Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Three Great Last-Minute Gifts for the Technology Lover in Your Life




Three Great Last-Minute Gifts for the Technology Lover in Your Life

With Christmas a couple of days away, most of us are either wrapping up our shopping or wrapping up the presents we’ve already purchased. If you are looking for a last-minute gift to give the tech lover in your life, here are three that we found really cool.

Apple Air Tags

Apple AirTags are small, smart tracking devices that help you keep track of your belongings. Whether it's your keys, wallet, backpack, or even a pet, these handy gadgets make losing items a thing of the past. Using the Find My app on an iPhone, AirTags allow you to see the precise location of your tagged items. Features like precision finding, a loud chime, and even Lost Mode make finding misplaced things quick and easy. Their sleek design and durable build mean they fit seamlessly into anyone’s daily life.

AirTags are a thoughtful and practical gift idea because they solve a common problem in a simple, high-tech way. They’re ideal for busy people who tend to misplace things, travelers keeping track of luggage, or anyone who values peace of mind. They are easy to set up and work seamlessly with Apple devices, making them a great, affordable gift.

For the Android users in your life, you can check out Tile Trackers or Samsung Galaxy SmartTabs.

USB Power Banks

Power banks are compact, portable chargers that keep devices powered up anytime, anywhere. Whether you’re on a long commute, traveling, or just out and about, a power bank ensures your phone, tablet, or earbuds stay charged. With various sizes and capacities, you can choose a lightweight option for casual users or a high-capacity one for heavy travelers and gadget lovers. Many power banks even come with fast-charging capabilities and multiple ports, making them versatile for charging multiple devices simultaneously.

Power banks are both practical and universally useful. Everyone can relate to the frustration of a low battery at the wrong time, and having some extra juice at the ready is never a bad thing. As mentioned above they come in all sizes and some are even waterproof.

Portable Photo Printer

Portable photo printers are small gadgets that let you print photos from your phone in just a few seconds. They’re great for turning your favorite pictures into real-life prints you can hold, stick on your wall, or share with friends. Some even let you add cool stuff like stickers, filters, or frames to make your photos stand out. It’s like having your own mini photo studio that fits in your bag.

These printers make an awesome gift for anyone who loves taking pictures. They’re super easy to use and work with most phones. Plus, they’re perfect for the holidays—you can print and share moments with friends and family right away. A portable photo printer isn’t just a gift; it’s a way to make your favorite memories last forever.

Technology is a great gift, and these three are just a few of the myriad of gifts that are great for the people in your life. From everyone at Coleman Technologies, we hope you have a happy holiday season.

Continue reading

How Much Risk Can the IoT Cause?


Let’s explore some of the risks that the IoT can present.

The Security Issues of the IoT

The Internet of Things has added utility to many devices, expanding their potential in ways that would otherwise be impossible. This has only been further augmented by the access to personal devices that many employees enjoy through Bring Your Own Device policies.

However, these benefits have come with an assortment of considerable risks alongside them. Devices that are a part of the IoT are notoriously vulnerable to many cyberattacks, which means that they could potentially be used as a point of access to your business’ network. From there, a cybercriminal has plenty of opportunities to create issues - whether that’s by stealing your data, hijacking your devices to be used in a botnet, or whatever their goal may be.

This problem is only exacerbated by the tendency for IoT devices to go without updates, whether through the negligence of the manufacturer or of the consumer. Without these updates, security flaws go unresolved, and the devices are thereby left vulnerable.

Consider how many devices are now manufactured that connect to the Internet. Smart watches and other wearables, smart speakers and televisions - really, almost anything with the word “smart” in its name - we have more or less surrounded ourselves with the Internet of Things. This includes the time we spend in the workplace, despite many of these devices not being visible on the network to IT. As a result, it has become almost impossible to track all the devices that attach to a network, which has developed into a new issue for businesses.

Shadow IoT

Thanks to the public demand for convenience and advanced functionality, more and more IoT devices are being manufactured all the time. If any of these devices makes its way into your office without the knowledge and approval of IT, you have a shadow IoT problem.

If you do, you aren’t alone.

In 2017, 100 percent of organizations surveyed by an IoT security firm were found to have consumer IoT devices on the network that qualified as shadow IoT. Another report, from 2018, stated that one-third of United States, United Kingdom, and German companies have over 1,000 shadow IT devices on their networks every day. Combine this with the security shortcomings discussed above, and you have a recipe for a cybersecurity disaster.

You may remember the Mirai botnet, which struck back in 2016. This botnet was built up of over 600,000 devices at its peak and focused primarily on IoT devices. Once these devices were identified by Mirai, they would be attacked and infected, adding more computing power to the botnet. Mirai is far from the only example, too… cybercriminals have been known to hack into IoT devices to gain network access, spy and listen in on conversations, and otherwise prove themselves to be a nuisance.

How to Minimize Shadow IoT

Clearly, shadow IoT isn’t a good thing for any organization. There are a few things you can do to help protect your business from the security issues that shadow IoT can cause.

  • Accept IoT devices in the workplace. If your employees really want to use one of their devices at work, they’re going to. Instead of shooting down requests to bring in these devices, make it easier for your employees to do so through the proper channels - and make sure your employees are aware of these channels. Openness and cooperation can be effective tools as you try to get your team on the same page you’re on.
  • Keep IoT devices separate. To better protect your network, you will want to consider utilizing a dedicated Wi-Fi network for IoT devices, configured to allow them to transmit the information they generate while blocking any incoming calls to them. This will help prevent threats from being transmitted to IoT devices.
  • Seek out potential threats. Not all shadow IoT necessarily can be found on an organization’s network, as over 80 percent of the IoT is wireless. This means that you need to be monitoring your wireless signals for shadow IoT devices and networks.

Your business’ security is important - too important to be undermined by an insecure consumer device that was brought in without your knowledge. You need to get out ahead of shadow IoT, as well as the other threats that could do your business harm.

Coleman Technologies can help. Our professionals are well-versed in cybersecurity best practices and how to use them to your benefit. To find out more about what we can do for your business, reach out to us at (604) 513-9428.

Continue reading

How Your Business Must Conduct Business with the Internet of Things




How Your Business Must Conduct Business with the Internet of Things

With so many devices connecting to the Internet, it’s natural that a term would emerge for devices that don’t typically have Internet connection, but nowadays do anyway: the Internet of Things. Businesses can leverage the IoT to take advantage of incredible benefits, but these devices come with an inherent security risk. Why does the IoT matter for businesses, and what can you do to keep your organization secure?

The IoT Cannot Be Ignored

Chances are the IoT already impacts your business in some capacity.

For example, the connected devices your employees own would fall under this umbrella. Devices like smartphones, fitness trackers, smart speakers, and so on are all IoT devices. They are potential entry points for hackers that your business must be aware of.

The key to using IoT devices effectively is to stay on top of them and continuously monitor for potential risks, like security breaches.

Make Security a Priority

If your business uses the IoT, then you’ll have to ensure it remains secure.

Smartphones have security measures in place, but other IoT devices don’t have this luxury. You might not see some of your more bizarre IoT devices as threats, but if they are connected to your network, they could easily become weak points that hackers can use against you. We recommend you manage these devices with a Mobile Device Management solution.

After all, technology that is not secured or monitored is just increasing the threat surface area for your business, which doesn’t bode well for you.

Weigh the Benefits

At first glance, the IoT might look like it’s more trouble than it’s worth, and we understand why.

Monitoring these devices might seem like an unnecessary frustration, but they can be used strategically to your advantage. For example, even something as simple as a connected thermostat or light switch can dramatically reduce utility costs. Connected devices can also provide your business with data that you can use to make better decisions.

We’ll give you an example of how the IoT makes it easier to make operations more efficient while cutting costs.

Here’s a Real-World Example: Fleet Management

Businesses often use fleet management systems powered by the IoT.

Companies that use vehicles for deliveries or services can use the IoT to track these vehicles and optimize operations. Here are some of the ways the IoT supports fleet management:

  • Find the most efficient routes.
  • Monitor fuel use and emissions.
  • Track vehicle maintenance needs.
  • Gather data about driver performance.

All of this is powered and refined by real-time data collection, so you can make the most out of your fleet, saving money in the process.

How Your Business Can Use the IoT

The IoT is so much more than just fun gadgets; it’s a way to make your business better.

Through the IoT, you can automate processes, collect insights, and improve operations. We recommend that you at least consider the IoT, and if you’re still on the fence, we welcome you to contact us at (604) 513-9428 to have a discussion about what’s holding you back.

Continue reading

Your Cool New Gadgets Could Make Problems for Your Personal Data




Your Cool New Gadgets Could Make Problems for Your Personal Data

So you got a new computer for a holiday gift. That’s great! We’re excited that you’re excited. But you also need to consider how you are going to dispose of your old device and how to do so in a safe way. Today, we want to discuss how you can safely discard, or potentially even reuse, your old device so you don’t put your data at risk.

The #1 Challenge: Your Data

Imagine the amount of data stored on your devices over a single day.

It’s a shocking amount, and a lot of people will just throw away a device holding this information just because wiping the device doesn’t cross their minds. We recommend that you back up any data on your old device, then remove it all before you even consider tossing it. A simple factory reset isn’t always enough; we recommend you use a solution that will eliminate any chance at all of a data recovery effort.

If you want to know more about the process, just give us a call, and we’ll be happy to explain it.

It’s Not Always About Functionality

Even if the device is no longer functional, you still need to worry about its data.

Most issues that kill a computer have nothing to do with the storage components. A computer is  a machine with mechanical components, many of which are prone to failure. Data can be saved from a device that has experienced a failure, provided the storage components are intact.

This is great for you, but bad if you’re trying to recycle a faulty device without first taking the time to wipe it.

Ideas for Reuse

If the device is still operational, you have a couple options to consider for reuse.

For one, you can regift the device to someone else in need, like a local business or a family member. Just make sure you have already wiped the device and there’s no sign of personal or professional data on it. Another opportunity, for devices with screens, is to transform it into a digital display.

However you decide to reuse your old devices, we’ll help you ensure you’re doing it in a safe and compliant way.

How to Recycle Your Computer

Once your device is data-free, you can safely recycle it—but there’s still a catch here.

Depending on who you work with for the recycling, your device might not actually be recycled. If you’re not careful, the device could be shipped to a developing nation where it will sit in a landfill, causing serious damage to the environment and the health of its citizens. Your best bet is to work with a recycler with a proven record of recycling your devices ethically and responsibly.

That’s where we come in!

To learn more about how we can help with technology reuse or recycling, give us a call at (604) 513-9428.

Continue reading

Potential Legislation Could Require End-of-Life Disclosures for Consumer Tech




Potential Legislation Could Require End-of-Life Disclosures for Consumer Tech

An expiration date helps to make sure you aren’t buying fast-turning foods at the grocery store, and now, the technology industry is making strides to establish a similar standard. A new industry report recommends new legislation pushing for End-of-Life (EoL) disclosure, which would, in theory, allow businesses and consumers alike to make more informed purchasing decisions. What does this mean for your business?

The Connected Consumer Products End of Life Disclosure Act

A joint report issued by Consumer Reports, US Public Interest Research Group, and the Secure Resilient Future Foundation recommends the above-titled (please don’t make us type it out again) legislation.

While the name of the legislation might be a mouthful, it’s an important step to informing consumers about anticipated timelines for updates and end of support. This standard might be more important than ever since devices are inherently produced with connectivity in mind. Unsupported devices will no longer work as intended, creating problems for both consumers and businesses alike.

While technology cannot last forever, quick turnaround time for end-of-life and end-of-support events leads to the following detriments to the consumer.

More Electronic Waste

All electronic devices that no longer work can be considered e-waste. Of course, all devices eventually reach this state, and more e-waste is produced today than ever before. Plenty of it goes unrecycled, too, lending itself to massive landfill problems around the world. Since many devices don’t work without their connectivity, you can imagine how much waste an EoL creates.

Security Issues

Even if devices stop working as intended after an EoL, they still hold data, especially if they haven’t been properly wiped. Additionally, EoL devices left on a network could be attacked by an attack they aren’t prepared to defend against since they no longer receive security updates.

Consumer Outrage

It’s frustrating to say the least when you spend money on something that is almost immediately obsolete. According to the US Federal Trade Commission, 89 percent of 184 total product websites offered no information regarding how long support would be provided.

This Law Would Promote (or Require) Consumer Transparency

The proposed regulations would require any Internet-connected device to disclose a timeframe for how long support would last, thus encouraging companies to place a greater focus on user security.

It seems like it would be a win for consumers, as manufacturers would be held legally responsible for communicating to consumers just how long they can expect their device to last. This would also keep businesses from making too many simple “smart” devices, as they would have to maintain them all. Any business owner with connected devices knows how much of a pain this is already.

On that note, security is always an issue, even for non-EoL devices, so why not make it a little easier by working with Coleman Technologies? Learn more by calling us today at (604) 513-9428.

Continue reading

Tip of the Week: Is a Laptop the Best Fit for Your Employees?


Reason 1: Mobility
Let’s begin with the most obvious reason laptops are a great option - you aren’t tied to a desk to do your work as you would be with a conventional desktop. Instead, you can just pick it up and take it with you, whether that’s to a meeting on the other side of the office or home for some remote work. I don’t know if you’ve ever seen someone haul an entire desktop workstation around, but if you have, you know that it just isn’t practical to do.

Potentially travelling with a laptop is also much easier. A desktop workstation would need to be carefully stowed in a vehicle, if not shipped to its destination. While it may seem like a hassle at the airport, stowing a laptop in a carry-on is a much more secure and convenient option when all is said and done.

In short, utilizing a laptop makes a lot more sense in an increasingly mobile world than does utilizing its far less mobile cousin, the desktop.

Reason 2: Concision
If the resources are there, one might make the argument that it makes more sense to utilize both a desktop and a laptop - one for the office, and one for home and travel.

Financial considerations aside, there are other issues with this strategy. The major one is the fact that it makes it that much more complicated to ensure that everything you need is where you need it to be, when you need it to be there. There is little that is more professionally frustrating than sitting down to work and realizing that the data you need is on your other device. Hopefully, you have the access to the other device at the time to make the necessary transfer.

While properly utilizing a cloud solution would be another way to approach this difficulty, why use two devices when one will suffice? That way, you can be sure that your employees always have access to the programs and data that they need to be productive.

Reason 3: Consistency
One of the most important considerations for any office technology configuration to take into account is how compatible the many devices it contains are with each other, and the solutions needed to accomplish each day’s tasks. If each employee has a different device, not only is this no longer guaranteed, you have no guarantee that each laptop will have the same shortcuts and features. For instance, if you want to encrypt the data on laptops and allow your staff to sign in with a thumbprint scanner, not all models are equipped with that. Different devices don’t tend to change how complicated it is to manage the devices, but it can vary the experience your users have and limit the policies you can set.

Standardizing your office’s devices becomes much easier when everyone has the same device, which inherently means that everyone has the same capabilities in the office. Of course, if someone needs their device to have more specialized capabilities, they should be the exception. However, for the run-of-the-mill tasks that many are responsible for, the average laptop should suit them just fine.

If you want more help in designing your technology infrastructure and setting it up for prolonged productivity, reach out to Coleman Technologies. One call to (604) 513-9428 is all it takes to start receiving the technology services that you need for success!

Continue reading

The Next Phase of the Internet of Things


With global spending on IoT research and integration reaching $745 billion in 2019, the IoT is primed to be one of the largest single industries in the world in the future. Individuals, businesses, and governments are looking at the IoT for solutions to their problems. After all, the more information people have, the better decisions can be made. From the outset, it was said that this technology will transform the way we interact with machines and the way they will interact with each other, and only a few short years into a worldwide implementation, that mantra has proven to be true. Let’s look at where the IoT is growing most.

Industry

The huge annual jumps in IoT spending is largely driven by manufacturers, transportation, and utilities. Industrial IoT solutions provide companies and municipalities, alike, the link between their cloud-based software systems and their analysts, salesmen, and decision makers. This relationship is tenuous, however, and is closely monitored as a result. If a huge IoT strategy breaks even once, confidence in the platform is destroyed, leaving it an unreliable solution, regardless of the strengths of the technology. 

Manufacturers and process managers that utilize IoT solutions absolutely need their systems to be as reliable as possible. That means security, which is the number one improvement that the next phase of IoT has to make. For years, IoT was only somewhat trustworthy because of the lack of integrated security many IoT devices were manufactured with. Today, with security an absolute must for the major undertakings it is being used for, security has improved, but only slightly. A dedication to creating IoT devices that have hardware and software systems that are secure and reliable will dictate just the ceiling of IoT effectiveness.

The Smart City

One of the most intriguing places the IoT has been utilized thus far is in the integration of automated utility systems inside what has been termed, “the smart city”. The smart city uses what are known as low power IoT connections. These devices deliver low bandwidth and power saving features that are perfectly suited to asset monitoring. They can be implemented for a variety of uses, including: 

  • Sensors built into city roadways to sense things like the subsistence of traffic congestion and wear and tear of roadways.
  • Sensors built into bridges to sense degradation and the effect of seismic forces caused by geographical and traffic-based events.
  • Sensors built into buildings to measure wind force, foundation subsistence, or seismic activity.
  • Sensors in the interior of buildings to control foot-traffic, lighting, heating and air, and other systems humans rely on. 
  • Sensors on the street or on entryways that will provide facial recognition and reporting.

Unlike IoT-connected consumer goods, every IoT device deployed in a smart city would have a purpose that is beyond convenience. Every device would be placed to achieve a goal, improve the usability, longevity, and management of infrastructure, boosting resident safety and improving their access to services, cutting costs and limiting energy use, improving communications, and more.

One thing is for sure, the next phase of IoT implementation is going to challenge conventional thinking and deliver solutions that only a short time ago, were only imaginary. At Coleman Technologies we find technology fascinating. For more great technology information about innovative new tech, return to our blog regularly. 

Continue reading

Don’t Forget to Add These Handy Home-Office Gadgets to Your Shopping List!


Power

To start, let’s go to perhaps the most basic need of any technology user: the energy required to keep their devices on in the first place. Let’s not split hairs—the average home office setup might not have sufficient outlets available for all the devices that need to be powered.

If this applies to you, you may appreciate someone giving you a nice surge protector to help expand the number of available outlets you have while simultaneously protecting the devices you plug in.

In addition to this, there are assorted other power-related solutions available that you might consider adding to your wish list. For instance, you may be using two-factor authentication more often as you work remotely, making your mobile device something that needs to be kept on. A charging station or even a power bank may be a welcomed addition to your tools.

Comfort

Of course, productive work is impossible if you aren’t at least somewhat comfortable. You might want to consider adding a few amenities to your list that help support this goal. This can range from requesting a supportive new desk chair, to a comfy seat cushion or footrest, or even a pair of blue-light filtering glasses.

Honestly, there’s a lot of things that could be added to this list. There are tons of computer peripherals available that are specifically designed to make the user’s experience more suited to their preferences. Really, it’s about identifying what makes you the most uncomfortable throughout the workday and identifying the solution.

If you’re a fan of sipping warm beverages throughout the workday, consider asking for a desktop cup warmer.

Personality

All work and no play make Jack a dull boy, so it may not be the best idea to have a totally austere workplace. One or two small tchotchkes shouldn’t hurt your productivity unduly and can make for a great conversation starter if used in the office. Whether it’s a classic Newton’s cradle or some other perpetual motion device, something to fiddle with to help break up the workday can be valuable to have.

If you happen to have a stressful job, you could even ask for a miniature punching bag to attach to your desk. Fans of golf might ask for the pen set that doubles as a desktop putting green. Really, the possibilities here are endless.

Whatever you do choose to ask for, make sure you share your wish list in the comments to help inspire others.

Remember, while this may have been a sillier blog than we usually share, Coleman Technologies is always here to help you with your IT management and maintenance needs. Regardless of whether your team is working in-house or remotely, our managed services can give your business the benefits you want it to have. Learn more by giving us a call at (604) 513-9428.

Continue reading

Who’s Really Hurt the Most by Card Skimmers?




Who’s Really Hurt the Most by Card Skimmers?

It probably isn’t a question you’ve put much thought to, but tell me: who do you think feels the greatest impact from card skimming schemes, where a payment card’s data is captured so a cybercriminal can make use of the card’s associated account? While it isn’t a good situation for anyone, some are impacted more than others.

Unfortunately, card skimming is even worse for those who rely on prepaid cards provided by the state for food assistance. Let’s consider why this is.

Skimming Losses are Worse for Those Receiving Assistance

Authorities across the country have taken note of increased losses associated with those receiving assistance through the Electronic Benefits Transfer (better known as EBT), which permits participants with the Supplemental Nutrition Assistance Program (SNAP) to pay for their food purchases.

When a SNAP card is used, the associated EBT account is debited so the store is reimbursed for the purchase. In this way, the EBT card is effectively a debit card—they even have an associated PIN and can be used to withdraw money from an ATM.

However, EBT cards largely lack the protections that most other payment cards have, like the more secure smart chip technology that makes these cards harder to duplicate, or the fraud protections that other payment cards have. If SNAP funds are fraudulently stolen and spent, the rightful recipient has little recourse to take. They’re effectively out that money…money that they need as a member of the program.

It isn’t exactly news that criminals and scammers have found ways to steal card data, either…and they’re getting better at doing it surreptitiously. The devices used to “skim” data off of payment cards (cleverly referred to as “skimmers”) can now be hidden inside cash machines, or camouflaged to look like just another part of the device. This makes it more challenging to spot these skimmers, putting more people at risk in general of having their data cloned and used to create additional copies of payment cards that the thief can use or sell.

What Can Be Done?

Well, short of more states implementing improved security measures into their EBT cards—eliminating the magnetic strip and replacing it with the modern chips that other card types use—it really falls to the user and the business where an ATM or other card-reading device is located to prevent these issues. Keep an eye out for people trying to tamper with these machines, and discontinue its use if you can until it has been fully checked by a professional for card skimming devices. As a customer, give any card reader a close look before you swipe to see if it looks at all unusual.

Coleman Technologies is here to help keep your business more secure and efficient, both for your benefit and that of your clients and customers. Find out how we can help via our managed services by calling (604) 513-9428.

Continue reading

3 Last-Minute Gifts For the Technology Lover in Your Life




3 Last-Minute Gifts For the Technology Lover in Your Life

The holiday season is getting busier and busier every year and with less and less time afforded to shopping and getting ready for the holiday, you may have overlooked that special someone on your holiday shopping list. This week, we give you three gadgets that would be really nice last minute gifts for that technology lover in your life

Levitating Plant Pot/Lamp

We’ll start with a couple of cool pieces that just about anyone will find fascinating and fun. Using magnets, several manufacturers have created products that seem to defy the laws of physics; and they are perfect for the desks of technology lovers. 

The levitating potted plant is a succulent that floats above the base, while the lamp is a LED light fixture that floats beneath the arm of a desk lamp. There are different versions of the lamp with the most expensive ones providing a wireless charger in the base. Overall these are cool items that can be purchased online for under $100 and shipped to you fast.

The Couch Console

In today’s age of video games and streaming media, people spend a lot of time in front of the television. One problem with this is that controllers, remotes, phones, and all manners of other devices (and often a lot of garbage) can accumulate in the nesting spots we choose to relax from. One awesome gift is called The Couch Console. It is a modular place to store your remotes, your phone, and even a drink and a snack while you relax on the couch. 

Made from lightweight foam, the Couch Console comes with a no-spill cup holder, a place to store your remotes and can even come with an optional battery pack so that you can charge your devices. The Couch Console starts at $80 and will be a great option for just about anyone. 

A Power Bank

We add in the power bank because today everyone uses devices that need charging all the time. How many times have you gone someplace and someone asks you if you have a charger they can use so they can keep their devices alive just a little bit longer? Gifting a power bank eliminates the need to scramble around to find juice for their favorite device; they’ll have it on them already.

Essentially, a power bank is a backup battery that can be used to charge devices that run out of juice while you are on the go. There are all types of power banks available: from ones that will change your wireless earbuds to devices that can power a laptop for hours at a time. The ones that make great last-minute gifts will be able to sufficiently recharge a smartphone and a pair of wireless earbuds on a single charge. For this reason they are a great gift for just about anyone. 

What do you think? Are there any specific technology gadgets that you would suggest to add? Leave your thoughts on our social media and have a Merry Christmas!

Continue reading

Is Your BYOD Strategy About to Backfire?


How Can BYOD Manifest Issues?

Unfortunately, for all its benefits, there is no shortage of drawbacks to BYOD - at least, if it is implemented without conscious deliberation and preparation. Here, we’ve listed a few such drawbacks:

Business and Personal Data Often Mix, but Shouldn’t

Do you really expect an employee to have a personal device that isn’t for personal use? If this device is used for work purposes as well, it can become very easy to combine this data and put some of it at risk. What if an employee who brought their own device in then left the company, the device in question full of your company’s sensitive data? Without some kind of policy in place to eliminate this risk, BYOD is simply too risky to allow.

Your Business Will Be Vulnerable to More Risks

Unfortunately, a poorly-strategized BYOD policy opens your business up to a variety of issues that could have severe and lasting ramifications.

This is mainly due to the many risks that mobile devices inherently have in terms of data leakage, malware infection, and other vulnerabilities. If your employees aren’t vigilant in keeping their devices updated and secured, your network will be subject to the same vulnerabilities. Malware infections can also be introduced via an employee not treating their device as carefully as they should be. If malware is installed on their device, it can easily be spread to your network - free to wreak havoc and steal data.

Your Infrastructure Will Likely Need Reworking

This one is admittedly less of an issue as it is an inconvenience. Simply put, adding an influx of devices and ensuring that your IT remains compliant to any policies can be a huge investment of time - and if not done correctly the first time, this investment will only grow.

How to Prevent These Issues Via Policies

As we briefly mentioned above, any BYOD initiative you introduce to your company needs to be controlled through a stringent use policy. This policy needs to clearly describe how an employee is to use their device during work hours, as well as the prerequisites that your employees need to abide by and agree to in order to use their own device. We recommend the following:

Mobile Device Management and Endpoint Protection

This technology helps to keep any company data isolated from any personal data on the device, which means that it allows you to control your data without intruding on an employee’s privacy. As a result, if a device is stolen, you can remotely remove any business data from it to ensure your data is protected.

Another precaution to enact is endpoint protection software. This software essentially performs a preemptive security scan of any device trying to access the network, identifying if a device has been infected. This means that your network isn’t introduced to whatever malware is present on the device, and the owner is then aware of their security issue as well.

Access Controls

The fact of the matter is that not every employee needs access to every byte of data you have. Therefore, it makes sense to implement role-based access controls. These controls can help keep an employee focused on the data they need for their work duties, and can help you identify where a breach occurred, should one happen. Some access controls can even prevent a device that isn’t up to date from connecting to the network at all. You should also investigate two-factor authentication measures that might assist you in limiting access to those who should have it.

Exit Strategies and Safeguards

Finally, you also have to consider what to do if something happens to one of the devices that has been used for BYOD purposes. First of all, you need to have your employees agree to have a lost device wiped remotely, applying the necessary solutions to each device used. Your employees also need to report a lost or stolen device immediately so these precautions can be put to use.

Finally, should an employee leave your business, you also need to make sure you have already secured the authorization to remove your company’s data from their device. You don’t want someone walking around with access to your data, whether their departure was amicable or not. Including this in your BYOD policy will ensure that anyone who leverages their mobile device is aware of your capability to remove your company data from their device, and will allow them to opt out of BYOD if it makes them uncomfortable.

With these policies backing up your Bring Your Own Device planning, you should be able to make use of a great productivity tool without sacrificing your data security. For assistance in putting BYOD into practice, reach out to Coleman Technologies at (604) 513-9428.

Continue reading

What You Need to Consider About BYOD


To begin, let’s briefly review the basic principles of BYOD practices. In essence, rather than providing each employee with a company-supplied device, an employee is allowed to bring in a device that they own and leverage it for work purposes.

Why BYOD Has Become Popular in Workplaces

On the surface, BYOD seems to be the perfect solution - there are even statistics that help to support this position. For instance, companies who embrace BYOD practices save around $350 each year, per employee. Furthermore, using portable devices for work (much like what would be used as part of a Bring Your Own Device practice) has been shown to save employees approximately an hour each day, increasing their productivity by about a third.

This is just the tip of the BYOD-benefits iceberg. There are much more, including:

Access to Better Technology

If you were to list any business’ technology priorities, security and productivity should top the list… but oftentimes, frugality wins the day. Budgetary restrictions and a preference for tried-and-tested solutions frequently means that investments into more recent solutions are often pushed by the wayside. After all, what if the expensive new technology doesn’t work properly? This is frequently why businesses find themselves making due with solutions that really should be replaced. On the other hand, employees likely have no such qualms when they purchase their own devices.

BYOD policies allow a business’ employees to replace their outdated solutions with the reliability of newer, more up-to-date devices… leading to happier, more productive employees.

Reduced Financial Toll on the Business

Like we mentioned, it is fairly common for budgetary concerns to be the driving factor of many business decisions. It isn’t that the company doesn’t want to replace the aging workstations scattered around the office… it just isn’t in the budget. Before Bring Your Own Device emerged, businesses were stuck in a few different money pits. Between providing their employees with devices, maintaining and replacing these devices when they went faulty, and all the other expenses that come from keeping up an IT infrastructure, employers were stuck with a hefty bill.

Nowadays, with many people investing in their own devices and their accessibility, these expenses can largely evaporate. The employer’s investment can be effectively limited to securing access to these devices, allowing funds to be spent on other meaningful initiatives.

Employee Satisfaction

We’ve all experienced the struggle of trying to do work on equipment that just isn’t equipped for what we are trying to do. It can feel like trying to play Yahtzee with loaded dice - it just isn’t going to work, no matter how much effort is put forth. This is the other side of the example that preceded this one. If the aging workstations scattered around the office aren’t replaced due to budgetary concerns, some employees are going to be stuck using them… and they aren’t going to be happy.

As we alluded to as we described the effects that access to improved solutions can bring, an employee who isn’t being hamstrung by their technology is simply going to be more productive and happier with their working situation.

Clearly, BYOD isn’t something that should be dismissed without at least some consideration, but that isn’t to say that it is a perfect solution. There are also potential issues that need to be addressed as a BYOD policy is considered.

The Potential Issues of BYOD

Distractions

For every productivity application available on the Google Play Store, there is at least one application that is decidedly unproductive… at least, in terms of your business and its operations. While you could take steps to prevent these kinds of applications from appearing on devices that you provide, there isn’t much you can do about your employees downloading whatever they want onto their own.

Loss of Control

This is a big issue for businesses, as there are a multitude of ways that their losing control over the devices on their network could impact them. The policies that once prevented vulnerabilities from being leveraged can’t just be installed on an employee’s device without their consent, which many employees may be hesitant to give. This problem becomes even larger if an employee is fired or quits - what happens to the data on their device? How can a company be sure that a current employee isn’t putting sensitive company data at risk? What if the device is lost?

Compliance Shortcomings

Finally, you have to consider how your BYOD implementation will interact with any other compliances or requirements that your business is beholden to. In the past, a shockingly low number of IT leaders and professionals were confident that their BYOD policies met the standards placed by a variety of requirements, including HIPAA and Dodd-Frank.

How Can I Leverage BYOD Securely?

Fortunately, there are a few means of adopting a BYOD approach within your business while mitigating the concerns described above. The simplest way is to simply enforce a use policy, outlining the guidelines that your employees must follow if they wish to use their personal devices for work purposes.

Coleman Technologies can help you to create and enforce these guidelines, as well as optimize your use of your IT in many other ways. To learn more, reach out to our team by calling (604) 513-9428.

Continue reading

Office Gadgets to Add to Your Holiday Shopping List


Here, we’ve put together a list of suggestions for the different kinds of coworker you might have to provide a present for.

The Health-Conscious

Let’s face facts - the desk jobs that are typical of the office aren’t exactly the healthiest ones in the world, so there are plenty of gifts that are intended for the office worker who wants to fight the battle of the bulge.

From numerous standing desk and converter options, to chairs that require active sitting (like those big inflatable balls you sit on) or are specially designed with ergonomics in mind, to elliptical machines that fit under a desk, you have your choice of means to help decrease sedentary behavior in the naturally-sedentary office environment, or at least minimize its impact.

Want to take the more affordable route? Look into posters with yoga positions or rolled up yoga mats that can be stowed away. If your office has an outdoor space, a few outside gifts like frisbees, jump ropes, and hackysacks might be a big hit.

While you may not be able to give your coworker the ability to avoid the snacks in the break room, or the extra cupcakes that Susie from Human Resources brought in from her daughter’s 7th birthday party, you can at least help them fight off their effects.

The Productivity-Minded

We all have that coworker who likes to keep themselves as organized as possible, as the more organized they are, the more productive they can be. There are many gifts that may be perfect for such a person, especially with the new year following so closely behind the holidays. For instance, a personal calendar or planner is a popular tool that many people use, especially those who prefer to find it easier to remember their responsibilities if they record them in analog, rather than digital format.

Alternatively, you might consider getting such a person a means of keeping their space uncluttered and organized, such as an attachable storage shelf for their desk, or a case to help them keep their various peripherals, dongles, and doodads organized and easily portable.

Of course, one of the most common ways to boost productivity is to add an additional display, so you always have the option to invest in any of a variety of products that can accomplish this. There are additional monitors for both desktops and laptops, of course, but there are also docks that can turn a mobile device into an additional, interactive display. Of course, these can be pricier than a gift for a coworker should perhaps be, but there are also options with a much less considerable price tag - like a wireless phone charger or similar device.

The Fidgeter

We all have that coworker who tends to think with their hands - that person who needs something tactile to help organize their thoughts. This is a fairly easy person to buy a gift for, as there are plenty of “desk toys” out there that you can find - fidget spinners, levitating tops, and magnetic balls just being the start.

One word of warning - unless your coworkers are always listening to music while they work, or are exceptionally patient, you will probably want to make sure whatever tchotchke you decide to give someone is minimally disruptive. Otherwise, your gift may result in issues down the line.

Of course, you don’t necessarily need to give gifts that are just for the office. It’s always fun to get a more personalized gift for someone to use in their personal life, as it means that you have really gotten to know your coworkers.

What was the best gift you ever got from an office gift exchange? What would you hope to receive now? Share it in the comments - you never know, someone might see it and give it to you!

Continue reading

Did You Mean to Type “LOL”? This Device Will Know If You Meant It!




Did You Mean to Type “LOL”? This Device Will Know If You Meant It!

Whether or not you believe acronyms are an acceptable form of speech, some people might use them habitually or instinctively even for business communications. Of course, they don’t have much place in this context, but habits are hard to break. To address this issue, one innovative thinker has created a tool that can help determine if the acronym “LOL” is sincere or not.

Curious? Read on to learn more about this tool and why we think it’s pretty neat.

This Device Puts a Stop to Phony LOLs

The phrase “laughing out loud” often means nothing, something which inspired Brian Moore to build a device that can detect when the LOL is not what it appears to be. It’s supposed to mean that something is eliciting an outburst of laughter, but oftentimes, it’s used to either lighten conversations or to fill space in a conversation. This device can actually detect if someone LOLed before sending the message: the LOL Verifier.

We’ll let him explain it for himself:

I made this thing called LOL Verifier: a device that only lets you type lol if you’ve actually laughed out loud pic.twitter.com/Gsc63yGEm0

u2014 Brian Moore (@lanewinfield) January 3, 2023

 

Basically, Moore built the device to filter out LOLs that the user did not laugh out loud at before typing, replacing it instead with a different form of appreciative approval. He plans to release the code to the public, despite it requiring at least 20 minutes of training before it can actually detect anything with accuracy. In other words, you have to laugh in front of your computer for 20 minutes so it can figure out your speech patterns.

Why Is This a Good Idea?

Basically, it keeps people honest, but in a different sense, it exposes the gap between what we feel and what we write. It’s remarkably easy to send an LOL with little-to-no thought, thus killing any sincerity in the conversation. This isn’t something that really applies to the business world, but it does showcase how the right technology can be used to find solutions to specific problems.

For example, imagine a solution that can keep problematic emails out of your employees’ inboxes, freeing them from the possibility of wasting time on potentially dangerous messages. This is exactly what spam filtering does, and antivirus works the same way by keeping threats out of your network, thus keeping it safe. Content filtering, as well, can be a preventative tool to keep your employees from visiting time-wasting or risky websites.

If any of the above sound like helpful solutions for your business, call Coleman Technologies today at (604) 513-9428.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

20178 96 Ave C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am–5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image