Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Be Mindful of All the Internet of Things Devices on Your Network

The Internet of Things is essentially a massive network of connected devices. Some of them have not traditionally taken advantage of network connectivity, but now depend on it. The more obscure examples of Internet of Things devices include kitchen appliances and other oddities, whereas the more usable devices include watches, wearables, connected vehicles, smart homes, and more. Some Internet of Things devices can even communicate with others, sending data and using it for a certain functionality. It all coalesces into a security disaster waiting to happen.

To prepare for this, you need to implement what’s called an Internet of Things policy within your workplace. Here are some ways you can keep the Internet of Things from devastating your business.

It’s Impossible to Stop Them All

One of the most valuable lessons of dealing with Internet of Things devices is that it’s impossible to keep tabs on every single device that enters your office. If you assume that each employee has a smartphone, a laptop, and at least one or two other minor devices, it all adds up. Therefore, you need to prepare for the worst by expecting it.

You Need to Do Your Best

The best way to protect against the Internet of Things is to be prepared for them. Implementing security measures is key, and the best ones for this situation include a Unified Threat Management system (UTM) and a Bring Your Own Device policy (BYOD). What this enables is the ability to eliminate threats and keep them from entering your network in the first place, including from your employees’ personal devices. It also helps to have a password-protected network so that passing devices don’t automatically connect to your wireless network.

Working with a managed IT provider like Coleman Technologies can make it easier to manage all of the devices that make their way to your business’ network. To learn more about what we can do for your organization, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Tip of the Week: Selecting the Right Data Warehouse for Your Needs

To begin, let’s figure out exactly what a data warehouse is.

Understanding the Data Warehouse

A Data Warehouse isn’t to be confused with a Data Center, where you might store your server infrastructure. It is a system for analyzing and reporting on large amounts of data. It helps you predict trends and get a full picture of what’s going on with your business.

In order to understand the purpose of a data warehouse, it helps to look to warehouses in the real world. In short, it’s a place to store stuff.

While this may seem simplistic, it is key to the other functions of a data warehouse. By storing all of a business’ data in a central location, that data can all be referenced against each other - regardless of the original source. This means that you can use this data to generate better analytics than you may have gotten otherwise, simply because you are less limited by the data you have access to.

Selecting a Data Warehouse

Of course, not all data warehouses are the same, and the different types offer different utilities. You also have to consider if the data warehouse itself is sufficient. Let’s go over some of the considerations you will have to make during your deliberations.

What kind of data do you need to store?

For our purposes, data can be split into two types: structured and unstructured.

  • Structured data is data that can easily be organized into a spreadsheet. If your data fits the bill, a relational database would likely be a good fit for your needs.
  • Unstructured data (or semi-structured data) is data that is presented in less-uniform formats, like geographical data, emails, books, and the like. If you have a lot of this kind of data, you may want to consider utilizing a data lake over a data warehouse.

How immediate does your data need to be?

Your intended use of your data warehouse will have the largest impact on this consideration. Are you looking for business insights, or are you more focused on real-time analytics? If you are looking to find out more about your business, having more data available will give you better answers. If you are using the data warehouse to fuel a predictive analytics platform, you will need less data, as tracking trends can be done with a simple Relational Database Management System (RDMS) and won’t necessarily benefit from access to all of the data your organization stores.

How are the costs structured?

Different data warehouse solutions are priced based on different factors, usually combining the storage used, the size of the warehouse, the number of queries that are run, or the time spent leveraging the solution. Your particular use case will likely influence which solution is most cost-effective for you, whether frequent utilization makes a lower compute cost preferable or a high volume of data makes lower storage costs the logical choice.

Does it work with the tools you use?

Finally, you need to be sure that the solution you are considering is compatible with your business’ other solutions - otherwise, you won’t get the full value from your data warehouse (or create more work for yourself).

Coleman Technologies can help your business manage its technology needs. To learn more about how we can optimize your business processes, call (604) 513-9428.

0 Comments
Continue reading

Be Proactive to Avoid Substantial Downtime

What is Downtime?

Downtime can mean many things, but it generally means any situation where your business cannot function like it’s supposed to due to drastic issues such as a data breach, a natural disaster, or hardware failure. In many cases, the reason why your business isn’t functioning is irrelevant, as the fact of the matter is that you’re suffering from downtime that could have been prevented with the proper action.

As you may have guessed, it’s not always about what caused your business to experience downtime, but what you can do to keep it from happening in the future. It’s times like these when learning a little bit about your business’ shortcomings and failures can be beneficial. You need to have measures in place to keep disaster from striking.

What Are Some Effects of Downtime?

We can use a simple situation, like an electrical outage, to showcase just how damaging downtime can be. Imagine a situation where your employees can’t get anything done due to a power outage keeping them from using their devices. Maybe they are sitting around and chatting. It’s difficult to put the blame on them, since they’re not the ones that control the weather.

This particular situation shows just how much your organization relies on technology, and it’s incredibly important to make sure it remains functioning. If your technology fails, you lose out on possible revenue, providing support for clients, and being productive as a whole.

Plus, fixing your technology will take a heavy toll on your business’ budget. If you’re replacing a piece of hardware like a server unit, you’ll be forced to shell out just to get back in proper working order. On the other hand, if you were to proactively maintain these devices, you can prolong their lifespan and mitigate costs associated with downtime.

What Should You Do?

Proactive technology maintenance is key to ensuring your organization doesn’t suffer from downtime. With the right solutions, your business can actively prevent IT issues from impacting operations. To learn more, reach out to us at (604) 513-9428.

0 Comments
Continue reading

How Technology Changed the Office Forever

Talent Acquisition

Consider the way that IT maintenance and management was before modern technology solutions became prevalent. Businesses had to either hire a team to manage their IT or outsource the responsibility to a third party. The key factor here is that both are limited by geographical location; if you can’t find a local business or enough talent to manage your business’ IT maintenance, it might not get done properly (or at all).

On the other hand, with remote technology maintenance and management being more available than ever before, plenty of businesses are finding that they can better maintain their technology infrastructures. What’s more is that these businesses don’t need to have these providers visit the office, meaning they get the maintenance they need without expensive on-site trips and travel costs.

Streamlining of Operations

Depending on the industry your business is a part of, you may have had run-ins with outdated technology or solutions that simply haven’t aged well. Perhaps you’re still using spreadsheets to keep track of inventory, which creates opportunities for user error and produces displacement. Maybe you’re finding that it’s difficult to find enough space for document storage, as filing cabinets are clunky and take up a ton of room. The list goes on and on… if you think of a former inconvenience, chances are there is a technology solution that has been developed to solve it in recent years.

That being said, modern technology solutions have given offices the ability to move past obsolete and outdated technology to make operations more manageable and dynamic. One great example of this is file management software and digitizing documents. It eliminates the obsolete and bulky filing cabinet in favor of a searchable database for storing your documents.

Consolidation of Resources

Your business might take advantage of several services that you think are beneficial for operations, but there is a serious chance that they are counterintuitive to your business’ bottom line. Your business’ phone service is a prime example. A phone system is critical to being in business, but it can come with considerable expenses, including some that can be avoided thanks to modern technology solutions.

The Internet gives your business the opportunity to consolidate resources in a way that wasn’t possible in its infancy. For example, Voice over Internet Protocol (VoIP) utilizes your Internet connection and eliminates the need to go through a telephone provider for this important service. VoIP uses an existing resource to lower your organization’s expenses. Furthermore, the “as a service” model allows your business to take advantage of solutions previously unavailable, and it’s all thanks to the accessibility provided by the cloud.

You might look back on the good old days with nostalgia for a time when technology wasn’t so necessary, but it’s hard to deny the effect that it has had on the business world. You want someone managing your technology that knows a thing or two about how to get the most out of your resources. To learn more, contact Coleman Technologies at (604) 513-9428.

0 Comments
Continue reading

The Time Has Come for SQL Server 2008 and 2008 R2

Outdated software is an issue that all businesses have to deal with. The fact that so many organizations don’t routinely update their software solutions is pretty telling. For one, many businesses simply don’t have the resources at their disposal to make sure maintenance is performed on a regular basis. Granted, unless a business has taken substantial steps toward upgrading away from software that has reached its end of support date, they will have to suffer the consequences.

What Does “End of Life” Mean?

End of Life, also known as End of Support, is a term that is used to identify software that is not updated or patched after a specific period of time has passed. Certain Microsoft products can utilize the Extended Security Update, but only for a maximum of three years, meaning it’s more efficient and cost-effective to upgrade away from your old systems before they reach the end of support date.

What You Need to Do

How would your business be affected by a potential security breach? Since you won’t be receiving security patches or updates, you’ll need to consider this possibility. Following a major security breach, you’ll be forced to upgrade your systems anyway, so not only will you have those costs, but you’ll have to deal with the fallout of a data breach. It’s never too early to start taking preventative measures and think about the future of your infrastructure, as well as who will be responsible for the management, maintenance, and upgrading of your business technology.

Before Windows SQL Server 2008’s End of Support date arrives, consult this list of upcoming end of support dates and take the necessary steps to upgrade your technology. It’s better to do so now than wait until it’s too late.

We Can Help

Worrying about your business’s IT infrastructure is something that you simply don’t have time for. A managed service provider like Coleman Technologies can help you achieve affordable and accessible technology support, including the updates and patches needed to maintain network security. We can even help monitor your infrastructure for potential End of Support software that will soon be outdated. To learn more, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Are You Leveraging these Invaluable Business Tools?

Here, we’ll commit some time to examining the enterprise-level technology that SMBs are now leveraging to encourage their business’ forward momentum, and how you can leverage a solution that may not initially seem to be a fit.

The first consideration that any small business decision maker needs to take is how connected people are today. This level of connectivity produces many things, perhaps most of all heightened expectations - a fact that any SMB needs to contend with.

Historically, a small business would never invest in solutions meant to improve the customer’s experience and relationship with the company - they just didn’t have to. However, consumer demand makes it so that investing heavily in software can bring opportunities that simply wouldn’t be there otherwise.

As a result, your SMB needs to have the following solutions in its arsenal:

Customer Relationship Management

It can almost be said that, if your business doesn’t use a CRM, you aren’t really in business. That’s how crucial a CRM system can be nowadays. With hundreds of options out there, there are those that are unquestionably meant for the enterprise user, as well as plenty of options dedicated to a particular industry’s needs. These particular solutions take the benefits of the CRM and integrate different options that are precisely suited to a specific industry vertical.

One of the biggest small-business benefits of a CRM has to be how it can automate a significant amount of tasks that once were handled by multiple employees - a relatively larger chunk of its workforce (and payroll) than a larger competitor would be concerned with. This makes the CRM that much more valuable to a small business, as it reduces the manpower needed to complete business-critical tasks through automation. By integrating your customer relationships with your scheduling, your payroll, and other concerns, a CRM helps to make your business and its operations more streamlined.

Supply Chain Management

The demands of the customer are more crucial than ever to meet, especially for today’s smaller manufacturer. This means that the supply chain (procurement, manufacturing, fulfillment, and distribution) needs to smoothly work in coordination with its different parts. This is made easier by leveraging a single Supply Chain Management platform. Some of the options that these platforms often include, like Enterprise Resource Planning (ERP) software, are the same that are found in a CRM. This makes it easier to combine and consolidate software solutions so that users have that much less to learn to keep business moving.

Marketing Automation

Much like was said regarding the CRM, today’s small business doesn’t really exist without some kind of online presence. Some businesses will have an entire website created, while some stick to social media profiles. If you’re looking to boost your own business’ revenue generation (and why wouldn’t you be), building up your online presence is both an affordable and an effective means of doing so. Pairing this presence with automated systems can help you to nurture leads while simultaneously speeding up business and reducing operational costs.

This is how it works: your website captures leads. Once you have these leads, your marketing automation solution takes your captured information and integrates it with the CRM - saving you from the considerable task of doing it yourself. The end result, more worthwhile conversations that ideally end in more closed sales.

With the tools that are available today, it is amazing that more businesses aren’t leveraging them to cut costs and accomplish more. Don’t you want to get out ahead? The IT professionals at Coleman Technologies can help by deploying the ones that fit your business’ operations. For more information, call us at (604) 513-9428.

0 Comments
Continue reading

The city of Burlington Ontario falls for $500,000 phishing scam; investigations underway.

 

Phishing attacks are entirely preventable, but they can be incredibly difficult to identify. As hackers adopt more sophisticated methodologies, it increases the importance of sophisticated and continual training to prevent them from wreaking havoc on your company’s IT infrastructure and customer data. What’s more, this training needs to reflect the evolving nature of today’s attacks.

 

Coleman Technologies can simulate phishing attacks and conducts security awareness training campaigns, helping employees identify the signs of a scam in a rapidly changing threat environment. Click the "get in touch" link to get started.

0 Comments
Continue reading

Tip of the Week: Are Workplace Wellness Programs Effective? It Depends

Study after study has been performed over the years about the impact of workplace wellness programs, producing various results. Some have indicated health improvements and cost savings, while others haven’t. However, the studies that were performed in the past had a high rate of issues. Whether there was no comparison group, or the chance of personal bias influencing signups, these studies simply didn’t provide reliable data.

Now, however, researchers from the University of Chicago and Harvard have conducted a large-scale study that meets the requirements that such a study is usually beholden to.

The BJ’s Wholesale Club Experiment

This experiment began by selecting 20 of the big-box retailer’s outlet centers to offer an employee wellness program. 140 additional BJ’s locations did not offer any such program. Across the 160 clubs involved, there were almost 33,000 workers employed.

Participants filled out a health risk questionnaire, took health classes, and had basic medical tests performed. After 18 months, their progress was evaluated...and that’s where things got interesting.

Despite the workers who were participating in this program reporting healthier behaviors than they once exhibited, almost all other factors were left unchanged. Blood sugar levels, job performance and attendance, and employer health care spending all were unaffected.

Why This Might Be

There’s a good chance that the results of this study were skewed by the incentives offered to participants. Participants were given gift cards for attending wellness courses, for a total incentive of about $250. According to founder and CEO of Bravo Wellness, Jim Pshock, this may just not have been enough. According to Pshock, any amount less than $400 is only going to be enough to incentivize people to do what they were already going to do anyways. As Pshock put it: “It’s simply too small to get them to do things they weren’t already excited about.”

Another study, published in 2018 by the University of Illinois, essentially debunked the idea of the workplace wellness program, concluding that it neither reduced costs or impacted behaviors - although this study also found that participants of wellness programs were those who were already healthy and motivated. This potentially suggests that the true benefit of these programs isn’t to make their existing workforce healthier, but to attract and retain healthier employees.

There are other potential contributing factors as well. A recent survey indicated that 84 percent of employees saw their wellness programs as “one-size-fits-all,” a concept that doesn’t really work will all of the various factors that contribute to health. Eighty percent of respondents to that same survey claimed that more personalization would contribute to their participation in wellness programs.

Why You Want to Adopt a Workplace Wellness Initiative

Admittedly, we’ve provided a mixed defense for these kinds of activities, but it cannot be denied that anything you can do to promote the health of your employees will only benefit your business - healthy employees tend not to call in sick, after all.

There are other benefits to these programs as well:

  • Reduced Stress - The stress management benefits of healthier behaviors have been well documented. By adopting these healthier behaviors, you and your staff can reduce the stress that comes from the office and approach the source issues more effectively.

  • Community Building - As the boss, you want your entire team to work as, well, a team. Unfortunately, if certain departments don’t work together much, this kind of relationship can be hard to develop. However, many activities that would fall under a workplace wellness initiative can help cross departmental lines, drawing your team closer together.

  • Better Moods - Wellness programs allow employees to try out new activities, which can not only add to their wellbeing, but can also keep them engaged and productive. Plus, studies have indicated that employees who participate in these programs were generally happier with their work situation.

What have you done to cultivate a more health-conscious workplace? Share your strategies in the comments!

0 Comments
Continue reading

Even Small Businesses are Targets for Hackers

Profitable Types of Data

Believe it or not, even a small business with a handful of clients has data worth stealing. You’re in business to make money, and by virtue of this fact, you likely collect and store financial information. In fact, you collect a ton of valuable data. The type of data that hackers are looking for.

In addition to all of the financial details you collect, there is also all of the contact information regarding leads, clients, and customers. With so many emails and phone numbers stored on your infrastructure, hackers can have a field day. They will have all the information they need to steal funds, distribute malware, and create unpleasant situations for your business.

The Unpredictability Factor

Not all hackers have any specific goal in mind when they hack you. Sometimes all they want to do is make your life miserable. The unpredictability associated with hackers is one of the most dangerous parts of them, as they can take advantage of any overlooked vulnerabilities to create a problematic situation for you.

The Impact of Security Negligence

If your business falls victim to a hacker, it’s certain to affect your business' operations. In some cases, it could be subject to compliance fines that could break your budget and put your business at greater risk. Furthermore, you could lose access to important data that makes your business work, threatening its future and all but guaranteeing that recovery can never happen. Therefore, the importance of protecting your network can never be overstated.

Coleman Technologies can help your business implement the security solutions needed to maximize protection from threats. To learn more about what we can do for your organization, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Staff Education Goes a Long Way in Preventing Security Issues

Unfortunately, most attacks still come in through email, and can slip by your users. Even the most complex cybersecurity platforms used by massive corporations and governments can be foiled by a simple phishing attack, and your end-users are your last line of defense.

How Can an Employee Fall Victim?

Phishing attacks are designed to look real. An email might come in looking like a valid message from Paypal, a bank, a vendor, or even from another employee or client. Hackers use several tricks to make the email look real, such as spoofing the address or designing the content of the email to look legitimate.

Unfortunately, if the user clicks on the link in the email or downloads the attachment, they could open themselves and your company up to whatever threats contained within.

Commonly, this leads to stolen sensitive information, or installs malware on the device, or grants the hacker the ability to log into the user’s bank account.

While having strong IT security can reduce the amount of these phishing attacks that come in, a percentage can be tricky enough to bypass your firewalls and content filters, exposing your staff to situations that could your whole endeavor in

Educate Your Employees

It’s important to teach employees how to catch a phishing attack. We recommend sharing the following steps with your staff, or even printing them out and posting them around the office:

  1. Carefully hover (don’t click!) over links and see if they go to a legitimate URL. If the email is from Paypal, a link should lead back to paypal.com or accounts.paypal.com. If there is anything strange between ‘paypal’ and the ‘.com’ then something is suspicious. There should also be a forward slash (/) after the .com.   If the URL was something like paypal.com.mailru382.co/something, then you are being spoofed. Everyone handles their domains a little differently, but use this as a general rule of thumb:
    1. paypal.com - Safe
    2. paypal.com/activatecard - Safe
    3. business.paypal.com - Safe
    4. business.paypal.com/retail - Safe
    5. paypal.com.activatecard.net - Suspicious! (notice the dot immediately after Paypal’s domain name)
    6. paypal.com.activatecard.net/secure - Suspicious!
    7. paypal.com/activatecard/tinyurl.com/retail - Suspicious! Don’t trust dots after the domain!
  2. Check the email in the header. An email from Amazon wouldn’t come in as This email address is being protected from spambots. You need JavaScript enabled to view it.. Do a quick Google search for the email address to see if it is legitimate.
  3. Always be careful opening attachments. If there is an attachment or link on the email, be extra cautious.
  4. Be skeptical of password alerts. If the email mentions passwords, such as “your password has been stolen,” be suspicious.

Phishing Simulation

Another great tactic is to have regular phishing simulations. This is where we create a series of fake phishing emails (don’t worry, it’s safe), and randomly send it to your staff. When someone falls for the attack, we send them educational information to help them prevent being tricked by a real one.

We’ve found this to be very effective, without taking a lot of time out of an employees already busy day.

Are you interested in helping to protect your staff from falling victim to phishing attacks? Give us a call at (604) 513-9428.

0 Comments
Continue reading

Tip of the Week: How to Utilize Your Business’ Email

Properly Managing Your Email Like a Professional

Let’s not split hairs here: checking your email throughout the day can be a major waste of time. In order to avoid sinking time you could otherwise spend productively on reading (and re-reading) emails, there are a few habits you could develop.

Impose Rules on Your Email Habits

As we’ve said, repeatedly checking your email throughout the day can very quickly become a waste of your time. To avoid this, schedule times throughout your day to commit to checking your email. Once your time is up, stop until your next scheduled time.

We’ve all also accumulated emails that we simply don’t need to read. As harsh as it may seem, archive these emails, or unsubscribe as they come in to keep your inbox clean based on the subject line or the sender.

Managing Important Emails

Admittedly, not every email that comes in will be a waste of time. However, an overstuffed inbox can make it easy to miss something important. To avoid this issue, utilize folders to file your emails so that your inbox doesn’t become overfilled.

If Time is Left, Return to Your Inbox

If you finish your other tasks, return to your inbox and review your messages in order of importance. If you happen to run out of time, stop your review until your next opportunity. As you review your emails, don’t be afraid to unsubscribe to emails that aren’t important to your tasks.

Don’t Be Afraid to Leverage Filters and Labels

Filters and labels can help you to keep your emails more automatically organized. Your filters/labels should be relevant to their content. One can contain messages from a certain sender or pertain to a certain topic. As a result, you will be able to more easily keep your emails organized.

Rules like these can also keep you from having to deal with automatic replies, like out-of-office autoresponders and similar replies that you don’t need to receive.

What other emails have gotten in the way of your productivity? Let us know… we might cover them in a future blog! For more information, subscribe to our blog!

0 Comments
Continue reading

What Does Your Business' IT Infrastructure Look Like?

What Does Your IT Infrastructure Look Like?

Your IT infrastructure consists of all the technology that enables your organization to store and utilize data that it has collected. This includes your network, your storage system, and any hardware and software solutions that are used to access it. Basically, an IT infrastructure is effectively your organization’s central nervous system, supporting operations through the transportation of data.

It’s clear that your IT infrastructure will play an important role in the way your business works. This means that you’ll need to invest time and energy into developing a proper strategy for your IT infrastructure to adhere to.

Determining Your IT Infrastructure Strategy

The same infrastructure won’t work for all businesses, so you’ll have to craft one. To create an optimized infrastructure strategy, consider the following best practices.

Simplification

Make no mistake--your infrastructure today hardly resembles what it looked like just a few short years ago (at least, it shouldn’t). Chances are that your IT infrastructure contains several different types of technology. This complicates the process of improving and updating it.

Be sure to consider the modern standardization of the software and integrations that are possible with your centralized IT platform, as this will maximize access to data and increase how much value you get from your solutions.

Flexibility

IT is always changing and adapting to trends, which means that you will want to build your IT infrastructure in such a way that it can take advantage of these changes. Ask yourself where your organization’s biggest speed constraints are, as well as how they can be rectified. If you can consolidate your existing infrastructure to limit the risks, how would this affect your business processes? These are all factors that must be taken into consideration.

Service-Focused

The biggest advantage that IT provides for your organization is that operations can’t happen without it. When planning out your infrastructure, be sure to consider the fact that your entire business will need to use it for access to services and tools required for each employee’s day-to-day responsibilities. Ask yourself what you can do to make sure your infrastructure can do what must be done both now and in the future.

Why You Should Consider a Managed IT Infrastructure

You might recall the process you used to create your network back when your business was just a fledgling pushing back against the world. Remember that feeling and use it to fuel the process of reexamining your current IT infrastructure. In fact, you may find it more reasonable to outsource this task to a managed service provider.

There are many benefits to doing this, but the biggest has to come from the time you’ll save from doing so. You have a lot on your plate as a business owner. Can you say with confidence that you have the time it takes to design, build, manage, and maintain an IT infrastructure? Of course not--there simply aren’t enough hours in the day. Instead, you hand this responsibility to professionals you trust to ensure that the process goes well.

Coleman Technologies wants to be the MSP you trust to make sure your infrastructure is working for your business and its goals. To learn more about the services we offer, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Is Blockchain a Shield for Cybercrime?

How Blockchain Has Been Shown to Be Vulnerable

Let’s face it… blockchain technology is a human invention, which means that there are going to be some flaws.

Admittedly, the concept behind the blockchain makes this hard to believe: every transaction made through the blockchain, financial or data-based, is given a permanent, designated “block” in the chain. Before the transaction is completed, the rest of the network needs to approve this new block’s validity. The block is then added to the chain, where it cannot be altered and provides an unchangeable record of the transaction - to undo it, a new block would be created. It is only then that the transaction is completed.

While this method may seem foolproof, even “unhackable”, this just isn’t the case. In March of 2014, cybercriminals managed to steal $450,000,000 worth of Bitcoin through a transaction mutability vulnerability, and in June of 2016, cybercriminals managed to steal approximately $60,000,000 by leveraging a recursive calling vulnerability.

Additional Blockchain Vulnerabilities

Again, as a human creation, there are going to be some flaws in blockchain platforms. One investigation revealed that some blockchain and cryptocurrency platforms had over 40 vulnerabilities.

51% Vulnerabilities

Many of blockchain’s vulnerabilities have more to do with the nature of the platform as well. One such vulnerability is known as a 51% vulnerability, and is associated with mining cryptocurrencies. Let’s assume you are a cryptocurrency miner. If you manage to accumulate hashing power that exceeds more than half of what the blockchain contains, you could leverage a 51% attack to manipulate the blockchain to your own advantage.

Naturally, more popular blockchains, like Bitcoin, are far too expensive to be practical targets, but smaller coins are much more affordable to attack and can be lucrative for hackers. In 2018, 51% attacks were leveraged against less popular cryptocurrencies, netting the attackers approximately $20 million.

Security of Private Keys

Using a blockchain requires a user to have a private key. Naturally, if this key were to be stolen, those cybercriminals who stole it would be able to access and tamper with that user’s blockchain. What’s worse, because the blockchain is decentralized, these kinds of actions are difficult to track and even harder to undo.

Breach Examples

As you might imagine, most breaches involving a blockchain are in some way tied to an end user. In 2017, a fraudulent cryptocurrency wallet service was left up for months as the cybercriminal responsible allowed people to funnel their cryptocurrencies into it before stealing $4,000,000 - out of a reported total of $2 billion being stolen since 2017 began. In January 2018, it was disclosed that hackers stole private keys with malware, taking over $500,000,000 in NEM coins (a now-effectively-worthless cryptocurrency established by a nonprofit).

If hackers are able to steal from a purportedly “unhackable” technology, what’s to stop them from stealing from your business?

Cybersecurity solutions from Coleman Technologies, that’s what. We can set up the security solutions your business needs to protect its data, and monitor your systems to detect breaches preemptively, preventing a security issue from happening. To learn more about what we can do, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Our Newsletter

Welcome to the on-line version of our monthly newsletter.  

0 Comments
Continue reading

Get Your IT Playbook

Thank you for your interest in our IT Playbook. It will arrive in your mailbox in a few short days.

Looking to speak someone directly? Call us now at: (604) 513-9428.

Check out our blog to keep up with the latest Coleman Technologies news and information!

0 Comments
Continue reading

IT Playbook

Get a copy of our FREE IT Playbook

Make Educated Decisions on Your Technology Best Practices and IT Strategies

When you opened a business, that business was your specialty - not IT concerns. That’s why we’ve developed the IT Playbook, a guide to aid you in shaping the choices you make as you select the technology that powers your business.

The IT Playbook will help you make educated decisions on:

  • Which IT model makes the most sense for your organization.
  • How to align your data backup solution with your Business Continuity Plan.
  • What IT security practices should your company have in place.
  • Determine if and how the cloud would work for your business.
  • Choosing the IT solutions that best fit your company.

With advice and practical solutions for businesses of all sizes, the IT Playbook can serve as your guide to optimizing the technology your business uses to increase productivity, profits, and preparedness.

Fill out the form to download a copy of the IT Playbook, and give yourself the answers to many of the IT questions you may have, as well as strategies to improve your technological prowess.

0 Comments
Continue reading

Download Business Continuity Plan Cheat Sheet

Thank you for your interest in "7 Things Your Company Needs to Know for Your Business Continuity Plan" Cheat Sheet

Download

0 Comments
Continue reading

Download Microsoft Risk Assessment Plan

Thank you for your interest in our Microsoft Risk Assessment And Migration Plan.

Looking to speak someone directly? Call us now at: (604) 513-9428.

0 Comments
Continue reading

Thank You - Aspirin

Thank you for getting in touch!

We appreciate you contacting us about the $497 “Get-To-Know-Us” FREE Gift. One of our colleagues will get back to you shortly.

Have a great day!

0 Comments
Continue reading

Is Your Current Computer Guy Causing You To Need One Of These?

Is Your Current Computer Guy Causing You To
Need One Of These?

Bayer aspirin

  • Does he take forever to call you back and respond to your requests?
  • Are you paying him good money to keep things working, but are STILL having constant problems, slowness and other recurring issues?
  • Are you worried he’s not backing up and securing your network?
  • Does your head hurt from having to deal with the hassles?

Are you sick and tired of constant IT, phone and computer problems interrupting your day, frustrating you and your team? Do you feel stuck with an absent-minded computer guy who isn’t delivering the SERVICE you want, but you don’t know who else you can trust to do a good job without overcharging you?

If so, I have the solution that will make IT-related issues one headache you NEVER have to deal with again.

My name is Darren Coleman, owner and CEO of Coleman Technologies and author of the book Easy Prey: how to protect your business form Data Breach, Cybercrime & Employee Fraud. We specialize in delivering proactive IT support and services to businesses like yours with friendly, knowledgeable techs who will put you at ease and resolve your IT problems quickly and efficiently. Chances are you’ve never heard of me or my company before, but when you finish reading this letter, you’ll be glad you finally have.

Why can I make such a bold statement?

Because almost every small business CEO I talk to will confess that their current computer support person – whether it’s a friend who’s good with computers or a “professional” IT company – is NOT completely delivering the level of service they want. Therefore, they are forced to deal with ongoing technical issues and worry that their network is NOT secure from hackers, ransomware, extended downtime, and a range of data-erasing disasters. Clearly this is unacceptable!

Isn’t It Time To Finally Get Rid Of This Headache?

Although the notion of providing reliable, affordable, full-service computer support isn’t an amazing concept, it still surprises me how many computer technicians don’t get it right. Therefore, I understand if you’re skeptical about our claims. My guess is that you’ve been disappointed, even burned, by other IT guys in the past. That’s why I’d like to extend the following offer to you…

A $497 “Get-To-Know-Us” FREE Gift…

As a prospective client, I’d like to offer you a free, no-obligation, no-sales-pressure IT Systems Assessment where I’ll send one of my senior technicians to your office to conduct an audit of your network’s security and overall health.

When done, we’ll give you a report of findings that will not only reveal if your data and computer network really are properly backed up and secured, but also if there is anything you need to do now to prevent a major network outage, data loss, hacker attack or other expensive, data-erasing disaster. Plus, we can almost always show you how to save a little (or a LOT) on hardware and software by switching to more efficient cloud-computing solutions.

After all, it never hurts to get a competitive bid from a qualified third party – and this assessment is totally, completely free without obligation.

The Assessment only takes [60 minutes] to conduct, but when it’s done, you’ll know for sure if your company’s data is secured and, in the event of a disaster, exactly how fast you could be back up and running again (if at all). I will be following up in the next couple of days to make sure you received this letter, and to see if you would like to schedule this free IT Systems Assessment. If not, please just let us know!

Awaiting your response,

Darren Coleman
CEO, Coleman Technologies Inc.
Author, Easy Prey: how to protect your business form Data Breach, Cybercrime & Employee Fraud

P.S. Why risk it? Our free IT Systems Assessment comes with zero strings attached, no expectations and no obligations on your part. If nothing else, it will be a good third-party validation of how well your systems are currently performing.

How Does Your Current IT Guy Stack Up?

Take this quiz to find out!

How can you tell if you are receiving poor or substandard service? How do you know if your IT company or computer guy is doing everything possible to secure your network and prevent expensive disasters? If your technician does NOT score a “yes” on every point, you could be paying for substandard support and jeopardizing your data and network’s security!

  • Do they answer their phone LIVE and respond to emergencies promptly (within X minutes)?
  • Are they easy to reach and highly responsive (responding same day) when you need them for non-emergencies?
  • Do they proactively monitor, patch and update your computer network’s critical security settings daily? Weekly? At all? How do you know for sure?
  • Do they offer proof that they are backing up ALL your data, laptops and devices?
  • Do they meet with you regularly (at least once a quarter) to report what they’ve been doing, review projects and offer new ways to improve your network’s performance instead of waiting until you have a problem to make recommendations?
  • Do they provide detailed invoices that clearly explain what you are paying for?
  • Do they explain what they are doing and answer your questions in terms that you can understand, NOT in “geek speak”?
  • Have they proactively discussed cybersecurity with you, and made recommendations for better protecting your network from ransomware?
  • Have they provided you complete network documentation, or do they hold the “keys to the kingdom” refusing to give you admin passwords?
  • Do they offer any guarantees on their services?
  • Do they arrive on time and dress professionally?
  • Do you look forward to seeing them, working with them, or do you cringe every time you have to make that call?

 

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image