The Michigan IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At NuTech Services, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

  • Who Are We?
  • Our Difference
  • It's A Secret!
  • Refer A Friend
Who Are We?

It's Nice To Know Who You're Working With, We Get That

NuTech Services understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

About NuTech Services
 

We are not your typical business, We are your business partners

We live by the idea that your business needs come first, so much so that our CEO Fred Rappuhn has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

Read More
Our Difference
 
It's a Secret

Shhh, don't tell anyone we told you!

WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

Discover What It Is!
 

Refer A Friend To NuTech Services!

Do you know someone who you think my benefit from our services? Let us know and we will get in touch with them!

Read More
Refer a Friend
 

What Our Clients Say

  • Fantastic Service, I worry much less now
    Oneonta, New York

    NuTech Services has been instrumental to our company's expansion. Because of NuTech Services, we've been able to go paperless and establish a remote office.

Latest Blogs

According to FBI Director, Privacy is a Misnomer

Do you remember the controversy concerning Apple and the FBI? It was a case that swept the country and encroached on unprecedented ground. The FBI demanded that Apple release information on how to unlock an encrypted iPhone that was connected to a terrorist attack, but Apple chose to vehemently refuse the FBI, stating that it would be endangering the entirety of their consumer base by doing so. The FBI threatened Apple with lawsuit after lawsuit, but in the end they were able to unlock the device without Apple’s help.

The popular trend of providing mobile devices with encryption has led to increased complications during investigations, and Comey chose to clarify the Bureau’s stance on the privacy of the typical American citizen. While there has to be a reasonable expectation of privacy in houses, vehicles, and even mobile devices, Comey claims that these expectations can reasonably be revoked in a court of law. He says: “With good reason, the people of the United States--through judges and law enforcement--can invade our public spaces."

This statement prompts yet another question: how does a personal device qualify as a public space? According to Comey, a mobile device actually can be considered a public space: “Even our memories are not absolutely private in the United States,” Comey said. “Even our communications with our spouses, with our lawyers, with our clergy, with our medical professionals are not absolutely private. Because a judge, under certain circumstances, can order all of us to testify about what we saw, remembered, or heard. There are really important constraints on that. But the general principle is one that we’ve always accepted in the United States and has been at the core of our country: There is no such thing as absolute privacy in America. There is no place outside of judicial authority.”

Additionally, Comey made sure to point out that the FBI has no business telling American citizens how to live and govern themselves, and that the tech companies don’t either. You might recall the open letter that many tech companies addressed to the the FBI last April, demanding that the government cease issuing mandates that would require tech companies to provide encryption keys for their software.

It’s natural that these Silicon Valley giants don’t agree with Comey. In fact, there are even those amongst his peers who don’t believe he’s right on the matter. Nuala O’Connor, the President and CEO of the Center for Democracy & Technology, as well as the first Federal chief Privacy Officer for Homeland Security, is one of them. She says, “He could not be more wrong on encryption.”

O’Connor is hardly the only one of his contemporaries who disagree with Comey. Two other notable former government officials had something to say about the FBI’s stance on encryption, and they both spoke at the RSA Cybersecurity Conference. Former Department of Homeland Security Secretary Michael Chertoff claims that forcing Apple to provide software that can hack into an encrypted iPhone would be like “creating a bacterial biological weapon.” Similarly, Mike McConnell, a former Director of National Intelligence, claimed that “ubiquitous encryption is something the nation needs to have.”

This isn’t a problem that only technology companies have to deal with. It’s something that all users of smart technology (and most technology in general) have to endure. After all, any rulings in favor of the FBI’s stance could be detrimental to user privacy. For example, in the case of Apple creating a software that can crack their iPhone’s encryption, what would happen if this software were stolen and exploited by hackers? It would become a major problem, just like the NSA’s surveillance vulnerabilities that were stolen and sold on the Black Market just this past summer.

In light of Comey’s response, what are your thoughts on the FBI’s stance on encryption? Do you think that government agencies have the right to access devices, despite invading the privacy of its citizens? Do you think that this “greater good” argument holds water? Share your thoughts in the comments.

Learn More

3 Lessons We’ve Learned for a Successful Cloud Migration

The first thing you need to know is that a cloud migration is much more involved than moving a file from one location to another. We’re talking about your entire data infrastructure getting migrated to a new location in the cloud. This involves a lot of prep work, not unlike moving all of your belongings from your home to a new house. The better prepared you are for the move, the smoother the transition, and the lower the probability that you’ll misplace important items of value.

ITProPortal provides some insight into what migrating properly to the cloud takes: “It involves a complex infrastructure migration process. Good preparation is the key to success. Those organizing the migration process should ensure that all data is ready for the move and that the company network has the necessary capabilities to interact with the cloud.” This is the biggest reason why you want a qualified professional to assess your IT infrastructure before you start your move to the cloud.

Consider these aspects of cloud migration before making the big move:

Sort and Label Your Files
Over the many years you've been in business, your organization has collected countless files and documents. It’s crucial that you take the time to determine which files are worth saving and moving. Otherwise, you could waste valuable time and resources moving files that you no longer need, which could drag out the migration process.

Prepare Your Network Infrastructure
Cloud migration may come with changes that need to be made to a network infrastructure. In general, when migrating to the cloud, you need to consider two major additions; setting up a direct Internet breakout in order to distribute traffic across external networks, and multiple firewall instances in order to secure the various Internet connections.

Have a Migration Timetable
Even the most thorough planning for a cloud migration can yield results that take weeks or months to fully realize. Therefore, you need to provide your staff with an accurate timetable for the transition to ensure that their workflow isn’t disrupted. One way to do this is to plan for how user settings are migrated, like profiles, address books, calendars, and so on. To help with this, ITProPortal advises: “Instead of moving all their data to the cloud, more and more companies are opting for a hybrid solution. This means that some users and storage locations stay with Exchange on-premises, while the rest move to the cloud.”

Once all of your data is successfully migrated to the cloud, you’ll want to focus on security, archiving, and data backup to ensure that you’re ready for anything. NuTech Services is happy to help your business with

Learn More

Tip of the Week: Why You Should Be Wary of Using Public Wi-Fi

The biggest problem, however, is that most people who use public Wi-Fi are fully aware of the risks, yet, still continue to use it. The Identity Theft Resource Center claims that 78.5 percent of users who connect to free Wi-Fi understand that there are major risks involved, and only 26.7 percent use a VPN to keep themselves safe. Free Wi-Fi is dangerous, and we’ll show you how using a series of examples.

Anyone Can Access It
Unless the Wi-Fi router is protected with a passcode, chances are that the network is vulnerable to hacking attacks and other threats. Even then, if the router isn’t configured properly, the passcode doesn’t necessarily help. Since anyone can access it at their leisure, nothing is stopping a hacker from connecting to the router and spying on others who might be connected to the network.

It’s worth mentioning, although we use the term ‘hacker,’ even a mischievous child with a bit of curiosity and know-how could get access to your files if the connection isn’t secure.

Free Wi-Fi is Highly Used
This goes without saying, but the more people who use an Internet connection, the lower the quality of the connection, and the more likely it is that a hacker will be on it. Hackers know that free Wi-Fi draws crowds, so they use the search for the convenience to find new targets for their treachery.

Data Isn’t Encrypted
You can think of encryption as an extra layer of protection for any data that’s sent to and received from the Wi-Fi connection. When routers have encryption, hackers have a more difficult time stealing data of substance.

What You Can Do
While unsecured public Wi-Fi routers aren’t something that you have direct control over, you can certainly take steps to be mindful of using them when you’re out and about. Here are three best practices for avoiding a potentially risky Wi-Fi network in a public place.

  • Only connect to networks that require security codes.
  • Set your phones and devices so that they don’t automatically connect to any new Wi-Fi network.
  • Use a virtual private network (VPN).

If your business needs its employees to stay safe while on the move, reach out to us at 810-230-9455. We’ll help your team understand the best way to work around potentially threatening situations.

Learn More

Know someone who would benefit from NuTech Services? Let us know!

Latest Blog Entry

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has ...

Latest News

NuTech Services launches new website!

NuTech Services is proud to announce the launch of our new website at www.nutechology.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account Login

Remember me