card_skimming_69867689_400.jpg

Nothing Good Comes from Card Skimmers

card_skimming_69867689_400.jpg

Card skimming is a very real problem for companies and individuals alike, but there will always be those who are more impacted by these kinds of financial scams—particularly those who rely on prepaid cards provided by the government for food assistance and so on.

Skimming Losses Really Hurt Those Receiving Assistance

It has been confirmed by authorities that those who take advantage of Electronic Benefits Transfer, better known as EBT, which permits those paying for their food purchases through the Supplemental Nutrition Assistance Program, or SNAP, are at greater risk for loss from card skimming.

This is largely due to the way that the SNAP card works. The associated EBT account is debited to reimburse the store for the purchase, making the EBT card the same as a debit card. The card also has a PIN associated with it that allows the user to withdraw money from an ATM.

The issue with EBT cards is that they lack the protections that other payment cards have, like smart chip technology or fraud protections. SNAP funds can be stolen and spent, and without these protections in place, those who need the funds are left in a tight spot.

This shouldn’t come as a surprise to anyone who uses cards for payment—after all, hackers have been stealing card data for as long as they have existed—but they are getting much better at doing so inconspicuously. One way that they do this is through the use of card skimming devices which they hide inside cash machines, or those that are camouflaged to look like they are a part of the machine itself. This puts people at risk of having their card data stolen and duplicated by hackers and scammers, who can then use that information for fraudulent purchases or to sell them online to the highest bidder.

What Can You Do?

Until more states implement improved security measures for EBT cards, like eliminating the magnetic strip and replacing it with the modern security chips that other cards use, most of the security measures taken will depend on the user being more aware of how and where they are using their cards. Be on the lookout for signs that a machine has been tampered with, especially if the devices are found in a place that isn’t out in the open. And, of course, if you see something suspicious, say something so that others don’t become victims, too.

We want to help you be as secure as possible in your use of technology, so for more great tips and tricks, be sure to call us at 810.230.9455.

150098256_gadgets_400.jpg

Don’t Forget to Add These Handy Home-Office Gadgets to Your Shopping List!

150098256_gadgets_400.jpg

There is no denying that gifts are a major part of the typical festivities around this time of year, so it only seems that having some ideas as to what you’d like to receive to share with others is a helpful contribution. As our way of helping, we’ve decided to share a few tech-based suggestions that would find a welcome home in any home office or remote workspace.

Power

To start, let’s go to perhaps the most basic need of any technology user: the energy required to keep their devices on in the first place. Let’s not split hairs—the average home office setup might not have sufficient outlets available for all the devices that need to be powered.

If this applies to you, you may appreciate someone giving you a nice surge protector to help expand the number of available outlets you have while simultaneously protecting the devices you plug in.

In addition to this, there are assorted other power-related solutions available that you might consider adding to your wish list. For instance, you may be using two-factor authentication more often as you work remotely, making your mobile device something that needs to be kept on. A charging station or even a power bank may be a welcomed addition to your tools.

Comfort

Of course, productive work is impossible if you aren’t at least somewhat comfortable. You might want to consider adding a few amenities to your list that help support this goal. This can range from requesting a supportive new desk chair, to a comfy seat cushion or footrest, or even a pair of blue-light filtering glasses.

Honestly, there’s a lot of things that could be added to this list. There are tons of computer peripherals available that are specifically designed to make the user’s experience more suited to their preferences. Really, it’s about identifying what makes you the most uncomfortable throughout the workday and identifying the solution.

If you’re a fan of sipping warm beverages throughout the workday, consider asking for a desktop cup warmer.

Personality

All work and no play make Jack a dull boy, so it may not be the best idea to have a totally austere workplace. One or two small tchotchkes shouldn’t hurt your productivity unduly and can make for a great conversation starter if used in the office. Whether it’s a classic Newton’s cradle or some other perpetual motion device, something to fiddle with to help break up the workday can be valuable to have.

If you happen to have a stressful job, you could even ask for a miniature punching bag to attach to your desk. Fans of golf might ask for the pen set that doubles as a desktop putting green. Really, the possibilities here are endless.

Whatever you do choose to ask for, make sure you share your wish list in the comments to help inspire others.

Remember, while this may have been a sillier blog than we usually share, NuTech Services is always here to help you with your IT management and maintenance needs. Regardless of whether your team is working in-house or remotely, our managed services can give your business the benefits you want it to have. Learn more by giving us a call at 810.230.9455.

AdobeStock_188630884_400.jpg

Tip of the Week: Why Rebooting Can Fix so Many Problems

AdobeStock_188630884_400.jpg

There is quite possibly no more famous question in IT services than “Have you tried turning it off and on again?” While it may sound like a joke (and has quite often been used as one), could this advice actually work? The short answer: it does. For this week’s tip, we’ll explain why that is.

There are countless examples of IT turning to a reboot as a quick fix for technology issues in popular culture. Going back to August 4, 1999, Scott Adams’ syndicated comic strip Dilbert featured Dogbert working in tech support, interrupting a caller with the instruction to “Shut up and reboot.” The Channel 4 comedy, The IT Crowd, turned it into a catchphrase for one of its characters…

The joke has appeared in countless other places, including Supernatural, the long-running show that airs on The CW…

Even South Park used the concept as a joke, as Kyle effectively saves the world after the Internet stops by traveling to the “center of the Internet” and discovering that it is a giant router. I bet you can guess how Kyle fixes it:

As it turns out, this trope really is an example of art imitating life.

Why is Rebooting So Effective?

Well, let’s consider how much you actually do with your computer (or your mobile device, or your router, or your washing machine, or anything else that now has its own operating system) on a regular basis.

You start processes, you may install new programs, and that’s not even considering the massive amount of computing that goes on behind the scenes. A lot of these processes and activities will start things up in the background that are never really resolved, which means that your system resources are being used up. This usually has the biggest impact on your Random Access Memory, or RAM. Ultimately, your solutions aren’t able to work effectively any longer, and you see the effects.

However, rebooting inherently ends all of these processes, as they all require power in order to work. As a result, once the computer starts back up again, these processes are no longer running and impacting your system’s resources.

As a result, you have a better-working computer, and the IT stereotype is proven correct.

Keep in mind: if an issue seems to come back and persist despite a reboot (or multiple reboots) you likely have a bigger problem at hand. If this is the case, you can always lean on the professionals at NuTech Services to assist you with your technology.

Just don’t be surprised if we ask a particular question.

Subscribe to our blog for more great tips, IT tricks, and best practices!

gadget_170110606_400.jpg

Office Gadgets to Add to Your Holiday Shopping List

gadget_170110606_400.jpg

It’s the holiday season, which means many offices are holding gift swaps between employees. In the spirit of the holidays, we thought it would be helpful to share some gift ideas for the people you work with.

Here, we’ve put together a list of suggestions for the different kinds of coworker you might have to provide a present for.

The Health-Conscious

Let’s face facts – the desk jobs that are typical of the office aren’t exactly the healthiest ones in the world, so there are plenty of gifts that are intended for the office worker who wants to fight the battle of the bulge.

From numerous standing desk and converter options, to chairs that require active sitting (like those big inflatable balls you sit on) or are specially designed with ergonomics in mind, to elliptical machines that fit under a desk, you have your choice of means to help decrease sedentary behavior in the naturally-sedentary office environment, or at least minimize its impact.

Want to take the more affordable route? Look into posters with yoga positions or rolled up yoga mats that can be stowed away. If your office has an outdoor space, a few outside gifts like frisbees, jump ropes, and hackysacks might be a big hit.

While you may not be able to give your coworker the ability to avoid the snacks in the break room, or the extra cupcakes that Susie from Human Resources brought in from her daughter’s 7th birthday party, you can at least help them fight off their effects.

The Productivity-Minded

We all have that coworker who likes to keep themselves as organized as possible, as the more organized they are, the more productive they can be. There are many gifts that may be perfect for such a person, especially with the new year following so closely behind the holidays. For instance, a personal calendar or planner is a popular tool that many people use, especially those who prefer to find it easier to remember their responsibilities if they record them in analog, rather than digital format.

Alternatively, you might consider getting such a person a means of keeping their space uncluttered and organized, such as an attachable storage shelf for their desk, or a case to help them keep their various peripherals, dongles, and doodads organized and easily portable.

Of course, one of the most common ways to boost productivity is to add an additional display, so you always have the option to invest in any of a variety of products that can accomplish this. There are additional monitors for both desktops and laptops, of course, but there are also docks that can turn a mobile device into an additional, interactive display. Of course, these can be pricier than a gift for a coworker should perhaps be, but there are also options with a much less considerable price tag – like a wireless phone charger or similar device.

The Fidgeter

We all have that coworker who tends to think with their hands – that person who needs something tactile to help organize their thoughts. This is a fairly easy person to buy a gift for, as there are plenty of “desk toys” out there that you can find – fidget spinners, levitating tops, and magnetic balls just being the start.

One word of warning – unless your coworkers are always listening to music while they work, or are exceptionally patient, you will probably want to make sure whatever tchotchke you decide to give someone is minimally disruptive. Otherwise, your gift may result in issues down the line.

Of course, you don’t necessarily need to give gifts that are just for the office. It’s always fun to get a more personalized gift for someone to use in their personal life, as it means that you have really gotten to know your coworkers.

What was the best gift you ever got from an office gift exchange? What would you hope to receive now? Share it in the comments – you never know, someone might see it and give it to you!

242008881_400.jpg

The Next Phase of the Internet of Things

242008881_400.jpg

The Internet of Things is growing rapidly, and with that growth there will be a stage where thoughts about IoT technology change forever. From RFID sensors to mobile devices to commercial goods, machine-to-machine communications have already made their way into people’s homes and businesses. What can we expect to happen with the IoT in the future? Today, we take a look to answer this very question.

With global spending on IoT research and integration reaching $745 billion in 2019, the IoT is primed to be one of the largest single industries in the world in the future. Individuals, businesses, and governments are looking at the IoT for solutions to their problems. After all, the more information people have, the better decisions can be made. From the outset, it was said that this technology will transform the way we interact with machines and the way they will interact with each other, and only a few short years into a worldwide implementation, that mantra has proven to be true. Let’s look at where the IoT is growing most.

Industry

The huge annual jumps in IoT spending is largely driven by manufacturers, transportation, and utilities. Industrial IoT solutions provide companies and municipalities, alike, the link between their cloud-based software systems and their analysts, salesmen, and decision makers. This relationship is tenuous, however, and is closely monitored as a result. If a huge IoT strategy breaks even once, confidence in the platform is destroyed, leaving it an unreliable solution, regardless of the strengths of the technology. 

Manufacturers and process managers that utilize IoT solutions absolutely need their systems to be as reliable as possible. That means security, which is the number one improvement that the next phase of IoT has to make. For years, IoT was only somewhat trustworthy because of the lack of integrated security many IoT devices were manufactured with. Today, with security an absolute must for the major undertakings it is being used for, security has improved, but only slightly. A dedication to creating IoT devices that have hardware and software systems that are secure and reliable will dictate just the ceiling of IoT effectiveness.

The Smart City

One of the most intriguing places the IoT has been utilized thus far is in the integration of automated utility systems inside what has been termed, “the smart city”. The smart city uses what are known as low power IoT connections. These devices deliver low bandwidth and power saving features that are perfectly suited to asset monitoring. They can be implemented for a variety of uses, including: 

  • Sensors built into city roadways to sense things like the subsistence of traffic congestion and wear and tear of roadways.
  • Sensors built into bridges to sense degradation and the effect of seismic forces caused by geographical and traffic-based events.
  • Sensors built into buildings to measure wind force, foundation subsistence, or seismic activity.
  • Sensors in the interior of buildings to control foot-traffic, lighting, heating and air, and other systems humans rely on. 
  • Sensors on the street or on entryways that will provide facial recognition and reporting.

Unlike IoT-connected consumer goods, every IoT device deployed in a smart city would have a purpose that is beyond convenience. Every device would be placed to achieve a goal, improve the usability, longevity, and management of infrastructure, boosting resident safety and improving their access to services, cutting costs and limiting energy use, improving communications, and more.

One thing is for sure, the next phase of IoT implementation is going to challenge conventional thinking and deliver solutions that only a short time ago, were only imaginary. At NuTech Services we find technology fascinating. For more great technology information about innovative new tech, return to our blog regularly. 

199393098_iot_400.jpg

How Much Risk Can the IoT Cause?

199393098_iot_400.jpg

The Internet of Things is rapidly growing in popularity, which makes it all the more likely that some IoT devices will make their way into your office. Also growing: the reputation that these devices have as vulnerabilities to your organizational security. In an increasingly connected world, it is important to remember how the IoT could quickly become a hindrance to your business if not managed properly.

Let’s explore some of the risks that the IoT can present.

The Security Issues of the IoT

The Internet of Things has added utility to many devices, expanding their potential in ways that would otherwise be impossible. This has only been further augmented by the access to personal devices that many employees enjoy through Bring Your Own Device policies.

However, these benefits have come with an assortment of considerable risks alongside them. Devices that are a part of the IoT are notoriously vulnerable to many cyberattacks, which means that they could potentially be used as a point of access to your business’ network. From there, a cybercriminal has plenty of opportunities to create issues – whether that’s by stealing your data, hijacking your devices to be used in a botnet, or whatever their goal may be.

This problem is only exacerbated by the tendency for IoT devices to go without updates, whether through the negligence of the manufacturer or of the consumer. Without these updates, security flaws go unresolved, and the devices are thereby left vulnerable.

Consider how many devices are now manufactured that connect to the Internet. Smart watches and other wearables, smart speakers and televisions – really, almost anything with the word “smart” in its name – we have more or less surrounded ourselves with the Internet of Things. This includes the time we spend in the workplace, despite many of these devices not being visible on the network to IT. As a result, it has become almost impossible to track all the devices that attach to a network, which has developed into a new issue for businesses.

Shadow IoT

Thanks to the public demand for convenience and advanced functionality, more and more IoT devices are being manufactured all the time. If any of these devices makes its way into your office without the knowledge and approval of IT, you have a shadow IoT problem.

If you do, you aren’t alone.

In 2017, 100 percent of organizations surveyed by an IoT security firm were found to have consumer IoT devices on the network that qualified as shadow IoT. Another report, from 2018, stated that one-third of United States, United Kingdom, and German companies have over 1,000 shadow IT devices on their networks every day. Combine this with the security shortcomings discussed above, and you have a recipe for a cybersecurity disaster.

You may remember the Mirai botnet, which struck back in 2016. This botnet was built up of over 600,000 devices at its peak and focused primarily on IoT devices. Once these devices were identified by Mirai, they would be attacked and infected, adding more computing power to the botnet. Mirai is far from the only example, too… cybercriminals have been known to hack into IoT devices to gain network access, spy and listen in on conversations, and otherwise prove themselves to be a nuisance.

How to Minimize Shadow IoT

Clearly, shadow IoT isn’t a good thing for any organization. There are a few things you can do to help protect your business from the security issues that shadow IoT can cause.

  • Accept IoT devices in the workplace. If your employees really want to use one of their devices at work, they’re going to. Instead of shooting down requests to bring in these devices, make it easier for your employees to do so through the proper channels – and make sure your employees are aware of these channels. Openness and cooperation can be effective tools as you try to get your team on the same page you’re on.
  • Keep IoT devices separate. To better protect your network, you will want to consider utilizing a dedicated Wi-Fi network for IoT devices, configured to allow them to transmit the information they generate while blocking any incoming calls to them. This will help prevent threats from being transmitted to IoT devices.
  • Seek out potential threats. Not all shadow IoT necessarily can be found on an organization’s network, as over 80 percent of the IoT is wireless. This means that you need to be monitoring your wireless signals for shadow IoT devices and networks.

Your business’ security is important – too important to be undermined by an insecure consumer device that was brought in without your knowledge. You need to get out ahead of shadow IoT, as well as the other threats that could do your business harm.

NuTech Services can help. Our professionals are well-versed in cybersecurity best practices and how to use them to your benefit. To find out more about what we can do for your business, reach out to us at 810.230.9455.

201295262_byod_mobile_400.jpg

What You Need to Consider About BYOD

201295262_byod_mobile_400.jpg

One of the biggest buzzwords in business these days is BYOD – Bring Your Own Device – and for good reason. There are plenty of operational benefits that an organization can enjoy by adopting a BYOD policy; but, BYOD isn’t an inherently perfect solution, which means that businesses that leverage it need to do so mindfully.

To begin, let’s briefly review the basic principles of BYOD practices. In essence, rather than providing each employee with a company-supplied device, an employee is allowed to bring in a device that they own and leverage it for work purposes.

Why BYOD Has Become Popular in Workplaces

On the surface, BYOD seems to be the perfect solution – there are even statistics that help to support this position. For instance, companies who embrace BYOD practices save around $350 each year, per employee. Furthermore, using portable devices for work (much like what would be used as part of a Bring Your Own Device practice) has been shown to save employees approximately an hour each day, increasing their productivity by about a third.

This is just the tip of the BYOD-benefits iceberg. There are much more, including:

Access to Better Technology

If you were to list any business’ technology priorities, security and productivity should top the list… but oftentimes, frugality wins the day. Budgetary restrictions and a preference for tried-and-tested solutions frequently means that investments into more recent solutions are often pushed by the wayside. After all, what if the expensive new technology doesn’t work properly? This is frequently why businesses find themselves making due with solutions that really should be replaced. On the other hand, employees likely have no such qualms when they purchase their own devices.

BYOD policies allow a business’ employees to replace their outdated solutions with the reliability of newer, more up-to-date devices… leading to happier, more productive employees.

Reduced Financial Toll on the Business

Like we mentioned, it is fairly common for budgetary concerns to be the driving factor of many business decisions. It isn’t that the company doesn’t want to replace the aging workstations scattered around the office… it just isn’t in the budget. Before Bring Your Own Device emerged, businesses were stuck in a few different money pits. Between providing their employees with devices, maintaining and replacing these devices when they went faulty, and all the other expenses that come from keeping up an IT infrastructure, employers were stuck with a hefty bill.

Nowadays, with many people investing in their own devices and their accessibility, these expenses can largely evaporate. The employer’s investment can be effectively limited to securing access to these devices, allowing funds to be spent on other meaningful initiatives.

Employee Satisfaction

We’ve all experienced the struggle of trying to do work on equipment that just isn’t equipped for what we are trying to do. It can feel like trying to play Yahtzee with loaded dice – it just isn’t going to work, no matter how much effort is put forth. This is the other side of the example that preceded this one. If the aging workstations scattered around the office aren’t replaced due to budgetary concerns, some employees are going to be stuck using them… and they aren’t going to be happy.

As we alluded to as we described the effects that access to improved solutions can bring, an employee who isn’t being hamstrung by their technology is simply going to be more productive and happier with their working situation.

Clearly, BYOD isn’t something that should be dismissed without at least some consideration, but that isn’t to say that it is a perfect solution. There are also potential issues that need to be addressed as a BYOD policy is considered.

The Potential Issues of BYOD

Distractions

For every productivity application available on the Google Play Store, there is at least one application that is decidedly unproductive… at least, in terms of your business and its operations. While you could take steps to prevent these kinds of applications from appearing on devices that you provide, there isn’t much you can do about your employees downloading whatever they want onto their own.

Loss of Control

This is a big issue for businesses, as there are a multitude of ways that their losing control over the devices on their network could impact them. The policies that once prevented vulnerabilities from being leveraged can’t just be installed on an employee’s device without their consent, which many employees may be hesitant to give. This problem becomes even larger if an employee is fired or quits – what happens to the data on their device? How can a company be sure that a current employee isn’t putting sensitive company data at risk? What if the device is lost?

Compliance Shortcomings

Finally, you have to consider how your BYOD implementation will interact with any other compliances or requirements that your business is beholden to. In the past, a shockingly low number of IT leaders and professionals were confident that their BYOD policies met the standards placed by a variety of requirements, including HIPAA and Dodd-Frank.

How Can I Leverage BYOD Securely?

Fortunately, there are a few means of adopting a BYOD approach within your business while mitigating the concerns described above. The simplest way is to simply enforce a use policy, outlining the guidelines that your employees must follow if they wish to use their personal devices for work purposes.

NuTech Services can help you to create and enforce these guidelines, as well as optimize your use of your IT in many other ways. To learn more, reach out to our team by calling 810.230.9455.

P9UGYQ5_byod_400.jpg

Is Your BYOD Strategy About to Backfire?

P9UGYQ5_byod_400.jpg

Bring Your Own Device, or BYOD, has become a very popular option for businesses seeking to save a bit of their budget on obtaining and maintaining devices for their employees. While this is an economically commendable practice, it has the potential to generate risks for your business if left unchecked. Let’s discuss the pros and cons of BYOD, and how you can make it work for your business.

How Can BYOD Manifest Issues?

Unfortunately, for all its benefits, there is no shortage of drawbacks to BYOD – at least, if it is implemented without conscious deliberation and preparation. Here, we’ve listed a few such drawbacks:

Business and Personal Data Often Mix, but Shouldn’t

Do you really expect an employee to have a personal device that isn’t for personal use? If this device is used for work purposes as well, it can become very easy to combine this data and put some of it at risk. What if an employee who brought their own device in then left the company, the device in question full of your company’s sensitive data? Without some kind of policy in place to eliminate this risk, BYOD is simply too risky to allow.

Your Business Will Be Vulnerable to More Risks

Unfortunately, a poorly-strategized BYOD policy opens your business up to a variety of issues that could have severe and lasting ramifications.

This is mainly due to the many risks that mobile devices inherently have in terms of data leakage, malware infection, and other vulnerabilities. If your employees aren’t vigilant in keeping their devices updated and secured, your network will be subject to the same vulnerabilities. Malware infections can also be introduced via an employee not treating their device as carefully as they should be. If malware is installed on their device, it can easily be spread to your network – free to wreak havoc and steal data.

Your Infrastructure Will Likely Need Reworking

This one is admittedly less of an issue as it is an inconvenience. Simply put, adding an influx of devices and ensuring that your IT remains compliant to any policies can be a huge investment of time – and if not done correctly the first time, this investment will only grow.

How to Prevent These Issues Via Policies

As we briefly mentioned above, any BYOD initiative you introduce to your company needs to be controlled through a stringent use policy. This policy needs to clearly describe how an employee is to use their device during work hours, as well as the prerequisites that your employees need to abide by and agree to in order to use their own device. We recommend the following:

Mobile Device Management and Endpoint Protection

This technology helps to keep any company data isolated from any personal data on the device, which means that it allows you to control your data without intruding on an employee’s privacy. As a result, if a device is stolen, you can remotely remove any business data from it to ensure your data is protected.

Another precaution to enact is endpoint protection software. This software essentially performs a preemptive security scan of any device trying to access the network, identifying if a device has been infected. This means that your network isn’t introduced to whatever malware is present on the device, and the owner is then aware of their security issue as well.

Access Controls

The fact of the matter is that not every employee needs access to every byte of data you have. Therefore, it makes sense to implement role-based access controls. These controls can help keep an employee focused on the data they need for their work duties, and can help you identify where a breach occurred, should one happen. Some access controls can even prevent a device that isn’t up to date from connecting to the network at all. You should also investigate two-factor authentication measures that might assist you in limiting access to those who should have it.

Exit Strategies and Safeguards

Finally, you also have to consider what to do if something happens to one of the devices that has been used for BYOD purposes. First of all, you need to have your employees agree to have a lost device wiped remotely, applying the necessary solutions to each device used. Your employees also need to report a lost or stolen device immediately so these precautions can be put to use.

Finally, should an employee leave your business, you also need to make sure you have already secured the authorization to remove your company’s data from their device. You don’t want someone walking around with access to your data, whether their departure was amicable or not. Including this in your BYOD policy will ensure that anyone who leverages their mobile device is aware of your capability to remove your company data from their device, and will allow them to opt out of BYOD if it makes them uncomfortable.

With these policies backing up your Bring Your Own Device planning, you should be able to make use of a great productivity tool without sacrificing your data security. For assistance in putting BYOD into practice, reach out to NuTech Services at 810.230.9455.

totw_laptop_best_400.jpg

Tip of the Week: Is a Laptop the Best Fit for Your Employees?

totw_laptop_best_400.jpg

In today’s working world, not using technology to work on your tasks can be seen as an oddity. Taking this into account, choosing the device that best suits your office’s work style is an important consideration to make. For this week’s tip, we’ll dive into some of the reasons that you may want to standardize laptops in your office.

Reason 1: Mobility
Let’s begin with the most obvious reason laptops are a great option – you aren’t tied to a desk to do your work as you would be with a conventional desktop. Instead, you can just pick it up and take it with you, whether that’s to a meeting on the other side of the office or home for some remote work. I don’t know if you’ve ever seen someone haul an entire desktop workstation around, but if you have, you know that it just isn’t practical to do.

Potentially travelling with a laptop is also much easier. A desktop workstation would need to be carefully stowed in a vehicle, if not shipped to its destination. While it may seem like a hassle at the airport, stowing a laptop in a carry-on is a much more secure and convenient option when all is said and done.

In short, utilizing a laptop makes a lot more sense in an increasingly mobile world than does utilizing its far less mobile cousin, the desktop.

Reason 2: Concision
If the resources are there, one might make the argument that it makes more sense to utilize both a desktop and a laptop – one for the office, and one for home and travel.

Financial considerations aside, there are other issues with this strategy. The major one is the fact that it makes it that much more complicated to ensure that everything you need is where you need it to be, when you need it to be there. There is little that is more professionally frustrating than sitting down to work and realizing that the data you need is on your other device. Hopefully, you have the access to the other device at the time to make the necessary transfer.

While properly utilizing a cloud solution would be another way to approach this difficulty, why use two devices when one will suffice? That way, you can be sure that your employees always have access to the programs and data that they need to be productive.

Reason 3: Consistency
One of the most important considerations for any office technology configuration to take into account is how compatible the many devices it contains are with each other, and the solutions needed to accomplish each day’s tasks. If each employee has a different device, not only is this no longer guaranteed, you have no guarantee that each laptop will have the same shortcuts and features. For instance, if you want to encrypt the data on laptops and allow your staff to sign in with a thumbprint scanner, not all models are equipped with that. Different devices don’t tend to change how complicated it is to manage the devices, but it can vary the experience your users have and limit the policies you can set.

Standardizing your office’s devices becomes much easier when everyone has the same device, which inherently means that everyone has the same capabilities in the office. Of course, if someone needs their device to have more specialized capabilities, they should be the exception. However, for the run-of-the-mill tasks that many are responsible for, the average laptop should suit them just fine.

If you want more help in designing your technology infrastructure and setting it up for prolonged productivity, reach out to NuTech Services. One call to 810.230.9455 is all it takes to start receiving the technology services that you need for success!

students_learn_technology_400.jpg

How Technology is Transforming the Way Students Learn

students_learn_technology_400.jpg

To educate the leaders of tomorrow, using technology from the past isn’t going to cut it. While some schools are still using technology from the last century, others are moving forward. Today, we will take a look at classroom technology innovations, and how to get this exciting new technology in the hands of more students.

The Modern Classroom
Like the modern office, the modern classroom is beginning to run on technology; and as a result, it is changing the way teachers need to teach. Teaching strategies that have been the same for decades are being questioned and altered, making the children of today more-or-less guinea pigs in the new way of learning. They are well-equipped for this alteration, however, as they are the first generation of people that have lived in the age of social media and are likely well more advanced at using technology to solve problems than previous generations. So while there are some inherent problems with kids growing up in the age of social media, for education, the concept is a major win.

One strategy modern teachers are using nowadays is called flipped learning. This is where children are asked to watch online lectures, videos, and other materials at home, then do what used to be called homework during class. The classwork isn’t just people sitting quietly at their desks with their five-pound textbook open any longer, it’s now a chance for the children to work collaboratively to solve problems and hone practical skills that can be used throughout their lives. Best yet, flipped learning allows for a more analytical approach to teaching, whereas in the past kids that had trouble with certain concepts would work on problems they didn’t understand at home, away from educators, leading to frustration and higher degrees of failure.

For the school that isn’t ready to flip education completely on its head, there is blended learning, which is a strategic combination of using traditional face-to-face teaching with technology-based assignments to get more out of each lesson plan. So, while there are still in-class lectures, and individual assignments, integrating the use of technology to find answers, present homework, and introduce concepts can go a long way toward getting the children using technology and gaining the skills they are going to need as a member of the future workforce.

What Are Some of the New Technologies?
There are several technologies that are being developed to help students (and people in general) learn more about the world around them. Let’s start in the classroom. One technology that is starting to become common in the classroom is the smartboard. If you haven’t seen one, it is in essence a whiteboard that is hooked up to a computer and has multi-touch capabilities. This provides a more immersive educational experience than the old overhead or slide projector. One feature that a smartboard has is that it can be mirrored to any Internet-connected computer, giving students (or whomever is viewing this content) the chance to follow along when they are out of the classroom or on their personal device within the classroom itself.

Another great tool is the smart table. Smart tables are computer-based, and Wi-Fi connected touchscreen tables that typically have many multi-touch points, some have as many as 80 unique touch points at the same time. Since the technology is more accessible, the smart table is great for younger students that need more hands-on learning.

Another technology that the classroom of tomorrow will almost certainly feature is virtual and augmented reality glasses. These technologies are just in their infancy, but the more applications they begin to create, the more they will be found in schools. AR specifically is a technology that many students can benefit from. Since it is a digital overlay over real life objects, it makes instructional learning more immersive and provides a student practical instruction rather than providing conceptual instruction. It won’t be surprising to see apps developed for tablets and smartphones that will provide step-by-step instructions to students in a wide variety of disciplines.

Securing the Technology
The process of getting students and teachers more connected and modernized isn’t just about acquiring new hardware and software. It’s also critical that teachers and administrators are taught how to use the technology and how to use it safely. Without proper security measures, sensitive information could be at stake, and putting a student’s identity or privacy at risk has deep ramifications. It’s critical that schools consult IT experts who understand IT security before deploying technology that connects to the Internet or the network in general.

How to Get Kids the Technology They Need
One big problem facing a lot of public schools is that they simply don’t have the funding to get enough of the technology into classrooms to make a difference for the students. Most school boards won’t propose major tax increases in order to fund classroom innovation, and it’s unreasonable to expect that educators foot the bill for this technology. For situations like this, teachers have turned to crowdsourcing and social media. The most popular platform used by educators is DonorsChoose.org, which was started by a teacher and can be used by educators to raise funds for school supplies and technology.

Another form of funding can come from social media. Reddit does a gift exchange for teachers. There are people from all around the world looking to help kids get a better education by providing them technology. Another is Digital Wish, where teachers can purchase donated technology and software. The site allows donations that can go into their Digital Wish account to help them purchase the technology they need.

Of course, you can always go the traditional route: writing to your congressman/woman, but a lot of times you’d be better off turning to Adopt a Classroom, a foundation set up for teachers who, on average, spend nearly $600 a year on classroom supplies. Go to adoptaclassroom.org for more information.

The world has seen its technology change quickly and education is going to have to represent where we are in society. Do you know of any technologies that students use nowadays that we didn’t touch on? Leave your thoughts with us in the comments section below and return to our blog for more great technology-based content.

new_recycle_cable_400.jpg

A Better Way to Be Rid of Old Cables

new_recycle_cable_400.jpg

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

Take an Inventory
First, you need to see what cables you have on-hand. This includes cables, wires, and adapters. Basically, keep an eye out for anything that might be of value to your organization. This doesn’t mean to hoard them–rather, keep an eye out for anything that could potentially be useful, but not obsolete in the near future. For example, smartphone chargers with USB Type-A and Type-C cables might come in handy for travel or to keep as spares for staff.

Recycle (Don’t Discard) Your Unwanted Cables
If there are any cables remaining, you should always, always recycle them rather than throwing them in the trash. Modern computer and video cables are typically made out of valuable materials, such as copper and gold. On their own, they might not be worth much, but if everyone recycled their old cables instead of throwing them out in the trash, it would have a pretty large impact.

You can reach out to NuTech Services for assistance with getting rid of your unneeded and unwanted hardware. This goes for more than just cables–if you have anything at all that you simply don’t need, we’ll take it off your hands. If you just want a place to drop off your unneeded hardware, just call 1-800-RECYCLING or visit the National Center for Electronics Recycling website.

For help with recycling your unused technology, give us a call at 810.230.9455.

windowsinkofficiallogo400.jpg

Why Windows Ink Is So Useful In The Business Setting

windowsinkofficiallogo400.jpg

While computers, laptops, and tablets are incredible tools for productivity, there are many who miss the ability to scrawl out their ideas by hand. However, Microsoft has developed a means for your business to enjoy the benefits of both approaches with Windows Ink.

You may be familiar with the digital tablets that many artists use to transpose their ideas directly into their computer. The concept behind Windows Ink is very much the same. The primary difference is that, rather than using a separate tablet that you plug in via a USB connection, Windows Ink enables you to take notes right on the screen of your device with specialized writing utensils.

Naturally, as a Windows (and by extension, Microsoft) tool, Windows Ink is particularly suited to working with Microsoft Office products.

  • Microsoft Word: Windows Ink not only allows you to mark up documents, but allows you to edit them with different settings and gestures. Among other features, you can turn your stylus into a high-precision highlighter, or delete unwanted words or sections with a quick strikethrough.
  • Microsoft OneNote: With Windows Ink, OneNote turns into a freehand calculator. If you write an equation in the workspace, you can get the answer instantly–or, if you want to polish your math skills, OneNote will take you through the process step-by-step.
  • Microsoft PowerPoint: If you have ever used PowerPoint and wished that you could do more than what the toolbar allows you to do, Windows Ink is for you. Using the built-in ruler that comes with Windows Ink, you can draw with more precision than ever. Plus, Windows Ink gives you the ability to replay whatever notes others have made on a PowerPoint file.

Of course, there’s more that Windows Ink can do than work with the various programs of Microsoft Office. For instance, if you use Windows Ink to jot an address on a sticky note, Maps will step in to find you the best route. Another useful utility Windows Ink offers is its ability to take screenshots that you can then put notes on, allowing your reaction to be more easily understood.

The utility of Windows Ink in an office setting should be clear. Communications can be condensed from emails that list out the edits that a document needs, to contextual notes being made directly on the document itself. Windows Ink can essentially turn your device into an interactive notebook, allowing you improved utility and increased potential for productivity.

To learn more about Windows Ink and other useful solutions for your business, reach out to NuTech Services at 810.230.9455.

b2ap3_thumbnail_new_gadgets_of_2016_400.jpg

3 New Gadgets That Will Spice Up the Office in 2016 [VIDEO]

b2ap3_thumbnail_new_gadgets_of_2016_400.jpgTechnology is a staple in the modern office, but with thousands of new devices manufactured each year, it can be difficult to identify what will help your business, and what will ultimately hold it back. While some new gadgets hit the market and fail miserably, others become phenomenal successes. Here are three pieces of upcoming 2016 technology that we believe will help you get the most out of your workday in the near future.

Zcan Mouses
Do you remember the flat-bed scanners that once dominated offices all over the country? You might even still have one sitting inside a closet somewhere, waiting to find purpose in life once more. Or, instead, you might just opt to try out the Zcan mouse, which functions as a two-in-one scanner and mouse. Basically, the Zcan is an ordinary mouse setup, but it comes equipped with scanning capabilities that allow users to capture pictures, documents, notes, and whatever else you might need to scan, and save it locally or share through social media. The Zcan mouse has built-in Evernote integration, so users can keep themselves organized.

Zcan’s latest product, which you can see on display in the above video, is a wireless version of their scanner mouse. This product is great for allowing users to scan on the move, which makes it very valuable for getting work done on the road. The Zcan is currently obtaining funds via Indiegogo, but if you want to learn more about it before it’s released, you can view all you need to know on this website.

Slide N’Joy
How many times have you been disheartened by your laptop’s lack of screen space? If you’re using a typical workstation, it’s likely that you have multiple monitors that you use to get things done. The laptop, unless you feel like lugging around an entirely separate monitor, doesn’t have this luxury. This is why the Slide N’ Joy was created. The Belgium-based Slide N’ Joy was developed with the laptop user in mind, allowing them to immediately achieve more desktop screen space to be productive with. The company is currently active on Kickstarter to gather funding.

The display uses two magnetically-attached screens that connect to your laptop, tripling the amount of display space on your screen. Each is connected with an aluminum hinge, allowing you to share information with others you’re working with, or display them toward yourself for a more private feel. This idea could be a great investment, especially if you’re worried about not having enough space to conduct meetings or work on projects while out and about.

Swiftpoint GThttps://youtu.be/MY6weQACgm4
Mouse technology has continuously evolved to suit the needs of the computer it’s attached to. With more devices than ever before taking advantage of touch screens, the mouse needs a way to communicate with these devices. While using a touch screen has its uses, performing quality work on a mobile device presents new challanges. This is why the Swiftpoint GT is so valuable. It’s a wireless mouse that mimics the controls of a touch screen, making navigating a tablet much easier.

Swiftpoint GT uses two different modes. There’s the traditional point-and-click mode that’s used by your typical mouse, but the other mode allows for use similar to your typical mobile OS. It integrates touchscreen features like zooming and application switching. The mouse is connected via Bluetooth or a USB connection that can be used to charge the mouse. Each 30 second charge is good for an hour of use. In a world dominated by touchscreens, Swiftpoint GT delivers a solution for the mobile professional. Visit their campaign on Kickstarter for more information.

What are some of your favorite new 2016 technologies that you look forward to using? Let us know in the comments.

Let’s Talk Tablets

Tablets are definitely becoming a staple in the consumer electronics world. For the longest time, the tablet PC was an expensive, clunky device that just didn’t wow consumers. Some businesses had adopted tablets back in the day, but they were difficult to use, hard to support, and they simply didn’t perform for the price tag. However, like many consumer electronics, Apple reinvigorated the tablet market with the original iPad, and now it would seem tablets are here to stay. The question is, are they right for businesses?

Tablet devices are very similar to modern day smart phones. In fact, in most cases, the apps you run on the phone usually translate to the apps ran on the tablet. You get the basics; email, web surfing, streaming video, calendar, note taking, and more, but the difference is you get all that on a larger device. Ask yourself if you would like that basic functionality that your smart phone gets with a larger playing field, and you’ll have a pretty good inclination of you want to jump on the tablet bandwagon. However, the future of tablets is looking even more robust; Microsoft’s Windows 8 operating system is being built for both desktops and laptops and also tablets. This means you’ll get the same OS you would run on a desktop PC on your handheld tablet. Although the hardware in a tablet isn’t quite as beefy as what you’d find in a desktop, dual and quad-core CPUs and integrated graphics and generous amounts of memory are found in the cutting-edge devices, so expect tablets in the not-too-distant future to be major contenders to laptops as far as mobility and compatibility.

As for the tablets on the market now, there are plenty to choose from. Let’s take a short look at a few of the leading contenders.

iPad 2

The Apple iPad established itself as the gold standard for tablets. The device is sleek, well designed, easy-to-use, and boasts a great set of features and capabilities. With it being the most popular tablet device, it also has the most apps developed for it. Remember, you can’t just take software that works on your desktop and put in on a tablet; so you are limited to the apps available. Fortunately the Apple App market place is very extensive, and often enough when a developer makes software for tablets, they start with the iPad. The iPad2 starts at $499.

Samsung Galaxy Tab 10.1

The Galaxy Tab is essentially the iPad’s closest rival. Instead of using Apple’s iOS, the Galaxy Tab is powered by Google’s Android 3.0 Honeycomb OS. If you own and like your Android smart phone, you’ll feel right at home with this tablet. Android’s App marketplace is continually growing, and while it isn’t as massive as Apple’s, it’s getting very close. The Samsung Galaxy Tab 10,1 is also $499, although some carriers offer a 4G mobile version for a little bit more.

Amazon Kindle Fire

Amazon’s foray into the tablet world is a little smaller than the 10 inch tablets mentioned so far. The 7-inch tablet is also cheaper at $199, and packs quite a bit of functionality using Amazon’s multimedia ecosystem. The Kindle Fire lets you surf the web, read books, watch streaming videos, and more. Since the Kindle Fire has just come out, it’s a little too early to decide if it has what it takes for business use, but the low price makes it very attractive for multimedia and ebooks.

Nook Tablet

Much like the Kindle Fire, the Nook isn’t really built to perform. At $250, the tablet is more geared towards handling ebooks, email and other basic multimedia.

Toshiba Thrive

Not the prettiest tablet of the bunch, the 10 inch Thrive is thick and heavy. However, it supports a full USB port, HDMI and SD card slot, making it easier to connect with other devices. The Thrive runs Android, so email, web surfing, and basic productivity tools are easy to come by. The Thrive runs at about $379.

There are dozens of other great tablets out there; many of which are provided by mobile carriers such as Sprint, AT&T and Verizon. Be careful when shopping around; most of the time carriers want you to commit to the device for two years – a long time in an emerging market. Not sure what tablet would be a good fit for your business? Give us a call at 810.230.9455.