Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Are You Dealing with Toxic Productivity?

Are You Dealing with Toxic Productivity?

There is one question that workers don’t hear enough, and if they do hear it, it is usually said in passing as a rhetorical question. That question is:

“How are you doing?”

0 Comments
Continue reading

How Will the Regulations Surrounding the Cloud Continue Shifting?

How Will the Regulations Surrounding the Cloud Continue Shifting?

Cloud computing is a major growth industry as businesses and individuals look to use the computing strategy to either save money or get resources that they would typically not be able to commit to. With cloud computing becoming more and more integrated into business each year, it stands to reason that the once Wild West of cloud computing would start to see a lot more regulation. This week, we’ll take a look at how the cloud is regulated and what to expect out of cloud regulation down the road. 

0 Comments
Continue reading

How to Squeeze Every Drop of Value from Your Business Technology

How to Squeeze Every Drop of Value from Your Business Technology

Keeping a business running is no easy feat, with dozens of moving parts and considerations to maintain at any given time. Arguably, this has never been more true than it is now, when you combine current inflation and labor shortages with the technological options businesses now have. In short, it can be exceptionally confusing…and challenging in terms of budgeting it out.

0 Comments
Continue reading

What Software Does Your Business Need?

What Software Does Your Business Need?

Every business depends on some type of software, but some businesses seem to have an application for every single thing and it can be too much for employees or administrators to manage. So the question has to be asked: What is the right amount of software for your business? Today, we’ll discuss the types of software every business needs and how to determine what you need. 

0 Comments
Continue reading

Proactive Management Strategies Can Reduce IT Costs

Proactive Management Strategies Can Reduce IT Costs

Staying proactive with your IT maintenance can save your business a lot of money, but a lot of people don’t know exactly how they can go about doing this. In this month’s newsletter we are going to discuss how proactive maintenance works and how it is a crucial part to any evolved managed IT strategy. 

0 Comments
Continue reading

Bureaucracy In Your Business Can Ruin Efficiency

Bureaucracy In Your Business Can Ruin Efficiency

For business managers, it can sometimes be difficult to create policies and procedures that allow for the efficiency that they’d like to see from their business. Business growth leads to more complex situations which in turn demand more complex procedures. This enhanced complexity can not only get constant in that you need to alter the way things are done, you also could fall into the trap of mistakenly putting productivity roadblocks up that can alter the way your business operates.

0 Comments
Continue reading

What is Coming After the Smartphone?

What is Coming After the Smartphone?

If you were to ask anyone under the age of 30 what the most important invention of their lifetime is, you may be surprised how many of them would say “the smartphone”. These devices have revolutionized the way that people communicate, work, and play, but like any other technology, the form factor may not be here forever. So what’s next after the smartphone? We unpack what technologies may replace the smartphone as the next big jump in personal computing. 

0 Comments
Continue reading

Is Your Team Becoming Desensitized to Your Business’ Cybersecurity Precautions?

Is Your Team Becoming Desensitized to Your Business’ Cybersecurity Precautions?

Password changes, multi-factor authentication, and countless changes in policy and procedure can make daily workflows more and more complicated. Cybersecurity can truly be a pain—a necessary pain, granted—but a pain nevertheless, and one that can gradually lead to burnout if you aren’t careful. Let’s go over how to mitigate the likelihood of it.

0 Comments
Continue reading

What Your Organization Needs to Know About the FTC Safeguard Rule

What Your Organization Needs to Know About the FTC Safeguard Rule

The Federal Trade Commission, or FTC, has put together a Safeguard Rule to help establish guidelines for how businesses store and interact with customer information. Enacted in 2003, this rule was recently revamped in 2021 to stay relevant with the latest technology used by businesses. Let’s look at some of the policies and procedures that your business needs to know about the FTC Safeguard Rule.

0 Comments
Continue reading

Don’t Be So Quick to Scan Every QR Code You See

Don’t Be So Quick to Scan Every QR Code You See

There is no denying that Quick Response codes—better known as QR codes—are a handy little invention. Just a few years ago, many businesses heavily adopted these contactless communication tools, allowing customers with a smartphone to access menus, documents, and more with ease. Having said that, we unfortunately can’t deny that cybercriminals are taking advantage of how handy QR codes are, too.

0 Comments
Continue reading

Is Remote Work Really That Much Greener, In the Long Run?

Is Remote Work Really That Much Greener, In the Long Run?

One of the biggest arguments for remote work is that it poses environmental benefits, but how much truth is there to this statement? Today, we want to dive into the details and see if there is actually a solid benefit to working remotely—for the environment, at least. The answer might surprise you.

0 Comments
Continue reading

Are You Being Phished? 4 Things to Look Out For

Are You Being Phished? 4 Things to Look Out For

Your business’ computing infrastructure is a pretty resilient system. It has all types of tools added on to keep malicious code, bad actors, and even sabotage from ruining the good thing you have. This reliability has led to hackers changing the way that they go about their business. Nowadays, most of the attacks that affect businesses are phishing attacks. In today’s blog we will go through the elements of a phishing attack and how you can protect your business from them.

0 Comments
Continue reading

How Schofield’s Laws of Computing Can Benefit Your Business’ Security

How Schofield’s Laws of Computing Can Benefit Your Business’ Security

There are quite a few platitudes that we support, in terms of business IT. Some that we haven’t really touched on, however, are Schofield's Laws of Computing. Let’s fix that today by reviewing where they came from, and what these laws entail.

0 Comments
Continue reading

Supply Chain Management and the Growing Need for Logistics

Supply Chain Management and the Growing Need for Logistics

Small manufacturers and distributors operate under a whole separate set of conditions than their larger competitors. This is because they don’t have the available capital to have any noticeable inefficiencies, and if they do have some, they are going to definitely affect their ability to compete. One solution that these organizations can lean on is a logistics platform. 

0 Comments
Continue reading

Tip of the Week: How to Create an Email Group in Gmail

Tip of the Week: How to Create an Email Group in Gmail

Email groups are remarkably useful. Instead of sending a copy of an email to each individual recipient, you can effectively create a simple forum post that everyone can participate in—a feature that certainly helps when collaboration is a priority. Let’s go over how you can quickly and easily create a group in Gmail.

0 Comments
Continue reading

Tomorrow is World Password Day (But Passwords Are Just Half the Battle)

Tomorrow is World Password Day (But Passwords Are Just Half the Battle)

Did you know that tomorrow is World Password Day, 2023? As the result of a campaign to spread awareness of the importance of sufficiently secure passwords, it has become an annual reminder of how critical sufficient passwords are to proper cybersecurity…despite passwords not being sufficient protection on their own. In light of tomorrow’s observance, let’s take some time to review why passwords are important to get right, and what else you need to have in place.

0 Comments
Continue reading

How to Secure Your IoT Devices at Home

How to Secure Your IoT Devices at Home

The Internet of Things is everywhere and that means that it’s important to understand how much of a potential security risk these devices can be. From smart speakers to smartphones, it's important that you understand how these devices can create problematic situations. In this week’s blog we will discuss how you can protect yourself against IoT vulnerabilities at home.

0 Comments
Continue reading

Spring Cleaning Your Business’ Technology

Spring Cleaning Your Business’ Technology

Technology is a big part of doing business for a lot of organizations. One issue that comes into play is that managing that technology can get a little much for a small organization or one that doesn’t actively have some type of plan of how to organize their IT in a way that can keep that technology from being a risk or a problem. This month, we’ll take a look at a couple things that can be done to clean up your IT and make it be more of a benefit to your organization.

0 Comments
Continue reading

You Aren’t Wrong When You Say IT is Complicated

You Aren’t Wrong When You Say IT is Complicated

I was meeting with an old colleague the other day. We met over Microsoft Teams to just check in and see how they were doing—no real itinerary, just to check in with a familiar face that I haven’t personally talked to in a few years. They had a little trouble getting into Microsoft Teams, since they were used to Zoom. I patiently smiled and helped them through it, and told them “No worries, it’s always the little differences that complicate things!”

At the time, I said this just to be empathetic. At first, the nerdy computer-geek part of my brain told me that the process to get into a Zoom meeting vs a Teams meeting, from their perspective, is exactly the same. But after the call, I really thought about this small interaction, and you know what? Things have gotten complicated.

0 Comments
Continue reading

Cybersecurity is a Constantly Evolving Industry

Cybersecurity is a Constantly Evolving Industry

Security is extremely important for every single organization that uses IT. Like any other part of a business where practices and demands change frequently, there is bound to be significant innovation involved with the strategies built to protect users and the business as a whole. Let’s look at why it is important to continuously innovate your organization’s cybersecurity policies and procedures.

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image