Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Upgrades Are Necessary as Microsoft Retires Two Heavy Hitters

The future of your business depends on how you respond to these End of Support dates. In fact, along with Windows 7, solutions like Windows Server 2008 R2 will also lose support, putting businesses that haven’t updated their infrastructure in a while in a precarious place. Believe us when we say that you are potentially underestimating the process of implementing new software solutions for your business in the face of these End of Support dates.

What Does End of Support Mean?

You may receive messages on your device asking you to install updates. While it might almost always be an inconvenient time to make sure this happens, the fact that they won’t be there in the future should scare you. These updates are meant to help you dodge issues that could become larger problems in the future, meaning that if an End of Support event is upcoming, you’ll want to prioritize upgrading away from unsupported software.

Why is this an Issue?

Security updates are important, but so are the patches that resolve everything from minor operational issues to major security flaws and vulnerabilities. Hackers take advantage of everything they can find to create trouble for your business, and it’s likely that after the End of Support date, the number of threats will only multiply. It’s best to prevent these security issues from becoming major disasters by ensuring your updates are applied as they are released.

By taking preventative action now, you can save your business countless amounts of time and resources. Furthermore, wouldn’t it be nice if you had technology from this decade? We assure you that the update to a more recent operating system will be much welcomed after the fact, no matter how difficult the implementation process winds up being.

Coleman Technologies can help your business ensure that it upgrades away from outdated software in a timely manner. To learn more about this process and your options, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Getting a New Computer? We Can Help, Part V

Deciding on a Brand

Brand can boil down to something as simple as user preference, but ultimately, all computer manufacturers--namely Dell, Asus, Lenovo, HP, Acer, and friends--have access to the same basic components and parts. It doesn’t start to get complicated until you reach the higher end of the spectrum, like with gaming rigs and video production.

Brand does, however, make a big difference in regard to laptops and all-in-one-devices. For example, HP and Microsoft have high-end graphic design all-in-one desktop computers. Microsoft, HP, and Lenovo have laptop options with the option for pen input from artists. Beyond this, we start talking about specialized hardware and devices meant to be used for certain tasks. In addition to reading a lot of reviews from big box stores, we recommend working with Coleman Technologies to help your business find the best specialized hardware.

Full-Size Desktop vs Compact Desktop

This has to do with the size of the desktop case. Full-size desktops are easier to upgrade and maintain, and they often cost less. Compact desktops are slim desktops, but they might have a limited capacity to upgrade. Smaller designs are easier to deploy for office workstations, whereas gaming PCs and video production machines require more space for hardware and cooling.

Read Reviews and Benchmarks

There are many sites out there that are invaluable for finding information on specific models of desktops and computer hardware. The Internet is full of reviews, but the most valuable might be some on the websites of stores you visit regularly. High-end systems will have more specific information mentioned in their reviews simply due to the fact that there are bigger nerds picking up these devices. You will want to pay attention to make sure you’re not spending more than you need to on desktop or laptop hardware.

Be Aware of Bloatware

Pre-configured desktops from certain brands can come with pre-installed software. It’s not always bad--a free trial of Microsoft Office might be just what you need--but often times, the pre-installed software can slow down your device. You’ll want to remove some of this software so you can continue to use your centralized antivirus and licenses for Office.

Eliminating Your Old PC

When you migrate your data to a new computer, you’ll need to take great care in wiping your old drives thoroughly. You should leave this task to the professionals, unless you plan on physically destroying the drives. Depending on your industry’s standard procedures and compliances, you may need to make sure it gets done professionally.

You also have several options for recycling your PC, but we always encourage users to not just throw their computer in the trash. Computers have many harmful elements in them that simply can’t be disposed of in the traditional sense. We also recommend against donating a PC that your business used previously without having it professionally wiped first. While it’s a nice gesture to donate something you don’t need anymore, it could put your business at risk.

Need Desktops for Your Office?

If you want to purchase desktops, it’s best to do so with the help of trained IT professionals who know how to configure, optimize, and license your devices to help your staff work as best they can. We can also help on the infrastructure and network side of things to make sure your office can accommodate growth. We also offer 24/7 monitoring and maintenance to keep your computers working properly. To learn more, reach out to us at (604) 513-9428.

0 Comments
Continue reading

VoIP Can Present Some Unexpected Value

Voice over IP is a service that utilizes something that you already pay for to eliminate the costs of telephone providers from your budget. VoIP uses your internet connection to make and receive calls, so in a way your business is saving money and consolidating its infrastructure.  VoIP is also customizable to make sure that it suits the specific needs of your business. Here are some of the major benefits that you can expect to reap from utilizing a VoIP solution.

Cost Savings

Telephone providers tend to bundle services together as a way to increase billing and increase usage of services. You might get your telephone service from a local provider that also bundles cable channels and other services you have no interest in. To avoid this, you can use an Internet provider for your phone service to consolidate costs and make managing your infrastructure easier.

Scalability to Suit Your Organization

New employees in your office always create a certain sense of excitement, but they also mean that you’re investing time and resources into accommodating them with services, including giving them a phone terminal and extension. Now, you may remember running cables and reorganizing your business to make this happen, but with VoIP, it’s as easy as creating an account and giving them a handset or headphones. It certainly makes implementing a telephone more flexible.

More Features and Dynamic Services

VoIP is a very dynamic communication solution, giving you access to multiple services like messaging, voice chat, conference calling, and so much more, all to supplement your voice chat system and give you a ton of control over your services.

Coleman Technologies can help you implement the best VoIP solution on the market. To learn more, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Give Your Users a Little Support and See What They Give Back

So why not make sure they have the technical support they need?

We’ve seen this all too many times. An end user is constantly running into an issue on their computer that interrupts their day and prevents them from accomplishing a task in a timely manner. Maybe they are trying to get a proposal or presentation finished, or push out a marketing campaign.

Either way, perhaps your employee feels that his/her performance on a certain project will help them achieve a bonus or raise or commission. Maybe they just want to perform well. You can’t knock that kind of attitude, right?

Unfortunately, there’s this computer issue. It’s getting in their way. They aren’t running on all cylinders because they are always having to reboot or they can’t open the software they need, or something just isn’t working right. Whatever it is, they need help.

In some cases, they might go to a coworker and seek help. They might contact a manager. They might go directly to you. Everyone has their own work to do, and even if this person’s tasks are important, solving their computer issue might not be a top priority.

Depending on how you handle your IT, you might know that in order to get their issue looked at, you need to call your IT provider, get walked through the issue, approve a remote session or on-site visit, authorize a quote, etc. That’s a lot to distract you from what YOU were working on.

What we end up with is an employee who’s frustrated because they can’t perform well. It reduces morale and it could belittle their position within the company. They can’t work effectively and their project or task can take longer than it normally would. It’s a lose-lose situation.

Grant Your Staff Access to the Helpdesk

Now imagine the scenario like this: the user runs into an issue. They know that they don’t need to go to you for IT issues. They know that they can just pick up the phone or email in a ticket describing their problem and it gets handled.

In many cases, they could put in a ticket mid-morning and have it resolved by the time they are back from lunch. For more severe issues with a greater impact on operations, it could be solved even faster.

If your employees are empowered to report issues and get help, they feel more appreciated and more in control over their own work. If they need to get approval or be told that the issue is too minor to pay for a support call, it demeans their perception of their position.

That’s why we encourage our clients to let their staff access our help desk. For many common issues, it can fall under your managed agreement, and the business owner can be hands-off for the minor issues and support questions that would normally bog you down.

It’s time to give your staff the freedom to get support. It will save you time, and increase their productivity. Want to learn how we do it? Give us a call at (604) 513-9428.

0 Comments
Continue reading

Getting a New Computer? We Can Help, Part IV

The Number of Monitors

Do you have more than one monitor for your home PC? Most people don’t, which is why having a second one is all the more interesting once you get to a work environment where it’s practically necessary. Having more than one monitor can dramatically improve your productivity by spending less time moving applications around and having multiple applications open without needlessly complicating the screen.

Utilizing multiple monitors is so common these days that most desktops will support it right out of the box. You need to check to see if your desktop comes with two or more ports first, though. You’ll see several options for connecting displays to your computer, including the following:

  • VGA/DVI: These older connections consist of a plug with little pins that need to be connected and tightened with screws. Older monitors will use these connections, but most desktops will have at least one VGA port to ensure compatibility with these connections.
  • HDMI: HDMI is the type of connection used by flat-screen televisions, modern game consoles, and Blu-Ray players. As such, you can assume that it’s pretty standard these days.
  • DisplayPort: DisplayPort is similar to HDMI, as it’s another cable that can carry video and audio. DisplayPort will eventually become the standard, but for your purposes, you might as well consider HDMI and DisplayPort the same. The only reason not to is if you look into the finer details of these cables.

Budget desktops will require that users examine how many ports are available on the device. It would stink to get the wrong kind of monitor because you thought you had a port for that particular type. Some types will also require connectors or adapters, so be sure to do your due diligence before purchasing a monitor.

Integrated Video vs Dedicated Graphics

Integrated video simply means that your computer processes video and graphics from hardware that is built in on the motherboard rather than a dedicated graphics device, like a video card. Most office PCs don’t need dedicated graphics, but they are helpful for video editing and gaming. Of course, this is also where the price starts to increase. High-end graphic cards can cost anywhere between $500 to $1,500.

Most graphic card chipsets have multiple models, and with so many companies out there selling their own brands of hardware, purchasing a graphics card might seem a little intimidating. While you don’t have to worry about things like 3D rendering or video editing (unless you’re making a gaming or video editing rig), the graphics card that comes with your desktop’s hardware will likely be adequate.

Are You Purchasing Monitors for Your Desktop?

With so many options to consider, we want to outline some of the important specs you’ll need to focus on when looking for a monitor:

  • Resolution: The resolution of a monitor is how many pixels the monitor will display. Most desktop monitors display at a 16:9 display ratio, or “widescreen.” This is the current standard, though there are other ultra-wide monitors that utilize either HD, FULL HD, Ultra HD, or 4K to break the mold.
    • HD: In a bizarre twist of fate, HD is actually the low-end of the spectrum, displaying its best on small screens. This resolution tends to be known as 720p, and it’s the go-to display for budget laptops.
    • FHD: Full HD is known as 1080p, and it’s the most common resolution you’ll see. It’s the one that you should focus on finding whenever possible.
    • UHD: Ultra HD is a pixel resolution of 3,840 x 2,160. This might not be available on low-end desktops without dedicated graphics cards, or at least integrated video that supports higher resolutions--particularly if you’re using multiple monitors.
    • 4K: 4K is technically a higher resolution that UHD, though some people think that it’s roughly the same thing. These displays are much more expensive than the average office needs, and they are only particularly useful for high-end gaming, video production, graphic design, or other visual tasks. Budget hardware often times won’t even support 4K, although this is a trend that is slowly being broken down.
  • Refresh Rate: The refresh rate is measured in milliseconds. This is a statistic that measures the speed that your monitor can update its image. High refresh rates give the impression that the time between you moving or clicking the mouse and the time it takes for the computer to register the movement is delayed. This was a much bigger problem in the past but suffice to say that it’s not as big of an issue in today’s environment, unless you are a gamer.

Coleman Technologies can help you determine the best options for your display needs. To learn more, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Unveiling the Managed Service Provider

Managed services differ from the traditional method of IT management and maintenance. Perhaps you remember the old days when you sought technology repairs as needed thinking that it actually saved you money. While it may have been true to an extent in the short term, did it actually save you money for the long haul? We’re willing to bet that it didn’t for one big reason: the downtime associated with technology maintenance.

When we talk about downtime, it’s important to remember that it’s a major cause for budgets being flattened. If you are waiting until your organization suffers from technology issues before resolving them, you’re practically begging for operations to be affected by downtime. Wouldn’t it be better to actively prevent these issues from evolving into bigger, more costly problems that are much more difficult to resolve?

It is this mindset that managed service providers take on. Managed service providers and preventative technology maintenance aim to eliminate the majority of downtime and save businesses serious capital in the process. 

Furthermore, managed IT makes for easier infrastructure management, as it involves outsourcing the majority of your organization’s technology management to a third party. In this way, you save time and resources from being consumed in a way that is counter-intuitive to operations. Remember, your employees aren’t necessarily learned in repairing technology, so unless they have actually been trained in how to administer IT help, you should leave it to the professionals.

Coleman Technologies can provide your business with the preventative technology maintenance and solution management needed to ensure operations are always at their maximum. Not only that, but we can also maintain your solutions and host them on our infrastructure specifically so that this responsibility doesn’t fall on your shoulders. In other words, you’ll have an easier time managing your business because you’re not bogged down trying to manage all of its technology solutions.

To learn more about managed services and everything we can do for your business, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Getting a New Computer? We Can Help, Part III

Data storage has progressed rapidly in the past few decades, ranging from punch cards to floppy disks (and then less-floppy disks), to rewritable compact discs, all the way to the countless storage devices that are used in the workplace today. Your standard floppy diskette measured in at 3.5 inches wide and could contain about 1.44 MB (megabytes) of information. While this was impressive at the time and enabled these disks to hold large text files, they were unable to hold something like an MP3 file on one disk alone.

A CD can contain around 650 MB of data, while a DVD can hold 4.7 GB. A single DVD can hold just as much data as approximately 3,342 3.5-inch floppy disks, just to give you an idea for how much things have changed. Blu-Ray disks can store even more data, up to 10 times as much as a DVD can. For reference, Google’s data storage exceeds 15 exabytes, which would take 26.2 million Blu-Ray disks to fill.

How Your Use Affects Your Storage Needs

First, you’ll need to consider your storage needs before implementing any storage device. For example, if your computer will be plugged into your office’s network, and most of the data is stored in a central location or cloud solution, the device probably doesn’t need so much onboard storage. It will likely only need enough for the operating system and any programs on it that aren’t associated with the cloud, as well as a little breathing room for file storage and other oddities. If your computer is for personal use, gaming, or a home office, you should invest a little extra in your storage. This also applies for video production, as it requires dedicated storage devices for these specific file types.

Comparing HDD and SSD Storage

When examining your options, the devices used will have at least one of the following acronyms: solid state drive (SSD) or hard disk drive (HDD). Some devices have both of these storage options.

Hard Disk Drives (HDD)

Hard disk drives are components in your computer that store data, and they have been used for over three decades. They utilize tiny electric motors, a spinning stack of magnetic platters, and a small arm to read and write data; all housed within a heavy metal construction. They work similarly to record players, though they move far faster. These drives are often called mechanical drives due to their many moving parts.

HDDs can hold large amounts of data, but they are slower and less energy-efficient, for sure. They are also more fragile, and if you’re not careful, you could lose data due to roughing up your device a bit too much. For this express purpose, laptops tend to avoid using HDD storage, both to save battery life and maintain durability. Still, HDDs can be utilized for high-capacity storage options, as they are a cheaper alternative to solid state drives.

Solid State Drives (SSD)

Unlike the hard disk drive, SSDs don’t have any moving parts. All data is recorded electronically. While they are expensive, they are much safer and more reliable to use than an HDD. They also work faster and experience less wear and tear over the years, making them less likely to fail and cause problems with data loss. The biggest issue with SDD stems from limited capacity, and higher storage drives can increase the price considerably. For comparison, a budget HDD with 3 terabytes of storage would set you back less than a single terabyte SSD at the time of this writing.

What Are Your Storage Needs?

For the most part, your computer storage needs will depend on what the computer is being used for. Start by thinking about whether an SSD will be beneficial or not. If you don’t use your PC for much, then perhaps you will only need one that stores 128 or 256 GBs of storage. If your data is stored on the office network, you won’t need much onboard storage.

If your computer is for personal use, you’ll want to invest in between 512 GB and 1 TB. Depending on where you get your computer, it might not influence the cost of the PC at all--at least, nowhere near as much as others like your CPU or RAM might.

A home office desktop without a centralized server or network-attached storage device will likely need additional hard drive storage. Using an SSD to run your operating system will help the operating system run more efficiently, but you could still use an additional HDD for your data.

A gaming PC would benefit from this setup, as there are storage-intensive programs that can quickly fill up even a whole terabyte of storage. The same holds true if you have a lot of media, like photos, videos, or music on your device. Even casual hobbyists might find themselves filling up their device’s storage without meaning to.

In the End…

An SSD is a mostly-superior option for your primary drive, no matter what kind of device you’re using. However, just to be safe, it’s helpful to have an additional hard drive for data storage to ensure that you don’t run out of space for storage. Finally, try to avoid the cheapest option, as there is no good reason to put data at risk--and don’t forget to take data backups!

For help with acquiring your next computer, reach out to Coleman Technologies at (604) 513-9428.

0 Comments
Continue reading

Getting a New Computer? We Can Help, Part II

We will cover options for both high-end and low-end machines so you know what to look for in each.

Random Access Memory, or RAM, is often confused with the amount of data that a computer can store, but the reality is much different. RAM is used to measure the temporarily stored data so that it can be recalled easily without recalling it from the computer’s storage. It’s kind of like short-term memory like that pulled from a human’s brain.

If you’re one to multitask, RAM is what allows it to happen. RAM determines how many tasks can be accomplished at once on your computer. The CPU handles the instructions and processes the data your computer’s RAM holds. More RAM means that the larger amount of data that a CPU can process, and the faster that a CPU is, the faster that data can be processed. It makes your computing experience much less of a pain.

How Much RAM Does Your Computer Need?

Most computers these days have pretty limited options for RAM. There might be several brands to choose from, all with their own clock speeds, but PC manufacturers will handle this process for you so you don’t need to worry as much. It’s only something you should be concerned with if you plan on building your own PC. This guide will oversimplify it a little bit to help you determine your specific needs. The speed and type of RAM will be determined by the manufacturer’s model, so all you need to do is focus on how much RAM is included with the device.

  • Skimping the Budget: The smallest amount of RAM that should ever be used on a Windows 10 device is 4 GB. While you can technically get Windows 10 to run on less, you really shouldn’t. 4 GB is pretty bare bones, so you’ll only be able to handle some light document editing and web browsing.
  • Low-End: Most reasonable low-end budget PCs come with 8 GB of RAM, which can handle the majority of office tasks, such as editing documents, browsing photos, surfing the Internet, and whatever else you need to accomplish.
  • Mid-Range: 16 GB is possible for a lot of organizations, even on a budget. The price difference isn’t too noticeable, and the investment is certainly worth it. 16 GB is nice as an entry point for gaming rigs, but while it’s not necessarily a catch-all, it’s the best way to make the most out of your budget.
  • High-End: The ceiling for RAM is incredible, but the cost rises in association with it. For example, the new Mac Pro can reach 1.5 TB of RAM--about 1500 GB--but experts have placed the value of this at approximately $20,000. If you’re building a gaming rig, video editing system, or server, you might need more than 16 GB of RAM, but at that point, you should be speaking with professionals to determine the best path forward.

Wrapping Up

Depending on the device, you might have the ability to upgrade your RAM, but it’s easier to do with desktops than with laptops. We recommend going for nothing less than 8 GB, and consider looking at 16 GB to determine if it’s a viable option for your organization.

For more information on how we can help you get the best computer for your budget, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Getting a New Computer? We Can Help, Part I

What Do You Need Your Computer For?

There are a lot of different computers on the market. Some are created by big-box stores and branded with a fancy name. Some are thrown together inexpensively by your cousin. Regardless of who puts your computer together, knowing what you need the system for is the best way to determine what components you need inside of your system. After all, there are some big differences between the components that make up a workstation designed to run web apps and a CRM as opposed to a system that has been designed as a video editing station. 

For practical purposes, we will focus on cost-effective CPU options, since higher-end computing options used for audio/video production or gaming can get extremely expensive, quickly. Remember, you can typically upgrade a computer’s CPU, but it's not going to be cost-effective to turn a low-end PC into a gaming rig, whether its a desktop or a laptop. 

CPU Specifications

When you are shopping for a new computer, you’ll see a spec sheet accompanying the computer. You will see a myriad of components listed. Today we are going to talk about the CPU.

The CPU determines just how much “computing” your computer can accomplish at once, and how fast it will load that information up. Nowadays, there are two brands you’ll run into; Intel and AMD. Intel, in an attempt to simplify an otherwise complicated component, tiers most if their CPUs: Core i3, Core i5, Core i7, and Core i9. The larger the number, the more powerful the CPU. AMD recently has followed suit with its Ryzen series of processors. Since both brands make both low-end and high-end CPUs, it's important that you understand what each type of processor would be used for. Let’s take a look.

Intel

Core i3 - This tier is found in budget PCs and works fine for low-end processing. If you need to edit documents, check email, or surf the web, is a good, cheap option. The latest generation of Core i3 processors are strong enough to handle streaming video services like YouTube and Netflix without too much trouble.

Core i5 - The i5 will do what the i3 can do, just a little faster. Users will have no problem streaming video, doing some light photo editing, and maybe playing a game or two if it isn’t too resource-intensive. The Core i5 is a solid choice if you are building a workstation for your office.

Core i7 - Core i7 CPUs are more expensive and geared towards high-end systems for video editing and gaming. If your team has resource-intensive applications, a Core i7 processor will provide plenty of oomph for just about any task. 

Core i9 - The Core i9, introduced in late 2018, is Intel’s fastest and best commercial grade processor. If you are building out a computer for 3D animation, rendering, gaming while streaming, or scientific calculations, then this might be the way to go, but the price tag for this CPU alone can be several thousands of dollars. 

AMD Ryzen 3 - AMD’s low end model is, to simplify things, on par with the Intel Core i3. You’ll be able to edit documents and surf the web, but not a whole lot else without straining the system.

AMD Ryzen 5 - The Ryzen 5 is in about the same tier as the Intel Core i5. You’ll pay a little more than the Ryzen 3, and get some more performance out of your desktop. Expect to handle typical office work, streaming video, and be able to do some light photo editing and gaming.

AMD Ryzen 7 - The Ryzen 7 is AMD’s answer to the Intel Core i7. Just like the i7, the cost of the CPU starts to climb pretty significantly compared to the lower-end models.

AMD Threadripper - The Threadripper is designed for heavy loads like 3D animation, gaming while broadcasting your stream, and other intense computing that a typical workstation isn’t traditionally used for.

When Does the GHz Matter?
At one time, users would have to consider the clock speed of their processors, but now with these manufacturers tiering their products, these numbers can often be ignored. The higher the GHz number, the faster the CPU, and the more it costs. Until you get to the point where you are building a server or high-end gaming PC, you can definitely just worry about the tiers instead of the GHz.

Does the Number of Cores Matter?
Cores are the number of processors built within the main processor. Typically, shoot for at least four cores unless you are on a serious budget. For gaming and video editing and higher-end tasks, more cores can start to matter, but even then, most of the time the number caps off at eight. There are processors out there with dozens of cores, but typically these are designed for servers or specific uses.

You may start to look up older processors, only to find that it isn’t going to save you a lot of money. This is largely because older CPUs, even products like Intel’s Core 2 Duo, have clock speeds in range of today’s comparable processors. Going with newer hardware is always preferable as they typically won’t have as good of a chance to fail. 

In part two of our computer buying guide we will continue to sort through the other components of a new PC. If you would like help with building computers for your business, call the IT professionals at Coleman Technologies today at (604) 513-9428. We can help you sort through all the options and improve your chances of being happy with your new hardware.

0 Comments
Continue reading

Tip of the Week: Using Digital Signage

When we say digital signage, what we mean is having digital displays in your office. You may have seen them out and about in other locations, such as fast food restaurants using monitors as menu boards. In essence, digital signage solutions give your business the opportunity to broadcast content to screens around your office for a variety of reasons, and they are great opportunities to make your workplace a more dynamic experience as a whole.

Showcase Important Information or Statistics

Sometimes you need your employees to see announcements, but you want to make the information known in a more public location. Otherwise, you can use it to display statistics, like the number of sales or a countdown to a certain date or time. Either way, digital signage can be used to keep your staff informed.

Digital signage is also helpful for navigating the office. You can have signs indicating where important locations, like a conference room or bathroom, are located. 

Display Upcoming Dates and Events

All businesses have deadlines of some sort, and digital signage is a perfect way to broadcast it to your entire office… or at least the locations where digital signage is used. It’s an easy, supplemental way of drawing attention to certain times, dates, or events that are arriving in the future. 

Monitor Goals More Effectively

Digital signage can help your organization keep its employees accountable through the display of goals and key performance indicators. You might even be able to foster some healthy competition between your organization’s employees, as their performance will be displayed in an easy-to-understand format.

Does your business need assistance with setting up or acquiring resources for digital signage? Coleman Technologies can equip you with all the assets you need to make effective use of digital signage. To learn more about what we can do for your business, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Even Amazon Can Be Hacked

“Unknown Hack”

On May 8, 2019, almost a year to the day after the first transaction was made, an Amazon spokesperson claimed that the company had completed investigating the compromised accounts, and had been the victim of an “extensive” fraud. The extent of the fraud was large enough where two banking companies, Barclays and Prepay Technologies (who is a partial subsidiary of Mastercard) are caught up in the crime.

Ultimately, Amazon neglected to disclose the true scope of the hack, but a report by Bloomberg indicated that over one billion dollars were dispersed to merchants in 2018 via Amazon Capital Services U.K. While there is currently no figure provided by the company, if large portions of that money was subverted, it could rank as one of the largest hacks in the history of online commerce, and certainly the biggest fraud that has involved Amazon

Amazon, which has a business model built to be largely automated, has done a remarkable job of keeping personally identifiable information from being hacked over the years, but in today’s threat-persistent culture, even the most secure companies can have situations happen to them that jeopardize their ability to complete financial and information transactions, regardless of how much they invest in cybersecurity.

Phishing Attacks

Just because this article mentions a major fraud involving the world’s largest online retailer in no way means that hackers have moved on from trying to hack small businesses. Small businesses face the majority of hacking attacks, mainly because they have the least amount of security to thwart. In fact, if Amazon can fall victim to phishing attacks, it’s not a stretch to believe that your company is susceptible. With millions of phishing messages sent every day, many of which target small businesses, having a strategy to educate your staff is extremely important.

The best way to go about doing that is to be proactive. Getting your staff to understand that they are on the front lines of a never-ending cyberwar and what they need to learn in order to keep themselves, and your organization free from the serious risks that come from falling victim of phishing attacks. Some things you can prioritize:

  • Annual education and training - Have a comprehensive plan in place to educate new and current staff that is updated and required annually.
  • Having strong passwords - Since phishing is a form of social engineering, the hackers on the other end of the phishing attack are simply looking for access. Having strong passwords will keep them out much longer than weak ones. 
  • Avoid shadow IT - Make it clear that all software has to pass through IT first, before it is downloaded onto a workstation. It may seem inefficient at first, but the company will be better off vetting a software solution before it gains access to your organization’s network.
  • Provide cloud storage - When people are constantly on the move and have a lot of responsibilities, they will often upload their work into their personal cloud-based file storage. This can be risky behavior, even if the employee’s motives are solid. Keep your company’s data hosted on its own infrastructure.

With these four tips you can go a long way toward protecting your business, and your staff, from the detrimental characteristics of a phishing attack.

If you need help with your organization’s cybersecurity, or if you simply want some help outlining a strategy to use, contact the IT professionals at Coleman Technologies today at (604) 513-9428.

0 Comments
Continue reading

Windows 7 and Windows Server 2008 R2 is Finally Losing Support

Support for these two titles ends on January 14, 2020. If your business has neglected to upgrade away from the technology after Microsoft ended mainstream support in 2015, time is finally running out in which to do so. It is important to have a strategy to move to a more up-to-date operating system. By not completing a full migration away from these titles your business will not have the protection it needs to keep your company’s data secure. Vulnerabilities will begin to present themselves pretty quickly and you will see your ability to maintain data security wane. Let’s take a look at these titles, and what needs to happen to successfully remain secure.

Windows 7

Windows 7 is one of Microsoft’s most popular operating systems of all time, and is still used by millions of people from all over the world. In fact, it wasn’t until last December that Windows 10, Micrsosoft’s latest OS, passed Windows 7 in number of users. The software giant has started a major ad campaign to inform people of how to upgrade away from Windows 7 as soon as possible.

The most obvious option is to upgrade your business’ workstations to Windows 10. Windows 10 is constantly supported, offers many features that Windows 7 is incapable of, and features a profile that isn’t significantly heavier so most systems that you have will run Windows 10 effectively.  If you are in a position where you need to move over a lot of workstations, our consultants can help you calculate the best route forward. 

Another option Microsoft provides is called Microsoft 365. This cloud-based service deliberately targets the millions of Windows 7 users as it doesn’t require huge capital costs to move to Windows 10. At Coleman Technologies, we can help you determine the pricing of a migration either to new onsite infrastructure or a hosted solution. Either way, your business will need to have upgraded before January 14, 2020.

Windows Server 2008 R2

In addition to Windows 7, in January 2020, Microsoft will be retiring the entire Windows Server 2008 R2 suite. If your business utilizes Windows Server 2008 R2 for data and application hosting, you will need to have a plan in place to upgrade prior to the end of support date. Just like Windows 7, Microsoft will stop delivering security patches to Windows Server 2008 R2, meaning that there is a very real possibility that your organization could go without security updates if you fail to upgrade.

Microsoft has since released two new versions of the Windows Server software, as well as implemented a cloud-based option in Azure. It might be able to help you save money with cloud-based server management, but you won’t know for sure if it’s the right call to make without talking to the IT professionals at Coleman Technologies. Call us today to find out more at (604) 513-9428.

0 Comments
Continue reading

An Outdated Operating System Poses a Huge Security Risk

An Outdated Operating System Poses a Huge Security Risk

It’s Time to Abandon Windows 7 for a Safer Option.

Windows 7Windows 7 is considered to be one of Microsoft's most successful operating systems. So much so that many organizations skipped upgrading to either of Microsoft’s newer operating systems: Windows 8 and Windows 10. You may be able to list many reasons why you want to stay with Windows 7, but it is time to start preparing to upgrade away from the OS as the end of life deadline is fast approaching.

January 2020 will be the end of the line for Windows 7. It won’t stop working, but Microsoft will no longer provide the crucial security updates, bug fixes, and technical support that you’ve come to rely on. In this way, it may as well have stop working. An unsupported operating system makes your workstations vulnerable to cyberattacks. It is very likely that these attackers are working on how they can exploit the vulnerabilities that will be presented when Microsoft stops support for Windows 7.

What you need to do to prepare?
Anytime your organization is making a significant change like moving operating systems it’s important to plan properly so that your transition is smooth and successful.

1. Establish what computer systems are running Windows 7
2. Review computer hardware consider replacing to support Windows 10
3. Check your line of business and other applications for compatibility
4. Establish a timeline and a budget
5. Plan time for employee training

If you are still using Windows 7, our expert consultants can help you prepare for the inevitable transition to Windows 10 by helping map out the most efficient way to upgrade your workstations so that it has minimal impact on your business.

To learn more or to schedule a consultation contact us today to get started.

 

0 Comments
Continue reading

Tip of the Week: For Maximum Productivity, Try Sprinting

Don’t worry… we don’t expect you to try and work while you’re running as fast as you can. What we mean by “sprinting” is that you commit to focused, intensive work for a period of time, followed by a shorter period of rest.

The Science Behind Sprinting

The human body has certain capabilities, and is subject to certain limits. The way we are designed, we are meant to spend our time either spending or accumulating energy. These cycles are known as ultradian rhythms. Using our brains counts against this energy.

As a result, our focus is limited to somewhere between 90 and 120 minutes. Research indicates that, in order to perform well again after that, you need to take a 20-to-30 minute break so your brain can recover.

A sprinting methodology fits this pattern to a ‘T.’ By narrowing your focus to a single one of your tasks and blocking out distractions, you are better able to commit yourself to your goal. Once you hit the end of your sprint, you spend your recovery time refocusing yourself and preparing for your next foray into intense productivity.

Various authors and researchers have provided anecdotal evidence as to the efficacy of this approach:

  • While writing The Way We’re Working Isn’t Working: The Four Forgotten Needs That Energize Great Performance, Tony Schwartz used 90-minute blocks of time to break up his day, only writing for a daily total of four and a half hours. Six months later, his book was finished.
  • In 1993, performance researcher Anders Ericsson discovered via a study that the most skilled young violinists all followed a similar practice schedule: three 90-minute sessions of morning practice, with breaks in between.
  • In his book, Schwartz tells the story of how Leonardo Da Vinci would put down his paints while working on The Last Supper and daydream for hours at a time. When he was questioned about it, Da Vinci is said to have replied, “The greatest geniuses accomplish more when they work less.”

Why and How to Leverage Sprinting

One of sprinting’s biggest benefits is something that many people are very familiar with: the feeling of being in “the zone.” It’s that time when you are fully committed to your task at hand, and are enjoying yourself as you apply yourself. Psychologists refer to this as “flow.”

One psychologist, Mihaly Csikszentmihalyi, has committed his career to studying flow. As he said in his book, Flow: The Psychology of Optimal Experience, he wrote:

“The best moments usually occur when a person’s body or mind is stretched to its limits in a voluntary effort to accomplish something difficult and worthwhile. Optimal experience is thus something that we make happen.”

To make flow happen, sprinting once again fits quite well. Incorporating these patterns into your daily routine will help you to work more productively and ultimately, be more successful in your work.

What methods have you used to boost your productivity? Share some in the comments!

0 Comments
Continue reading

Five Reasons Video Conferencing is a Great Business Tool

Team Building Benefits

Many modern businesses have employees who don’t always work in the office, instead electing to operate remotely. However, it is important that these employees are still assimilated as a part of your team as a whole. A conferencing solution can allow you to keep your remote employees on the same page as your on-site employees, building camaraderie between coworkers despite any distance between them. The better your team is able to collaborate, the more effective they will be able to be in accomplishing their tasks, as they will have each other as a resource to lean on as needed.

Keep Your Team On-Task

Let’s face it, it can sometimes be hard to be sure that your employees are focused on the task at hand. This is especially true when you can only hear their voice, or see the responses they send back to you. A conferencing solution fixes this difficulty by giving you and your team a visual of each other, keeping everyone involved accountable and engaged.

Increase Your Collaborative Footprint

It wasn’t all that long ago that collaborating with someone a distance away was only possible over the phone or by physically traveling to meet with them. However, collaborative conferencing solutions have taken this distance and shrank it down to effectively nothing. Like the team building benefits we discussed earlier, your team is no longer restricted to one place, or to dealing with exclusively local coworkers, partners, and other resources.

Promote “Face-to-Face” Communication

A sizable portion of communication is non-verbal, which means that your solution needs to account for this balance. More traditional solutions didn’t take this into consideration - or rather, couldn’t. Modern collaboration solutions, on the other hand, allow you to communicate more completely by allowing you to witness these non-verbal cues. 

Conferencing Can Simplify Your Solution Set

Compared to legacy solutions, modern conferencing tools offer a much more comprehensive selection of features. As a result, you can reduce the number of solutions that your operations rely upon, cutting expenses and streamlining your processes. This makes it much easier to find success in communicating with your team, without sinking all of your capital into your solutions.

Coleman Technologies can assist you in establishing the collaboration solution that fits your needs, as well as any other IT implementation your business requires. Learn more by calling (604) 513-9428.

0 Comments
Continue reading

How Much Risk Can the IoT Cause?

Let’s explore some of the risks that the IoT can present.

The Security Issues of the IoT

The Internet of Things has added utility to many devices, expanding their potential in ways that would otherwise be impossible. This has only been further augmented by the access to personal devices that many employees enjoy through Bring Your Own Device policies.

However, these benefits have come with an assortment of considerable risks alongside them. Devices that are a part of the IoT are notoriously vulnerable to many cyberattacks, which means that they could potentially be used as a point of access to your business’ network. From there, a cybercriminal has plenty of opportunities to create issues - whether that’s by stealing your data, hijacking your devices to be used in a botnet, or whatever their goal may be.

This problem is only exacerbated by the tendency for IoT devices to go without updates, whether through the negligence of the manufacturer or of the consumer. Without these updates, security flaws go unresolved, and the devices are thereby left vulnerable.

Consider how many devices are now manufactured that connect to the Internet. Smart watches and other wearables, smart speakers and televisions - really, almost anything with the word “smart” in its name - we have more or less surrounded ourselves with the Internet of Things. This includes the time we spend in the workplace, despite many of these devices not being visible on the network to IT. As a result, it has become almost impossible to track all the devices that attach to a network, which has developed into a new issue for businesses.

Shadow IoT

Thanks to the public demand for convenience and advanced functionality, more and more IoT devices are being manufactured all the time. If any of these devices makes its way into your office without the knowledge and approval of IT, you have a shadow IoT problem.

If you do, you aren’t alone.

In 2017, 100 percent of organizations surveyed by an IoT security firm were found to have consumer IoT devices on the network that qualified as shadow IoT. Another report, from 2018, stated that one-third of United States, United Kingdom, and German companies have over 1,000 shadow IT devices on their networks every day. Combine this with the security shortcomings discussed above, and you have a recipe for a cybersecurity disaster.

You may remember the Mirai botnet, which struck back in 2016. This botnet was built up of over 600,000 devices at its peak and focused primarily on IoT devices. Once these devices were identified by Mirai, they would be attacked and infected, adding more computing power to the botnet. Mirai is far from the only example, too… cybercriminals have been known to hack into IoT devices to gain network access, spy and listen in on conversations, and otherwise prove themselves to be a nuisance.

How to Minimize Shadow IoT

Clearly, shadow IoT isn’t a good thing for any organization. There are a few things you can do to help protect your business from the security issues that shadow IoT can cause.

  • Accept IoT devices in the workplace. If your employees really want to use one of their devices at work, they’re going to. Instead of shooting down requests to bring in these devices, make it easier for your employees to do so through the proper channels - and make sure your employees are aware of these channels. Openness and cooperation can be effective tools as you try to get your team on the same page you’re on.
  • Keep IoT devices separate. To better protect your network, you will want to consider utilizing a dedicated Wi-Fi network for IoT devices, configured to allow them to transmit the information they generate while blocking any incoming calls to them. This will help prevent threats from being transmitted to IoT devices.
  • Seek out potential threats. Not all shadow IoT necessarily can be found on an organization’s network, as over 80 percent of the IoT is wireless. This means that you need to be monitoring your wireless signals for shadow IoT devices and networks.

Your business’ security is important - too important to be undermined by an insecure consumer device that was brought in without your knowledge. You need to get out ahead of shadow IoT, as well as the other threats that could do your business harm.

Coleman Technologies can help. Our professionals are well-versed in cybersecurity best practices and how to use them to your benefit. To find out more about what we can do for your business, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Tip of the Week: How to Use Instant Messaging Professionally

Why Effective Communications are So Critical

There are a few reasons that you want your business’ internal communications to be clear and effective.

Fewer Errors

Miscommunication is rarely a good thing, but in the business setting, it has the potential to be crippling to your operations. If the correct information isn’t shared at the right time, with the right people, productivity will suffer. On the other hand, proper communications can help minimize, or even avoid, many potential workplace errors.

Increased Accountability

When an organization keeps its communications open across the board, it is prone to see an associated increase in companywide accountability. From owner to intern, being responsible for (and being held responsible for) certain milestones in a process keeps each member of a team on-task and motivated.

Improved Teamwork

Naturally, when members of a team communicate properly, they are better able to work cooperatively. As a result, problems often become easier to solve, as ideas may more easily flow and develop. Additionally, potential issues between departments are more easily resolved, preventing interpersonal concerns from affecting the work.

Efficient Problem-Solving

The ability to communicate clearly enables a team to better pool their talents to much more efficiently overcome any issues that may arise. Whether a problem is strategic or technical, having the capability to swiftly solve it will only benefit a business’ operations.

Instant Messaging in the Workplace

Naturally, all of the above outcomes can (and often do) result from the use of an instant messaging application… as long as it’s the right one.

You need to make sure that your chosen solution is intended for business purposes, which means you need to use an enterprise-grade instant messaging application. In addition, you also need to be sure that you and your staff are properly leveraging your solution. Try to encourage the following practices and behaviors in your staff to ensure that your instant messaging solution doesn’t turn into an instant messaging problem:

  • Keep it in check. You don’t want a solution that is meant to be a productivity booster to actually harm it. There’s a very real difference between your staff properly leveraging instant messaging capabilities, and aimlessly chatting all day. Encourage your staff to keep their conversations pertinent to the workplace and the task at hand (at least as much as possible).
  • Remain professional. Again, conversations on your instant message solution should be far and away focused on workplace matters. It is important that your staff knows this, and resists using the solution to share jokes, GIFs, or memes excessively. Moderation is key.
  • Don’t rely too much on it. Not all conversations are appropriate for an instant messaging platform, especially those that contain sensitive or overly complicated details. Some conversations are better shared in person, or in an email, where lengthier messages can be sent.

Have you ever utilized instant messaging in the workplace? Share your experience with us in the comments!

0 Comments
Continue reading

Smartphones Role In the Modern Workplace

Smartphones in the Workplace

Let’s start with the trickiest bit of this first. Smartphones are a distraction, pure and simple. In fact, according to one survey, employees average about 56 minutes per day on their phones while they are in the office. This equates to a massive productivity leak for many businesses, but just when you think it isn’t equitably fair for the employer to pay for time employees spend scrolling through Twitter, Facebook, and Instagram, responding to personal emails, and browsing websites blocked by the company’s content filter, employers aren’t totally innocent in this situation.

The modern employer is the first person to take advantage of the computing prowess of these devices. Since the modern company tries to do more with less, many employers expect their workforce to always be available; and, that means always. Moreover, managers and executives aren’t any different: they are always on their smartphones too!

Some organizations feel the need to try and strategically design policies to keep people from using their personal devices for personal use on company time. These same people don’t have a problem with them using these devices for the benefit of the organization, just not for personal gain. This is where policies go wrong. They create archaic and completely unrealistic policies and are shocked when even their best performers can’t avoid their phones for long. 

If you want your staff to limit their phone use at work, you have to make that clear. Some companies have implemented a policy that provides small breaks in which they can use their phones, but most companies have come to understand that this isn’t a trend and that phone use is part of day-to-day life. Locking down people’s ability to connect with the outside world for eight (or more) hours a day is only going to serve to bring negative reviews from your team, so your best bet is to embrace it, and realize that as long as your expectations have been communicated properly, most employees won’t take advantage.

Smartphones Out of the Workplace

While the smartphone may be a bit of a distraction to your in-house staff, what happens the moment people leave the confines of your business? They use their phone. In fact, I doubt very much if they make it out to their car or onto the train without a full assessment of the messages sent by applications, people, and others. How long do you last without checking yours?

This brings us to the point that needs to be hammered home. The more people use mobile devices, and specifically smartphones, the more they are willing to do off the clock for work. You don’t think this is true? If you are a business owner or manager, try texting, emailing, or messaging a member of your staff outside of work. They may not appreciate it, but more than likely, they will respond. This effectively extends them to “on-call”, a state that was typically reserved for people with jobs that the public depends on like doctors, lawyers, and the like. Now if you have a question about a project that just can’t wait until the morning, there is an excellent chance that you will be able to get the answer you seek directly from the person who worked on a task last. That can have a lot of benefits for your business.

What About Security?

Mobile malware has become much more prevalent than ever before--so much so that it can be a major problem for your business. The best way to mitigate liability from this is to design and enact a Bring Your Own Device (BYOD) strategy that takes advantage of cutting-edge mobile device management tools. Your staff may scoff at first, but if their two options are using their data or using your wireless network, they will opt in, guaranteed. 

If you need some help ensuring that you are doing everything you can to take advantage of your staff’s reliance on their smartphones, we can provide you with all the information, resources, and technology you need to make employee smartphone use work for your company. To learn more, call us today at (604) 513-9428.

0 Comments
Continue reading

Risks that Come From IT Threats

Before we get too deep, we want to emphasize that there are two primary categories for threats to your business: external and internal.

External

External threats are those that come from outside your business’ network. The majority of threats will fall into this particular category, and it contains a lot of big names that you have likely heard in the past. Here are a couple of examples of threats to your business, as well as what they can lead to:

  • Viruses/Malware: these are malicious bits of code or full-blown software programs that can be customized by hackers to perform a certain role. It would take far too long to list off everything that can be done with these kinds of threats, as the options are literally limitless.
  • Ransomware: Sometimes malware will encrypt the user’s files and demand payment for the decryption key. Without access to important files, businesses might crumble under the pressure, losing both money due to the payment and a little bit of dignity in the process. In cases like this, it’s important to never pay the ransom, as it only serves to fund further attacks.
  • Spam: Hackers like to send countless emails with threats attached to them, hoping that someone will download them and expose their organization’s network to threats. Spam can be prevented for the most part, but if left unchecked, your business could wind up installing threats on your network by accident.

Internal

Internal threats can come from the most unlikely sources, as even the most well-meaning employees could accidentally expose your business to potential threats. Furthermore, there could even be more sinister forces at work with employees potentially trying to actively sabotage operations. Here are some ideas for threats and what could happen from them:

  • Phishing Attacks: Your users are your weakest link. While you might think that you have an understanding of adequate security practices, they may not, leading hackers to utilize underhanded tactics to leverage this to their advantage. Phishing attacks convince users to click links, download attachments, or provide credentials/sensitive information.
  • Account Hijacking: Let’s say an employee’s account is hijacked by an external threat. You might see account activity from your employee, but how do you know that it’s not someone else using their account? Data could be stolen, or worse.
  • Access Control: Have you ever fired an employee? Have they ever resented you for it? Chances are they may have felt the urge to go into their old accounts and cause some trouble. These internal threats could lead to embarrassing situations, as well as a loss of control over certain types of data. It’s up to you to cut off access as soon as you can.

Does your business need help maintaining security and keeping track of the countless threats out there? Coleman Technologies can equip you with the best security measures on the market. To learn more, reach out to us at (604) 513-9428.

0 Comments
Continue reading

GDPR: One Year In

The GDPR

Prior to the implementation of GDPR, individual data privacy was mostly left up to the individual. In non-EU circles, this is still mostly the case, but GDPR has made issues related to this much more noticeable, such as the way this personal information can be used for corporate financial gain. GDPR was a response to these organizations failing to properly utilize user data. This included people having their personal information like names, addresses, email addresses, and even medical/financial information being utilized by advertising companies or worse. The largest corporate technology companies were using the data of individuals to turn a massive profit--a practice that seemed to be unfair to consumers.

EU member states have been legislating their own data protection laws prior to the establishment of GDPR. The United States has yet to jump on board this trend, though. With GDPR, organizations are seeing themselves as members of the global economy with strict new guidelines to adhere to. The GDPR is essentially an amalgamation of the laws that had previously existed, requiring all businesses to report certain types of personal data breaches within 72 hours to a supervised authority mandated by EU member nations.

This case was a landmark in that businesses were forced to remain more cognizant of how important data management is for the people who take advantage of their services. Before GDPR, many organizations failed to protect the data of their customers, staff, and vendors. In a way, GDPR forced them to begin thinking about data management, training staff, and investing in security.

One Year In

The results of GDPR have been mixed, to say the least. Over 59,000 personal data breaches have been identified by companies notifying regulators. The sanctions for failing to comply with GDPR mandates carry fines of up to €20 million, or up to 4 percent of total revenue from the previous year (whichever is larger), leading to a more targeted and strategic approach to data security, as well as more prompt reporting of when data breaches occur. To take a look at the results the GDPR had in its first eight months, download the DLA Piper GDPR data breach survey, here.

Overall, the GDPR provided a substantial boost to data breach reporting speed. The mandate gave organizations up to 72 hours to notify breached parties, so there were fewer instances of breaches going years before being revealed to the general public. The GDPR has also resulted in nearly doubling the amount of reported incidents.

The fines resulting in these breaches being reported, however, is considerable to say the least. Fines totaling up to €55,955,871 have been levied against the companies responsible for the 59,000 reported incidents, with most of this being struck against Google. A French GDPR calls this year as more of a transitional phase rather than an indicator of the long-term effectiveness of the measure.

Effects Abroad

U.S. companies that do business in Europe aren’t safe from the measures initiated by GDPR, but organizations have started to change up their approach to data privacy. Many legislators are pushing for similar measures to GDPR, and CEOs like Apple’s Tim Cook have labeled data privacy a “fundamental human right.”

Unfortunately, this viewpoint seems to be in the minority of major American tech company leaders. Still, this hasn’t stopped states like California from implementing its own data privacy law. Other states like Colorado, Massachusetts, and Ohio were inspired to pass their own data privacy laws. Perhaps the federal government will consider acting to fill in the holes left by these data privacy laws.

What are your thoughts on GDPR and data privacy regulations? Let us know in the comments.

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image