Information Technology
Technical know-how in an ever changing world!
Newsletter
IT Newsletter: July, 2021
NUTRAMAX APPLICATION UPDATE: OFFICE 2019
The Nutramax IT Team is currently in the process of rolling out Office 2019, the most recent version, to the entire Enterprise....
Password Complexity
Passwords have become part of our daily lives. We use them to secure access to our email, shopping sites, bank accounts, and nearly every form of electronic information...
New Backup Solution:
Veeam Backup & Replication
As you may know, the Nutramax IT Team has been migrating our server infrastructure into a brand-new VMWare virtual environment...
Nutramax Security Indicatives:
Sophos Device Encryption
WHY ENCRYPT MY LAPTOP?
With all of the security measures that we have in place, you might ask why laptop encryption is essential...
2021 IT Projects – Endpoint MFA
WHAT IS ENDPOINT MFA?
Endpoint Multi-Factor Authentication (MFA) is a security process that requires users to respond to requests to verify their identities before they can access the Nutramax network...
Newsletter
IT Newsletter: July, 2020
Trustifi Newsletter
Secure email tool for sensitive data handlers
This month Nutramax will begin utilizing a new service called Trustifi to better secure our email. Trustifi has a vast feature set to help companies like Nutramax better secure sensitive data as it travels through email environments...
Data Loss Prevention (DLP)
What is it and what does it mean to me?
We live in a world where data is often accessible wherever, whenever, and however we desire it. Unfortunately, there are those in the world that would love to have access to your social security...
Information Technology Dept moving to Virtualization
The basic idea behind virtualization is to use software to simulate the existence of hardware.
This powerful idea will allow us to run multiple computer systems on a single physical computer system. Each of the simulated computers is called a virtual machine...
Newsletter
IT Newsletter: March, 2020
Password Guidelines
How to create a secure and strong password
We use passwords every day. They are used to secure all types of data, from our personal financial information to our shopping and email accounts to the data we work with at the office. When we use weak passwords, like 123456 or ‘password,’ the two most commonly used passwords, or any word...
Phishing; you need to be aware
A fraudulent attempt to get sensitive and or personal information by acting like a trustworthy source
Phishing is one of the most popular ways in which to compromise a person or an organizations data and can lead to additional harm to both. Organizations have been victimized by a wide range of threats and exploits, most notably phishing attacks...
Multi-Factor Authentication and why it’s so Important
A process of verification in which access to a computer system is allowed only after presenting two or more pieces of evidence
Multi-Factor Authentication (MFA) is a security system that verifies a user’s identity by requiring multiple credentials. It is a critical component of identity and access management (IAM). Rather than just asking for a username and password, MFA...
FAQ
IT - Frequently Asked Questions
What are our current desktop and laptop standards?
The following is the configuration of our standard desktop or laptop setup:
Standard Desktop
Lenovo ThinkCentre M710q Tiny
8GB RAM
256GB SSD
No DVD ROM
Windows 7 Pro SP1 or Windows 10 Pro
Microsoft Office Standard 2010 SP2
22" LED Monitor
Lenovo ThinkCentre M710q Tiny
8GB RAM
256GB SSD
No DVD ROM
Windows 7 Pro SP1 or Windows 10 Pro
Microsoft Office Standard 2010 SP2
22" LED Monitor
Standard Laptop
Lenovo Thinkpad T480 Ultrabook
8GB RAM
256GB SSD
No DVD ROM
Windows 7 Pro SP1 or Windows 10 Pro
Microsoft Office Standard 2010 SP2
14" 1920x1080 Full HD Display
Lenovo Thinkpad T480 Ultrabook
8GB RAM
256GB SSD
No DVD ROM
Windows 7 Pro SP1 or Windows 10 Pro
Microsoft Office Standard 2010 SP2
14" 1920x1080 Full HD Display
My current PC does not meet the current desktop and laptop standards, does that mean I can get a new PC?
No. Many of the PC’s that are currently in use throughout the company have sufficient resources to perform adequately. PC’s can have an active life span of anywhere from 3-5 years, longer in many cases. The life of your PC depends on many variables including the suite of applications that you use. We are committed to providing state-of-the-art computer equipment that provides efficient and effective performance. The IT department will utilize all current equipment in our inventory. At the discretion of the IT department we will re-issue valid equipment, which meets our past or current standards, for any employee requiring computer equipment. Equipment that is deployed below our current minimum configuration will be evaluated based on the set of applications that the individual will be accessing on a regular basis.
Why do some people have a laptop while others have a desktop?
Laptops are provided solely for individuals that have a justified business need to work while out of the office. The decision to purchase and justify a desktop vs. a laptop is the responsibility of the department manager along with the IT department.
When utilizing a company laptop, what can I access while not in the office? What specifically can I do off-line, and while I am dialed-in from out of the office?
Today, most individuals that connect while out of the office on their company laptop, are connecting solely to get their company email. The procedure is to connect and replicate (or copy) your mail folder from the server located in the office to the mail file on your laptop. Disconnect, then read and reply to your email. Reconnect and replicate (or copy) once again to actually have that mail delivered. Please contact the IT department for specific procedures and training assistance. When you receive a laptop you will be given instructions for mail retrieval.
Are the files and documents on my computer backed up on a regular basis?
Data files that are located on the hard disk of your computer, drive "C", are not backed up. Any files that you keep on a network drive: H (HOME), or S (SHARED) are backed up on a daily basis and can be restored in the event that a file is deleted. Please be sure not to keep critical files on your C drive.
What type of mail filtering do we utilize and how is junk mail controlled or eliminated?
In order to protect you and our corporate electronic environment, we have taken precautions to prevent SPAM and other email threats. SPAM, can also contain computer viruses that once opened, could infect the integrity and accessibility of corporate data. We utilize a third party product, Sophos Spam Filter, to filter all of our incoming email from known electronic email threats.
While in the office, how are we protected from access to inappropriate web-sites?
We utilize a third party product, Sophos Web Filter, to protect us from the threats of harmful and inappropriate Internet content. This software will only allow access to web content that has been deemed appropriate for our business. It is also completely customizable so we can allow, or disallow access to web sites. Please refer to the Human Resource policy on Internet use in the office.
How are company desktop computers and laptop computers protected from current and past viruses?
Each company desktop and laptop computer is installed with a current copy of Sophos Endpoint Security and Control software. This software is active on your PC. It will protect your workstation from current and previous virus threats. It is updated on a regular basis so that the threat of any new viruses can be detected and eliminated. This virus protection spans workstations and our corporate servers. In addition to Sophos Endpoint Security and Control, we also utilize a Firewall to protect our network. The firewall scans incoming and outgoing data for viruses, blocks unnecessary TCP/IP ports, and scans for and blocks well-known Spyware applications usually downloaded from web pages.
What do I do if I want to purchase new software for my computer, or software for my whole department to use?
Any new software purchase requests, whether for an individual or an entire department, must be approved by both the director of that department and IT management. Please submit your purchase request to the helpdesk for review.
Can I get a widescreen flat panel monitor like some of my coworkers have?
We do not have an excess of widescreen flat panel monitors. We only replace them if one is defective, or is damaged. It is an unnecessary cost to the company to replace monitors that are performing adequately. We can not fulfill your personal preference request.
TIPS
Information Technology Travel Tip
If you have a need to travel internationally and expect to access your corporate email, (although due to COVID19 travel is unlikely at present) please contact the IT Helpdesk prior to your trip. We are blocking corporate email access from various countries for security purposes. This can be temporarily unblocked for you while traveling. If you do not alert us before your trip you will be unable to access your Nutramax email account.
Helpdesk number: 4500










