Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

How is Your Business Going to React to a Crisis?

As more and more people are dealing with the virus and its effects on commerce, supply chains are failing and distribution patterns are completely disrupted. This has had a devastating effect on the world economy. It isn’t like a hurricane or a flood, but an outbreak, like most other disasters, hit business’ suddenly and has led many to enact their disaster recovery strategies. Today, we are going to discuss how IT fits into disaster recovery

0 Comments
Continue reading

Tip of the Week: Eight Ways to Optimize Remote Productivity

Set Some Boundaries

Establish a Workspace

One of the first things that you should do when adopting a remote work approach is to give yourself guidelines. It can be immensely helpful to establish a set place to do your work, and equip it appropriately with minimal distractions. As a general rule, it is best if this area is not in the bedroom, or any area in your living space that you typically spend your recreational time. This will help you to keep up your focus throughout the day.

0 Comments
Continue reading

Managing Your Business and Remote Workforce During the COVID-19 Pandemic

First of all, it’s important not to panic. Many organizations have been offering work-from-home perks for years. Not only is it entirely possible to keep business running, but many businesses see a boost in productivity. A two-year Stanford study shows that in general, remote workers are as productive, if not more so, than those confined to an office.

0 Comments
Continue reading

Backup System is a Crucial Tool when Disaster Strikes

The COVID-19 pandemic has certainly thrown us all for a loop, with many businesses wisely choosing to close their office doors, either scaling back their operations or choosing to utilize a more mobile workforce. While this clearly qualifies as a disaster, it isn’t one that holds too many risks against your data; at least, not when compared to some others. This gives us a chance to consider how well-prepared we are for other disasters that could pose more of a threat to the information and files your operations depend on. For instance, how would you respond if something were to happen to your actual business infrastructure (and, by association, any data you had stored there)?

0 Comments
Continue reading

Will 5G Change Wi-Fi as We Know It?

We like to talk about the major security problems that could come from using public Wi-Fi networks. Data security can be severely compromised by using some unsecured wireless connections. Then you have the issue of unpredictable (and often unreliable) network speeds and the need to routinely give over your personal information to sign in that can be plenty annoying. In the future, these considerations should dissipate as 5G technologies and new ways of sharing information begin to take hold.

There are three technologies looking to change wireless network access forever. They are Wi-Fi 6, 5G, and Hotspot 2.0. 

5G

5G just stands for the fifth generation of wireless technology. 5G, which started rolling out in 2019, is promising gigabit speeds to every user. For reference, gigabit speeds are approaching (and sometimes surpassing) the speeds delivered by fiber optic cable. By being able to broadcast wireless signals at those speeds will allow for an unprecedented level of innovation.

In fact, the capabilities are virtually endless with this type of networking speed. At the very least, it will highlight the capabilities of emerging technologies that require fast data speeds such as augmented reality and autonomous cars/trucks as viable technology for the very first time.

Wi-Fi 6

Wi-Fi 6 is the newest version of Wi-Fi. It is said to provide up to 40 percent higher available network speeds as compared to current Wi-Fi. For the vast majority of people, the data caps, data speed throttling, and overage charges are unfortunate realities when purchasing wireless platforms. Wi-Fi, therefore, is needed to bridge the gap to help us all avoid the major costs associated with wireless networking delivery. Wi-Fi 6, like Wi-Fi 5 before it, will be an essential part of doing business in the future.

Hotspot 2.0

So unfortunately 5G won’t eliminate the need for Wi-Fi. As a result, Wi-Fi hotspots will continue to be an important part of computing on the go. Hotspot 2.0, also referred to as Wi-Fi Certified Passpoint, removes a lot of the agita from using unsecured wireless networks by improving security and taking the actual connection out of the network deliverer’s hands. Essentially, when your phone comes in contact with a Hotspot 2.0 connection it will connect your phone automatically, using encryption to keep your data and the connection more secure. 

Over the next few years you will begin to see public places switching over to Hotspot 2.0. It will become the standard for wireless hotspots, limiting the need for third-party software that often confronts users of today’s hotspots or hospitality visitors. 

Subscribe to our newsletter for more information about using mobile technology for business.

0 Comments
Continue reading

How to Operate in an Environmentally-Conscious Way

Use Less Power

We’ll get the simplest habit out of the way first: don’t leave things, like lights and peripherals, powered on when they aren’t necessary. Build the habit of switching them off when they aren’t in use. It may help to label your switches to ensure the right lights are turning off at the right time.

Use Up-to-Date Technology

Modern technology solutions are another good way to reduce the amount of power that your hardware and infrastructure require. Public cloud options, like Google Drive and Microsoft Office 365, offer a dual benefit in that they not only enable remote capabilities (more on that shortly), they allow you to scale back your on-site infrastructure needs. As a result, your energy requirements are likewise decreased. The same result can come from keeping your hardware and business infrastructure (like the aforementioned lights) up-to-date, as newer technologies are more energy efficient.

Use Your Printer Less

On the subject of using up-to-date solutions, these solutions also help minimize the need to print very much at all. Using collaborative technology can therefore reduce the amount of paper waste your business produces.

Use Remote Capabilities

Returning briefly to the idea of remote work solutions, enabling your employees to operate from home is another means of reducing the environmental impact your business contributes. Not only will your office require less energy by default, there will be fewer emissions generated thanks to the reduced amount of traffic on the road from commuters.

Use Carpooling Practices

If you do require your staff members to be present in the office, encouraging them to set up carpooling groups is another way that you can help reduce the emissions they produce. After all, one car produces fewer emissions than four would, and it gives your staff time to connect, to boot.

Use Fewer Disposables

The average office has quite a few disposable options that could very well be replaced with reusable ones. Switch the paper and plastic products in the break room for washable, reusable options, down to the coffee filter. Instead of offering sugar packets and individual creamer cups, have communal dispensers that can be refilled. Will it make a huge difference? No, but it is something, and it will ultimately be less costly to your business in the long run.

Use Laptops

As the nature of the work environment has shifted, laptops just make more sense for many employees than the desktop. This is good, because laptops not only help enable remote work, they also require far less energy in comparison.

Use Recycling Resources

Finally, as you make these upgrades to your location, equipment, and processes, make sure you are properly disposing of the elements you are replacing--including your equipment. Due to the environmentally-hazardous components that are used to make them, most modern pieces of technology shouldn’t just be thrown out. Instead (once you’ve made sure that all data has been good and wiped from the device) enlist a reputable professional to ethically recycle your device and its components.

We can help you with many of these initiatives, while improving the general functionality of your business’ technology. To learn more, give Coleman Technologies a call at (604) 513-9428.

0 Comments
Continue reading

Cloud Communications Are Helping Drive Business Forward

How the Cloud Helps Businesses Communicate

Having a strong communications strategy for your business can go a long way. With the options that are now available through the cloud, your business can significantly cut your communications costs by utilizing technologies like Voice over Internet Protocol (VoIP) and video conferencing. Today, there are complete communication platforms that integrate all necessary communications into one easy-to-control solution.

This comprehensive platform, called Unified-Communications-as-a-Service (UCaaS), combines your business telecommunications and messaging with your web and video conferencing and collaboration. UCaaS gives your business the technology it needs along with the following options:

  • Disaster recovery
  • Managed support
  • Thorough analytics
  • Management software integration
  • Regulatory support
  • Global service delivery
  • Available support 

...and more!

Available Technology

Below are some of the technologies a UCaaS platform offers:

Telephone

A powerful and feature-rich telephone system is one of the most important parts of a business’ communications platform. A VoIP system uses your organization’s bandwidth to deliver reliable voice services at a substantial cost reduction. Each VoIP platform can offer a whole cache of features, including:

  • Call Management/Auto Attendant
  • Call Queue
  • Call Routing/Screening/Transferring
  • Call forwarding/Voicemail
  • Call Park/Presence/Pulling
  • Call Recording
  • Custom In-Call Music
  • Custom ringtones
  • Do Not Disturb
  • Three-way calling
  • Extensions
  • SIP Trunking
  • Find/Follow Me
  • Voicemail services

...and more.

Aside from these features, a hosted VoIP platform offers users the ability to use the system on their own mobile phones through the use of a mobile app, effectively making any smartphone a work phone. 

Text and Instant Messaging

The UCaaS also integrates a lot of other useful messaging features. Many people would rather get a text than a call, and with a UCaaS, your organization’s messaging will integrate with other software to provide a useful collaborative option.

Video Conferencing

Today, having a video conferencing solution is a must. With more people working outside of the office, and with businesses outsourcing work to remote contractors, having a solution to run meetings over the Internet is extremely useful. 

Collaboration/File Sharing

Collaboration is the name of the game in the information age and a UCaaS can provide a solution for secure file transfer and document sharing. 

With integrations with CRMs and other management platforms a UCaaS can make your business be more efficient and productive. To talk to one of our IT professionals about the possibility of integrating a unified communication solution into your business, give us a call at (604) 513-9428 today.

0 Comments
Continue reading

How to Maintain Productivity when Illnesses are Rampant

Let’s go over a few solutions that can assist your business’ continuity in these testing times.

The Fear of Infection

The primary concern that comes from this specific variety of disaster is generally one of widespread infection, which makes it an uncomfortable prospect for people to congregate anywhere. This is especially true of the workplace, where papers and files were traditionally distributed (and redistributed) as work was done.

Naturally, this is the perfect storm for any illness to spread: materials being passed around, with many people together in a relatively enclosed space. With COVID-19, this is especially problematic, as the CDC believes that it is spread through respiratory droplets and close proximity to others. As a result, it is better to avoid this situation… but how could your business possibly cope with its entire staff being absent, due to either illness or preventative “social distancing?”

Fortunately, the technology exists today that allows you to see the best of both worlds.

Securely and Safely Working Remotely

Many common technologies today can be used to enable your employees to do the same tasks they would do in the office from the relative comfort and security of their own home. Let’s go through some of these technologies and applications and review why they are valuable to a remote work policy.

  • Mobile devices - If your employees are going to work productively from home, they’re going to need access to the proper tools to do it. Supply your staff with laptops or thin clients that permit them to bring their tools out of the office if need be.
  • VPN (Virtual Private Networking) - Of course, once your technology has been taken out of the security of the office, the data that it accesses can be put at risk. Utilizing a virtual private network can help decrease that risk greatly by shielding the data that is in transit.
  • Cloud solutions - Of course, in order to effectively work remotely, your data and applications need to be accessible to your team as they need them. Hosting these resources in the cloud enables your team to access them from wherever an Internet connection can be established on many different types of devices.
  • VoIP (Voice over Internet Protocol) - Communication is absolutely critical to business productivity, especially when it comes to remote resources. Without communication, you can’t expect to accomplish much at all. Certain solutions, like VoIP, allow you and your team, to maintain this communication--again, from wherever an Internet connection can be maintained.

While productivity is crucial to your business’ success, so is the well-being of your employees. Giving them the option to work remotely can help attend to both needs. For assistance with implementing the needed solutions, reach out to Coleman Technologies at (604) 513-9428.

0 Comments
Continue reading

Considerations for Your Business Networking Setup

One of the first things you should know is what might be a part of your network infrastructure. You’ll likely be working with at least one network switch and at least one router. A network switch allows all the technology on your network to communicate with one another through network cables, while the router provides wireless capabilities and connectivity. Your modem enables you to access the Internet.

Networking Best Practices

As your network is such an important tool to your business’ success, you need to be sure that it is sufficiently prepared for this task. To do so, it will help to keep to the following tips in mind:

  • Skip the consumer level. Networking products come in a variety of “grades,” intended for consumer or business use. When equipping your business with these solutions you should only use options made for professional applications. This is because the consumer-based ones are simply not secure enough for business purposes, and likely will not be able to support your business’ needs.
  • Incorporate some redundancy. In the event that your business suffers from a disaster, you will want to be sure that your network is reliable enough to make it through and bounce back. Having a data backup and disaster recovery platform will build the redundancy you need to protect your network. 
  • Plan for future growth. Or in other words, make sure that the network you put in place can be scaled to your business’ future expansion, and that it can incorporate the solutions you will ideally grow into.

Coleman Technologies is here to assist as needed. Our team can help optimize your business’ network to best fit its needs and your professional development. To learn more, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Privacy Issues Surrounding Biometric Security

In a society where getting over on other people is the quickest way to the top, people are constantly looking to take advantage of others. We create security systems for this purpose. Since every person’s identity is unique it is often used for authentication into these secure systems. Nowadays, with the advancement of biometric technology, many organizations are pushing the envelope and using unique physical identifiers as authorization methods, and it is causing problems with the security/privacy equilibrium most people favor. 

Biometrics Trending Up

Biometrics are being used everywhere from the digital security of mobile devices all the way to border security and identification. Biometrics include:

  • Fingerprint identification
  • Iris and retina scans
  • Facial recognition
  • Gait measurement
  • DNA
  • Handwriting recognition
  • Voice recognition
  • Brainwaves

...And more.

These technologies are used to effectively identify and authenticate people simply by pairing the information with existing database information. With this technology being more accessible due to falling prices, it is now being rolled out all over the world for a multitude of purposes. Across the world you can find biometrics being integrated into systems. The US FBI has a massive fingerprint database they use to help identify people. China’s Social Credit system is run on facial recognition. Businesses, like your bank, may be using your voice to authenticate who you are over the phone. With so much data being captured, and with the seemingly endless ways this technology can be used to secure almost anything, it turns out that it really isn’t securing much of anything.

The Illusion of Security

The immense scale of biometric data systems makes securing this extremely personal information nearly impossible. The question has to be asked: can a system be a human identification system and also work as an authentication system? It turns out that with all the challenges people use biometric security systems for, the only thing that it is truly good for is identifying who a person is. That’s not to say that systems can’t work in small doses, but a main problem with these systems is that the information captured--the data that is being used for the security of these physical and virtual systems--has to be saved somewhere. Moreover, with organizations mining data left and right, this very private and extremely sensitive data ends up as just another piece of data captured by corporate entities looking to turn it into a quick buck.

If that doesn’t scare you, consider that organizations and governments possessing this data and losing it to hackers, who much like these massive corporate entities, will be using it to gain a monetary advantage. Losing your identity to a hacker is a traumatic experience, but with these biometric systems, it takes on a whole new meaning. Even scarier yet is that artificial intelligence has been proven to compromise biometric indicators, leaving biometrically-protected systems accessible without physical authentication. 

A Complete Lack of Privacy

We touched on this a little above, but the lack of privacy that a biometric reliant system would provide the individual would be frightening. You see, the biometric security system isn’t designed to allow for invasions of privacy, but because this technology is just in its infancy, and organizations are using it in ways that it may not be designed for, the minute a person puts his/her information into a biometric system, privacy is out. The production of the data, the way it is stored, the way it is compared to database data raise big concerns for the individual and his/her privacy.

Additionally, with changes to physiology, these biometric systems have to have some deviation built in. This poses a lot of questions about what is secure and what isn’t. These systems are definitely state-of-the-art, but if you compare the effectiveness of the security to the systems that we’ve been using (Passwords, PIN, Two-factor authentication), it’s hard to say that these advanced biometric systems are any better at keeping data or infrastructure secure. 

Biometrics are definitely here to stay, but before you implement a biometric security system into your business, call the professionals at Coleman Technologies to discuss the benefits and detriments of doing so; and, the strategies where biometrics will excel. Call us at (604) 513-9428 today.

0 Comments
Continue reading

Smart Contracts Will Dominate the Mobile Age

Today, there is a shift in the ways that people are entering a contract. Using blockchain technology, businesses are using the technology to solidify their contracts, reduce process conflict, and save time. Blockchain offers faster, cheaper, and more efficient options in which to enter a binding agreement with someone. Let’s take a look at how companies are going about using smart contracts.

What is a Smart Contract?

To understand how a smart contract works, you first need to understand how it is smart. Smart contracts are designed to work on clearly defined and conditional principles that work to resolve ownership only after those conditions are agreed upon. Think about it this way, you have a product that you want to sell, but the buyer can only pay over time. You agree to hand over the product under the condition that the buyer pays four equal payments. After the third payment is made, the buyer doesn’t send another payment. It will be evident to the buyer, the seller, and any intermediary or arbiter that not all the conditions of the contract have been met because each action made by either party creates an individual block in the blockchain; and, that information is not only encrypted, it is completely transparent. This means that it can be seen by all parties involved because the information is stored on every system that is in on the contract. 

Why Would You Want to Use a Smart Contract?

The most advantageous part of the smart contract as compared to normal contracts is the speed in which agreements can be completed, but there are almost an endless number of superlatives when compared to traditional contracts. They include:

  1. Accuracy - One of the best features of a smart contract is that it records all of the information that needs to be known in explicit detail. 
  2. Communication clarity - The explicit nature of the smart contract leaves no room for miscommunication, removing much of the liability, and cutting down on inefficiency that comes as a result of misinterpretation.
  3. Transparency - All relevant parties would have a fully visible set of the terms and conditions set forth in the contract.
  4. Security - Smart contracts use the highest level of encryption available. 
  5. Redundancy - Smart contracts save every transaction in explicit detail. If data were to be lost, it is easily retrievable. 
  6. Trustworthy - Since smart contracts are made with some of the most secure, transparent, and reliable tools available, there is no room for outside manipulation and error. 

Where Will You Find Smart Contracts? 

These contracts will be found in some of the most important transactions humans undertake. Some of the industries you may find smart contracts popping up in include banking, insurance, healthcare, and real estate. In fact, anywhere you find the need for a lawyer, you may only need the use of a distributed smart contract.

Emerging technologies are changing the way people do business. For more information about blockchain or smart contracts, subscribe to our newsletter and visit us at www.colemantechnologies.com.

0 Comments
Continue reading

You’d Be Surprised How Insecure Some Healthcare Providers Are

What is BlueKeep?

BlueKeep is a malware strain that was first discovered in May 2019, and was patched in short order to prevent it from becoming another situation like EternalBlue. EternalBlue was the exploit that allowed WannaCry to have such a considerable impact, especially on healthcare providers in the UK. Despite this precedent, however, many hospitals neglected to apply the necessary patches--and that isn’t even the worst part.

The worst part is that the three systems that BlueKeep impacts (Windows 7, Windows Server 2008, and Windows Server 2008 R2) share one thing in common: they have all passed their end-of-life date, and therefore no longer receive security updates.

This makes this situation a two-fold disaster. Not only have patches been released to mitigate BlueKeep, the systems affected by BlueKeep should not be in use anyways.

Of course, it only gets worse, and paints an unfortunate portrait of medical IT. A reported 22 percent of BlueKeep-vulnerable devices are yet unpatched. Worse, 45 percent of connected medical devices remain vulnerable, making things like x-rays, anesthesia machines, and other care-driven technology a risk to use.

Are you concerned about your organization’s technology?

Lean on the IT experts at Coleman Technologies for assistance. We can help any organization ensure that their technology won’t put their operations or their patrons in harm’s way. Learn more about what we can do by calling us at (604) 513-9428.

0 Comments
Continue reading

Tip of the Week: Using Microsoft Word Templates

In actuality, you’ve used a template every time you’ve opened a Microsoft Word document… the Normal template. However, you may want to use a different template to meet your different needs. If that’s the case, you’ll need to adjust some settings as you create your document.

As you select New from the File tab, you will be presented with a few options. One of them will be Blank document, but you also have the opportunity to utilize a huge variety of other templates that can be found in the application and then downloaded. Once you have done so, select your chosen template and your new document will be generated with that template’s contents. These can include:

  • Boilerplate text
  • Styles
  • Images and logos
  • Table of contents
  • Sections that split the document into different parts, with appropriate numbering
  • Table and chart boilerplates

Of course, this isn’t a comprehensive list of your options. Feel free to explore the different templates and their options to see all that these documents can do.

Once you have a few templates downloaded, you can even edit them to better fit your needs. To do so, all you need to do is open the template you want to edit (File>Open>This PC>My Documents>Open) and make your desired changes. Once that’s done, just Save and Close.

Why Bother with Templates at All?

There are a few advantages to using templates that you should see significant benefits from, such as:

  1. Templates can be shared amongst your staff and unify your business’ style.
  2. Templates can be used to make forms much easier (and less expensive) to reproduce.
  3. Templates can reference your other applications to simplify additional tasks.
  4. Templates allow you to quickly reformat your documents if need be.

So, do you think you’ll do any investigating into templates in the future? Why or why not? Let us know in the comments, and let us know what other tips you would find helpful!

0 Comments
Continue reading

You Need to Backup Your Data

Data Is a Big Deal

Your company’s data is one of its major assets, and you take quite a bit of effort to protect it. You deploy antivirus, firewalls, intrusion detection, and other security tools designed to mitigate exposure to malware, hackers, and other deplorable situations like:

  • Human error (negligence and mistakes)
  • Sabotage and theft
  • Hardware malfunction
  • Power surges
  • Software corruption

The minute something gets through your network’s defenses, you are in deep trouble. If disaster hits your business and you don’t have a reliable backup, you could not only lose continuity, you could lose it all. This wouldn’t be so dire if you have a comprehensive business continuity strategy in place. Business continuity plans are just potential solutions to problems that threaten to take the business down. 

There are hundreds of different situations that could result in substantial data loss, but irregardless of the situation your business is in, having a strong backup and recovery plan lets you be prepared for any eventuality. 

Today, there are a lot of different ways that you can back up your data and applications, but there really is only one that offers onsite and offsite backup, incremental backups, and the ability to recover data on demand. This solution is what we call a BDR. Short for backup and disaster recovery, our backup service allows you to configure the backup solution to fit your company’s demands, while also providing all the high-end redundancy features that any business could need. 

If your business is looking to protect its data from the litany of ways it can be corrupted or lost, the BDR is right for you. Call Coleman Technologies today at (604) 513-9428 for more information.

0 Comments
Continue reading

How to Encourage Collaboration in Your Place of Work

Have Them Socialize Outside of the Office

Let’s look at how kids behave for a moment… if told to partner up, they—almost automatically—gravitate toward their friends, the people they are comfortable spending time with. Your employees will do the same, both in and out of the office.

Collaboration greatly relies on some level of trust and familiarity, which is most effectively developed outside of the professional environment. Encourage your staff to socialize outside of work hours, or even treat them on occasion, on one condition: no shop talk. While your employees may not all be fast friends afterwards, they’ll understand one another much better and be able to work more effectively.

Tell Them What You Want

Speaking of efficacy, make sure your team understands what you expect from them in terms of results. This goes double when collaborative work is involved. A clear understanding of a task makes it easier to determine how to accomplish it, and how their combined efforts can best serve their purpose.

Walk the Walk

If you really want your team to work collaboratively, make the first move and involve yourself in the process. “Rank” or “position” should have no bearing on how able someone is to participate in a collaborative process, and there is no telling who could be struck with inspiration. Actively seek input from your team and demonstrate how you want your employees to work together.

Use Your Resources Wisely

While there’s a time for either, there is a difference between combining your resources to accomplish a given task and having your employees collaborate. The former is great if a lot of a single task needs to be finished quickly, but if a complicated process needs to be completed, it helps more to give the task to a group of people who have different proficiencies. This way, you have a better chance of the necessary skills being present in the group.

Acknowledge Accomplishments

A team that doesn’t feel appreciated is a team that won’t accomplish much. Why would they, if it doesn’t seem to matter whether they excel, or put out a thoroughly mediocre performance? This is especially the case if a single member’s performance is publicly singled out, as though they did all the work.

To encourage your team to perform well as a group, make sure that the entire group receives some recognition of their combined efforts.

Make Collaboration the Easy Option

Regardless of how motivated your team may be to collaborate with one another, it just isn’t going to happen if they don’t have the opportunity or means to effectively do so. While this may have been a more reasonable obstacle in the past, today’s available technology invalidates any excuse your team may have… mostly due to the Internet serving as the greatest collaborative tool the world has ever seen. The easier the collaborative process is, whether you lean on an Internet-based application or an internal resource or both to simplify things, the more likely it is for your employees to work with each other.

We’re Here to Help.

Coleman Technologies is ready and willing to deliver the solutions you need to promote collaboration among your staff. Give us a call at (604) 513-9428 to hear more about your options.

0 Comments
Continue reading

Tip of the Week: 5 Ways to Maximize Productivity, According to Experts

Two-Hour Solution

Roger Seip, author of Train Your Brain for Success, took a proactive and prepared look at productivity by developing his Two-Hour Solution. The idea is to take two hours to plan out a schedule to follow each week, based on how your plans and goals culminated the week before. Investing this time should allow you to make the most of your available time to accomplish what you want to accomplish.

The reason that this is different than simply going over your calendar each week is the fact that, if guided by the Two-Hour Solution, you’re figuring out how the time you’re spending contributes to your goals. “Green time” is time that helps you generate financial capital, while your “red time” is the time that you spend preparing for green time, without generating any profit. To account for the wrench in the works that would ordinarily throw off your schedule, you also include “flex time” to provide a buffer. What’s left is your “re-creation” time, where you recover from your productive endeavors by doing the things you want to do.

Prioritizing

Steven Covey is an educator and a businessman who came up with a philosophy to living a full life that can also apply to life in the office.

Consider your big priorities, your more flexible responsibilities, and your rote tasks in the workplace as large rocks, smaller stones, and sand, respectively. Your time is a bucket, ready to be filled with these items as you see fit.

Let’s say you decide to start with the “sand,” before trying to cram in the “rocks” and “stones.” Chances are pretty good that you won’t be able to accomplish very much at all, at least nothing of any circumstance. However, if you prioritize the more impactful rocks, then the stones, and fill in the rest of the space with your sand, your bucket—or workday—is then used as productively as possible, and anything you didn’t get to complete isn’t of consequence.

Two-Minute Rule

While there are countless variables that can potentially influence the amount of time a task will take to complete, you eventually get a feeling for the typical duration, right? So, some tasks can predictably take a significant amount of time, while others take almost no time at all to make it through. The idea of the Two-Minute Rule, thought up by productivity consultant David Allen, takes advantage of that difference. His strategy: if a task will take two minutes or less, do it.

If that seems too simple, it kind of is. The philosophy behind the Two-Minute Rule is to build up your motivation to tackle the larger responsibilities by successfully completing smaller tasks. Think about it—every task, regardless of how large it is, can be broken into smaller, more manageable chunks, chunks that can take mere minutes to complete. Once you’ve completed enough of these two-minute tasks, it only makes sense to see the greater responsibility through… and with the progress you’ve already made supporting you, completing it seems that much more feasable. 

The Blastoff Method

Entrepreneur and motivational speaker Mel Robbins devised this practice to help overcome the mental blocks that encourage us to procrastinate rather than doing things that are good for us. Robbins posits that, by hesitating, we put the brain into “protection” mode—by thinking about everything that needs to be done between point A and point B, your brain ultimately prevents you from doing what you need to do. However, if that hesitation can be avoided, your productivity (or, by Robbins’ original theory, your well-being) will see benefits.

Her solution is to close the gap that hesitation creates between your capability to do a task and your perception of that task. Her recommendation is to, quite literally, treat yourself like a rocket and count down to your action. Focus on counting down…5,4,3,2,1… and act immediately, before your thoughts get in the way.

Scientifically, by doing so, you are bypassing a behavioral process and resetting an established habit loop… allowing better, more productive habits to be created instead. Give it a try next time you encounter a task you want to avoid starting.

Create a Time Crunch

We’ll wrap up with another method that Roger Seip came up with. If you really feel you work better on a deadline, add a bit of a hurdle as you are scheduling your “green time” … give yourself less time than you think you’ll need. The pressure can help you to focus. Naturally, you need to avoid any flex time you have assigned for this to work.

What methods do you use to keep yourself focused and productive? Do any of these approaches sound like something you want to try? Let us know in the comments!

For the technology solutions that can also help you improve your practical productivity, talk to us! Give us a call at (604) 513-9428 to discuss your options.

0 Comments
Continue reading

How Secure is Your Use of Cloud Solutions?

To do so, we’ll be discussing the concept of cloud security, which is pretty much what it sounds like: security concerning the data, infrastructures, and applications that are hosted in the cloud. In many ways, these considerations aren’t all too different than the ones that would be involved with your local IT. When really boiled down, any security you have implemented should meet a few benchmarks:

  • Assurance that data/solutions are safe
  • You have a transparent view of your security’s status
  • Instant alerts to unusual events and issues
  • These events and issues can be followed back to their source and addressed

Of course, we don’t mean to say that everything is identical between the security of your local infrastructure and a cloud system. We just wanted to establish this as the foundation of any security you implement.

Demystifying Cloud Security

By its nature, cloud computing can be intimidating, especially when you start to consider how it has impacted the business technology landscape. Fortunately, many of the security considerations that cloud now demands aren’t necessarily huge leaps from what your security should be normally. Let’s walk through a few differences between traditional security and what is required in the cloud.

Different Perimeters to Protect

Consider how data can be protected when it is localized. You can effectively prevent a lot of threats just by preventing access to the area where your data is stored. The cloud makes this significantly more difficult by being so very connected.

However, if you know this moving forward, you can adjust your security to meet these needs. One effective way to do so is to make sure that all data to be stored in the cloud is encrypted, and that access to the cloud itself is protected with multi-factor authentication requirements with the appropriate best practices baked in.

More Advanced Threats

Unfortunately, not even cloud providers are immune to attacks. The development of Advanced Persistent Threats (which you may see referred to as APTs) and other means of breaching data make it difficult to be sure that your data is truly safe. While the jury is still out on how these threats can be overcome, you need to accept the responsibility of keeping up with the practices that can help in the meantime.

Software Challenges

As the cloud relies on software to deliver hosted data, there is an assortment of potential variables that need to be addressed. Therefore, the cloud needs to have security controls in place to address these variables as they present themselves. This is the case whether data is being transported at the time, or if it is filed away.

Coleman Technologies can assist you with your data security needs, as well as assist you with whatever cloud implementation you decide to put into place. To learn more, reach out to us by calling (604) 513-9428.

0 Comments
Continue reading

More Industries are Seeing Accountability and Security with Blockchain

What is “Blockchain” Anyway?

Blockchain is defined as a distributed ledger system that creates a single encrypted and unalterable file whenever any transaction is made to help preserve its continuity. As every device involved in the blockchain helps to store it, the blockchain itself is unprecedentedly transparent. This allows business systems to be both more accountable, and secure.

Accountability

Let’s return for a moment to how the blockchain works—each time a transaction of any kind is made, be it adding new data or revising some that already existed, a new “node” (think of it as another link in the chain) is created to document the transaction and encrypt it. As a result, you wind up with a running record of reliable data. As you might imagine, this offers itself quite well to many industries.

Banking and Financial Services

With the importance of the record-keeping that these organizations maintain being so apparent, it only makes sense that blockchain is used to automatically keep track of where funds are being moved.

Real Estate

Real estate processes are notoriously intricate and confusing. Blockchain provides an option that could make the entire experience of buying and selling real estate much more transparent.

Wills and Inheritances

Tragically, wills and inheritances can be very hotly contested, and their veracity may be called into question. The transparent and immutable logs of the blockchain could eventually lead to many fights being averted in the future.

Voting

Elections now face more scrutiny than ever before, as votes are counted, recounted, contested, and recounted again. Using the blockchain could help to eliminate most challenges and issues that call the integrity of an election into question.

Supply Chain Management and Logistics

Managing all the moving pieces of a supply chain could be made much simpler by integrating blockchain technology. Goods and resources could be easily tracked and directed where they need to go, with confirmation when they arrive at their destination.

Security

Communications have gone digital, with unprecedented numbers sent and received each day. As more people than ever rely on these communications for a variety of reasons, data sharing needs to be more reliably secure. The blockchain is well suited for this task, as each transfer of data remains fully transparent, while the data contained in the nodes remains undisclosed. This technology can even be safely used to hold parties to their shared agreements by facilitating proper compensation once certain requirements are met. These capabilities will likely lead to advancements in:

Education

Consider how many files any educational institution needs to maintain and verify, and the amount of personal information shared in these records. Blockchain makes it so that these paper files are no longer necessary, while also making it easier to verify registration, management, and financial aid-related data.

Healthcare

Any patient who needs to see multiple physicians knows the frustration of working with providers who operate in different healthcare networks. However, healthcare has a good track record with embracing innovative technology solutions. Introducing blockchain could ultimately lead to self-managed healthcare records.

Stock Trading

There are many ways that stock exchange processes could be made better with the assistance of blockchain technologies. Two clear improvements: convenience, and of course security.

Public Records

Many states are still overly reliant on paper documents, which are very easy to alter and otherwise manipulate (never mind steal). Shifting to digital documents that are supported by blockchain could do a lot to reduce fraud, ensure accountability, and generally improve security.

The Internet of Things

IoT devices are overwhelmingly insecure, but if they were decentralized through the blockchain, some of this insecurity could be resolved.

To learn more about blockchain technology, feel free to call Coleman Technologies to discuss it, as well as the options you currently have to leverage for your business. Reach out at (604) 513-9428 today!

0 Comments
Continue reading

Coronavirus: A Threat to Your Staff, Cyberthreat to Your Operations

How to Minimize General Exposure in the Office

Based on what is currently known about the coronavirus, the Centers for Disease Control and Prevention have some recommendations as to how to keep the potential impact of coronavirus to a minimum:

  • Encourage employees who are ill to stay home. This will help to minimize the spread of infection within your business. Make sure that your employees are aware of this policy by reiterating it verbally, and by posting notices around the office encouraging them to stay home if under the weather.

    Emphasize hygiene and etiquette. Properly stifling coughs and sneezes and keeping hands clean are surprisingly effective ways to keep your workplace healthier. Rather than using their hands to catch a cough or sneeze, your employees should use a tissue or--if unable to do so--use the upper part of their sleeve.

    The CDC recommends that tissues and alcohol-based hand sanitizer should be made readily available. Make sure your employees are washing their hands with soap and water for the recommended 20 seconds.

  • Engage in keeping the workplace clean. There is a chance that coronavirus (and other illnesses) could be spread via infected surfaces. Make sure that all surfaces that are touched frequently, like desks, workstations, and doorknobs, are kept sanitized. Provide your employees with disposable wipes so they can proactively disinfect these surfaces before use.

If you find that one of your employees is confirmed to have been infected with coronavirus, make sure that you inform their coworkers of their possible exposure while still maintaining the confidentiality that the Americans with Disabilities Act requires. These employees and those who are living with a sick family member should assess their risk of exposure using the CDC’s guidelines.

Coronavirus as a Cyberthreat

Unfortunately, coronavirus will also require you to also keep an eye on your network security, particularly if you operate within the healthcare industry. Hackers and cybercriminals have taken advantage of the widespread concern that the disease has caused. For example:

  • Scammers have phished healthcare providers with updates that appear to have come from the World Health Organization or hospitals local to their area, but actually introduce keyloggers into their systems.
  • Those involved in the medical supply chain have been targeted with emails referencing the coronavirus that install malware to steal information.
  • Ransomware has been introduced into consumer systems by promising recipients of an email information about COVID-19’s spread.

While the current climate may not make it easy, these emails and other threat vectors can be overcome through the same best practices that foil other cyberthreats. In addition to comprehensive digital protections, training your employees to spot these threats will be crucial.

Of course, you should also maintain a comprehensive backup in case you need to recover from a successful attack.

How to Maintain Productivity with Your Team at Home

With today’s technology, sending an employee home sick doesn’t necessarily mean that you will be sacrificing that employee’s productivity. We now have many ways that your team can work effectively from home, still contributing to your organizational agenda without exposing their coworkers to their illness.

Equipping Your Employees

Remote access solutions, paired with virtual private networking technology, can allow your employees to securely continue their work from home, safely accessing the applications and data their tasks require through an encrypted connection. As collaboration will certainly be necessary, you will want to be sure that your employees are also equipped with the communication tools that facilitate this collaboration as well.

Network Protections

You will also want to thoroughly secure your network infrastructure to help prevent threats like phishing attacks and other methods from being successful… as well as preparing for a potential breach or emergency with data backups and disaster recovery policies and procedures (including contact information for your employees) to help mitigate a worst-case scenario.

Employee Awareness

Finally, make sure your employees are on the lookout for any suspicious activity that could be a cybercriminal’s attempt at using the coronavirus as a means to an end. Not only should your employees know how to spot these attempts; they should also know the proper procedures for reporting and handling them.

Is the coronavirus scary? At this point, it is safe to say that it is, but does it have to interrupt your business operations entirely? Not if you are properly prepared.

For more assistance in preparing your business for any kind of disaster, reach out to the professionals at Coleman Technologies by calling (604) 513-9428.

 

What is COVID-19?

COVID-19, better known as coronavirus, is a respiratory illness that first appeared in Wuhan, China, and was reported in the United States on January 21st, 2020.

As of March 3rd, 12 states have reported 60 total cases of coronavirus and six confirmed deaths, with no vaccines or specific antiviral treatments for the illness. Symptoms of the virus include fever, shortness of breath, and a cough, while those with complications from the virus can experience pneumonia in both lungs, failure of multiple organs, and death. 

0 Comments
Continue reading

VoIP Can Replace Analog Phone Systems

VoIP Allows You to Do More

While at its core, a VoIP system is a telephone system, it allows for many more options. Since it uses an organization's available bandwidth rather than a dedicated RJ-11 connection, there are more dynamic options available. It may raise the cost of the solution a bit, but VoIP can come with instant messaging, conferencing, and call archival built in.  

VoIP is More Secure

VoIP is far more secure to use than the traditional landline because it is easier to secure a digital connection than it is to secure an analog one. The use of encryption protects all information transmitted through the system.

VoIP is More Portable

This is a big benefit. VoIP solutions can be linked to mobile applications. This means that any smartphone can become a work phone, and can be linked to the same number as the user’s business phone. This allows people to get calls on their phone without having to give over their personal number. This is either done through forwarding or by installing a simple app on the phone.

VoIP Offers Automated Client Interaction

A VoIP system can be configured to support an entire business. There are integrated automated menus that can offer a lot of value by directing calls to voicemails, alternative members of your team, and allowing employees to avoid distractions and not neglecting their incoming calls. Call forwarding, parking, and many more options can be tied to a VoIP account for additional costs.

VoIP is a technology solution for all of your business’ calling needs. Call Coleman Technologies today at (604) 513-9428 for more information about VoIP and you can get the telephone system you’ve always wanted for your business.

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image