Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

You Even Need To Worry About Phishing In Your Text Messages

What is Smishing?

When cybercriminals use phishing scams, they aren’t using advanced technologies to crack their target’s digital defenses. Instead, they hack users by exploiting the assumptions, bad habits, and ignorance of the target to get them to release sensitive information.

Attackers circumvent cybersecurity measures by sending messages purporting to be from an authority figure or trusted contact, thereby convincing the user to undermine their protection. A notorious example of phishing is the email from the persecuted royal family, known as the "Nigerian Prince scam."

0 Comments
Continue reading

The End is Nigh for Adobe Flash Player

Adobe Flash Player was deprecated back in 2017, but its official end of life date lands at the end of this year. What this means is that the software will gradually show more and more vulnerabilities that will not be mitigated, and therefore, the software will be far more susceptible to attack. Therefore, it is important that you check to make sure that anyplace that Flash Player would be—including your Internet browsers on your computers and mobile devices—to make sure that Flash isn’t still installed there.

0 Comments
Continue reading

Automation Has Workers Looking Over Their Shoulders

Why Are More Things Being Automated?

Much of the western economy is theoretically based on the idea of competition. To succeed, businesses have to do whatever it is that they do better than their competitors. Automation provides a business with the ability to streamline operations and reduce their costs, mostly by cutting payroll. They do this by automating repetitive jobs and replacing the people who are doing these jobs with machines. 

0 Comments
Continue reading

A Few Budget Options for Your 2020 Smartphone Search

Past Flagship Phones

We should start by mentioning that some of the best options are actually purchasing flagship phones from the past couple of years. Most flagship smartphones from 2018 have the same specs as many of the mid-range phones today so they can be had at a budget price point. These devices tend to not only have comparable specs, they typically have superior build quality, run on better processors, and offer a user experience in line or better than the experience they would get on some budget smartphones. 

0 Comments
Continue reading

Go Beyond a Firewall to Secure Your Business

In reality, it takes several different tools to make a network as secure as it needs to be.

Why a Firewall Isn’t Enough

A firewall serves only one purpose, and that’s to monitor traffic that goes in and out of your network for any security issues. However, it’s important to remember that there are threats that can bypass firewalls, and that there are other components of network security besides monitoring traffic.

0 Comments
Continue reading

How Software as a Service Fits Into Your Business’ Technology Plans

It’s the cloud.


Specifically, software-as-a-service (SaaS).

What is SaaS?

In order to understand SaaS, you definitely need to have a cursory understanding of the concept of cloud computing. Basically—for you that don’t know—cloud computing is the use of servers hosted in data centers to provide your business (or individuals) the computing they need through the Internet. It’s as simple as that. Companies create data centers where any business can get the processing, the data storage, the services, and the software utilities they need. Software-as-a-service represents the last part of that. Basically, if you need a piece of software, you can now get it in the cloud.

0 Comments
Continue reading

Benefits of a Comprehensive Backup Strategy

Using BDR

If you want data redundancy for your business in the information age, you need to get a BDR. Not only is your data backed up locally, it is also pushed to the cloud. Having data on site is great if you need to quickly restore something, or if your server crashes and you need a substitute server, while cloud backup is great for protecting the data in case of a major disaster that knocks out your onsite hardware. 

0 Comments
Continue reading

How SMBs Use Social Media

Very Small Businesses and Self-Funded Startups

For the very small business—that is the mom-and-pop shop and the sole proprietorship—social media can be the major marketing outlet for your business. In fact, many bootstrapped startups and extremely small businesses will use Facebook as their exclusive hub for marketing outreach. Since these businesses often don’t have the capital to commit to large content-driven marketing initiatives, social media gives them a way to get their brand out there at a modest cost.

0 Comments
Continue reading

Flip and Fold: Innovative New Smartphones

Samsung Galaxy Z Fold2

Samsung’s major contribution into the folding smartphone market is the extraordinarily expensive Galaxy Z Fold2. While the device is impressive with its two full displays and three camera sets, there are some questions about who this device is for. 

0 Comments
Continue reading

You Need to Keep a Close Eye on Your IT Investment Strategy

How to Approach Your IT Spending

When determining an IT budget, perspective is an important part of the process. It can be tempting to view your IT as just another cost of doing business, but it really is more than that. Your technology (and the state it is in) has a major effect on how your business runs. If it is lacking, other things will as well. In some cases, employee morale will suffer, your productivity will slow, and your incoming cash flow will falter.

0 Comments
Continue reading

Tip of the Week: Keep Google Keep Working For You

Labels

Instead of categorizing your notes into folders and notebooks, Keep is organized by labels. You can create labels to find everything you have stored on a particular topic. Fortunately, it's also easy to use, so in this tip I'll show you how to use Google Keep to track all the important information you need to process and store.

0 Comments
Continue reading

Don’t Forget to Add These Handy Home-Office Gadgets to Your Shopping List!

Power

To start, let’s go to perhaps the most basic need of any technology user: the energy required to keep their devices on in the first place. Let’s not split hairs—the average home office setup might not have sufficient outlets available for all the devices that need to be powered.

If this applies to you, you may appreciate someone giving you a nice surge protector to help expand the number of available outlets you have while simultaneously protecting the devices you plug in.

0 Comments
Continue reading

Smartphone Flagships to Consider Going into 2021

Flagship Phones

The flagship smartphone gets its name from a military nautical tradition where the ship that holds the commanding officer would be the best, strongest, and most capable ship in the fleet. When discussing smartphones, it typically describes the best available device that any manufacturer has released for the year. Let’s take a look at some of 2020’s flagship smartphones:

0 Comments
Continue reading

Why is VoIP Seen as Such a Great Business Solution?

What is VoIP, Anyways?

Voice over Internet Protocol is simply a different, more cost-effective means of transmitting voice data from one telephonic device to another. Rather than using a telephone provider’s infrastructure, a VoIP signal utilizes the Internet. This eliminates an entire line item from your expenses by rendering your telephone provider’s services redundant. This enables you to simultaneously save money while enjoying many often-included features that would otherwise have cost extra—assuming that they were even available with traditional telephony.

0 Comments
Continue reading

The User Experience Using Windows Apps on Chrome OS

A Few Brief Disclaimers

Before we get into how this is possible, we should mention a few of the prerequisites of this process.

As of right now, the Windows/ChromeOS compatibility is clearly intended for enterprise use, as it is configured for company-wide setups and rings up an annual per-user cost of $70. Furthermore, the method we are covering here is only compatible on higher-end Chromebooks, with at least an i5 or i7 Intel Core processor, 16GB of RAM, and 128GB of onboard storage.

0 Comments
Continue reading

Examining Some Unusual Cybercrime Patterns in 2020

To begin, let’s examine the data that we currently have available, courtesy of Statista: in 2019, there were a total of 1,473 data breaches recorded. The first half of 2020 saw 540 breaches reported. Crunching the numbers, these 33 percent fewer breaches have impacted what other sources assert to be 66 percent fewer people.

0 Comments
Continue reading

How Listening to Your Team Can Improve Your Use of Technology

“What does—and doesn’t—work?”

To motivate your team to take ownership over their responsibilities and invest in your successful operations, you need to communicate that what they say has credence. Your team can be a goldmine of insights if you hear what they have to say. Think about it, they’re the ones that have hands-on experience using the tools that you’ve put in place.

0 Comments
Continue reading

IoT Can Really Make a Difference for Your Business

The IoT

The Internet of Things has been growing incredibly fast over the past five years, but many small business owners don’t know where it fits. That’s because there are tens of millions of devices that could actually serve some purpose for their businesses and basically have buyer’s paralysis or are skeptical that integrating these tools is going to save them money. Here are some ways that the IoT could be used to do just that.

0 Comments
Continue reading

Clearing the Ethical Hurdles of Employee Monitoring

Monitoring Employees Without Their Knowledge

We figured it would be most appropriate to discuss the no-go option first, which would be to start monitoring your employees without their knowledge or consent. As you would imagine, this is the shadier side of the monitoring spectrum, and is actually illegal in most cases. Unless you have reason to believe an employee is actively acting out and are investigating them, you are not allowed to use monitoring software to keep an eye on your team without telling them.

0 Comments
Continue reading

How to Establish Fast, Secure Wi-Fi for Guests to Your Healthcare Organization

Your Main Hospital Wireless Network Needs to be Locked Down

First of all, your main office Wi-Fi cannot be used for guest access. The same network that your computers, tablets, laptops, and other equipment run on needs to be completely segregated from the rest of the traffic and secure. This might be pretty obvious for most healthcare professionals, especially those who have an understanding of HIPAA compliance, but it’s worth mentioning because it poses such a huge security risk (and breaks compliance).

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image