cloud_stroage_400.jpg

Why Cloud Storage is Knocking Flash Storage Out of the Picture

cloud_stroage_400.jpg

You need to quickly move documents from one computer to another. Do you reach for a USB Thumb drive? You may want to think twice and entrust the cloud to your data. Let’s talk about why.

A Brief History of Recent Data Storage Methods
Throughout the 1990s, NAND flash memory–which is what stores the data on a USB flash drive–was progressively becoming more and more affordable. The first company to sell a USB Flash Drive was a Singaporean company Trek 2000 International, who released their proprietary ThumbDrive at the beginning of 2000. Later that year, IBM became the first producer to sell USB flash drives in the United States with their product, DiskOnKey.

The cloud, believe it or not, was thought up in 1969 by J.C.R. Licklider. His idea was an online storage system that could be accessed from an Internet connection anywhere in the world–an idea that had to wait until the technology was there to support it. Once it was, many well-known companies (like Google and Amazon) were quick to leverage the cloud to provide utilities, including data storage capabilities.

Comparing the Two…
…however, there isn’t much of a comparison. The biggest benefit that a usb flash drive has to offer is the fact that it doesn’t rely on an Internet connection to access files. Otherwise, there isn’t much to be said about them that’s positive other than the convenience of portability. They’re easily infected by malicious programs, easy to lose, and easily stolen. Plus, they don’t offer near the collaborative abilities that the cloud does.

Cloud storage is, first and foremost, very secure against threats and malware, and backed up to protect your data against any circumstances that might put it at risk. Security mostly includes AES-256 encryption and superior access control through multi-factor authentication. As far as collaboration goes, the cloud offers much more utility than passing around a USB drive ever could.

The cloud allows you to work on your documents and data from any device with an Internet connection (we recommend that you make sure your connection is secure), sharing access with any other user by sharing a simple link. Also unlike the USB device, which only allows a single person to work on a file at a time, multiple users can manipulate the data simultaneously, simplifying any responsibilities that require collaboration.

While the USB thumb drive had its moment in computing history to be the star of data storage and sharing, that title has moved on to the cloud. Has your business done the same?

NuTech Services can help you make the move to the cloud. Call us at 810.230.9455 for more details.

screen_mirroring_400.jpg

Tip of the Week: Tip of the Week: Mirror or Cast Your Android Device’s Screen

screen_mirroring_400.jpg

Sometimes, the small screen of your mobile device is just too small. Instead of buying a whole new device that’s bigger and better, you can remedy this by simply mirroring your phone’s screen to a larger screen. Here’s how to do it from your Android device to your Windows PC.

First off, a word about mirroring. We’re NOT talking about using your phone as a mirror to check your teeth for ‘passengers’ before an important meeting–though there are several apps that could help with that. Instead, mirroring is when what’s displayed on one screen is also displayed on a second screen in real-time. In the case of the goal we’re trying to achieve in this week’s tip, we’re showing you how to take what your Android device is displaying and mirroring it on the monitor of your Windows PC.

Now, your Android device does not come preloaded with this feature, which means you’ll have to pay the Google Play Store a visit.

There are actually a few different mirroring apps that you can download for free. One of the most popular apps is AirDroid. You can find it in the Play Store here.

Keep in mind that AirDroid requires root access and Wi-Fi in order to work properly, so it might not be possible for the average employee to do use. There are other apps that can be used, such as TeamViewer and various other screen sharing apps, but you’ll want to check with IT to ensure that one of them is a proper fit for your organization. Of course, you might already have a solution put into place in order to handle this function, so you might be pleasantly surprised.

An alternative to mirroring your device’s screen is to use a casting solution such as Google Chromecast. While this is primarily a consumer-based technology that can be used for streaming apps such as YouTube, Netflix, or other videos to a connected television, it also has business functions. For example, Chromecast supports a variety of business-related apps that can be cast from your mobile device or laptop to a television screen. You can view documents as a group or conduct meetings, depending on your business’s unique needs.

Mirroring your screen and casting applications can be a great way to help your business take its meetings to the next level. How is your organization conducting meetings? Could it use these technologies to change the way it functions for the better? If so, reach out to NuTech Services. Our trusted technicians will work with your organization to fulfill its goals. To learn more about business technology solutions, reach out to us at 810.230.9455.

managed_it_is_for_you_400.jpg

There’s a Better Way to Approach Technology Than Fixing What Breaks

managed_it_is_for_you_400.jpg

Technology is a major factor that can determine your business’s fate, yet some organizations don’t necessarily recognize IT problems before they make themselves apparent. Unfortunately, by the time you notice any issues with your IT, they are usually turning into problems that cause your business considerable troubles. To keep issues from evolving into major problems, it’s up to you to ensure that your technology is maintained in a proactive fashion.

What NOT to Do
The first thing that comes to mind when thinking about tech support isn’t necessarily the best option out there. Most users think of a break-fix IT provider, which uses the following formula for providing service:

  • Some piece of technology or equipment stops working and it begins to affect operations.
  • You contact your tech support.
  • A technician is dispatched to assist you.
  • You wait for a technician to arrive on-site to fix the issue.
  • The tech arrives and fixes your issues.
  • You pay the support fees.
  • Your employees get back to work.

While this method of IT support certainly gets your problem taken care of, the true cost of such support is that you’re paying every single time you require it. While you pay your IT provider for services, there are plenty of other costs associated with this type of break-fix support. After all, your employees will still have to be paid for any time spent in the office, even if their technology isn’t allowing them to work properly.

Plus, what if the problem is not just affecting your employees, but your clients as well? If they can’t receive the goods or services that you provide for them, then they aren’t going to be happy. If this happens too frequently, they might even consider breaking their agreement with you and moving to a competitor who might offer more reliable services. Therefore, while break-fix IT is certainly a solution, it’s unlikely to minimize damage. You’re better off taking a proactive measure to resolve your technology troubles.

The Right Way to Approach IT
Many organizations are shifting from a dependence on break-fix IT to more proactive solutions, with the primary one being managed IT services. This particular approach takes a much different method of administering IT support:

  • One of the managed service provider’s technicians notices that there are components that might experience a critical issue. They then inform your organization of the possible issue.
  • The managed service provider then works to resolve the problem remotely while possible.
  • If your issue is covered by your service level agreement, then you pay nothing for the service besides your usual monthly fee.
  • Your employees get right back to work with minimal interruption.

The managed services provided by NuTech Services offer your organization dynamic, enterprise-level solutions that allow you to minimize downtime and take a proactive stand against IT issues. We can monitor and maintain your solutions so that your organization can focus on what it does best, without worrying about whether or not your technology will remain functional. To learn more about managed IT, reach out to us at 810.230.9455.

network_attached_backup_400.jpg

No Business Should Be “Happy” to Lose 24 Hours’ Worth of Data

network_attached_backup_400.jpg

A new study by Disaster Recovery on the state of data backup for enterprises yields some rather disappointing results, particularly when it comes to the percentage of companies not enacting data backup best practices. Companies that fail to continuously backup their data, or fail to even back it up at all, are gambling with their future.

For starters, one of the most shocking finds from the study is how 72 percent of businesses are “happy to lose” more than 24 hours’ worth of data after a cyber-incident. When one looks behind the scenes as to why this is, they may find it in a company’s data backup practices. This is especially the case if a business is utilizing tape backup–a data backup procedure that typically backs up a company’s files once every 24 hours.

Admittedly, a business having tape backup is better than not utilizing any form of backup whatsoever; a category which 13 percent of businesses find themselves in, according to the study. However, being “happy” that your data backup needs are covered vs being “happy” about losing 24 hours’ worth of data should be viewed as two entirely different forms of “happiness.”

To clarify our point, consider your SMB in the following IT scenario: At the end of the work day, a designated employee goes to perform a backup of the day’s work by swapping out the old tapes for new ones. The following day, an employee responds to a spam message by clicking on a malicious URL contained within the message. This dumb move ends up infecting your entire network with ransomware, completely disabling operations. Thankfully, you’re able to deal with the ransomware by pulling out the backup tapes and restoring the data from the previous day. While such a move may make you “happy” that you’re able to resume operations, the inconvenient fact remains that your company just lost an entire day’s worth of data, plus several hours (if not more) to restore the data from a backup.

Now, some businesses may operate in an industry that doesn’t handle a ton of data on a daily basis. For example, think of a small retail storefront that’s operated entirely by the owner and all the business dealings take place on a single PC. A small business like this might not take too hard of a hit by losing 24 hours’ worth of data, but it would nevertheless be a costly inconvenience.

For the modern SMB leaning heavily on technology and utilizing enterprise-level solutions, the amount of data generated in a single day can be significant, and more so for companies whose business model revolves around generating digital content, like marketing firms, schools, hospitals, etc. If such an organization were to lose 24 hours’ worth of data, the consequences could range from very expensive to catastrophic.

It’s not overly complicated to do the math and put numbers to such a data-loss scenario. Consider how many payroll dollars are spent on paying employees to generate and handle data, then factor in how much money is made in a single day thanks to all of the data that’s generated. You’ll also want to consider how much money you’ll lose from having your company’s operations miss out on an entire day’s worth of work. Chances are, you’ll be making up the progress lost from that day over the course of several work days. When all of these calculations are compiled, there’s an extremely high chance that you won’t be “happy” with the results–and hopefully be much more motivated to backup your files multiple times each day.

To that end, NuTech Services offers a cloud-based data backup solution that makes copies of your files as often as every 15 minutes. Plus, unlike tape backup, the entire data backup process is automated, meaning that you don’t have to make a nightly task out of swapping out tapes. To equip your business with a backup solution that you can truly be happy with, give NuTech Services a call at 810.230.9455.

facebook_followers_400.jpg

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

facebook_followers_400.jpg

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

This feature is called “follow,” which limits who can send you actual friend requests while still allowing some users to view your public posts. This is important primarily because hackers and scammers will often create fake profiles in an attempt to connect with potential victims. Their target might be sensitive credentials or other important information, so it’s important to avoid friend requests from people who you may not know.

To allow users to follow your profile and prevent users who don’t know who you are from sending friend requests, follow these instructions.

First, log into your Facebook account. If you’re using a desktop, select the down-arrow in the top right corner of Facebook. Once you’ve done so, click on Settings, which will be at the bottom.

Doing so will open up the General Account Settings. In the left column, notice the sub-categories for Facebook’s settings. You want to click on Privacy first.

In the Privacy Settings and Tools page, you’ll see sections that allow you to control who sees what you post on Facebook. The first option you want to find is the Who can contact me? Section. Click the Edit option and change the setting to Friends of friends. By doing so, you’ll be safe from friend requests from all but those who are currently on one of your friends’ rosters, and you’ll be able to send your own invitations in the same way as before.

If you want to give someone the ability to see what you post without accepting a friend request, you can enable public posts. This lets you share what you post, such as articles from your industry or professional development, without sharing personal posts that are meant for only your friends–effectively allowing you to split up your personal and professional posts. Just scroll down to Public Posts in the left column and open up the Public Post Filters and Tools page. Next, in the Who Can Follow Me section, select Public. Now you can select Public to make posts available to Followers, or Friends for posts meant only for your friends.

Granted, even with all of these measures, you still need to practice healthy skepticism when dealing with users on social media platforms. You never know who your latest friend could be, as it’s easy enough to hide behind the facade of an online account and pretend to be someone else. To learn more about how you can protect your business from online threats, reach out to us at 810.230.9455.

more_efficient_meetings_400.jpg

Employees Spend Nearly 80% of Their Time Communicating About Work. You Can Change That

more_efficient_meetings_400.jpg

How much time is wasted in your workplace just trying to communicate about potential projects? The notable difference between productivity and stagnation is that one is making you money, while the other is costing you money. Employees spend about 80 percent of their time in meetings, on the phone, or responding to emails, so it falls on the business owner to ensure that communications are as easy as possible so minimal time is wasted.

There are different approaches to this problem. The first place where you can cut down on wasted time is the one that you likely have the most control over: meetings.

Let’s face it; sometimes meetings aren’t as productive as they should be. One way to keep this from happening is to consider how you can make more efficient use of everyone’s time. Start by making a plan and considering what exactly is on the agenda. Ask yourself what the purpose of the meeting is, and if the goal of the meeting could be fulfilled more effectively in another way. If the goal of the meeting can be achieved without collecting your entire workforce into the same room, consider doing so.

Once you have determined that the meeting is the most efficient way to achieve this goal, you want to ensure that you communicate the purpose of the meeting to all of those who must attend. This way, everyone knows what they need to get out of the meeting, and nobody will be confused about why the meeting is being held. This keeps wasted time to a minimum.

By remaining cognizant of what your meetings should accomplish, you’ll inevitably save time and even wrap your meetings up earlier. This can even change the way that employees view meetings. Instead of keeping a meeting going long enough to fill in the space on their schedules, they will see that they can get more done since the goal was achieved earlier than expected.

Another way that you can make your meetings more effective is by creating an outline and then sending the agenda out to everyone at least 24 hours in advance. This way, your workforce knows what they can expect, as well as put together their own notes for quality input throughout the meeting. Another way that you can use this to your advantage is send them something to have read before the meeting starts–in essence, assigning homework. By using these methods, your meetings will be less improvised and more focused.

Once the meeting has ended, you can ask your employees for feedback regarding the process. If you take the time to listen to all participants’ feedback, you can then use it to improve the process and meet goals even more effectively next time. Eventually, it will lead to a chain reaction where meetings go by faster and faster, to the point where you have the process down.

When it comes to streamlining any processes in your office, the right technology can make or break the effort. Technology can help you make your meetings more efficient by utilizing video conferencing or voice chat technologies, so that your team doesn’t have to be in the same place all at once. They can even dial in with their mobile devices from their current location.

This strategic approach to collaboration technology can help your organization thrive, as well as focus on creating more opportunities for profit. To learn more about how there are technology solutions specifically designed to improve collaboration, reach out to us at 810.230.9455.

you_face_security_threats_400.jpg

5 Security Threats that Spell Doom for Any Organization

you_face_security_threats_400.jpg

Fact: your business will always be susceptible to various security threats in at least some capacity. It’s up to you to counter these threats before falling victim to them. To help you with this, we’ll go over the top five threats that you need to be prepared for.

Viruses
Viruses are bits of code that plant themselves in your system and cause a myriad of problems. Viruses can cause system slowdown, problems with performance, and can even open the way for data theft or downtime. Security software like antivirus is usually enough to keep simple viruses out of your network, but more dangerous variants may be sneaky enough to dodge discovery and cause damage.

Malware
Also known as “malicious software,” malware infects a system and performs whatever its programmed function is. There are all sorts of variants out there, including spyware to watch the infected PC and capture keystrokes, and ransomware that can lock down files until a fee is paid. Malware complicates operations and can potentially put your business at risk of further data breaches.

Spam
Spam messages are both annoying and dangerous. Spam is the hacker’s preferred way of spreading viruses, malware, ransomware, and phishing scams, among other threats. They can effectively use spam to send out countless instances of the same attack to recipients all over the world. Thankfully, you can prevent the majority of spam simply by implementing a spam blocking solution. This can keep spam out of your inbox in the first place, eliminating the opportunity for user error or otherwise.

Phishing Scams
Hackers and identity thieves will use whatever tools they can to steal information from whole organizations, or specific individuals via targeted attacks. They may take advantage of the people or organizations with whom individuals associate themselves with, masquerading as vendors or close personal friends in order to gain their trust. The end result could be someone you think you know stealing sensitive information, like financial credentials or personally identifiable information. Take the time to understand some of the symptoms of these attacks, like poor spelling in messages or out-of-the-blue outreaches from the sender. Other common giveaway signs are unexpected urgent final notices or calls requiring immediate action. NuTech Services can help your business successfully identify these scams.

CEO Fraud
Whaling is a trend in which CEO fraud occurs by hackers stealing the identity of a C-level employee. For example, a hacker using the identity of a CEO could send legitimate-looking emails to the finance department asking for an immediate wire transfer. In these cases, the one on the receiving end of the message might not think anything of it and go ahead with the transfer. If you receive such a message, take a moment to question the legitimacy of the request by consulting official records regarding email addresses and telephone numbers associated with the message, or simply contact the CEO yourself. 

Does your business want to take network security to the next level? If so, reach out to NuTech Services at 810.230.9455.

google_chrome_issues_400.jpg

Tip of the Week: Make Chrome Run Faster With These 3 Adjustments

google_chrome_issues_400.jpg

If Google Chrome is your preferred web browser, then you might notice that, just like any other application, its performance may fluctuate. When you experience issues with Chrome, it’s important to keep in mind that you can take steps to remedy the problem.

Here are three ways that you can make Google Chrome work better.

Make Use of Chrome’s Task Manager
Much like your computer’s task manager, Chrome has a feature that allows you to view your computing resources and programs at a glance. With Chrome’s built-in task manager, you can see information on browser tabs and extensions, and how much processing power they are using up. This information can help you diagnose which tabs are slowing down your browser. To open it, click the three-dot menu in the top right corner of the browser and click More Tools. Next, select Task Manager. Or, if you want a more straightforward path, just use the shortcut Shift + Escape.

Once the window opens, you’ll see all of the tabs and extensions that are currently in use, along with statistics concerning just how much resources they are consuming. If you find the offending tab, you can select it and click End Process. If you use this method to end an extension or an open tab, it will stop functioning until you reload Chrome.

Take Advantage of Hardware Acceleration
Before digging too deep into this, we want to make sure that you’re aware that it’s not always recommended that you implement hardware acceleration for your browser, as it depends on how powerful your computer is. If you’re unfamiliar with hardware acceleration and want to know how it can improve your browsing experience, reach out to your IT department or contact NuTech Services.

Hardware acceleration works by moving some of the burden off of your PC’s CPU onto the GPU, which can potentially resolve some processing problems by placing the page-rendering burden on the CPU. For this setting, click on the three-dot menu and open Settings. Then go down to the bottom of the window and find Show Advanced Settings. Go down from here and find the System section. Select Use hardware acceleration when available and restart Chrome to activate it.

Reset Google Chrome
If you’re not sure if your efforts have actually led to a better performance from Google Chrome, you can try resetting the browser’s settings. To do so, go past hardware acceleration and you’ll see the option to Reset Settings. Confirm your choice. Keep in mind that Chrome might not reset things like bookmarks, browsing history, or saved passwords, but it will get rid of settings like your default start page, your new tab page, your pinned tabs, and your default search engine.

Does your business have problems making the most of its technology? For more great tips and tricks, reach out to us at 810.230.9455.

root_cause_400.jpg

When Investigating the Root Cause of an IT Issue, Remember to Check Company Policy

root_cause_400.jpg

Downtime is something that no business wants to imagine, but it’s something that is practically inevitable if you don’t prepare for it. You’ll be forced to wonder how long it will take to get back in business, but how this problem occurred is also important to discuss. Understanding how IT downtime occurs within your organization is the first step toward making sure that it can’t happen again.

It’s clear that being able to diagnose IT problems is a great asset to your organization since the issue will be identified and resolved in a timely manner. This information can help you keep issues to a minimum moving forward. The act of getting to the bottom of a problem is called a root cause analysis. An analysis of this variety focuses on basic troubleshooting practices, which begin by looking at the functionality and performance of your technology infrastructure. Since networks typically expand and become more complex over time, your root cause analysis will only grow more challenging to pull off.

Let’s consider how much work goes into performing a root cause analysis for a small business with only one server and a few workstations, compared to a larger organization that implements more advanced solutions such as desktop virtualization or cloud computing. Chances are that finding the root of a problem for a larger business will be more of a problem, as there is simply more ground to cover than with a smaller organization. Plus, ensuring the quality and accuracy of your root cause analysis will be more challenging without an IT expert on-hand to oversee the process.

In these situations, it’s also important to involve IT in the decision-making process when upper-level executives are making technology-related choices. Since IT outages often extend much farther than simple equipment malfunctions, the problem area is frequently a poor IT policy–something that a trained IT professional will be able to identify and resolve as the need arises.

Even something as simple as a hardware replacement policy could be a problem if it’s not up to the requisite standards. Any good IT technician knows that hardware cannot and will not last forever and that it will start to show signs of degradation. Therefore, the need to replace technology before it breaks down and hampers progress is of the utmost importance, so as to avoid data loss and the expensive unexpected costs of replacing servers, workstations, and other major components. If these solutions are being monitored properly by trained technicians, chances are that they will see the problem and address it before it becomes a major concern.

A proper IT technician can identify and resolve the issues on your network so that they don’t grow too large and become major problems. Unfortunately, smaller organizations with less flexible budgets often can’t support this proactive maintenance in house. In situations like this, NuTech Services is glad to help with our managed IT services. We can monitor your network and minimize the damage that your organization experiences from hardware failures, downtime, and data loss. To learn more, reach out to us at 810.230.9455.

one_note_benefits_400.jpg

Microsoft OneNote May Be the Best Note-Taking Tool on the Market

one_note_benefits_400.jpg

Most modern PCs come pre-installed with a handy tool by Microsoft called OneNote (and it’s also included with Office 365). Today, we’ll run through the features that OneNote offers that make it a useful business tool.

Keep in mind, we’ll be focusing on OneNote 2016. Older versions of OneNote have some of the same features, but if you are running an older version of Office, you may want to consider upgrading.

Benefits of OneNote
OneNote was clearly designed with collaboration in mind, as you can save your Notebooks either to your local network drive, or to Microsoft’s OneDrive. You are able to share your Notebooks with others in your organization and work together, letting you collaborate on projects and share notes in the cloud.

While OneNote on its own isn’t the best word processor, spreadsheet app, or presentation software, it offers what can be described as the highlight reel of the other Office 365 applications. You can write, build simple tables, show charts and graphs, and even draw, but it won’t replace your other Office 365 applications.

Note Taking Capabilities
OneNote offers an impressive number of features that make it an excellent choice for quick note creation and organization. As you create a Notebook, you can divide it into tabs, and then divide those tabs into pages. OneNote also has premade templates for you to utilize, or you can create your own, to best arrange the particular information that note is to contain.

Of course, your notes can include more than just text. OneNote allows you to take clippings from web pages and insert them into your note. Another great thing about OneNote is you to pull text directly from images by right-clicking them, or search for text that appears in included images, with a considerably high level of success.

Plus, with the right equipment, OneNote supports handwritten note-taking, and is able to convert it into font-based text with good accuracy. The same can be said of its math function. By typing out or drawing a simple equation, the formula can be both converted to text and solved, as long as it was properly formatted. 

You can format your pages to suit your needs, and OneNote also offers a very handy feature that allows you to link content on one page to content elsewhere in OneNote for quick access. Finally, for added security, notes can be password protected, so if they are shared with someone they shouldn’t be, your data is still safe.

OneNote offers plenty of highly usable features to improve your business’ organization and collaboration. So, tell us, will you try it out in your company? Would you try it out for personal use? What do you use to stay organized? Let us know in the comments!

windows_apps_full_screen_400.jpg

Tip of the Week: How to Automatically Open a Windows App in Fullscreen

windows_apps_full_screen_400.jpg

If you’re a regular user of Windows applications, you’ll notice that they will, by default, open into smaller windows, allowing users to customize the size of their windows as need be. Usually, when you want to increase the size of the app, you have to click the maximize button in the top-right corner. However, you can save a little bit of time each time you do this by setting Windows to default to full-screen mode for this application.

First, you’ll want to pick the application, and find it’s shortcut on your desktop. When we say “shortcut,” we are referring to the little icons on your desktop that open a program, like Microsoft Word or your preferred Internet browser.

Select the app’s icon and right-click it. Go to the bottom of the dropdown menu and you’ll see Properties. Click it and you’ll open a Properties window, which will open up to the Shortcut tab.

You’re looking for the Run drop-down menu. It will be just a few selections down from the top of the tab. Currently, you’ll notice that it’s set to Normal window. However, if you click on the down arrow, you’ll be shown choices for Normal Window, Minimized, or Maximized. Click on Maximized, and whenever you open the program in the future, it will default to full screen mode. Once you’ve done this, click Apply to save the changes.

ib app full screen 1

While it might not seem like it saves a lot of time, it will certainly be more convenient. Just take a moment to optimize your settings now and you’ll save a lot of time and frustration in the future. To learn more about how to save time and optimize your business technology, subscribe to NuTech Services’s blog.

new_feng_technology_400.jpg

You Can Now Generate Power By Literally Folding Laundry

new_feng_technology_400.jpg

Wouldn’t it be convenient if you could charge your smartphone just by walking down the street? How about turning your tie into a voice-recognizing security system? Michigan State University has been working toward creating some great new tech that makes these suggestions seem like real possibilities, in the form of a small device.

Nelson Sepulveda, an MSU Associate Professor of Electrical and Computer Engineering, along with his team, developed a device that can create power as it is bent or folded–which means it can be used as fabric for clothing. These devices are called biocompatible ferroelectret nanogenerators, or FENG.

Power is created by the device’s layers as energy is received through other sources; for example, the user’s physical motion. This allows for countless possibilities, including the ability to charge a device through only using FENG technology.

There are other ways that this technology can be used, including security applications. FENG material is very sensitive, so it could make it almost impossible to trick a voice recognition system. FENG could also be used as a speaker, adding to its versatility. In other words, it can work from both sides of the spectrum.

It’s also likely that FENG technology can be used to aid in discovering new ways to make technology more efficient for longer periods of time. This can help businesses achieve much more overall than they were previously able to, all without losing the ever-important battery charge. Read more about FENG here

What are your thoughts on FENG? Do you think that this will become a new standard for building new devices? Let us know in the comments, and be sure to subscribe to our blog for even more great business technology information.

internet_of_things_issues_400.jpg

How the Convenience of The Internet of Things Can Come Back to Bite Us

internet_of_things_issues_400.jpg

While the Internet of Things has made many common tasks much easier through automation, it has also increased the potency of particular cybersecurity threats. For an excellent example, one only has to turn to the increasing prevalence of botnets that are powered by IoT technology.

An Overview of the IoT, and Why It’s Great For Botnets
If you wear a fitness tracker that automatically syncs to your phone, or have an Internet-connected security camera watching your house, you are utilizing the Internet of Things. Usually labelled as ‘connected’ or ‘smart,’ these devices collect data and process that data via a connection to the Internet.

While these devices have proven to be very useful, there is a major problem with them that seems to be present throughout the IoT: a noticeable lack of security measures. Combining this lack of security precautions with their need to connect to the Internet creates the ideal conditions for a botnet to gather.

A botnet pools the resources of a large network of infected devices to overcome the target’s security through a brute force attack. The attack on Dyn that made dozens of the web’s most popular sites go dark was a botnet, proving that this method of attack is no joke.

A New-ish Face on the Scene
While there is no shortage of botnets already, a new derivative of the infamous Mirai is using the same IP cameras to infect thousands of devices in China. This particular botnet has been named Persirai, and is just one of many that warrant concern.

For example, there is another botnet that Kaspersky Lab has concluded to have infected about 300,000 IoT devices. While this botnet, codenamed Hajime, is still dormant, it could potentially rival Mirai if it were to meet the expectations of security experts and become active.

Keeping Your Business Safe
Luckily, there are a few ways you can help to reduce the impact that a botnet can have on your business. A good rule of thumb is to follow business continuity best practices. As an example, your business data shouldn’t only be kept in one place. An offsite backup solution will allow you data to be preserved if you ever are assaulted by a botnet. It always helps to have a firewall solution in place as well, as they can mitigate some botnet attacks.

If you need help protecting your business against the vulnerabilities that the IoT creates, give us a call at NuTech Services. Call us at 810.230.9455 to get started.

quietier_pc_400.jpg

Tip of the Week: Options for Quieting a Noisy Computer

quietier_pc_400.jpg

How much noise does your work desktop make? Chances are that the majority of it comes from the fans. These fans are designed to cool down the systems while also maintaining an acceptable noise level. However, the longer your technology lasts, you might realize that these fans seem a bit louder than usual due to your machine needing more work from them to keep the innards cool.

It’s also worth noting that your PC might be caked in dust from years of use. With the dust blockading the fans, they’ll have to work a bit harder than before to get enough airflow, which means that they will create more noise. It’s certainly worth checking out if your computer has suddenly grown louder than you’re used to.

Unlike other fans that you might have in the office, computer fans don’t have settings that you can easily adjust. Furthermore, it’s unwise to mess with your PC fan speed in general, since it’s designed to keep your PC components at an optimal temperature. It might be a better move to just replace the noisy fans and upgrade to better, more quiet fans. Since fans are one of the few mechanical parts in most modern computers, they are the components that will show significant wear and tear, even if you take proper care of your computer.

Disclaimer: If you’re looking to replace your computer’s fans or do any work requiring you to open the case and swap out parts, then it’s highly recommended that you either know what you’re doing or have the assistance of an IT professional.

If you’re seriously contemplating changing out your fans, keep the following in mind:

  • A bigger fan will move more air at lower speeds, which makes for a quieter experience. Just make sure that your computer’s tower can accommodate it.
  • Look for fans that change their speeds to the amount of heat created by the PC. This keeps the fan’s noise levels to a minimum, even when it’s not being used as much.,
  • More powerful, high-end desktops require a lot of airflow. By these, we mean PCs dedicated to intensive tasks, such as gaming or video editing. These often have to use multiple fans, so there’s no way around that. However, a technician can probably install some sound-muffling foam to keep the noise to a minimum.

While your PC’s fans could be a major source of noise, there could be other problems associated with a loud computer. If you want to get to the root of the problem, reach out to NuTech Services for professional technology consultation and maintenance. To learn more, call us at 810.230.9455.

innovative_google_lens_400.jpg

You Will Soon Be Able to Search the Web With Your Smartphone Camera, Thanks to Google Lens

innovative_google_lens_400.jpg

While many instances of augmented reality may seem gimmicky, Google is taking strides toward making AR a purposeful utility in our mobile devices. This was made apparent when Google’s CEO, Sundar Pichai, announced Google Lens.

Taking note of the online shift from text-based content to image/video-based content, Google is doing its best to improve the search engine’s ability to reflect that shift. Utilizing machine learning, Google Lens can view images that are either saved in the device’s memory or visible to its camera and complete tasks based on those images.

For example, Google Lens can:

  • Identify a species of flower that the camera is focused on.
  • Log into a WiFi network just by viewing the SSID sticker on the router.
  • Translate text that the camera is pointed towards into a different language.
  • Provide information and reviews on local restaurants, stores, and other establishments that the phone is pointed at.

When it’s launched, Google Lens will have the ability to interact with both the Google Assistant and Google Photos. Google Assistant will allow you to add an event to your calendar just by pointing your camera at an information board. Google Photos will allow the user to check details like opening and closing hours of a business. If you happen to have a screenshot of someone’s business card, you can call them directly from the image.

More Google apps will follow these two, providing users even more functionality.

So, what do you think? Do you see these features making your day-to-day business tasks and responsibilities easier? Which Google app do you most look forward to Google Lens augmenting? Let us know in the comments!

your_it_audit_400.jpg

Advice for Passing Your Next IT Audit With Flying Colors

your_it_audit_400.jpg

Most people think of audits and immediately cringe, but the fact of the matter is that businesses wanting to maximize output can really benefit from an audit. Audits can be great ways to ensure that a business’ priorities are being given their due attention, and that best practices are being utilized. An audit of your IT infrastructure and network can go a long way toward helping you determine if there are changes you need to make in order to maximize the profitability of your organization.

Here are three of the most common problems that our technicians find when conducting our comprehensive IT audits.

Outdated Software
It doesn’t matter if it’s the operating system on your workstations or the software on the servers, if you fail to apply critical updates and security patches to your operating systems, then your network will be vulnerable. This is a big red flag during any IT audit. Since outdated versions of software can become problematic for your integrated security protocols, by not properly updating your mission-critical software, you could be putting your business at significant risk.

An Absent Business Continuity Plan
As a part of a risk management strategy, any organization that doesn’t have a business continuity plan is ignoring the truth. The facts suggest that a disaster could happen at any moment, whether a company is ready or not. If you fail to prepare for a disaster, you’re staring failure in the face.

Poor or Lackluster Implementation
When it comes to regulatory compliance, NuTech Services will audit your internal processes, and analyze how they could be more efficient or secure. If you have outdated IT policies, they can end up costing you a lot more than a passing grade on an IT audit. If you haven’t properly tested your infrastructure, or if you’ve failed to deploy modern security best practices like multi-factor authentication, then your organization will perform poorly on an IT audit. Furthermore, if an auditor sees that your organization’s IT department splits responsibilities on a per-task basis, you’ll be more likely to score lower than if all IT resources understood how to perform every task necessary to their position.

These are only a few ways that your company could fail to perform as intended during an IT audit. If you want to ensure that your organization can pass your next audit, then you’ll want to ensure that your IT understands the importance of adhering to security best practices and industry standards.

Lastly, it is incredibly important that you remember that auditors aren’t the ones who are trying to sink your business. If anything, they are attempting to help you improve the way your organization operates. They are simply doing what your IT department should be doing in the first place by checking to see if you have unpatched or vulnerable systems, or aren’t adhering to best practices.

NuTech Services can help your business ensure its security by performing an IT audit. We can comb through your network for any potential issues and suggest ways to resolve them. To learn more, reach out to us at 810.230.9455.

ssd_better_than_hdd_400.jpg

Tip of the Week: Got a Solid State Drive? Here’s How to Take Care of It

ssd_better_than_hdd_400.jpg

You may have purchased a solid state drive because of its many benefits over the hard disk drive. Although, if you want to get the most bang for your buck with a SSD, you’ll want to follow these best practices.

Install the Latest Operating System
Operating systems are updated periodically, but they are implemented with the idea in mind that more devices will be using a solid state drive compared to the normal hard disk drive. By upgrading to the latest operating system, you’re guaranteeing that your OS will be able to support your SSD.

Avoid Manipulating Data or Activating Wasteful Settings
An SSD can only rewrite data so many times before it’s unable to do so. While this limit isn’t low, the standard SSD can handle 40 GB of data writing every day for up to 10 years. Therefore, it’s a bad move to use your SSD to copy files or download data, as this puts unnecessary strain on the device. This means that you want to avoid the following features that your technology might be equipped with:

 

  • Benchmarking: While SSDs are fast to write data, it’s important to avoid running speed tests to see exactly how fast yours is. This will only shorten the lifespan of your drive, as it will use up valuable cycles that would be better used elsewhere.
  • Hibernation: Your computer can save system memory to the hard drive before it’s powered off. While this can help, you get back in business and resume operations quickly in the near future, it takes up more cycles on your SSD than you might prefer. Contrary to popular belief, putting your device to sleep and hibernation are two very different things, as letting your device sleep is much safer and more efficient for SSDs than for HDDs.
  • Defragging: When you defrag your device, it actively looks at the data to organize it on the mechanical level. While defragging improves the performance of HDDs, the benefits provided to SSDs aren’t noticeable, but the wear and tear might be if you proceed to perform them unnecessarily.

Be Mindful of Your Saves
The nature of SSDs make them more suitable for data storage of particular varieties. For example, it’s not recommended that SSDs be used to save large files, or the temporary files created by background processes. In these cases, it’s better to rely on a hard disk drive for saving this kind of data.

On the plus side, SSDs have a much longer lifespan than your typical HDD thanks to the many differences in their composition, including the use of flash storage and the lack of fast-moving internal parts. By keeping these best practices in mind, you can take a great technology and make it last even longer, allowing your business to experience fewer replacement costs overall.

Does your business rely on SSD or HDD? If you’d like a chance to improve the way your organization functions, reach out to us at 810.230.9455.

windows_bugs_400.jpg

“The Worst” Windows Bug is Now Taken Care of, Thanks to Google

windows_bugs_400.jpg

When a security researcher tweeted about what they thought was “the worst Windows remote code exec” in his memory, a recent incident came to mind: one that allowed a targeted file to implement remote code execution processes in order to manipulate any infected system. This vulnerability let the infected machine spread the issue to others and could be set off if a certain file were to be scanned by the Microsoft Malware Protection Engine. Scary stuff!

Regarding the incident, Microsoft was quick to resolve the issue. Thankfully.

The researchers who uncovered this vulnerability were Tavis Ormandy and Natalie Silvanovich from the Google Project Zero team. Once the pair had discovered the vulnerability, they took to Twitter to announce it to the world, including to Microsoft and the Microsoft Security Response Center.

Upon the notification, the MSRC confirmed that the vulnerability was indeed present, and that there were quite a few pieces of software within the Microsoft Malware Protection Engine that allowed a “specially crafted file” to run code placed on the system. This vulnerability was so widespread that it could be found on just about any recent Windows machine, including those running Windows 7, 8.1, 10, and even Windows RT.

Though this particular problem has been resolved, its urgency serves to remind all business owners that their software solutions need to be up-to-date at all times. While problems are often resolved by programmers, hackers always try to outdo them, creating a vicious, neverending cycle. Unless you want your business to be caught in the crossfire, you should patch your software whenever new updates are released. If you try to function without them, you’ll be leaving your organization wide open to attacks–attacks that can easily be preventable with proactive maintenance.

Does your organization need this type of proactive maintenance and management? If you think that it’s a hassle to keep an eye out for updates, you’re right. You shouldn’t have to worry about this, especially not while keeping your operations afloat. NuTech Services can provide the IT you need by taking care of these updates for you so you can stay focused on running your business. To learn more, reach out to us at 810.230.9455.

private_cloud_is_best_400.jpg

Can Your Cloud Provider Provide a Personal Touch?

private_cloud_is_best_400.jpg

Cloud technology has become an integral part of doing business today. This has led to a need for, and subsequent availability of, cloud services from a variety of sources to be able to meet the needs of a business. These services aren’t all created equally, however, and as a result, the source of cloud services is a critical consideration to take into account when choosing a provider.

The vast majority of these public cloud services come from one of two sources. First, there are cloud solutions that are provided by the well-known, multinational technology companies. These cloud services include the likes of Google Drive, Microsoft OneDrive, and Dropbox, to name a few. Alternatively, there is also the prospect of utilizing hosted solutions that are delivered through a managed service provider.

Consider the service that one could expect to receive from a big box solution provider. While the products are excellent, it is extremely unlikely that–should you ever require support–these providers will offer the in-depth insight and dedicated attention to resolve your issue efficiently and effectively. After all, chances are slim that these providers would feel much impact from losing one client thanks to their size and scope. Therefore, major providers will almost certainly be considerably less involved in providing the attention that your business would benefit from. What’s more, since these providers have to serve the lowest common denominator, there is the chance that the cloud solutions they have available simply aren’t suited to meet your business’ specific needs.

This is not the case when it comes to what a managed service provider can deliver.

When an MSP offers a cloud solution, that offer is made with the promise of personalized service and attentiveness to the needs of their clients. With the more personal business relationship that is formed between you and the MSP, their services are more focused upon providing you with a solution that fits your needs, instead of the one-size-fits-most approach that larger firms and corporations take. The MSP will always be there if you ever need assistance in managing your cloud solution, and is willing to help you optimize your service level so that you will receive the attention and resources that you need… without breaking the bank on a service package filled with things you don’t.

If you’d rather your cloud computing experience be one that is personally handled by a resource that’s invested in your business and its success, reach out to NuTech Services. Give us a call at 810.230.9455.

dispose_of_computers_400.jpg

Tip of the Week: Cover Your Assets By Properly Disposing of Your Old Computers

dispose_of_computers_400.jpg

It can be difficult to think about replacing expensive hardware like desktops and servers without breaking your budget, much less having to deal with your old data. Thankfully, there are certain steps that you can take to make the transition to a new PC or server much easier, and it all starts with properly getting rid of your old technology.

Before we get started, though, we want to emphasize the importance of taking preventative measures. These keep you from getting into a situation where you don’t have the technology you need. In other words, if your desktop is outdated, then you shouldn’t wait until it completely breaks down before you replace it. This makes it imperative that you identify warning signs for your ailing technology before it suddenly stops working.

Warning Signs
To get started thinking about what to do when your computer breaks down, look for the following warning signs.

  • General PC slowdown
  • Freezing or even operating system crashes
  • Corrupted files or data loss
  • Random shutdowns
  • Startup errors

Keep in mind that these symptoms could be signs of other PC issues as well.

Understand When You Need to Replace Technology
Nothing your business utilizes can last forever, including technology like workstations and servers. If you suspect that your PC is reaching its limit, it’s crucial that you implement a strategy to properly replace it and dispose of the old one. If there’s no such policy to adhere to, you could be putting your business at risk of a data breach, and putting yourself at odds when the investigators look into whether it was your fault for failing to follow best practices. Gartner explains, “Best-practice PC disposal processes provide an audit trail documenting the serial-numbered inventory of disposed PCs, certification that proprietary and personal data has been removed and made unrecoverable, and transfer/reuse of software licenses, where applicable.”

Does your business have old technology that’s holding you back from moving forward? If so, contact NuTech Services right away. Our technicians can help your business completely wipe the data off of your old technology’s hard drives, or transfer it to your new, more recent hardware. Plus, we can recycle your business’s old devices so they won’t cause harm to the environment.

Our goal is to help your business make a smooth transition to new hardware solutions without putting your sensitive data at risk. To learn more about what we can do for your organization, reach out to us at 810.230.9455.