The Michigan IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

 

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At NuTech Services, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • First Name *
  • Last Name *
  • Company Name
  • Phone *
  • Comments
      • Who Are We?
      • Our Difference
      • It's A Secret!
      • Refer A Friend
      Who Are We?

      It's Nice To Know Who You're Working With, We Get That

      NuTech Services understands that making a decision means putting your trust in us. We encourage you to find out more about our company and read testimonials from our many satisfied customers!

      About NuTech Services
       

      We are not your typical business, We are your business partners

      We live by the idea that your business needs come first, so much so that our CEO Fred Rappuhn has written a letter for you to read showing just how dedicated our team is to not only solving problems but your success!

      Read More
      Our Difference
       
      It's a Secret

      Shhh, don't tell anyone we told you!

      WARNING: We are about to let you in on a secret about how most computer companies really make their money! We will cover the three main types of IT companies and what you can expect out of them.

      Discover What It Is!
       

      Refer A Friend To NuTech Services!

      Do you know someone who you think my benefit from our services? Let us know and we will get in touch with them!

      Read More
      Refer a Friend
       

      What Our Clients Say

      • Fantastic Service, I worry much less now

        NuTech Services has been instrumental to our company's expansion. Because of NuTech Services, we've been able to go paperless and establish a remote office.

      Latest Blogs

      Use the SMART Model to Set Actionable Goals

      Created in 1980 by George Doran, SMART goals is a framework used for fleshing out goals that are Specific, Measurable, Attainable, Relevant, and Time-Bound. The idea here is that, by defining goals based on this acronym, you will have a greater understanding of the goals you seek to achieve, as well as how to achieve them.

      One thing we would like to point out before diving into what makes a SMART goal is that goal-setting and habit-forming are two different things. The two are not interchangeable; strong habits are the impetus for achieving goals. Having solid habits is but one step toward achieving a goal, although it should be said that having a strong goal can provide motivation for building a habit.

      Specific

      The devil is in the details, or so they say. If you can answer a series of specific questions about your goal, then you will have a much better shot at achieving it. Here are some questions to consider for making your goal more specific:

      • Who is involved in making this goal a reality?
      • What is it you hope to achieve?
      • When do you want to work towards this goal?
      • Where is your goal taking place?
      • Why are you working toward this goal (this is perhaps the most important question of all)?

      Measurable

      A measurable goal is one that you can quantify somehow. In other words, you are using a unit of some sort to measure progress towards your goal. This might include profits earned, time spent, clients serviced, etc. You can also take this a step further by using milestones. For example, if you have a goal of replacing your office desktop solutions with new hardware, you could stagger progress toward this goal by department or units replaced.

      Attainable

      When asking yourself if a goal is attainable, consider just how far beyond your reach it actually is. Naturally, you don’t want to set a “safe” goal, i.e. one that you can easily achieve. While there is some merit to doing this early in the game, you should be challenging yourself and your business to extend beyond its reach. That said, your goal should not be so outlandish that it is impossible to reach. It should be just beyond your perceived ceiling.

      Relevant

      If a goal is relevant, this means that it is something that bleeds into more than one aspect of your organization. In other words, these goals are focused on what you truly want. This is especially helpful for getting your employees on board with the organization’s goals. If more profits mean more success for them and their careers, then they will be more likely to buy into the goals and strive to do their best to meet them.

      Time-Bound

      All good goals should have a concrete endpoint. Whether it is the end of the week or the end of the month, your goal should have an end date. You will either have completed your goal by this date, or you will have not completed it. You might be surprised by how much having an end date can influence your decision-making process while you are working toward the goal. You might find yourself making smarter choices, as no matter how much progress you are making, that end date creeps ever closer.

      What Are Your SMART Goals?

      Now that you know about SMART goals, what are some of your long-term goals to work towards? We bet some technology solutions and management from NuTech Services can help take some of the guesswork out of it. To learn more about how we can help you achieve your business-related goals, reach out to us at 810-230-9455.

      Learn More

      Setting Up Two-Factor Authentication on Multiple Platforms

      First, let’s examine two-factor authentication and its many benefits.

      What is Two-Factor Authentication?

      Passwords are the first line of defense against security threats, but for seasoned hackers, they are simply child’s play. Two-factor authentication aims to increase security through the use of multiple security measures. Ideally, the solution includes at least two of the three methods to secure an account. If they are not met, the account is inaccessible:

      • Something you know (a password)
      • Something you have (a secondary device you own)
      • Something you are (biometrics, facial recognition, fingerprinting, etc)

      Why Is It Important?

      One way to picture the benefits of two-factor authentication is using the example of a house. Imagine a home with two doors. The first is to the mudroom, and the second is into the house itself. If both doors use the same key, a thief only needs to steal one of the keys to gain access to both the house and the mudroom. If the two keys are different, on the other hand, the amount of effort required for the thief to succeed is effectively doubled.

      Now let’s apply this to the cybersecurity topic. It is much harder for a hacker who only has access to one key (the password) when your security protocols require multiple keys (a mobile device or biometric of some sort). The hacker would have to go through a much lengthier and more difficult process to gain access to a mobile device or biometrics compared to the relatively simple act of stealing or guessing a password.

      Setting Up Two-Factor Authentication

      We will specifically discuss how to set up two-factor authentication for Microsoft, Google, and Apple accounts.

      Microsoft

      Before you get started, Microsoft recommends that you have a backup email address, a phone number, or the Microsoft Authenticator application installed on a mobile device. First, go to this page and sign in with your Microsoft account. Next, click on More security options. Under the option for Two-step verification, you must select Set up two-factor verification. Follow the on-screen instructions and you should be all set.

      Google

      First, log into your Google account by clicking here. The next step is to select Security. For the option Signing in to Google, select 2-Step Verification. Finally, click on Get started. The directions for the next steps should appear on your screen. You have several options for setting up your verification step, including Google Prompts, security keys, Google Authenticator, verification codes via text or call, or a backup code. You can also disable this second step on trusted devices, but why go through all the trouble of setting it up if you are just going to disable it?

      Apple

      The first step for setting up two-factor authentication for your Apple ID is to access your account here. After you sign in and answer your security questions, click on Continue. If you see a prompt to upgrade your account security, tap Continue. Select Upgrade Account Security. You can then add a phone number for receiving verification codes through text message or phone call. Click Continue, enter your verification code, and turn on two-factor authentication.

      If you are looking to get started with two-factor authentication, don’t let these three accounts be the limit. NuTech Services can help you set up 2FA for your business. To learn more, reach out to us at 810-230-9455.

      Learn More

      Mobile Management Best Practices

      Here are four ways you can keep your mobile devices in check while still making the most out of them.

      Remote Wiping

      Let’s say that an employee is out of the office on a business trip. They, unfortunately, lose a device assigned to them. While your first instinct might be to scold the employee for their negligence, that is not going to help you keep the data on those devices secure. Thieves are always trying to make a quick buck, and if that involves stealing a device and harvesting its data, you need to have a contingency plan in place. If you can remotely wipe the device, you can both adhere to data privacy regulations and secure your business at the same time. It’s unfortunate to lose expensive devices, but it’s more unfortunate that data is placed at risk needlessly without this type of solution.

      Whitelisting and Blacklisting Applications

      By default, some smartphone applications will be more secure than others. You should always be encouraging skepticism regarding the installation of new applications on devices, but with the right tools, you can take some of the guesswork out of it through the use of whitelisting and blacklisting apps. This means that you can prevent employees from installing applications with known risks while allowing them to install applications with known merits, ensuring the protection of important data.

      Managing and Tracking Devices

      Next, you will want to have a system in place that allows you to track any devices used by your business. This could include any company-issued devices, but should also include any employee-owned devices that are used for work. You should know which devices are used when the devices are issued, who is using the devices, and other important information. All of this contributes to effectively managing and tracking your devices and, by proxy, your business’ data.

      Implementing a Mobile Device Management Solution

      A comprehensive all-in-one policy that helps you keep track of your company’s mobile devices is the ideal solution. These are typically called a mobile device management solution, or MDM. NuTech Services can equip your business with the best tool on the market that can help your business stay apprised of industry best practices related to mobile devices, as well as remain focused on data security. To learn more, reach out to us at 810-230-9455.

      Learn More

      Know someone who would benefit from NuTech Services? Let us know!

      Latest Blog Entry

      When you started your business, you had a specific goal in mind. You wanted to prove something, to create something worth sharing with the world. We all have goals and aspirations, but it’s not always clear what the best path toward those goals is. Using a simple framework, ...

      Latest News

      NuTech Services launches new website!

      NuTech Services is proud to announce the launch of our new website at www.nutechology.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account Login