Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

What’s Your Business Continuity Strategy for 2023?




What’s Your Business Continuity Strategy for 2023?

When you suffer a data breach, you might wonder how you can possibly come back from such an event, especially if it leads to a network compromise. Can your business rebound effectively, and if so, what do you need to do to make sure that it doesn’t happen again? It all starts with understanding how much data you need to function, as well as how much downtime you can afford to suffer from.

With all this in mind, you need to have a business continuity plan to prepare for the worst. Your business cannot afford to not be prepared for downtime-causing incidents. You can have the strongest security system in existence and still suffer from a data breach; therefore, you need to have contingencies in place that can help you navigate these unfortunate and unlikely scenarios in an effective way.

You should be backing up your data for multiple reasons beyond cybersecurity. You also must prepare for damages to your physical infrastructure that could affect your data, like natural disasters and user error. Let’s go over what business continuity and disaster recovery mean for modern businesses.

Business Continuity and Disaster Recovery Are Two Different Things

Business continuity and disaster recovery are often mistaken to be the same thing, but the fact is that disaster recovery is part of the greater business continuity effort. Business continuity includes far more than just data recovery; it also includes administrative aspects of running your business, including other events that could derail operations. Disaster recovery, in essence, is one part of an effective business continuity plan.

Disaster recovery starts with data backup, and if you think your business can run without it, you’ve never tried to run it without data or applications. Some businesses can suffer from downtime for longer than others without serious ramifications—this much is true—but enough downtime can cripple any business. This is why it’s important to know what standards you are working toward regarding disaster recovery.

What You Must Consider

Proper backup protocols include far more than storing copies of your company files in a safe location. It also means making sure they are accessible when you need them most. Not all disasters are going to hit you hard enough to knock you out of commission permanently, but you should treat each of them as seriously as they could. Even something as simple as a malware attack or a user error could make more work than necessary for your company if you’re not prepared to deal with it.

We want you to take this major point away from this blog. You should store multiple copies of your data in various locations, both on-site and in a secure, off-site data center (or the cloud). With these contingencies in place, you should be prepared for any situation that could derail your operations, whether it’s hardware failure or a hacking attack. A BDR solution from Coleman Technologies can prepare you to restore your data as quickly as possible following a disaster through a temporary server which can keep operations moving while IT repairs or orders a replacement server. On top of that, our BDR solution is much faster at restoring a backup onto a new server compared to traditional backup methods, saving you a ton of time and labor.

To learn more about how a BDR system can be just the right proactive solution for your business, contact us today at (604) 513-9428.

Continue reading

Make Sure You Share These Cybersecurity Tips with Everyone You Know




Make Sure You Share These Cybersecurity Tips with Everyone You Know

Cybersecurity is crucial for everyone to focus on, both in the professional environment and in their personal lives. That’s why I wanted to put together a list of cybersecurity practices you should encourage your team to follow when they aren’t in the office or working remotely, when their time is theirs. 

Make sure you share these points with them, and have them pass on the lessons to those in their lives as well. The more people we can get into a perpetual cybersecurity mindset, the better.

Cybersecurity Tips and Habits Everyone Should Be Following

Take Your Passwords Seriously

I know, I know… it’s always about the passwords. The thing is, there’s a reason for that. Passwords are still the predominant security measure in computing, and it is incredibly important that you are careful and strategic about using them.

Wherever you need to use a password, make sure that you’re using a new one and that it’s sufficiently complex. Avoid using what are known as “dictionary” words, and NEVER use personal details or information as you do so. As much as you might like thinking about Fido the dog or Luna the alpaca every time you have to log into something, a cybercriminal would like how easy it would be to figure that out, too.

While it may seem like a lot, I recommend investing in a standalone password manager and avoiding ones built into Internet browsers. This nifty bit of software helps you manage all the passwords you should be using, protecting them all behind just one you need to remember.

Take Advantage of Multi-Factor Authentication

With more and more accounts now implementing multi-factor authentication as an option, this may be one you’re already familiar with. If you’ve ever been asked to provide a code texted to you as you log in, you’ve experienced MFA.

MFA takes the security offered by the password and elevates it to the next level, requiring something that is much harder (not impossible) for a cybercriminal to get their hands on. Is it a pain? Yes, it is. However, it is also something that will leave you so much safer.

Think About Where You Connect

Again, I get it… data plans are expensive. Unfortunately, a data breach will cost you a lot more. Public Wi-Fi, like that found in restaurants and stores and the like, simply cannot be trusted with any amount of your data. First, cybercriminals have been known to create their own networks and name them something similar to a business’ actual network and see who takes the bait. Second, a cybercriminal could easily just sit and wait on the network to intercept your data.

Instead, we strongly recommend avoiding these kinds of networks at all costs.

Also, Think Before You Click

Cyberthreats frequently hide in the most innocuous of places. For instance, cybercriminals are not afraid to send falsified emails that look like they come from someone else to try and get people to click on dangerous links—sometimes to initiate downloads, sometimes to direct you to completely falsified websites meant to steal your usernames and passwords.

This practice is known as phishing, and it comes in many different forms. Likewise, your response to it should also take many forms. Don’t click unexpected or unknown links, report any spam or junk mail you get, and limit what you share publicly because this is where phishing efforts get a lot of their data.

These are Just the Basics, There’s a Lot More Everyone Should Do

This is especially true of businesses, as they can largely be seen as repositories of data of exactly the kind that cybercriminals want.

Businesses Have an Additional Responsibility to Their Clients and Employees

While cybersecurity is important for everyone, businesses really can’t afford to fall short. Coleman Technologies is here to help. Give us a call at (604) 513-9428 for assistance with your business’ IT, including its security preparations.

Continue reading

What’s the Deal With the Blockchain?




What’s the Deal With the Blockchain?

With things like cryptocurrencies and NFTs flooding the public awareness, the term “blockchain” has been brought up more than a few times. However, this association hardly covers what the blockchain is or what it is capable of.

Let’s briefly review what the blockchain really is, and what the technology can do.

The Blockchain is Nothing More Than a Distributed, Immutable Ledger

So, what does this mean?

In other words, the blockchain is a means of recording information in such a way that it is effectively impossible to manipulate, as this record is replicated across the network of devices that create the blockchain. Every transaction made (a block) is recorded in this network (the chain), which means that any attempt to edit information results in a new block being created.

The only way that this information can be changed is if every single block in the chain is simultaneously altered—requiring anyone trying to change that record to infiltrate each and every device in the chain simultaneously, which potentially means hacking dozens or even hundreds of endpoints all at the same time.

This Gives the Blockchain Assorted Advantages

For example…

The Blockchain is Very Secure

The distributed nature of the blockchain, and the fact that it relies on digital signatures, makes the prospect of fraud nearly impossible due to the scale of the network and the need for the digital signatures in order to change data as well.

The Blockchain Enables Automation

Transactions can be set up to be completed when different triggers are fulfilled, allowing you to focus on other matters with the confidence that the blockchain will attend to what you have previously instructed it to do.

The Blockchain Saves Time

Finally, while many traditional transactions need to go through numerous, time-consuming steps, the blockchain can reduce the time you need to spend on these processes from days to mere minutes.

How Can Your Business Put Blockchain to Use?

There are actually quite a few ways that the blockchain can be used by businesses of all sizes, from supply chain management, smart contracts, and others. Reach out to us to learn more about how you can use various technologies with our help to benefit your business. Give us a call at (604) 513-9428.

Continue reading

Managing Data is Easier with Data Virtualization


What is Data Virtualization?

It isn’t uncommon for today’s businesses to have multiple database management systems, and unfortunately, the different types don’t always play nicely with one another. As the amount of data that businesses leverage swells, it has become more important than ever for businesses to be able to consolidate all of this data into an easily accessible tool, without creating a new copy or moving it from its original source - a process similar to data federation, but one that allows access to different data types.

This process makes it far simpler for data to be put to use, allowing the various solutions that are used throughout the course of business to interact with this data.

The Primary Benefits of Data Virtualization

There are quite a few benefits to using data virtualization in your business, but for our purposes here, the fact that all of your data--stored in a variety of different locations--is interconnected and accessible from a single point is the highlight. Just consider how much more could be accomplished if you and your team could access all of the different data types you may need from one place.

As a result, data virtualization is exceptionally useful for processes involving analytics and Big Data, as both incorporate data that comes from a diverse variety of sources.

Of course, we would be amiss if we didn’t mention some of the other benefits that data virtualization has to offer. Productivity can be boosted through the integration of different data units and structures, management becomes simpler, and it is usually a more affordable option than the alternative of copying and converting all of your data into compatible formats.

Interested in Learning More about Data Virtualization?

Reach out to the pros at Coleman Technologies. Even if data virtualization doesn’t apply to your specific needs, we can come up with the right solution for you! Give us a call at (604) 513-9428 to learn more.

Continue reading

Music is Being Lost to Failing Hard Drives, Reminding Us of a Few Best Practices




Music is Being Lost to Failing Hard Drives, Reminding Us of a Few Best Practices

Nostalgia is a powerful force. It can drive us to look to the past for things we once loved, such as the music we listened to over the years. However, what if the music you loved was lost forever?

This could be the case for many, as older hard drives that archive this music have been discovered to have failed. Let’s examine the situation to see what lessons any small-to-medium-sized business can learn.

Meet Iron Mountain Media and Archive Services

Iron Mountain specializes in data management and storage services. It works with various industries to fulfill their document management and digital transformation needs, including the music industry. Iron Mountain provides archived storage for media assets for this particular client base. As a result, they store thousands upon thousands of hard disk drives that their clients asked them to use in the 1990s.

During a routine survey of its storage vaults a few years ago, the provider discovered that of these thousands upon thousands of HDDs, approximately a fifth—yes, 20% of them—were unreadable.

A Brief History of Why HDDs are the Standard Format

Ironically, the migration to HDD as the standard storage format was originally due to a similar problem. Masters, once converted to the preferred commercial format of the time, were put into storage as tape. Believe it or not, the tape degradation these masters suffered was discovered thanks to the Guitar Hero video game franchise and 5.1 surround sound. Artists wanted to make sure their work was compatible with these new platforms, but they found that their tapes weren’t all in working condition. Some had degraded, storage space conditions damaged some, and some were obsolete, having been produced for certain technologies in formats that were not easily played. Some were just missing.

We’d be the first to say that tape is far from the ideal storage medium, and we’re willing to guess that anyone who lost their masters in this way would easily agree.

As a result, the industry quickly shifted to HDD-based masters… but even this has its issues, as Iron Mountain discovered and has been trying to spread the word about.

What’s the Problem with HDDs?

Let’s say there was a nu metal band called Letters From Charlie of the Bears that had its heyday in the ‘90s, and their masters were saved via HDD. Letters From Charlie of the Bears ends up breaking up as the demand for nu metal wanes in the ‘aughts, unlike their many contemporaries that adjusted their music to match demand. However, with nu metal returning to fashion nowadays, Letters From Charlie of the Bears gets back together. They decide to remaster some of their old albums to capitalize on the renewed interest and go back on tour… only to find that the hard drives that once contained their work have gone kaput.

A few issues with HDD archival storage could lead to this scenario. First and foremost, these hard drives were never really designed with long-term archival storage in mind. Plus, the whole thing is rendered inoperational if any moving parts inside the drive fail. Older file formats have also made these master files difficult—if not impossible—to access.

What Does This Mean for Your Business?

There are two key lessons to be learned by the average business in British Columbia from this situation.

First, the importance of backup. As lovely as it would be to have technology that can inherently be trusted, and as hard as IT providers like Coleman Technologies work to keep business technology functional, the hard truth is that you can never fully trust your data storage. As a result, you must have a backup strategy that ensures you always have access to the most up-to-date version of your data and that features data redundancy to ensure that—even if something happens to one of your backup copies—you always have a working set of data to utilize.

Of course, having a backup is one thing. Knowing you can rely on it is quite another. We recommend that you occasionally test your backups by trying to operate solely from what you have stored in them. This is the second lesson to be learned.

We’re Here to Help

As part of our IT services, we offer comprehensive backup preparations and management, helping to protect your business against disasters of all kinds through adherence to key best practices. Find out how you can benefit from this by giving us a call at (604) 513-9428.

Continue reading

Sports Franchises All-In on Data Analytics




Sports Franchises All-In on Data Analytics

Sports franchises have changed the way they use data to help them strategize. In the past, businesses used basic scouting to find and develop talent, but with the use of advanced analytics, not only can sports franchises improve their talent bases, they can save money and build a competitive advantage over organizations that aren’t so analytically inclined. 

Enhanced Analytics

The field of sports analytics combines statistical analysis, data processing, and predictive modeling to build competitive superiority. In fact, more and more teams are enhancing the way they view data as franchises that were at the forefront of this strategy have found success using them. Improvements in sensor technology gives teams the ability to measure anything to help with team construction, individual performance, and what sells the best at the concession stands. 

Data-Driven Decision Making

With data driving organizational decision-making, teams can identify metrics to help them get the most out of their investments. By creating key performance indicators an organization can make more informed decisions using objective data rather than subjective insights, often to the benefit of the whole franchise. 

Improved Player Performance Analysis

Advanced analytics replaces some of the more basic statistics that sports franchises depended on to track player and team performance like goals scored and batting average with more advanced algorithms and statistical data that is collected using IoT sensors that give team managers a more accurate representation of the product on the field. This helps players know what to work on and helps teams construct better game plans. 

The technologies behind these major analytical improvements can work to help you make your business better as well. From measuring individual employee performance to strategizing your sales and marketing improvements to using predictive analysis to improve your standing processes, data analysis can help any business be more successful. If you would like to learn more about how to use data to improve your business, give us a call today at (604) 513-9428. 

Continue reading

3 Traits You Want a Business Data Backup to Have




data-backup

To keep your business running smoothly, even if something goes wrong—like a power outage, cyberattack, or other disaster—you need a reliable way to protect your data. That’s where data backup comes in. It’s important to make sure your backup is thorough and trustworthy so you can recover if things go south.

Here are a few key parts of a good backup system:

A Good Backup Has Extra Copies

Usually, having something "redundant" means it’s not needed, but in the world of data, redundancy is a good thing. A backup is just an emergency copy of your data in case the original gets damaged or lost. But one backup copy isn’t enough. You should have several copies so that you have more to fall back on if one gets ruined.

The 3-2-1 Backup Rule

The 3-2-1 Backup Rule is a smart way to ensure your data backup is safe and reliable. It goes like this:

  • Always keep at least three copies of your data.
  • Store these copies in at least two different places.
  • Make sure at least one copy is kept offsite, like in the cloud.

By following this rule, your data is much safer no matter what happens.

A Good Backup is Automatic

People make mistakes—forgetting to do something is normal. But you can’t afford to forget about your backup. Luckily, modern technology can automate your backups. This means the backups will happen on their own, without someone having to start them. As a result, your data is always up-to-date, and you don’t have to worry about missing a backup.

A Good Backup Keeps Old Versions

Sometimes, mistakes happen, or a virus messes up your files. You don’t want to lose everything if your backup occurs right after these events. That’s why it’s wise to have a backup that keeps old versions of your files, so you can go back in time to a clean version if needed.

We can help you set up a strong, reliable backup system to keep your business running, no matter what. Call us at (604) 513-9428 to learn more.

Continue reading

Why You Need to Keep an Eye on Your Data


How a Company Acquires Your Data

For a company to get your data, all they really have to do is ask you for it. Think about what happens each time you make a purchase online, or even create an account—you’re handing over your contact information, and usually pairing it to one of your financial resources.

Obviously, you’re subconsciously entrusting them with this information, assuming that they will keep it sufficiently protected and secure.

Here’s the thing: not all companies are totally deserving of this trust. Quite a few companies will make some extra money by bundling their contact lists and selling them off to other companies. This is considered a common enough practice but is fortunately looked upon more and more negatively as data protection is being prioritized more.

Even if this practice goes away, you still have no control over the company’s data security practices. Consider what information of yours could be exposed if that company was to be breached:

  • Your name
  • Your birthday
  • Your credit card information
  • Your contact information

These are all forms of personally identifiable information (PII), and this isn’t even a comprehensive list of the data that these companies will collect. Plus, if they were to suffer a data breach, the onus is still on you.

One of the biggest flaws of the Internet today is the questionable privacy of any activity. Anything you do on the Internet adds to a massive data trail that describes you, from the content you’ve streamed, the messages you’ve sent, everything.

As you might imagine, there’s a lot of value to be had from this kind of data.

How to Protect Yourself by Protecting Your Data

Due to this data’s value, you must do everything you can to protect it. Here are a few good ways to start:

  1. Use good passwords: Password hygiene and resiliency is the part of your online security that you have the most control over, so make sure that you aren’t taking any shortcuts that will undercut their effectiveness in protecting your accounts. Passphrases are often considered a more secure, but easier-to-remember, alternative to the password.

  2. Review the Terms of Service: For each account you’ve created, you need to check the fine print to see how they are using the data you provide.

  3. Track your finances: One of the most effective ways to find out if your security has been undermined is to keep an eye on your financial activities. Find a resource you can trust to give you these insights.

  4. Avoid public Wi-Fi whenever possible: Public Wi-Fi signals are a favorite hunting ground for many cyberattacks. Your data plan is a much safer alternative to these.

Coleman Technologies has the experience and know-how to keep your business safe from many cyberattacks. To learn more about how we can help, reach out to us at (604) 513-9428.

Continue reading

Tech Term: Really Simple Syndication (RSS)




RSSFeed_166616073_400

Some websites have an orange icon with waves coming from a dot in the bottom-left corner. This icon is for an RSS feed. RSS feeds are great for users who want to add the website’s content to an RSS reader—but what does this even mean? Let’s find out.

Explaining RSS Feeds

RSS is an acronym that stands for “really simple syndication” or “rich site summary,” depending on who you ask.

Basically, it boils down to two parts of the same process. If you visit many websites, you can use software to build an RSS feed reader (or news aggregator) that can pull those highlights into one place. This is great for websites that regularly produce new content, like news websites, podcasts, web shows, and blogs.

With an online RSS feed or browser extension, like Feedly, you can subscribe to different websites and aggregate their content in one place, making consumption much easier.

Aggregate the Content You Want into Your Own RSS Feed Reader

Want to build an RSS feed for yourself? Follow these steps.

Many RSS readers allow you to search for websites to follow, but if there’s one in particular you are looking for, just keep an eye out for the orange icon. Click this icon, and you can add it to your RSS feed. If the link brings you to a simple webpage with links to articles and website identifiers, copy the page’s URL into your RSS reader, and you should be all set.

We hope you find a great use for RSS technology so you can be more productive with your content consumption!

Continue reading

The Dark Web is No Place for Your Data




The Dark Web is No Place for Your Data

When hackers steal data, they don't just sit on it. Sometimes they delete it, but most of the time, they sell it or use it for illegal activities. A lot of this stolen data ends up on the Dark Web, a hidden part of the Internet where people do shady things. That's why it's so important to keep an eye on the Dark Web to protect your business.

What is the Dark Web?

The Dark Web is like the hidden back alley of the Internet, where illegal activities happen without much oversight. Things that would normally get removed from the regular Internet, like selling stolen information, drugs, weapons, and even worse things, can be found there.

To access the Dark Web, you need special tools like the Tor browser or specific permissions. Websites on the Dark Web are encrypted, meaning they can hide users' locations and identities, which makes it harder to track who is doing what.

How Does Your Data End Up on the Dark Web?

The most common way your data gets to the Dark Web is through data breaches. Hackers break into systems and steal personal or business data, then sell it to make money.

Even if you're careful, your data could still be at risk if companies or websites you use get hacked. If you've ever signed up for a service or shopped online, your personal information might already be on the Dark Web, waiting to be misused.

If your business data—like passwords, credit card info, or customer details—gets leaked, it can lead to serious problems, like identity theft or financial fraud.

Why Dark Web Monitoring is Important

To stay safe, businesses should regularly check the Dark Web to see if their data has been leaked.

If your information is on the Dark Web, criminals could use it to break into your accounts or steal your identity. With monitoring tools, businesses can quickly find out if their data has been exposed and take action to protect themselves—like changing passwords or improving security.

But checking the Dark Web yourself isn't a good idea. It's better to let cybersecurity professionals handle it. At Coleman Technologies, we can monitor the Dark Web for your business and help you take the right steps to stay safe. Call us at (604) 513-9428 to learn more.

Continue reading

Technology Can Bring a Lot of Optimism




Technology Can Bring a Lot of Optimism

Staying optimistic can be challenging, not just in business but in life. Here’s a few ways to give your business a little more confidence in your ability to support your business.

Enhancing Efficiency and Productivity

Technology can significantly enhance efficiency and productivity, fostering optimism among business owners. Advanced software and automation tools streamline operations, reduce manual errors, and speed up processes. Project management tools help teams collaborate seamlessly and meet deadlines. Cloud computing provides easy access to data from anywhere, ensuring uninterrupted work. These improvements boost worker productivity and improve time management, giving business owners confidence in their company’s smooth operation and consistent growth.

Data-Driven Decision Making

Technology also boosts optimism through data-driven decision-making. With big data analytics, businesses can gather and analyze vast amounts of information to understand customer behavior, market trends, and operational performance. Analytic tools enable owners to track key performance indicators and make informed decisions based on real-time data, reducing risks and improving future trend predictions. This data-driven approach instills a sense of control and confidence in the business’ direction.

Enhanced Customer Engagement

Another critical area where technology contributes to optimism is customer engagement. Social media platforms, email marketing, and customer relationship management (CRM) systems allow businesses to interact with customers more personally and effectively. CRM tools help manage customer interactions, track sales, and provide personalized service, leading to higher customer satisfaction and retention rates. Effective customer engagement helps business owners remain optimistic about their business prospects by ensuring they can consistently reach and satisfy their customers.

Innovation and Competitive Advantage

Embracing technology enables businesses to innovate and maintain a competitive edge. Advanced technologies like Artificial Intelligence (AI), blockchain, and the Internet of Things (IoT) open new avenues for product development and service delivery. AI can create smarter products, automate customer service, and optimize supply chains. Blockchain enhances security and transparency in transactions, while IoT improves inventory management and operational efficiency. By using these technologies, businesses can differentiate themselves from competitors, create unique value propositions, and capture new market opportunities. This potential for innovation and growth fuels optimism among business owners, presenting endless possibilities for their business' future.

To learn more about how we can help you handle your business technology give us a call today at (604) 513-9428.

Continue reading

Migrating Data? Budget in Evaluating End Result




Migrating Data? Budget in Evaluating End Result

There’s no beating around the bush with this one; moving data from one place to another, also known as data migration, is critical to get right the first time. If you create and follow a migration strategy, evaluating here and there to make sure it’s all going according to plan, you’ll see great success in this effort. Let’s go over how you can make it happen.

The Process of Migration Testing

When testing your data migration process, it’s important to make sure you take action to plan it out long before the process begins, as well as what happens after the migration. If you evaluate your process before, during, and after the migration, you’ll have key insights into specific metrics that can help you gauge the success of the endeavor. Of course, there are plenty of things that can go wrong, and keeping an eye on things throughout the process will help you catch them before they cause too much trouble.

Also of note is that data migration requires some pretty technical skills and know-how, so it’s advisable to have professionals on hand to help you with the process. Coleman Technologies is happy to assist you with this complicated process.

All that said, we can now take a look at what you need to know before, during, and after a migration.

What Should You Do Before Your Migration?

First, we recommend that you look at how much data needs to be migrated to establish a frame of reference for the success of the migration. It’s also crucial that you take measures to protect your data while you migrate everything to a new location, and be sure to back it up just in case of a worst-case scenario.

Furthermore, be sure that your team is aware of the proposed timeline, and make sure that your budget can cover this timeline in a sustainable way. The last thing you need to do is cut corners. Doing so could potentially put you at risk of doing it poorly, or even leave you subject to fines and other compliance issues if the system you’re migrating to is not adequate.

What Should You Do During the Migration?

As the migration occurs, you should break up your data into smaller batches so that testing is more efficient and easier to pull off. You can also take the opportunity to set access permissions according to the roles of your employees.

What Should You Do After the Migration?

Once you have finished the migration, you should go through and test your new solutions to make sure that they all work correctly. This involves making sure that the data have made it to the new system in the correct format. Checking the system performance should also be a priority, as well as various security assessments like stress testing, penetration testing, and others.

Need a Hand with Data Migration?

Coleman Technologies can help your business with its data migration needs. To learn more, call us today at (604) 513-9428.

Continue reading

One Way to Protect Your Data: Hand It Out Less




One Way to Protect Your Data: Hand It Out Less

We all know companies collect a lot of data. After all, your business is no exception to this rule, and you likely collect significant consumer data to facilitate operations. But if you get the itch to protect your personal privacy (and you should), there are ways to limit how much advertisers, criminals, and other companies can gain access to. Here are just a couple of ways.

Actually Read the Privacy Policies and Reports

Apps and websites take in a lot of data, but you have more control over it than you think.

For example, scroll to the Data Collection section of any website’s privacy policy. You’ll see notes for what data the app or service collects, how the company stores it, and how it uses that information. App stores also contain information that can shed some light on how they use your data, so take note of that whenever you download a new app (and be sure to check the permissions too while you’re at it!).

Depending on the country and regulations associated, companies may have to email you notifications about policy changes and security issues, so pay attention and be your own advocate for data privacy.

Opt Out of Data Collection

Some companies have begun to use customer data to train generative AI tools, which doesn’t sit well with consumers.

We recommend that you do what you can to limit data collection whenever and wherever possible. Oftentimes you’ll find information on data removal in your user settings, as is the case with most platforms that use generative AI in some way. If you can significantly reduce the number of apps and services that use your data in this way, you’ll be in a lot better shape.

After all, you don’t know what the data is used for unless the company explicitly tells you.

Give Them Bad Data

Have you ever looked at a sign-up form for an app or website and wondered, “Why do I need to give them this information?”

For some apps, certain information might be needed, like your name, email, or date of birth. Other times, the website or app might ask for completely irrelevant data that does not affect how you use the service. In cases like this, there’s no reason to offer the information, and it would be foolish to do so without knowing why the data is collected.

You’re also free to not accept cookies on many websites, despite those increasingly large banners that claim otherwise.

Ready to Take Security More Seriously?

The big reason to be aware of personal data privacy and security: you’ll be more likely to protect that of your customers.

We know security is a nightmare to handle logistically, which is why we do all the heavy lifting for businesses just like yours. With Coleman Technologies, you can know your business will always be doing what it can to stave off attacks against its consumers’ privacy.

To learn more, call us at (604) 513-9428.

Continue reading

Tip of the Week: Stop Apps from Invading Your Privacy




Tip of the Week: Stop Apps from Invading Your Privacy

Earlier this year, a location data broker called Gravy Analytics suffered a huge data breach that compromised a dataset with 30 million points from devices all over the world. With this data, hackers can track users and their movements through healthcare, government, and military facilities.

While there’s nothing that can be done about the data breach, you can take action now to ensure that your business is protected. Here’s how you can stop applications from tracking your locations and movements.

Prevent Location Oversharing on the App Level

If you want to stop sharing your location, then first you need to understand the mobile advertising ID (MAID), which is an identifier on every mobile device that tells advertisers if users have viewed or interacted with an ad.

MAIDs give ad platforms incredible power to single out and track individual users from location to location. They can create a detailed profile through this data, then sell that data to brokers who can resell it for a profit. This gives third parties the power to track your mobile device behaviors, which is a huge breach of privacy and (potentially) a security risk, as there’s nothing stopping malicious actors from purchasing this data for themselves.

You can delete these advertising IDs from your Android or iOS devices, though, so fret not!

How to Delete the Advertising ID from Android Devices

For users of Android 12 and beyond, users can delete their ad ID permanently using this process:

  • Open Settings
  • From there, access Security & Privacy
  • In Privacy, access Ads
  • Select Delete advertising ID, and confirm your choice on the next page.

You should also review your existing app permissions by following this path: Settings > Privacy & Security > Privacy Controls > Permission Manager.

How to Delete the Advertising ID from iOS Devices

Whenever you install a new app, it will request permission to access what’s called an identifier for advertisers, or IDFA. Select the option for Ask App Not to Track to deny this permission.

If you want to revoke permissions, you can do so at any time through your Settings > Privacy & Security. From here, you’ll see the option for Tracking, which lets you enable or disable multiple apps through the Allow apps to Request to Track slider. There’s also a native advertising system that doesn’t feed into the IDFA, which can be disabled by following this path: Settings > Privacy > Apple Advertising > Personalized Ads.

We recommend that you keep tabs on existing app permission through the Settings > Privacy & Security options.

Protect Your Privacy and Security

If you’re worried about security and privacy, we can help you ensure that you’re taking it as seriously as possible. To learn more, call us today at (604) 513-9428.

Continue reading

The NFL Has Seen a Significant Technical Leap Forward in Recent Years




The NFL Has Seen a Significant Technical Leap Forward in Recent Years

Did you watch the big game this year? Chances are that if you did, you got to witness all of the spectacles that the event had to offer, including a lot of technology that enriched the experience, whether you realize it or not. The National Football League has implemented emerging technologies that have helped solve persistent challenges over the years. Let’s explore some of these technologies.

Better Player Safety

Look, there’s no beating around the bush with this one. The NFL has countless fans tuning in to watch incredible athletes perform at the highest levels. When you have athletes of this caliber butting heads with one another, there are bound to be some nasty injuries, and it’s important that players get the treatment they need in record time.

If players are not treated, there are more opportunities for poor health outcomes. Look to the many stories from several years ago of retired players suffering from massive headaches or exhibiting strange behavior. When the brain is damaged over and over, degenerative brain diseases like chronic traumatic encephalopathy (CTE) can occur.

To address these issues, the NFL decided to alter the game's rules to support player health. Nowadays, you’ll find the NFL using IoT technology to collect information on players and work toward healthier outcomes for all.

More Accurate Player Performance

Player safety is far from the only data collected by the NFL. The organization constantly reviews data to improve what it offers viewers, including individual data that helps coaches build their ideal rosters. In fact, since 2022, the NFL has partnered with Amazon Web Services, or AWS, to create something called The Digital Athlete. Through AI, coaches, executives, and players can look at a comprehensive view of a player. This technology helps everyone involved make better decisions to operate better in their respective roles.

In-Game Augmented Reality

Augmented reality, or AR, is in play whenever you see lines drawn, down markers, or overlays across your television screen. The NFL has significantly ramped up its efforts at delivering a clean AR experience. One such way is through a 360-degree AR portal that gives fans a firsthand experience of the halftime show, which is pretty neat.

Additionally, the league is encouraging viewers to use technologies like ARound, an AR platform that pushes advertising and integrated experiences forward. AR could very well be the future of fan interaction, so it’s no surprise that the NFL would actively incorporate it into the biggest game of the year.

What are your thoughts on this technology? Be sure to keep your eye on our blog for more information about technology and its innovative uses.

Continue reading

Going Digital Saves Money on Document Storage and Collaboration




Going Digital Saves Money on Document Storage and Collaboration

A successful business thrives on building beneficial relationships, which generates a lot of data and contracts that need to be efficiently shared and stored. While this might seem straightforward, leveraging today’s technology can significantly cut down on filing costs and enhance file-sharing efficiency. Let’s explore how.

Traditional Methods of File Retrieval and Storage

Before delving into modern solutions, it’s essential to understand the traditional methods of file storage. The costs associated with filing cabinets are substantial. An average office worker uses about 10,000 sheets of paper annually, and it costs nearly $25,000 to fill a typical file cabinet, with an additional $2,000 each year for maintenance. Given these costs, it’s no surprise that businesses seek to transform their file management systems.

Modern File Management Solutions

Digital file management has transformed how organizations handle information, making it more efficient and accessible. Cloud storage solutions allow users to store large amounts of data securely online, accessible from any device with an Internet connection. This eliminates the need for physical storage and reduces the risk of data loss from hardware failures. Cloud platforms often feature real-time collaboration, automatic backups, and version control, enabling multiple users to work on the same document simultaneously and revert to previous versions as needed.

Modern digital file management systems also offer sophisticated organizational tools, such as tagging, metadata, and advanced search functions, which help users quickly locate files. These systems include built-in security measures like encryption and access controls to protect sensitive information and ensure compliance with data privacy regulations.

Digital systems can also reduce costs by streamlining the dissemination of information. Documents can be stored in searchable databases, enabling real-time queries and access from any location via smartphones. Smart contract services allow clients and customers to sign documents digitally, a service that will become more and more commonplace for consumers. 

Overall, advancements in digital file management not only improve data organization and access but also enhance security and collaboration, helping businesses cut down on excessive file management costs. Implementing this technology is crucial for any growing business.

To learn more about modern file management and file sharing solutions, contact the IT professionals at Coleman Technologies today at (604) 513-9428.

Continue reading

Managing Health Technology Has Its Challenges




Managing Health Technology Has Its Challenges

As technology continues to gain prominence in healthcare, it plays an increasingly vital role. Advancements in technology have allowed the healthcare industry to stabilize costs, improve access, and personalize care delivery—objectives that were challenging in the past. These benefits come with a potential downside: data privacy issues, which are becoming more concerning as technology advances.

How Technology Drives Healthcare

Technology hasn't just updated outdated systems and methods of care delivery—it has also brought about several significant improvements, streamlined the process between pharmacies, doctors, and insurance companies, enabling patients to obtain necessary prior authorizations more efficiently.

  • Smarter medical devices - The widespread adoption of electronic medical records (EMRs) in doctors' offices and hospitals allows for secure, cloud-based record sharing, leading to higher quality care.
  • Better predictive capabilities - Enhanced technology enables healthcare organizations to predict and manage outbreaks of contagious diseases before they escalate.

Data Privacy Challenges

Despite the advancements in technology, data privacy remains a critical concern. The sensitive nature of personal health information (PHI) and the growing threat of cybersecurity breaches make this issue particularly pressing. Healthcare providers need to keep software updated, as cybercriminals can take advantage of weaknesses before updates are fully implemented. While there is much to be excited about in healthcare technology, these advancements come with inherent risks.

To combat these challenges, healthcare organizations are heavily investing in cybersecurity.

Upgrading to newer, more secure systems is crucial for preventing security breaches. With robust security measures in place, healthcare technology can reach its full potential. Additionally, initiatives like the U.S. Food and Drug Administration’s (FDA) push to establish clear guidelines for cybersecurity in healthcare systems emphasize the importance of protecting sensitive data in an increasingly digital world.

Emerging technologies such as blockchain and AI also offer promising avenues for enhancing PHI security. However, the effectiveness of these innovations will depend on the level of investment organizations are willing to make.

If your medical practice needs help with their technology, our technicians can take a look. Give us a call at (604) 513-9428 to get started. 

Continue reading

Your Email is Insecure - Businesses Need Email Encryption




Your Email is Insecure - Businesses Need Email Encryption

All businesses use email to communicate, but too many organizations haven’t jumped on the encrypted email bandwagon yet. Encryption is incredibly helpful to keep networks and infrastructure secure, and it can do the same for your email solution. In fact, it is likely required to ensure the secure transfer of critical and sensitive information.

Encryption secures data by scrambling it into unreadable form. The data must be decrypted using a key, which reassembles it into a readable format. The key is found on approved devices or accounts, granting your team access to the data, but only when they are allowed access. It doesn’t take a genius to connect the dots and see the value of encryption for email.

Compliance with Regulations

Depending on your industry, you might need encryption to comply with regulations and laws. These include HIPAA, GDPR, and PCI. It’s important to note that this compliance extends beyond the simple transfer of data and also includes storage. If you fail to stick to these guidelines, you could be subject to fines that break your budget. It’s really just a best practice, anyway, so you should be securing your communications to be a good business partner and provider.

Security for Sensitive Information

Your business shares sensitive information with customers and clients through email all the time, even if it’s not personally identifiable information. If this information is stolen by way of an intercepted email address, that’s a serious problem. You should encrypt email messages so that any onlookers or thieves cannot do anything with what they steal.

Preserve Trust with Customers

Encryption with your mail sends a message to your customers and clients that you respect their privacy and care about the security of their information. It means they can rely on you to do what needs to be done to protect their information. This, in turn, creates a culture where you can get maximum earning potential from them.

Encrypt Your Email Today

Encrypted email is a valid way to show your customers that you are the most trustworthy business in British Columbia. To learn more about how to protect your business’ assets, contact us at (604) 513-9428.

Continue reading

What Types of Data Do You Need to Pay Attention To




What Types of Data Do You Need to Pay Attention To

Small businesses, like any other organization, need to protect various types of data to ensure the security and privacy of their operations. The specific data that needs protection may vary depending on the nature of the business, industry regulations, and the types of transactions or customer interactions. Today, we thought we would go through some common data types that small businesses typically need to protect.

Customer Information

It’s safe to say that the best way to run afoul of your customers is by playing it fast and loose with their personal information. Data such as names, addresses, phone numbers, and email addresses of your customers have to be protected. This also goes for payment information, including credit card details.

Employee Data

Employee data includes your employees' personal information, like contact details and Social Security numbers. This data needs to be protected like your customer data needs to be. This includes payroll information, bank account details for salary deposits, and other financial data as well.

Financial Records

Speaking of financial data, information like income statements, balance sheets, and tax records all need to be protected for the security of the organization. In many cases, protecting banking information and transaction records must be prioritized. 

Intellectual Property and Legal Documents

IP is the information on why your products and services are unique and effective. This includes information on trade secrets and proprietary information and any patents or copyrights your business has. Of course you also need to protect any contracts, agreements, and legal documents related to business operations as it has information that, if stolen, could have major negative implications for your business.

Website and Online Presence

This includes data related to the company's website, including customer login information and any data collected through online forms. A lot of data is shared online nowadays and you have to be mindful that any data you take in from the web is at risk for theft. 

Health and Safety Records

Employee health information is very attractive to scammers and hackers. Any records related to employee health and safety have to be secured.

IT Information

The technology your business uses holds a lot of sensitive information, even if you may not know it. Access credentials, network configurations, and other information related to the company's IT infrastructure can be useful to hackers looking to infiltrate your business.

It's crucial for small businesses to implement security measures such as encryption, access controls, regular backups, and employee training to safeguard the sensitive data they handle. Additionally, compliance with relevant data protection laws, such as GDPR, HIPAA, or others depending on the industry, is not just mandatory, it has to be prioritized when setting up a comprehensive data security strategy. Regular security assessments and updates to security protocols are also recommended to address emerging threats and vulnerabilities.

At Coleman Technologies, our knowledgeable consultants and professional technicians can help you with your end-to-end data security strategy and help you support all of the resources needed to make it work. Give us a call at (604) 513-9428 to learn more. 

Continue reading

Do You Know Exactly What is Being Backed Up?




Do You Know Exactly What is Being Backed Up?

Data backup is essential for any business, yet many employees might not fully understand how it works or what gets backed up. Today, let's clarify the basics of data backup and its importance.

What Gets Backed Up on Your Computer?

Many employees assume their entire computer is backed up, but this is often not the case. Typically, the main component backed up is the server, which varies by organization. This could be a network drive or another shared location.

However, documents not stored on the server may not be backed up if the system isn't configured accordingly. Files saved on desktops, in My Documents, or in Downloads are usually not backed up. It's a common misconception that these areas are backed up, but they usually aren't—especially the Desktop, where files shouldn't be stored long-term anyway.

When in doubt about your company's backup policies, consult your IT administrator or your service provider for clarification.

Consider Your Business Apps and Their Data

Ensure you understand how your business applications are backed up, especially if they are hosted in-house. Sometimes, employees use applications—known colloquially as shadow IT—without the IT department's knowledge. Applications don’t tend to ever get backed up on a corporate backup device, but if the data those applications use is stored in a central location (like on your server) then it should be backed up.

To avoid issues, confirm how and where your business app data is backed up. This awareness will prevent data loss and ensure business continuity.

Expand Your Knowledge of Data Backup Solutions

Understanding your data backup system encourages proper file storage practices and enhances business management. Don't wait—contact us for an IT consultation to discuss your backup systems. It’s a good idea to test a data loss situation at least once a year to see how your business can operate off of its backed up data. Get started today by calling (604) 513-9428.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

20178 96 Ave C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am–5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image