mobile carrier. They can block your phone from the network and make it much more difficult for people to siphon information off of it. 

For your convenience, here is some carriers’ contact information:

If your phone was given to you by your workplace, you definitely need to report it to them as well so they can take the steps to protect their company data. This goes for any device used for your work in any way. A lost device is a clear liability, with both your data and company data at real risk. Businesses need to have the capability to revoke access to company data and email remotely, or at least remove the device’s work profile.

Step 4: Change Your Passwords

It won’t be easy, it won’t be fun, but it’s time to fill a pot of coffee and change all of your passwords. You will have to change your passwords for your mobile account, and to be on the safe side, all of the accounts found on your phone. First start with these three, if you have them. 

Obviously, every password needs to be unique and complex. Don’t use the same password twice.

Then you will want to prioritize your next moves. Changing passwords is an extremely lengthy experience. We’ve given you an avenue of attack here, starting with: 

  • Email accounts (if you have others besides your main Apple/Google/Microsoft accounts)
  • Banking/financial accounts (bank accounts, credit cards, PayPal, merchant accounts, etc.)
  • Cloud storage accounts (e.g. Dropbox, Amazon, Box, iCloud, Google Drive, Onedrive, etc.)
  • Hosting/Domain-related accounts (e.g. GoDaddy, Network Solutions, Cloudflare, etc.)
  • Social media (e.g. LinkedIn, Facebook, Twitter, etc.)
  • eCommerce stores (e.g. Amazon, Best Buy, Walmart, ebay, etc.)
  • Services/utilities (e.g. Netflix, Hulu, your electric company, insurance companies, etc.)
  • Games and other apps

Again, this is going to take a long time. Take your time. You’ll feel better when all of your accounts are newly secured.

If You Suspect Your Phone Has Been Stolen, Report It to Authorities

After you are done with this, if it’s obviously been stolen, report it to the police. Why not? It probably won’t have any effect, but it is good to have a police record of the theft. These days, people don’t often steal phones, but it does happen occasionally. Most people today know that you can track a stolen phone, but those brazen enough to lift a smartphone are probably not the type of people you want to go confront over it. 

If You Find a Lost Phone

Now if you come across a phone in your daily jaunt out into the world, you will want to find someone to give it to. Typically if you find a phone it will be on a restaurant or bar room table. Just find the manager and give it over. It won’t take long and it could really help someone else out. 

We hope you never have to experience the loss of a phone, but if it does happen, we sincerely hope this guide helps.

254906239_lost_mobile_phone_400.jpeg

How to Find Your Lost iPhone or Android Smartphone

254906239_lost_mobile_phone_400.jpeg

Imagine for a second you are out to a socially distant dinner date with the friends that you barely get to see. You wrap up dinner and say your goodbyes and when you get to your car you realize that you don’t have your phone. COMPLETE PANIC! Your whole life is on your phone. Now imagine that when you went back to the restaurant to get your phone, it wasn’t anywhere to be found. We’ll talk you through how to proceed. 

Use Google’s Find My Device App to Find an Android Device

Android users have access to a feature called Google Find My Device, that you should definitely set up if you haven’t already. You first need to install it from the Google Play Store.

Once the app is installed, it will ask you to log into your Google account. You will want to set up a strong and unique password just as you would with any other account. When asked, you will want to Allow Find My Device to access this device’s location. Now you will be able to see where your phone is. 

Using Apple’s Find My iPhone to Locate Your Device

Apple provides a similar service to iPhone users. You will need to enable Find My iPhone. Find My iPhone is a built-in service that comes as a part of iCloud. As expected, it allows users to track the whereabouts of a lost or stolen device. If you suspect that your iPhone has been stolen, you probably shouldn’t try and go to the location it is at, for safety’s sake. 

The Find My iPhone feature also allows users to remotely wipe the device. This feature can help you avoid identity theft, a data breach, or any other unfortunate experience that could happen with someone in possession of your phone. You will need to opt-in to these services, but you will be glad you did if the worst becomes reality. Here’s how:

On your iPhone or iPad:

  • Open Settings.
  • Access iCloud.
  • Locate the Find My iPhone/Find My iPad slider and make sure it is switched On.

If you haven’t already set up an iCloud account, you’ll be taken through the steps by a tutorial. You will want to set up your iCloud account with a unique and strong password. We keep harping on this point, but it is an important one. 

Apple will let you track your device through its iCloud service as long as it is still on or not in airplane mode. 

Most iPhone users already have, but if you haven’t you should set up Touch ID or Face ID on your device. That way, it will be extremely difficult to access the contents of your phone. To do this, access Settings under Touch ID & Passcode.

If you are careful, you will probably never need these features, but if you do have to use them you will be thankful they are there. With the increasing price of new mobile devices (and the importance of the data stored on them) they offer a kind of insurance against loss or theft. 

At NuTech Services, we know the importance of technology for businesses and individuals alike and hope that you never have to worry about these features. Contact us today if you have any questions about how to protect your business’ data against theft at 810.230.9455.

378464120_best_practices_400.jpg

Tip of the Week: Essential Information Technology Practices

378464120_best_practices_400.jpg

Information technology is a critical tool for many businesses today, which means \\it is crucial that your IT is compliant to a few key best practices. Let’s go over these practices so that you have a roadmap to ensure that your operations can remain secure and productive.

Keep Your IT Up-to-Date and Maintained

Here’s the thing: you wouldn’t drive a horse and buggy to the office any more than you would type up a business brief on a typewriter or calculate your business’ budget on an abacus. The reasoning for this is simple: technology has gotten better over time and provided us with improved alternatives to what has been used before. These improvements have also come faster and have been more dramatic in scale.

On the other side of this coin, threats to your business technology have seen similar advancements.

As a result, your operational success depends on you keeping up with these changes. In addition to maintaining the operability of your IT solutions, you also need to prioritize updating and upgrading them when the time comes. These activities will both ensure your team can perform their tasks, and that they are also capable of doing so securely.

Back Up Your Data

With data being so important to a business’ successful and productive operations, you need to have insurance that some circumstance won’t cause you to lose your access to it—especially with so many circumstances potentially leading to that outcome. Infrastructure damage, theft, user error, equipment failure, and more can all lead to data loss at any level.

This is precisely why a backup solution is so important for a business to maintain. With no way of accurately predicting how or when data loss may strike, having some means of preserving your data continuity needs to be considered an essential consideration… arguably above any other. To accomplish this, we recommend that your backup strategy incorporate multiple copies of your data, with a minimum of three copies included. First should be the original copy of your data, second should be an onsite backup, and the rest should be hosted offsite—preferably in the cloud. That way, all your bases are covered, whether you need a quick fix for a deleted file or need to reconstruct your entire infrastructure.

Secure Your Data

Finally, data security must be addressed by all businesses, regardless of their size. Cybercrime nets more profit for its perpetrators than the global trade of illicit drugs does, and an average of 75 records are stolen each second. A bank account is currently available for a few dollars, provided you know where to look.

Businesses are often targeted via phishing attacks, which are only made more effective due to many user accounts having more access than is warranted and internal storage lacking the appropriate security protections. If they manage to fool one of a business’ employees into letting them in, a cybercriminal is given considerable power.

To help counter this, there needs to be a combined effort to both better educate business users as well as reinforce the security measures built into the infrastructure itself. Authentication requirements, role-based permissions, and other means could help prevent some data from being leaked that otherwise could be.

Lean on NuTech Services for assistance in putting these measures—and more—in place.

For our help and more information about your business’ technology, give us a call at 810.230.9455.

93116530_mobile_games_400.jpg

Tip of the Week: Four Tips and Tricks Within the Google Play Store

93116530_mobile_games_400.jpg

The Google Play Store is the Android operating system’s primary source of applications and widgets and can do a lot more than many might first think. Let’s consider a few useful tools and tricks that are incorporated into the Play Store that you should keep in mind.

Using a Password to Restrict Purchases

App store purchases can become notoriously expensive, and fast, so it makes sense to do whatever you can to help prevent any unauthorized purchases from going through. One means of doing so is to restrict the capability to make purchases behind password protection. That way you can avoid unwanted spending on your Android device… particularly if others regularly utilize your device.

Filter Apps Based on their Content

The Play Store has content available meant for a wide variety of age groups, due to the inclusion of gambling, violence, or other adult-themed elements present. While this is certainly a reason to restrict such apps for younger users, it also serves as an excellent reason to restrict what your business users can download—although you should also discourage them from using any apps not intended for business use during work hours anyways.

To filter out inappropriate apps, navigate to the Play Store and access Settings. Once there, tap Content Filtering, and select and deselect the maturity levels that apply to your needs.

View All Application Orders and Purchases

Keeping track of your investments into your applications is much simpler that you might expect, as the Play Store keeps a running record of your purchases. Finding this list is simple: all you must do is visit the web version of the Play Store and, via the Gear icon, access the My orders section.

See All Android Devices

Finally, you can track each device connected to a Google Account and used to access the Play Store, as there is a list in your account that outlines them. Finding this list is also fairly simple: from the online Play Store, click into the Gear icon and from there, Settings.

Have you heard about any other tricks behind the Google Play Store? Share them with us in the comments!

244341955_chrome_actions_400.jpg

Tip of the Week: Making Use of Chrome Actions

244341955_chrome_actions_400.jpg

As the most common Internet browser, Google Chrome is in a position where they always need to be coming up with new draws to maintain their hold on the market. Their latest efforts may help them to do so. Let’s take a moment and examine what Chrome is implementing, and how you can use it to your advantage.

Introducing Chrome Actions

Chrome Actions take the familiar address bar of the Chrome Internet browser and add some extra utility to it. Rather than specifying a webpage or network location to visit in the address bar (known as the “omnibar” to very few of us), Chrome now accepts very basic commands as input, and will follow these commands when they are entered.

For instance, opening a window in Incognito mode is as easy as simply typing “incognito” into the address bar.

As of yet, there are a few Chrome Actions that have been implemented:

  • Clear Browsing Data – type ‘delete history’, ‘clear cache ‘ or ‘wipe cookies’
  • Manage Payment Methods – type ‘edit credit card’ or ‘update card info’
  • Open Incognito Window – type ‘launch incognito mode‘ or ‘incognito’
  • Manage Passwords – type ‘edit passwords’ or ‘update credentials’
  • Update Chrome – type ‘update browser’ or ‘update google chrome’
  • Translate Page – type ‘ translate this’ or ‘ translate this page’

Of course, they come with the promise of more being added in future updates.

Is This Something You See Yourself Using?

Leave your thoughts in the comments and tell us why or why not. For more information and assistance pertaining to your business’ IT, give us a call at 810.230.9455.

211193007_mobile_businessman_400.jpg

Tip of the Week: 5 Ways to Improve Mobile Business Etiquette

211193007_mobile_businessman_400.jpg

Mobility is important to today’s workers and can be valuable to many different types of businesses; so much so that businesses demand that employees stay connected. Sometimes, especially when in public, this can become a social problem. Today, we will discuss mobile phone etiquette and five ways that you can improve yours. 

Business Doesn’t Stop, But You Should

We’ve all been there. We’re driving or on the train and a phone call comes in that you absolutely have to take. What do you do? Most people will take the call, but the right thing to do is send it to voicemail and return the call as soon as possible. Why? Because you are distracted. It’s best to call back and give the caller the attention they deserve rather than trying to juggle a phone call in the middle of traffic. Okay, this one is pretty basic, but it’s the foundation of all mobile etiquettes.

Don’t Be Rude

One of the biggest problems with mobile business is that there seems to be a continuous amount of communications that come in. This isn’t a problem when you are free to talk or text. It can be a problem if you are with other people, however. If you must take a phone call when you are face-to-face with others, be sure to excuse yourself and go at least ten feet away. This is courteous, and after all, it’s only four more feet than social distancing.

Brevity is often a cornerstone to modern mobile communication, with emails and texts often being short and sweet. Keep in mind though, sometimes being overly short can come across as disarming or even disrespectful to the recipient.

Stop Texting in Important Moments

One of the biggest faux pas that a mobile professional can have is the tendency to text people when other people demand their attention. If there is business going on right in front of you, even if it’s just a meal or an impromptu conversation, do yourself a favor and wait until it is over to return text messages. Again, pretty basic, but it doesn’t hurt to keep it top of mind.

Make Sure You Have Good Reception

This one is a serious problem. A lot of times when people are on the go, their service is not conducive to professional conversation. You can’t do business if calls keep getting dropped or texts don’t go through because you’ve chosen a poor place to conduct a mobile meeting; and nothing ruins your ability to communicate than if people have to stop every few minutes to get clarification or ask you to repeat yourself. Choose your location wisely. 

Sometimes you can’t help it, we get it, but if you are planning on running a meeting and need to participate, try to be somewhere where the service is reliable. It’s a sign that you respect everyone else’s time. If it’s impossible to prevent, simply be forthcoming about it and let everyone know at the start of the call. Perhaps even give an option to resume the call later if things get too difficult for the other participants.

Return Calls as Soon as Possible

When you return phone calls soon after you miss them, it shows professionalism and respect for the caller. If you are going to be out of touch for a bit, whether it be for meetings or personal time, it is solid practice to change your voicemail to state when you won’t be available. Then, when you are available, be sure to reach back out. Nothing is worse than getting a voicemail stating that the person won’t be available two weeks ago.

The mobile device is one of the best business tools available for people today, but knowing how to use them professionally is extremely important. Have you had to deal with a vendor or client that doesn’t adhere to mobile best practices? Leave your stories in the comments section below and return to our blog for more great tips and tricks each week.