Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Office 365 and Your Business

Office 365 and Your Business

office-365.jpg

Office 365 Will Change Your Business  

If you are not using Office 365 in your office you are missing out on a packaged product that could create an increase in your company’s efficiency. The efficiency of a company directly affects the success of the company. When your company isn’t running as efficiently as it can, it can cause significant financial losses for your company. Fortunately, Office 365 can improve the efficiency of your company, here are 5 ways how!

Work From Home and Remote jobs are becoming more popular as tech companies make it easier to connect! With Office Online you can work from anywhere you can connect to the internet and work with team members in real time. All of this with the familiar design and features of the regular Office products! 

With Office 365, teamwork becomes a breeze! Collaboration between teams and departments will never be easier due to Microsoft’s SharePoint. SharePoint, a software that comes with Office 365, will make sharing information and files easier as well as allow your employees to work on projects simultaneously.

Power BI is a business analytics tool by Microsoft that allows your business to track your data and share insights across your organization. You can then take that data and embed it into your website(s). Power BI will collect your data and provide you with visual reports that you can collaborate, publish, and share. Power BI will save your business valuable time and resources!

Keep your office and employees organized and on track with Microsoft’s Outlook. Outlook conveniently allows you to keep all of your emails, calendar entries, contacts, tasks, and more together in one place.

Cloud-based storage has become increasingly popular among businesses. OneDrive is the cloud-based file storage application from Microsoft 365. OneDrive connects you to all your files so you can share and work together from anywhere while protecting your work.

Improve Your Processes with Office 365

To wrap up, Office 365 is an essential business tool to ensure that your office is running as smoothly and efficiently as possible. Microsoft saves you from having to use multiple platforms and has conveniently packaged all of their products together in Office 365. Reach out to us by calling (604) 513-9428 to increase your company’s efficiency with Office 365!

0 Comments
Continue reading

Should Your HR Department Be Worried (About Automation)?

Automation Isn’t the First Threat

Human resources cover a lot of ground in any business. In fact, many smaller businesses extend the human resources role past the seven core functions of HR. These are:

  1. Recruitment
  2. Payroll Administration
  3. Benefits Administration
  4. Training and Professional Development
  5. Performance Reviews
  6. Labor Relations
  7. Managing Compliance

Over the past several years, the company human resources department, especially at small and medium-sized businesses, has been encroached upon by outsourcing. Like many other outsourced platforms Human-Resources-as-a-Service (HRaaS) services use technology to fill in the gaps left by not having dedicated HR professionals on staff. For the business, it reduces the cost, while fulfilling virtually the same roles through remote help desk and software

The Relationship Between Automation and HR

Technology changes things. Does it make it better? That’s a matter of opinion, but for the business owner, not having the human resources department means that they are on the hook to complete the tasks that the human resources department undertakes; and, there is a mountain of it.

That is, unless they can automate them.

The benefits of automation are the same no matter where it is put to use. It opens the way for staff to focus on being more productive, by leaving behind a lot of menial (yet time-consuming) tasks. Aside from enhancing efficiency and productivity, there are many key benefits to automating HR. They include:

  • Reduced employee turnover through improved employee engagement
  • Reduced storage and printing costs
  • Improved risk management and properly managed compliance
  • Improved document management
  • Enhanced business decision making with comprehensive reports
  • Optimized business growth through efficient onboarding

Today, there are plenty of software-based solutions that can keep any business running effectively, but when you get a look at them, these solutions aren’t really human resources platforms, they are human capital managers. 

What is Human Capital Management?

Human capital management is a platform that encourages businesses to treat their workforce as they would any other asset. Its goal is to get the human resources of the business to work as effectively and efficiently as possible. While human resources do more to deal with the individual needs and motivations of workers, human capital management seeks to look for metrics that can be quantifiable and strategically improved upon. It basically aims to change an organization’s view of their workforce from a commodity to an investment. 

What Strategy Is Best for Your Business?

There are multiple ways that automation can be implemented in the HR/HCM process, but depending on what strategy is used, you could be setting your company up for problems from your actual human resources. Most workers don’t like being treated like numbers on a spreadsheet after all. On the other hand, divorcing business decision-making away from typical workforce considerations that aim to sap overall productivity will benefit your organization’s bottom line. 

HR is always a balancing act. 

If you would like to know how automation could help you keep your organization balanced and productive, reach out to the IT professionals at Coleman Technologies today at (604) 513-9428.

0 Comments
Continue reading

Can Outsourcing Be an Option for Your Business?

Financial Benefits 

Looking outside your own business to get work done can be intimidating. Can you trust outsourced talent? Will I lose control over my business? Is it really a value? These questions and many more are reasonable to ask, but if there is one sure thing about outsourcing is that there are clear financial benefits. 

The decreased cost of outsourcing is the most well-known feature of the strategy. Obviously, it is extraordinarily expensive to onboard new help, purchase the resources that new hire needs to do the job you need him/her to do, and expand your benefits package (if you offer one) to another person. When you outsource, you may still pay a comparable rate in pay, but you will get someone that has the specific skills you need them for, and you’ll likely save a lot of capital by eliminating the associated costs.

Operational Benefits 

Your organization may see some major operational benefits from choosing to outsource. They include:

Internal Focus

Outsourcing can present a business’ leadership the ability to be more aggressive with their resources. There is a lot to do at the average business, giving regular employees access to trained and reliable resources can free them up to focus on operational issues while speeding up business significantly. 

Access to Skills

Typically, outsourcers come onboard with very specific skills and no long-term employment contract. This gives the organization the flexibility to find the gig-worker that fits the immediate needs of the company rather than committing to one employee over large swaths of time. 

Minimized Risks

In the course of doing business, decision makers are confronted with variable risks. Outsourcing allows many of the risks to be disregarded, although it creates some others. Overall, however, outsourcing will often present a net-positive situation for any business. 

Coleman Technologies offers high-value outsourced IT services and support for British Columbia businesses. If you would like to learn more, call us today at (604) 513-9428.

0 Comments
Continue reading

Taking a Long Look at Your Company’s Bandwidth Needs

Bandwidth Defined

Bandwidth is one of those terms that you think you understand until you try to explain it to someone else. Basically, bandwidth is how fast data can be transferred through a medium. In the case of the Internet, millions of bits need to be transferred from the web to network attached devices every second. The more bandwidth you have access to, the more data can be transferred. 

Speed vs Throughput

Network speed--that is, how fast you are able to send and receive data--is typically a combination of available bandwidth and a measure called latency. The higher a network’s latency, the slower the network is going to be, even on high-bandwidth network connections. Latency can come from many parts of the network connection: slow hardware, inefficient data packing, wireless connections, and others. 

Throughput is the measure of the amount of data that is transmitted through a connection. Also called payload rate, this is the effective ability for any data to be transmitted through a connection. So, while bandwidth is the presumed amount of data any connection can transfer, throughput is the amount of data that is actually transferred through the connection. The disparity in the two factors can come from several places, but typically the latency of the transmitting sources results in throughput being quite a bit less than the bandwidth. 

What Do You Need Bandwidth For?

The best way to describe this is to first consider how much data your business sends and receives. How many devices are transferring data? Is it just text files? Are there graphics and videos? Do you stream media? Do you host your website? Do you use any cloud-based platforms? Do you use video conferencing or any other hosted communications platform? All of these questions (and a few not mentioned) have to be asked so that your business can operate as intended. 

First, you need to calculate how many devices will connect to your network at the same time. Next, you need to consider the services that are being used. These can include:

  • Data backup
  • Cloud services
  • Email
  • File Sharing
  • Messaging
  • Online browsing
  • Social Media
  • Streaming audio
  • Streaming video
  • Interactive webinars
  • Uploads (files, images, video)
  • Video conferencing
  • Voice over Internet Protocol
  • Wi-Fi demands

...and more

After considering all the uses, you then need to take a hard look at what required bandwidth is needed for all of those tasks. Obviously, if you lean on your VoIP system, or you are constantly doing video webinars, you will need to factor those operational decisions into your bandwidth decision making. 

Finally, once you’ve pinpointed all the devices and tasks, the bandwidth each task takes, and how many people on your network do those tasks, you total up the traffic estimate. Can you make a realistic estimate with this information?  Depending on your business’ size and network traffic, you may not be able to get a workable figure. 

Too Much or Not Enough

Paying for too little bandwidth is a major problem, but so is paying for too much. Bandwidth, while more affordable than ever before, is still pretty expensive, and if you pay for too much bandwidth, you are wasting capital that you can never get back. 

That’s where the professionals come in. Coleman Technologies has knowledgeable technicians that can assess your bandwidth usage and work with your ISP to get you the right amount for your business’ usage. If you would like more information about bandwidth, its role in your business, or how to get the right amount for your needs, call us today at (604) 513-9428.

0 Comments
Continue reading

Thank you network health check

Thank you for requesting your Free Network Health Check!

There is ZERO cost or obligation to buy anything when you request this service. This is simply our way of giving you a risk-free way to ‘sample’ our services before having to make a commitment or payment.

Someone from our team will contact you within one business day to schedule your assessment. If this is an emergency, please feel free to call our office to schedule your appointment now at (604) 513-9428.

0 Comments
Continue reading

Top 3 Ways Hackers Will Attack Your Network - And They Are Targeting You RIGHT NOW

Hackers have many methods they use to break into your network, steal data or put you in a position where you have to pay them money to get your data back. They use a combination of software and skill to make it happen. Here are three ways hackers and cybercriminals attack your network in an attempt to get what they want.

1. THEY GO THROUGH YOUR EMPLOYEES.

That’s right, they’ll use your own employees against you, and your employees might not even realize what’s happening. Let’s say a hacker gets ahold of your internal e-mail list, like the e-mails you have posted on your website or LinkedIn. All the hacker has to do is send an e-mail to everyone at your company.

The e-mail might be disguised as a message addressed from you asking your employees for a gift card, which is becoming an increasingly common scam. Another e-mail tactic is making a message look like it’s from a fellow employee, asking everyone else to open an attached file, which is likely malware or ransomware. A third e-mail scam is directing people to a phishing website, which is a website that scammers have designed to look like popular websites in order to get login information to hack accounts. All it takes is a single click from any employee to let the bad guys into your business.

2. THEY ATTACK YOUR NETWORK DIRECTLY.

Some hackers aren’t afraid of forced entry. Hackers and cybercriminals have access to black market tools and software that helps them get into networked devices – particularly unprotected networked devices.

For example, if you have a PC that’s connected to the Internet and your network doesn’t use any firewalls, data encryption or other network protection software, a hacker can break in and steal data from that PC and potentially other devices connected to that PC, such as portable hard drives. This method of entry isn’t necessarily easy for hackers, but the effort can be worth it, especially if they can walk away with sensitive financial information.

3. THEY HOLD YOUR DATA HOSTAGE.

Hackers are relying on ransomware more and more to get what they want. Hackers rely on e-mail, executable files and fraudulent web ads (such as banner ads and popups) to attack networks with ransomware. It goes back to the first point. All it takes is someone clicking a bad link or file and the next thing you know, you’re locked out of your network.

This has happened to dozens of businesses and even city governments in the last year alone. The thing is that even if you pay the ransom, there is no guarantee the hacker will restore access. They can take the money and delete everything, leaving your business high and dry! This destroys businesses!

All of these points are why you need to take a hard look at IT security solutions and use them. For instance, if you had all of your data securely backed up to the cloud and a hacker came in and tried to hold your data hostage, you wouldn’t have to worry. They don’t really have your data. You can tell them “no,” then all you’d have to do is work with an IT team to get your network back up and running while scrubbing it of any malware or ransomware.

Then, it would be a simple matter of restoring data from the cloud. Sure, you might be out of commission for a day or two, but in the grand scheme of things, it’s much better than losing your business to these jokers.

Hackers are just looking for easy targets and, sadly, a lot of small businesses fit the bill. Just because you haven’t had any major problems yet doesn’t mean you won’t in the future. The threats are out there and they’re not going to go away. Invest in security, partner with an IT security firm and protect yourself. This is one investment that is truly worth it!

0 Comments
Continue reading

Tip of the Week: Fixing a Slow Internet Connection

You Don’t Have Enough Bandwidth

When you purchase an Internet package, you get certain speeds. Today, these speeds are faster than ever, but if your business has too much going on, it can wreak havoc with your Internet speeds. There is a situation that happens when too much data is trying to pass through a network connection. This situation is called bottlenecking and it is potentially the reason your speeds are slow. Think about it, if you try to put several gigabytes through a connection that is only rated for a few megabits per second, it’s going to take some time to get all the data through. To check this, audit how many devices are at work. Most of the time you’ll be surprised how much data you are sending and receiving. We can help you with this audit before you make the call to upgrade your Internet package.

Outdated Equipment

Another potential issue is that your networking equipment may simply be old and not be able to use the dual bands that are often necessary to get the most out of your wireless network. If you have enough bandwidth, but your Internet is just slow, chances are upgrading the modem, switches, or routers would be a prudent move and will likely fix any problems you have. 

Misconfigured Equipment and Environmental Factors

Once you’ve made sure that the physical components of your network are working as intended, but your Internet connection isn’t improving, you probably need to reconfigure your software on your devices or move your hardware to avoid interference. Specifically, if your wireless network signal is having problems making it through obstructions, you will want to consider using the 2.4 GHz connection rather than the 5.0 GHz channel. The max speed you’ll see will decrease, but the 2.4 GHz connection makes its way through obstructions better. Unfortunately, however, the 2.4 GHz signal can be a victim of electronic interference more than the 5.0 GHz channel. 

If you need help with your business’ networking, don’t wait and lose more money. Contact the professionals at Coleman Technologies today at (604) 513-9428.

0 Comments
Continue reading

The Mobile Device: A Brief History

At the Beginning

The invention of the radio in the late 19th century and the development of the medium in the early 20th century has more to do with modern day cellular devices than you’d think. As with most new technologies, two-way radio was used by militaries, used in the late stages of WWI, throughout the Russian (and October) Revolutions, and into the Spanish Civil War. Mobility allowed for enhanced communications, but that is a long way from the iPhone 11. 

Over the next half-century, it became the go to mass communications method, effectively making it the first wireless consumer device. In fact, over 95 percent of American households had one by the end of WWII in 1945. Radios then went mobile. The development of the portable radio was the first time people understood the convenience of having portable technology. The worldwide reliance on the medium was incredible. In the 1950s, it took the television (a drastically superior medium) over a decade to supersede the radio as the predominant technology of the time. 

Early Wireless Devices

In the early 1970s, technology had reached a point where the idea of a mobile phone was being bantered around. Prototypes were made, and the technology worked! The first set of wireless phones were added to luxury cars and train cars and other places where affluent people could take advantage of the technology. 

The first cellular phones, the 0G generation were introduced to the market in the late 1970s. Meanwhile, personal computers were trending upwards.

Amazingly enough, it would take almost 40 years before the trajectory of the two markets would intercept.

In the early 1980s, something changed. Cellular technology began to improve, as did the form factors of mobile devices. In 1984, the Motorola DynaTAC 8000X Advanced Mobile Phones System was introduced. The phone, which weighed in at a whopping 28 ounces, cost $4,000, and took 10 hours to charge for 30 minutes of talk time. Irregardless, the device, and others of that era had great demand. Motorola sold around 1,200 phones in 1984 alone; and, based on that success, innovation was priority number one.

It took until 1981 for manufacturers to develop anything resembling what we would call a mobile PC. The Osborne 1 was the first, but it wasn’t practical at about the size of a suitcase. The Epson HX-20, a PC that had a four-line display and used a microcassette to store data, would forever be known as the very first true laptop.

Just like cellular phone technology, the innovation of the laptop was moving faster.

‘90’s Mobility

By the mid-90s, mobility had started to become a priority for consumers. The huge, brick-sized cellular phones of the 80s were replaced by smaller, more portable devices. They also dropped significantly in price. Cell phones such as the Nokia 5110 made cellular calling commonplace.

On the mobile PC front, the laptop form factor of the ‘90s largely resembled the laptops we use today, the first touchscreen devices started to pop up, and mobile networks started to become better at transmitting data. 

In the same era, major PC manufacturers began to make laptop computers. These devices regularly fetched $3,000 or more. Once supply started reaching the public’s insatiable demand for these devices, there was a rapid reduction in price. Device manufacturers such as HP, Dell, and Compaq took advantage of the computing boom, and grew quickly. 

Cameras started to show up on devices in the late 1990s. It became obvious that cell phone device demand, as well as access to the brand new World Wide Web was pushing innovation. As a result, each year it seemed as if the new phones were getting more features, were better constructed, and dare I say, smarter.

The New Millenium 

In the dawn of the 21st century, more and more people had a cell phone. Constant innovation of hardware, software, battery technology, and more were powering a technology boom like the consumer world hadn’t seen since the advent of the color TV.

At this time, device manufacturers such as PALM, Nokia, and Apple started putting together the smartphone; devices that could function like a computer in your pocket. Then, in 2006 Steve Jobs unveiled the iPhone. The launch of Apple’s iPhone in 2007 set the standard for what consumers would come to expect from their devices. 

Luckily for consumers, the establishment of the iPhone was quickly followed by ‘copycats’. Dozens of other electronics companies started to put together smartphones. The companies may change, but this competition is still raging away today. Today there are 3.5 billion smartphones, most of which are powered by the Apple App Store and the Google Play Store. With millions of apps on each, the smartphone is now the predominant computing device in the world. 

How Smartphones Have Changed Business

Today, the manner in which we communicate, collaborate, and compute has completely changed. These devices have changed the way that people can be productive. This uptick in mobility has helped develop the following changes:

  • Remote workers - Today, remote workers are commonplace. Thanks to all the solutions built for mobile devices, employees can do work from anywhere just like they would have done it at the office. 
  • Social media - The subsequent development of social media provides mobile users contact with their family, friends, and contemporaries from any place at any time. 
  • Immediate demand - This may be the most important consideration that increased mobility has offered people. With the ability to get what they want when they want it, they expect quick responses and resolutions to problems in a blink of an eye. 

The smartphone is one of the best tools you can use. Today’s options are more powerful than ever. For more information about how to maximize your business’ productivity through mobility call the professionals at Coleman Technologies today at (604) 513-9428.

0 Comments
Continue reading

Is there a Difference Between Restarting and Just Turning It Off?

What’s the Difference Between the Shut Down and Restart Processes?

Before Windows 8, there was no difference whatsoever (aside from the obvious fact that Restart would start the device back up). This changed, however, with the introduction of Windows 8, and a new feature: Fast Startup.

Shut Down

Still present in Windows 10, Fast Startup shortens what was once a much longer start process after a user had clicked Shut Down.

While all a user’s files and programs are still shut down, the heart of the operating system is just put into standby mode. Please note that it does power down everything, unlike hibernate and standby. This makes it much easier for Windows to reactivate. However, since not all processes are completely stopped, present issues won’t be affected. Your problem will still be there the next time the workstation is turned on.

Restart

On the other hand, restarting the device actually does put a stop to all processes and resumes operations with a fresh boot on the motherboard level. This is why restarting your computer seems to take so long as compared to manually turning it off and on again.

So, the difference is really in the granularity of the shutdown process. Counterintuitively, “shutting down” a computer leaves more components active than a restart does, which is why restart is the process recommended when troubleshooting an issue.

So, while we may recommend that you “turn your computer off and on again,” or “reboot,” what we really mean is “restart your computer.”

For more assistance in dealing with pesky technology issues, lean on the managed services that Coleman Technologies provides. Learn more about what we offer by calling (604) 513-9428.

0 Comments
Continue reading

A Brief Review of Various Cybercrime Statistics

Ransomware

Imagine trying to access your computer (or your network as a whole), only to find yourself locked out and presented with a demand for payment in exchange for your files to be decrypted. This is precisely the scenario that ransomware puts its victims into, usually with a deadline to pay up under threat of the destruction of the encrypted files. If you’ve heard about Cryptolocker, WannaCry, or Petya, they are what we are referring to.

In 2019, a business was infected with ransomware once every 15 seconds, racking up a total of $11.5 million in total losses. Spam and phishing attacks were responsible for infecting 66 percent of affected companies, and in 2017, almost half of companies surveyed were affected by ransomware.

Denial of Service

Denial of Service (DoS) attacks, and their more-popular offshoot, Distributed Denial of Service attacks are the most common form of cyberattack. Using automation, an attacker has resources batter a target with the aim of taking it down. The rise in Internet of Things-enabled devices now allows an attacker to take over these devices and turn them against a single webpage. Naturally, this takes the website down.

The biggest DDoS attack on record happened on March 5, 2018, but was fortunately unsuccessful in taking down the targeted ISP… despite clocking in at 1.7 TB/s. On average, one of these attacks costs somewhere between $20K-to-$40K each hour, or in other terms, just under the average American worker’s annual salary. In the UK, businesses lost £1 billion to cybercrime in 2019.

Man-in-the-Middle

A Man-in-the-Middle attack compromises any communications between a business and their contact. Any and all data can be interfered with, allowing cybercriminals to have their way with personal data, business correspondence, or financial data that is transmitted. It can be intercepted, altered, or redirected, potentially causing more problems than can be counted. The worst part: because Man-in-the-Middle attacks are relatively easy to carry out, they are rising in popularity on a daily basis. They are most commonly used to extract information, whether personal or professional, that otherwise wouldn’t be available. This includes things like login credentials, banking information, or payment card data.

Okay, that wasn’t the worst part. The worst part is that the majority of servers are still vulnerable. As in, 2016 saw 95 percent of HTTPS servers still at risk.

Phishing

Believe it or not, phishing attacks are ranked as the biggest threat to businesses out there today. Phishing is a kind of social engineering where an attacker will reach out to the victim through some format, from email to instant messaging and beyond, in order to gain access to a secure system by fooling their victim into erroneously trusting them. While phishing emails have been around the block a few times, today’s attacks have grown to be quite sophisticated.

Many statistics surrounding phishing emails demonstrate how effective this relatively simple attack has proved to be. Phishing is involved in 93 percent of all social engineering attacks, and was directly responsible for 70 percent of government network breaches. In the last 12 months, 64 percent of organizations had first-hand experience with phishing, notably, 82 percent of manufacturers. The aforementioned ransomware relies on phishing for 21 percent of its delivery. As recently as 2016, 30 percent of phishing messages were opened.

SQL Injection

Abbreviating a structure query language injection, an SQL injection attack does what it says on the box - it injects malicious code into a target’s SQL servers and feeds the database information back to the attackers. While this is another “golden oldie” of an attack, web-based applications that call for database access have given new life to SQL injection attacks and allowed attackers to extract very valuable info.

It should then come as no surprise that 65 percent of all web application attacks are performed through SQL injections. So, if your organization draws information from a database for an application, you could easily be victimized to a significant degree. Even gamers need to be concerned, as 12 billion out of 55 billion detected SQL attacks that Akamai security experts found were leveled at the gaming community.

Malware

If only these other attacks meant that attackers didn’t have time to try anything else, but unfortunately, that isn’t the case. Malware attacks still rank among both the worst, and most common, attacks against businesses. Of course, there are many types to consider, including:

  • Trojan horses - Malicious code will be concealed within other files and applications and allow an attacker a point of access to a computing system or network.
  • Worms - Malicious and self-replicating applications that travel along and infect networks and individual devices.
  • Viruses - Samples of malicious code that infect applications for a variety of motives, including sabotage and theft of data and other resources.
  • Spyware - Code that, while it seems harmless, piggybacks to software and gathers information about how a device or network is used.

There are many ways for malware to be introduced into a system. Again, phishing messages can be responsible, but many attackers will use something called “droppers.” Droppers are specialized programs that will install a virus after bypassing cybersecurity solutions. Since there is nothing inherently malicious about the dropper, protections usually don’t flag them.

Fortunately, there are ways to protect your business’ resources, network, and infrastructure from the millions of different versions of these attacks - and you need them, as your business is actively targeted by these attacks. To learn more about putting these protections into place, reach out to the professionals at Coleman Technologies by calling (604) 513-9428.

0 Comments
Continue reading

Verified Business SMS Added to Messages

Most users that have an Android device use the Messages application to send and receive SMS messages. Companies that use this platform for marketing could have their messages routinely ignored because people don’t trust the content that comes from seemingly random numbers. 

With verified SMS, however, every message that is sent to a prospect or customer is verified to actually come from the company. In fact, the recipient won’t even receive the message until it is verified. The content is transmitted with the business’ name, logo, and confirmed with a verification badge. Google has stated that the content is never revealed to them, meaning that the content is secure and sent privately like any other text message.

How Do You Turn on Verified SMS?

Obviously, you need to have a device that runs a recent version of Android mobile OS. To turn on Verified SMS:

  • Open the stock Android Messages app
  • In the three-dot menu, access your Settings
  • Access Verified SMS
  • Switch on Verify business message sender 

Now you don’t have to waste time with unverified marketing or sales content. 

For more great tips, visit our blog regularly.

0 Comments
Continue reading

Pros and Cons of Leaning on a Wireless Network

The Wireless Connection

The Pros

There is one obvious benefit: No wires! Not having to run cable is a massive benefit, but the biggest benefit of this might just be the ability to connect devices to a wireless network inside your business. By giving your team access to network resources wirelessly, you’ll see better collaboration, improved productivity, and produce better products and services. 

Additionally, with a strong wireless network, you can promote some strategies that can work to improve your operational effectiveness. One of those strategies is a Bring Your Own Device (BYOD) strategy. Many of your employees bring their smartphones with them when they come to work. By enacting a BYOD strategy, your staff can take advantage of the devices they are most used to advance the goals of the company. 

The Cons

Even many wireless technologies aren’t actually wireless. Even the ones that are, need to be charged regularly, so while expanding your wireless network will provide the ability to compute inside the network’s perimeter, setting up a more collaborative workspace still comes with some drawbacks. Namely speed and security.

Wireless connections are more vulnerable than wired ones. It’s easier for unauthorized individuals to hijack the signal of a wireless connection and can provide a third-party that is looking to gain access, more of it to the critical information that is transmitted wirelessly. 

The Wired Connection

The Pros

When dealing with wired networks, IT admins have more control over what devices can connect to the network. This presents values several ways. First, there is more control over the security protocols on those devices, making contracting malware and other negative outcomes less likely. 

Wired connections also enhance an organization’s ability to keep their devices free from security threats. Controls have improved to the point where it is actually more difficult for attackers to break into a wired network.

Additionally, it may go without saying, but wired networks are overall faster than wireless networks. This speed boost is magnified if there are walls, floors, ceilings, or any other potential interference to seeing optimal speeds over Wi-Fi.

The Cons

The biggest setback to a wired Internet network is the act of wiring the network. Initial setup is a pain, as you need to hide cables and find ways to run cable as to not hinder the thoroughfares around your business. It is also a hindrance for maintenance if a cable fails or hardware has to be moved around due to business growth or restructuring. 

Another detriment to the business is that a wired connection doesn’t allow for the type of mobility many businesses are looking for nowadays. With a wireless connection meetings are faster, more to the point, and collaborative work can be fluid.

You have a business decision to make; and, while it may not be the most crucial one you will make, it can have an effect on how your business functions. For help networking your business, call the professionals at Coleman Technologies today at (604) 513-9428.

0 Comments
Continue reading

Tip of the Week: Four Fundamental Small Business Tech Tips

1. Adopt Technology Solutions

Regardless of your industry, who your business serves, or even where you operate, there are some universal changes that technology has brought to how the average small-to-medium-sized business functions. Methods of collaboration have shifted to digital formats, “coming to work” is no longer a prerequisite to working, and the filing cabinet has been rendered woefully obsolete by other, better options. Cloud solutions are a major contributor to this. I want you to take a moment and consider something: why were any of these changes made in the first place?

It is for the same reason that the assembly line process was adopted, or why we cook our food before eating it: it provides greater benefits than the old way. It is the same with business technology, and you will see this as a common theme throughout these tips. Don’t disqualify yourself from competing by removing your ability to do so.

2. Don’t Shortchange Email

Email is now the gold standard for business communications, for numerous reasons. While a small business might find it redundant to email an announcement, doing so can prove useful to their operations. For instance, let’s say Mary manages a small office with four or five employees. She could easily just announce an important message to the room, but what if James was at the dentist that day, or Rob had excused himself to the bathroom just before? What if Ellen had just connected for an important phone call?

Email provides an easy way for you to communicate with others in your workplace that ensures everyone gets the message, without disrupting operations too much.

3. Go Mobile

While we’re on the subject, let’s consider Ellen for a moment. In the past, making a phone call would tie her to her desk, so any distractions in the office would be an unavoidable issue. Nowadays, there are many ways that Ellen could hypothetically remove herself from the situation while still fulfilling her responsibilities. For instance, a Voice over Internet Protocol solution could allow her to make and take calls from anywhere she could establish a connection, so she could presumably find a quieter area to work without sacrificing her ability to do so.

Other solutions also offer some form of mobility, assuming they are backed up with enough security. For instance, if James was unable to get to the office after his dental appointment, he could still work on his assigned tasks from home with the right cloud-based solutions.  Again, this helps eliminate his reliance upon getting to the office in order to produce.

4. Don’t Underestimate the Cloud

We’ve already touched upon how the cloud has shifted businesses, primarily focusing on how useful it is for hosting and storing data. However, this isn’t the only thing the cloud can do. Cloud technology enables today’s businesses to make use of tools that would ordinarily be out of reach. Yes, its storage capabilities can help make data more accessible to team members who need it, but it can also assist you in preserving your data in case of some disaster, give you access to computing resources that you couldn’t procure yourself, and provide you flexible access to your business applications.

5. Improve Your Security

A small business’ size once protected it from cybercrime, but nowadays, all businesses are fair game. In order to remain secure against these attacks, the right defenses need to be put in place. Things like firewalls, spam blockers, antivirus, and assorted other solutions help to reduce these risks. Additionally, any employee could potentially let in a significant threat, so all need to be educated on how to spot them, and the proper procedures to dealing with them.

Coleman Technologies is here to assist you in implementing these modern IT essentials, as well as maintaining them for you through our remote monitoring and access capabilities. To learn more about how else we can help your growing business, give us a call at (604) 513-9428.

0 Comments
Continue reading

Integration Brings Benefits to Business

Planning Stages

Most businesses use some type of management program to streamline things. Whether that be a simple Customer Relationship Management (CRM), a more intuitive Professional Services Automation (PSA), or an end-to-end Enterprise Resource Planning (ERP) software, your company relies on software to get the job done.

Today, there is an opportunity to mix your business' production software--whether it be communication integration, file sync and sharing, another form of back-end integration, or a customer-facing application--with your management platform. Planning an integration like this can have big benefits, especially if you are beginning to use analytics to help you make critical business decisions. After all, the whole point in integrating your various business components is to make data flow better.  

The main hurdle to accomplishing this is, of course, how do you go about getting this done? If your organization doesn’t have on-staff developers, outsourcing your integration project quickly becomes your only recourse. If you are going to pay someone outside your company to connect your proverbial pieces, then you need to have an idea of what you want to accomplish ready when you start the relationship. It is essential that the outsourced developer knows your needs, and that you provide them with tools and access needed to complete, and thoroughly test, the integration. Most simple integrations can be done cheaply, and can provide massive returns on your investment, while larger integrations may not see the immediate return, but over time can provide massive cost-and-time-saving benefits.

Integration Benefits

Speaking of benefits, we’ve already touched on the main benefit of software integration: Unimpeded data flow. Integration can also result in:

  • Cost savings
  • Increased end-to-end efficiency
  • Organizational growth
  • Improving business with no downtime
  • Enhanced business analysis and intelligence

According to one study, small businesses that build a completely integrated suite can boost sales by upwards of 12 percent, reduce overhead by increasing inventory reporting, and increase revenue-creating situations by almost 50 percent.

If your organization has seemingly tried it all to boost productivity and efficiency, you may be missing out on a great way to improve both, while also providing a way for businesses to better plan for the future. Do you think that integrating your business’ software will help your business? Leave your thoughts in the comments section below.

0 Comments
Continue reading

IT Trends SMBs Should Focus On in 2020

Business Automation

As businesses have strict cost considerations to take into account, it is likely that automation will grow in popularity. While perhaps more expensive to initially implement, automated solutions can easily provide a return on investment by clearing schedules of the annoying (if necessary) repetitive tasks that otherwise eat up your human employees’ time. This combination of machine learning and artificial intelligence is known as Robotic Process Automation and enables businesses to greatly reduce how often human employees need to interfere in these tasks.

Some professionals have been hesitant to invest in AI-driven solutions, primarily due to incomplete algorithms and the negative opinion towards “replacing human jobs with robots.” However, artificial intelligence has seen some success in reducing HR costs through its inclusion in some software, and so RPA is experiencing considerable growth.

Furthermore, many of the solutions available today can be used in more simple applications, including the improvement of communications, reducing process inefficiency, and eliminating redundancy.

The Internet of Things

“Smart” devices are quickly becoming the new norm, even in the business environment. Many establishments are directing their budgets toward devices meant to improve security, evaluate utility usage, manage supply chains, and other operations.

The prevailing motivation behind implementing and integrating these devices is simple: better cost control. If a business has the tools to track and manage their costs, the entirety of the business can be better optimized. When fewer resources are expended on a business’ crucial interactions and processes, the business inherently becomes more sustainable.

Various Cloud Services

While it may seem like there has been ample time to take advantage of every aspect of the cloud’s capabilities, new services and utilities are still emerging. Sure, most businesses have adopted the cloud to support their email and file sharing needs, but this is the relative tip of the iceberg as far as the cloud’s potential is concerned. Businesses can now consider options like Infrastructure as a Service (IaaS), Security as a Service (SECaaS), and even AI as a Service (AIaaS), confident in the reliability of these increasingly popular utilities and others.

Cloud vendors are also creating new services to see to a business’ needs. The largest cloud vendors can effectively fill any requirement a business has through increasingly specific services. As a result, SMBs definitely have options to help resolve their operational hurdles.

Cybersecurity Awareness

At this point, there is plenty of precedent to establish -- without any doubt -- that businesses of every size, industry, and resource level need to have a cybersecurity strategy in place. While many may argue that enterprise-grade security solutions are above their means, the aforementioned precedent makes this argument untenable. 66 percent of all SMBs were targeted by some kind of cyberattack in 2019, and 2020 is already projected to be just as bad, if not worse.

Fortunately, there are ways that a business can improve their cybersecurity preparedness, such as:

  • Staff training - It is a simple concept: the more able your employees are to spot and properly handle a potential cyberattack (like phishing), the less likely your organization is to be victimized. Security has improved greatly, thanks to methods like encryption, rendering your employees your most vulnerable point. Properly training your staff to identify and report suspected threats, the safer your network will be.
  • Threat intelligence - If you know how you are most likely to be attacked, based on the vulnerabilities that cybercriminals usually target, you will be better prepared to handle these attacks. Think of this as the practical application of “knowledge is power.”
  • Multi-layering - With all the potential security issues that businesses face today, businesses of all sizes need to have a strategy in place to reduce all risks that face them. Therefore, all businesses and especially small businesses, need to have redundant file backup, DNS protection strategies, and AI/machine learning-enabled security features in place.

Improved Mobility

For the past decade, businesses have struggled with mobilizing their workforce. As a result, with today’s emphasis on remote work and other mobility-related concerns, solutions that enable a mobile workforce while eliminating risk have increased in importance. Now, increased connectivity, improved data security, and data protection policies like Bring Your Own Device (BYOD) allow your operations to be completed from inside and outside of your workplace, with resources safely delivered to your employees as they need them.

Coleman Technologies can help businesses around British Columbia adopt these approaches, or improve their use of them, to assist their operations and boost profitable productivity. To learn more, give us a call at (604) 513-9428.

0 Comments
Continue reading

Tip of the Week: How to Avoid Phishing Scams

What Exactly Is Phishing?

The practice of phishing is not new. It has been used for much of the past decade. The strategy goes like this: hackers use deception to get a user to provide their own credentials, thus giving them unknowingly to the hacker. The hacker then accesses the account legitimately (as the user) and has free reign over the entire account. Sometimes they will go in and siphon data and sometimes they will hijack the entire account, but regardless of the hacker’s intentions a successful phishing attack is a successful transfer of power over an account. 

What’s worse is that you can get phished in multiple mediums. Email is the predominant channel where phishing attacks are carried out, but people can (and do) get phished over social media, instant message, or via text message. There are even phone-based or snail mail phishing attacks that direct users to go to a fake website where they would provide their credentials and/or personal information. 

There are even different forms of phishing based on their intended targets. The general strategy behind traditional phishing attacks is to send emails out to as many people as possible, hoping to snare unwitting recipients into their phishing nets. Today, with more personal information available about people, there is phishing that targets individual people. This is called a spear phishing attack. Then there are spear phishing attacks that are carried out against business and organizational leaders. These are called whaling attacks. The intended imagery aside, phishing attacks are getting more direct, more deceitful, and more serious. 

Spotting Phishing

For all of the bad news surrounding phishing attacks, there is some undeniably good news: with a critical eye, you can tell when you are being phished. You aren’t going to fall for these types of attacks if you know what to look for. Today, we’ve put together a short guide on how to determine if you are dealing with a phishing attack and how to proceed when you are.

Look for Warning Signs

There are a litany of warning signs that will help you spot a phishing attack. Most of them are pretty obvious, and some of the more subdued ones come with telltale signs. 

Does the message have spelling and grammar mistakes? 

Not many businesses will send out official correspondence with grammar and spelling mistakes. This should be the first sign that something is amiss. Most phishing messages come from supposedly-reputable organizations and while a spelling or grammar mistake does happen from time-to-time, several mistakes won’t happen.  

Does the message deal with curious circumstances? 

One of the biggest telltale signs that you are dealing with a phishing attack is the tone of the message that is received. Does the message reference immediate situations that need to be remedied? Does it mention money or illicit a sense of fear or anxiety? If it has these elements, it’s probably not legitimate. Think about it: most organizations that need you to act immediately will have specific ways of contacting you and that correspondence will make it clear that you are dealing with a legitimate organization.

Does this message have a trusted URL?

Most phishing attacks will redirect to a website that is set up by the hacker. You probably shouldn’t be clicking on any links sent to you in an email unless you are sure who sent the email. One way to determine whether or not a link is from a reputable source is to mouse over the link and see where the link goes. If you get an email from Amazon and the link goes to amazorn.com, you are staring at a phishing email.

Protecting Your Assets

There are a couple simple ways to ensure that you or a member of your staff doesn’t fall for phishing attacks:

  • Use technology. A spam blocking filter on your email will go a long way towards removing unnecessary and potentially-malicious emails from hitting employee inboxes in the first place.

  • Training. Make sure your employees are trained to spot and properly handle attempts that may come through. By starting with the end user, you’re taking away a lot of the power that phishing has.

At Coleman Technologies, we appreciate the importance of secure workplace practices. If you’d like to learn more about phishing, and how we can help stop it from hurting your business, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Social Engineering Isn’t Going Away

What is Social Engineering?

Think of it like this: online, you have some type of social currency. Your personal information, your data, your interactions, your profiles, they all add up to your online life. If someone were to use that information to trick you into providing them access to your secure online accounts, you would be the victim of a social engineering attack. 

Basically, a hacker uses what amounts to the fundamentals of human psychology to gain unauthorized access to an account. Rather than exploiting a vulnerability within a system’s technology, a social engineer will take advantage of the human resources to gain access through relatively simple psychology.

Successful social engineering can be the result of many different actions. Some include: carelessness by an individual, perceived kindness, reaction to fear, and business as usual. Let’s take a look at these actions and how social engineering schemes work as a result.

Individual Carelessness

When there is a lack of diligence carried out by an individual, there are openings for a social engineering attack. This includes trash thrown out with information on it, keeping login credentials out in the open, and other careless actions. It’s important that you and your staff understand that the best practices of password protection, such as using a password manager, are crucial to maintaining the integrity of your company’s network and infrastructure.

Perceived Kindness

Many people won’t think twice about helping someone that asks for help. Social engineering attackers take advantage of the better angels of our nature, by using people’s helpfulness to gain access to secure computing resources. Any person can fall for this type of attack. This is why we stress that in order to keep your digital and physical resources secure, a critical eye for potential intrusion works. That doesn’t mean you have to be a jerk, but if a situation is presented to you that’s out of the ordinary, take anyone’s helplessness with a grain of salt.

Business as Usual

When we picture a hacker, we all tend to think about them the same way. They are brooding people sitting in a dark room typing away at a computer. In social engineering attacks, this couldn’t be further from the truth. A popular social engineering tactic is to gain physical access to a large business--where there are often a lot of moving parts--and then spend time at the business looking for ways into secure digital environments. This could also include straight hatchet jobs, where your employees would help people outside of your business sabotage your access control systems. 

Reaction to Fear

Finally, fear is one of the best motivators. By striking fast and threatening all types of negative consequences if a worker doesn’t help them get into a secure computing system, this kind of cyberattack can be a major problem. 

Coleman Technologies Can Help Protect Your Business

If you are looking to secure your network from cyberattacks, including social engineering, the IT professionals at Coleman Technologies can help. Call us today at (604) 513-9428 to learn more about how we can help you with the training you need to keep social engineering from causing problems for you.

0 Comments
Continue reading

How Well is Your Printing Managed?

Depending on their needs, businesses might have a series of consumer-grade printers, or they may rely on a centralized network copier/printer. Regardless of how you go about using the printers at your business, ensuring they are managed centrally will help a business cut down on problems. 

You Can Manage and Control the Expenses Tied to Printing

Many businesses don’t manage their printers at all. As ink/toner prices continue to climb, this can produce major, pointless costs. That’s why some businesses have begun to push a paperless strategy, using digital means to store, search, share, and back up organizational files. This strategy, while coming with substantial costs, takes the guesswork out of the whole process.

Reducing the amount that your users print can really make a difference over time. In a recent industry survey conducted by Xerox, it was found that 64 percent of small businesses aren’t tracking their printer usage costs. The report also revealed that nearly half of companies believe that their employees were just printing out their emails. 

Printer Management is Worth Investing In

To avoid the waste that comes with this type of behavior, a small business can deploy tools used to control, report, on, and restrict printer usage. Since every business has different uses and requirements, using a permissions-based system allows for centralized management over your printers.

Additionally, by having a print management platform in place, those endpoints are patched, updated, and protected against threats. There have been many cases over the last couple years where cybercriminals have utilized office printers as an entry-point for spreading malware or breaching data. These types of exploits can cost your business a lot more than another ream of paper or toner cartridge.

Going Paperless May Be Right for You

For some organizations, it may be worth it to reduce your printing costs by going paperless. Going completely digital means that documents can be searched, copied, organized, and shared securely, and backed up without requiring paper, toner, or bulky filing cabinets. Today, even contracts can be shared and signed digitally without a single sheet of paper being used.

Would you like to learn more about paperless office solutions? Contact us today at (604) 513-9428.

0 Comments
Continue reading

Tip of the Week: Making Microsoft OneDrive Work for You

For context, it helps to know that Microsoft OneDrive is a cloud storage platform that just about any business could make use of, regardless of its size. After all, any size of business will have to remain organized.

Speaking of which, our first tip covers how OneDrive can make this organization super convenient for you.

OneDrive Files On-Demand

Files On-Demand gives your users the ability to effectively link their File Explorer to OneDrive, which enables them to work with files found in your OneDrive without downloading all of them to their device. Not only does this save real estate in the device’s storage, it allows work to continue offline through a simple proactive switch in a particular file’s settings.

Known Folder Move

OneDrive can also work as a simple backup option, although it certainly should not replace a comprehensive plan. Regardless, Known Folder Move allows users to have the contents of certain folders automatically synchronize with their OneDrive storage. This can be set up during the initial installation of OneDrive, or at any time you have need for it.

Integration with Microsoft Outlook

Consider what typically happens when you try to share some kind of Office document as an email attachment for someone to work on: you aren’t sending them access to your file, you’re simply sending them their own copy. OneDrive fixes that by enabling a user to share their files as though they were attachments, editing the permissions provided on the fly. As a result, the actual file is being collaborated on, really allowing work to be done.

What has been your experience using OneDrive? Share your impressions, as well as any other questions we can help with, in the comments!

0 Comments
Continue reading

What’s the Point of An IT Assessment

Promoting Assessment

The purpose of having an assessment done on your organization’s information systems is simple: to gain a more complete understanding of how your IT works in regards to your business. That’s not to say that having an understanding how everything fits will, in itself, make your business’ IT more effective. No, that’s on you, but in order to know that you need to change, eliminate, or reconfigure parts of your IT strategy, understanding what systems do what is essential. 

Moreover, the assessment gives decision makers a look at how inefficient their IT strategy is, and how to make the changes necessary to make those systems work better for the company. A thorough IT assessment will have several parts to it. Today, we are going to go through what to expect when you get an assessment; or, what you need to look at if you want to objectively assess your own business’ IT.

Two crucial metrics that will repeatedly make an appearance are your total cost of ownership, and your return on investment.

  • Total Cost of Ownership (TCO) - This takes a look at the comprehensive cost of a given piece of business technology. Therefore, it goes beyond just the cost of procurement, and also considers how much the solution will cost to operate and maintain, as well as how much additional cost any downtime could create.

  • Return on Investment (ROI) - This familiar metric measures your profit from a single investment, once all procurement and operating costs have been covered.

Let’s look how these metrics come into play during an IT assessment:

At the Start

Typically, if your organization is going to conduct an IT assessment, there is some reason for it, and the results of this assessment (or audit, if you prefer) will likely have more to do with your future investments than many other actions would. This fact dictates that the audit is carried out by IT professionals who have the training needed to recognize inconsistencies, irregularities, and most importantly inefficiencies. 

Action

Any good IT assessment will begin by putting together a comprehensive Asset Detail Report. This will tell you what IT resources you have, when they were implemented and serviced, the latest firmware and software license and much, much more. This will cover all of your IT, including printers, copiers, cloud-based platforms, computing and networking hardware, software, and more. 

Additionally, you might find it helpful (at this stage) to create something known as a site diagram  or network map. This visual guide is used to map out the flow of data through your business.

Analysis

The assessment team will next audit your network by performing a SWOT analysis (which analyzes your business network’s strengths, weaknesses, opportunities, and threats). In this process it will become more clear what potential problems your network has and what it’s doing to function efficiently. There will be investment suggestions aimed to help reduce your organization’s IT risk, while also promoting solid TCO rates and improving your ROI.

Compilation

Finally, a risk report is assembled that combines the results from a variety of factors, including:

  • Network hardware
  • Security configuration
  • Servers
  • VPN/Remote Access
  • Websites, domain names, and hosting provider
  • ISP
  • Phone System
  • Email, messaging, and conferencing
  • Computers, mobile devices, tablets
  • Cabling
  • Printers
  • Software and mobile apps
  • Procedures, policies
  • Technology vendors

There are some other factors included in a finished assessment report. These include the status of domain controllers, the Active Directory settings, other potential vulnerabilities (like weak passwords and missing software updates), and any known network vulnerabilities.

Your finalized assessment will give you a comprehensive report that will be an indispensable tool for decision makers.

If you are looking for help identifying your company’s IT issues, call our knowledgeable technicians today at (604) 513-9428. 

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image