Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

How to Implement an Effective BYOD Policy




How to Implement an Effective BYOD Policy

Let’s face it; running a business can be expensive, and taking any measures possible to mitigate those costs can have huge benefits for your bottom line. One way companies are minimizing costs is by implementing a Bring Your Own Device policy, or BYOD, to allow employees to use their own personal devices for work purposes. We’re here to help you do so without putting security at risk.

But first, what does a Bring Your Own Device policy entail, and why is it so popular and effective for businesses?

BYOD is More Than Just an Employee Convenience

BYOD, when implemented properly, can give your employees the ability to use their personal devices for work purposes, opening up a whole range of benefits for both the employer and the employee. For the employee, they get to use a device they are familiar with, allowing them to be more productive. For the employer, they save capital by not having to provide employees with technology.

These benefits, however, are only effective when the devices are properly managed and secured. Let’s discuss some ways you can keep BYOD from becoming a liability for your company.

Issues Related to BYOD Strategy

Plan Ahead

Most business decisions cannot be made haphazardly, especially when it comes to technology implementation. You’ll want to take your time and consider the various elements involved with any change to your technology strategy. For example, you will want to consider that your business is working with data, and that data should not be accessed by anyone without the proper permissions; especially on a device that you don’t have much control over.

This is where classification comes in. Assign levels of classification to dictate who can access which data and on which devices. A good rule to follow is that you should work from the principle of least privilege. Provide the least amount of access possible for your staff to do their jobs, and nothing more until it becomes evident that they need further access. The fewer people who can access said data, the more secure it will be.

Be Prepared for Problems

The best way to prevent issues from escalating is to expect them to happen and be ready to address them. You might run into issues with your expectations for the policy differing from your team’s, which could lead to friction between management and your workforce. As such, you need to be ready to respond to situations where your authority and their privacy might clash.

We recommend that you always be transparent with your team about security and make sure their privacy is a priority whenever possible. We’ll cover this topic in greater detail in a moment, but for now, try to make security as easy as possible by providing them with easy-to-use tools like password managers and antivirus to reduce friction whenever possible.

Weigh Privacy and Security Appropriately

Ultimately, the trickiest part about BYOD is managing the balance between security and privacy in a way where your team feels respected and in control of their own technology, not the other way around. Your BYOD policy should maintain privacy without sacrificing security, something that a mobile device management tool can make much easier to manage. This will help to reduce friction whenever possible.

Let Coleman Technologies Help

If you’re ready to implement BYOD, we can help make the process easier. To learn more, call us at (604) 513-9428 today.

Continue reading

Why is VoIP Seen as Such a Great Business Solution?


What is VoIP, Anyways?

Voice over Internet Protocol is simply a different, more cost-effective means of transmitting voice data from one telephonic device to another. Rather than using a telephone provider’s infrastructure, a VoIP signal utilizes the Internet. This eliminates an entire line item from your expenses by rendering your telephone provider’s services redundant. This enables you to simultaneously save money while enjoying many often-included features that would otherwise have cost extra—assuming that they were even available with traditional telephony.

Is That the Only Reason I Should Use a VoIP Solution?

Absolutely not! VoIP can help you save time and money in other ways, as well:

  • With a history of being built upon open standards, VoIP solutions work on any device with sufficient specifications to support them—including mobile devices. This helps to minimize the investment you need to make to adopt VoIP, while simultaneously allowing you and your team to use your business telephone system remotely.
  • As VoIP operates through an Internet connection, the infrastructure to support it should already be in place within your business. As a result, it is likely that no costly renovations or additional wiring will be necessary, provided that your infrastructure is up to par.
  • Many businesses require costly Private Branch Exchange (PBX) equipment to properly utilize their internal phone network. VoIP eliminates the need for this expensive investment at all, also negating the need to maintain this equipment over time.
  • VoIP telephony generally doesn’t cost your business any extra for certain kinds of calls, like long distance calling—and if it does, it generally costs you much less than the telephone company would charge for it.
  • Unified communications are simpler to accomplish with VoIP, as many modern business solutions offer integrations with VoIP platforms. This makes communication easier to establish and track, which helps to keep the conversation moving forward efficiently.

All in all, utilizing VoIP as a part of your communications is not only a good strategy at the present, it is set to only show more promise as technologies—like artificial intelligence and 5G connectivity—continue to develop and improve.

Coleman Technologies can help you implement and maintain a VoIP solution that suits your business needs. To learn more, reach out to our team of experienced IT professionals by calling (604) 513-9428.

Continue reading

It’s Summer and You Have to Take Care of Your Tech




It’s Summer and You Have to Take Care of Your Tech

Summer is here, and sometimes, your technology pays the price. In today’s blog, we’ll discuss some ways to protect your tech as you travel and enjoy the nice weather.

Keeping Devices Safe While Traveling

Don't let cyber criminals ruin your summer plans. Protect your devices with these tips:

Install Updates Before You Travel

Keep your software and devices up to date to close any vulnerabilities hackers might exploit. This can also prevent the need for urgent updates using unreliable hotel Wi-Fi or mobile data.

Avoid Public Wi-Fi

Assume unknown public networks are compromised. Avoid using untrusted Wi-Fi, but if you must, ensure websites you visit use  “https://” instead of “http://” and avoid transmitting personal or sensitive information.

Backup Important Data

Backup your mobile data, such as contacts, photos, and videos, to prevent loss if your device is lost, stolen, or damaged. Sync your data with another device, like a laptop or desktop.

Activate "Find My" Features

Enable the "Find My Device" feature on your phones, tablets, and laptops. This feature allows you to track your device's location if it’s lost or stolen, as long as it’s turned on and connected to the internet.

Keeping Your Electronics Cool

Here are a few tips to keep your technology cool when it gets hot.

Provide Ventilation

To extend the lifespan of your devices, ensure they have adequate ventilation. Leave a gap of 2-to-3 inches around them and keep the vents free from obstructions. Most electronics have vents on the back or side that draw in cool air and expel hot air, so make sure these aren't blocked.

Keep Away from Heat Sources

Avoid placing your computer and other electronics in direct sunlight or near windows. Position them in the airflow of a fan or air conditioner for optimal cooling. Since heat rises, store your devices on lower levels of your home when possible.

Clean Devices Regularly

Fans in your devices help keep them cool, but dust, dirt, and hair can slow them down or cause them to stop. Use compressed air to clean out dust and keep all vents clear.

Power Down When Overheating

If a device overheats and malfunctions, turn it off and disconnect the power supply immediately. Allow it to cool down before using it again. Ensure it’s not stacked with other devices and that the area around it is clear to prevent future overheating.

To gain more insights on how to utilize technology best, keep coming back to our blog.

Continue reading

2020’s Smartphones, in Review


Now, the phones we are reviewing might seem like overkill - and, in fairness, there are many more budget-friendly options that can handle most of what you’re likely to task them with. However, the lure of a new device can be tempting, so we decided to indulge that temptation and go over some of the best smartphones available today.

Samsung Galaxy s10 Plus

If you’re looking for a quality Android device, you’re probably leaning toward the Samsung Galaxy s10 Plus. The newest addition to the line of flagships, the s10 Plus comfortably ranks at the top of many “best phone of the year” reviews.

With an aluminum frame housing the 6.17 oz phone and its Dynamic AMOLED display, the Galaxy s10 Plus is finished in Gorilla Glass 5, and has sharper edges that previous models did, intended to improve the grip of the device.

Looking inside, the phone has some just as appealing specifications. Driven by a Qualcomm Snapdragon 855 processor and between 8-to-12 gigabytes of RAM, this phone makes improvements to the rest of its features as well. There are five onboard cameras, with wide angle, ultra-wide angle, and telephoto lenses. The onboard fingerprint reader for authentication purposes is now cunningly hidden under the display, and the s10 Plus is likely to be the last flagship phone that Samsung produces with a 3.5mm headphone jack.

The Galaxy s10 is now the standard for an Android phone to beat (at least until the s11 comes out) and can be purchased in the following colors for somewhere between $599 and $1,200:

  • Prism White
  • Prism Black
  • Prism Green
  • Prism Blue
  • Canary Yellow
  • Flamingo Pink
  • Ceramic Black
  • Ceramic White
  • Cardinal Red
  • Smoke Blue

Samsung Galaxy s10 Plus
Body: Aluminum frame with Gorilla Glass 6 front, Gorilla Glass/Ceramic back
Display: 6.4-inch Dynamic AMOLED (~522 ppi)
OS: Android 9.0 with Samsung One UI skin
Chipset: Qualcomm Snapdragon 855
Memory: 128 GB/8 GB RAM; 512 GB/8GB RAM; 1 TB/12GB RAM
Expandable Memory: microSD up to 1 TB
Cameras: Three back-facing (12 MP, 26mm wide angle; 12 MP, 52mm telephoto; 16 MP, 12mm ultrawide); Two front-facing (10 MP, 26mm; 8 MP, 22mm)
Sounds: Stereo speakers, 3.5mm headphone jack
Battery (battery endurance rating): 4,100 mAh battery (91 hours)
Security: Ultrasonic, under display fingerprint reader; IP 68 resistant
Miscellaneous: Nano-SIM, Wi-Fi 6, Bluetooth 5.0, 15W fast charging, wireless charging, reverse wireless charging, NFC, FM Radio
Other versions: Samsung Galaxy s10, Samsung Galaxy s10e

Samsung Galaxy Note 10 Plus

You probably remember the dramatic news a few years ago that the battery’s tendency to explode had led to a million-device-plus recall on their Galaxy Note phones, ultimately costing Samsung more than $5 billion. The issues have long since been resolved, and so the Note 10 Plus might just be the best large-factor phone for the business professional on the market today.

Again, enclosed in an aluminum frame with a coat of Gorilla Glass 6, the Note 10 Plus comes with a 6.8-inch Dynamic AMOLED display and an on-board s-pen stylus. Also featuring a Qualcomm Snapdragon 855 processor and up to 12 gigabytes of RAM, it is powered by a fast-charging 4,300 mAh battery. This battery is also QI wireless charging-compatible, and supports reverse-QI charging, which allows you to use it as a wireless charger in a pinch. It has Android 9.0 installed at first, but can now be updated to Android 10 with certain carriers.

Most major carriers stock this phone for between $849 and $1,200, in Aura Glow, Aura White, Aura Black, and Aura Blue.

Samsung Galaxy Note 10 Plus

Samsung Galaxy Note 10 Plus
Body: Aluminum frame with Gorilla Glass 6 front and back
Display: 6.8-inch Dynamic AMOLED, 1,440 x 3,040 (~498 ppi)
OS: Android 9.0 with One UI skin
Chipset: Qualcomm Snapdragon 855 
Memory: 256 GB/12 GB RAM; 512 GB/12 GB RAM
Expandable Memory: microSD up to 1 TB
Cameras: Four Back-Facing (12 MP, 27mm wide angle; 12 MP, 52mm telephoto; 16 MP, 12mm ultra wide angle; TOF 3D VGA camera); Front-Facing 10 MP, 26mm wide angle
Sounds: Stereo speakers
Battery (battery life): 4,300 mAh (~107 hours)
Security: Ultrasonic in-display fingerprint, IP68 resistant 
Miscellaneous: Wi-Fi 6, Bluetooth 5.0, 45W fast charging, wireless charging, reverse wireless charging, NFC, S-Pen functionality
Other versions: Samsung Galaxy Note 10

Apple iPhone 11 Pro Max

Apple is surging back into prominence with the iPhone 11 Pro Max, which consistently ranks in the top three of phones developed in 2019. A stainless-steel frame holds its 6.5-inch Super Retina OLED display, as well as an advanced neural engine-improved A13 Bionic processor to boost the iPhone’s trademark features - namely, Siri’s performance as well as the functionality of its camera and AI. Along with the A13 chip, the inside holds 64 or 512 gigabytes of onboard storage space and four gigabytes of RAM.

Speaking of the camera, the iPhone 11 Pro Max houses three distinct 12-megapixel cameras, featuring a telephoto lens, a wide-angle lens, and an ultra-wide-angle lens. Most major carriers offer it for about $1,100, and it comes in SpaceGray, Gold, Silver, and Midnight Green.

Apple iPhone 11 Pro Max
Body: Stainless steel frame with glass front/back
Display: 6.5-inch Super Retina XDR OLED; 1,242 x 2,688 (~458 ppi)
OS: iOS 13
Chipset: Apple A13 Bionic
Memory: 64 GB/4 GB RAM; 256 GB/4 GB RAM; 512 GB/4GB RAM
Expandable Memory: None
Cameras: Three back-facing (12 MP, 26mm wide angle; 12 MP, 52mm telephoto; 12 MP, 13mm ultrawide); Two front-facing (12 MP, 23mm; SL 3D camera)
Sounds: Stereo speakers
Battery (battery life): 3,969 mAh (102 hours)
Security: Face ID, IP 68 resistant 
Miscellaneous: Nano-SIM, Wi-Fi 6, Bluetooth 5.0, 18W fast charging, wireless charging, NFC
Other versions: Apple iPhone 11, Apple iPhone 11 Pro

Google Pixel 4 XL

This phone marks Google’s latest effort to carve out a portion of the smartphone market. Again, powered by the Qualcomm Snapdragon 855 processor, the Pixel 4 XL really shines where its visual features are concerned. With 537 pixels crammed into every inch, it features a 6.3-inch P-OLED display, as well as one of the best camera setups available today - including a 122 megapixel wide-angle lens and a 16 megapixel telephoto lens with impressive low-light capabilities.

The Google Assistant can be summoned by simply squeezing the Clearly White, Just Black, or Oh So Orange phone.

Most major carriers will sell the Google Pixel 4 XL for between $899 and $999.

Google Pixel 4 XL
Body: Aluminum Frame with Gorilla Glass 5 front/back
Display: 6.3-inch P-OLED, 1,440 x 3,040 (~537 ppi) 
OS: Android 10
Chipset: Qualcomm Snapdragon 855
Memory: 64 GB/6 GB RAM; 128 GB/6 GB RAM
Expandable Memory: No
Cameras: Two back-facing (12.2 MP, 28mm wide angle; 16 MP, 45mm telephoto) Two front-facing (8 MP; 22mm)
Sounds: Stereo speakers
Battery (battery life): 3,700 mAh (~73 hours)
Security: Face ID
Miscellaneous: Bluetooth 5.0, 18W fast charging, wireless charging, NFC, Squeeze for Google Assistant
Other versions: Google Pixel 4

OnePlus 7T Pro

Of course, not all of this year’s “flagship-level” devices are necessarily produced by the biggest companies, as dozens of smaller manufacturers are also developing high-performance smartphones. For instance, the OnePlus 7T Pro. This device is all about the speed of the user’s experience, which is why they augmented its flagship-level specifications with a 90 hz refresh rate, making it seem even faster.

The 7T Pro doesn’t exactly underperform in other considerations, either. With a 6.7-inch fluid AMOLED display that houses a fingerprint reader, it actually runs on Qualcomm’s creme de la creme processor, the Snapdragon 855+. With three rear-facing cameras and a front-facing selfie camera that pops out of the chassis when used, the camera notch has been eliminated. Finally, because price is always a consideration to some degree, this phone does the least damage to your bank account of the ones we reviewed here with the 8 gigabyte RAM model totalling around $699.

OnePlus 7T Pro
Body: Aluminum frame with Gorilla Glass 5 front/back
Display: 6.67-inch Fluid AMOLED, 1,440 x 3,120 (~516 ppi)
OS: Android 10 with OxygenOS 10.0.4 skin
Chipset: Qualcomm Snapdragon 855+
Memory: 256 GB/8 GB RAM; 256 GB/12 GB RAM
Expandable Memory: No
Cameras: Three back-facing (48 MP wide angle; 8 MP, 78mm telephoto; 16 MP, 13mm ultra wide angle); Motorized pop-up 16 MP, 25mm wide angle
Sounds: Stereo speakers
Battery (battery life): 4,085 mAh (~100 hours)
Security: Optical in-display fingerprint reader, pop-up facial recognition
Miscellaneous: Bluetooth 5.0, 30W “Warp” charge, NFC
Other versions: OnePlus 7T

Finally, there are other phones that, while not included in our list, are definitely ones to consider under the right circumstances. These include the Huawei Mate 30 Pro and P30 Pro, the Sony Xperia 1, the LG v50 ThinQ, and the Samsung Galaxy Fold.

We included the “right circumstances” caveat because there is currently a ban on Huawei devices in the United States. Despite their superior hardware, government sanctions have put the kibosh on Huawei products for the time being.

Other devices are also just starting to rise in popularity, like those featuring foldable displays - including the Samsung Galaxy Fold, the Huawei Mate X, and the nostalgia-pumping Motorola Razr. We’ll likely soon see how these foldable devices are received on a wide scale.

Finally, there is also the advent of 5G to consider. A few cities have started to implement the necessary technology for 5G, and so manufacturers will likely start developing 5G-compatible devices before long. While it will likely take years for 5G to become the standard, if you happen to spend time in one of these cities, it may be to your benefit to upgrade.

What device do you currently use? Do any of these interest you, or did we miss one that you’ve had your eye on? Let us know in the comments!

Continue reading

You’ve Lost Your Phone, What Do You Do Now?




You’ve Lost Your Phone, What Do You Do Now?

No one wants to lose their phone, but it does happen. Whether you’ve left it somewhere or it has clearly been taken, you need to know how to respond to this situation. In this week’s blog, we will give you some tips on what to do if your phone has gone missing.

Your phone isn’t just your phone. They contain every contact we have, all of our correspondence, your payment card information, your banking details, and about everything personal you could possibly imagine. So losing it or having it stolen is a big, big deal. First, you should try to find your phone.

Find Your Phone

If you think that maybe your lost device isn’t the result of theft, you can first retrace your steps and have someone try to call it. Most cell providers can help if you are one of the people who keep your phone on silent and play a loud noise to help you locate it. If this helps you find it, great; if not, it’s time to take it up a level. Both Apple and Android offer a location program that can track lost or stolen phones. You’ll need to set up this feature prior to having your phone go missing, but since there is a good chance that you paid over $1,000 for a new flagship smartphone, it should be one of your first actions when you get the phone home. 

Hopefully, after using the find my phone feature, you will find that you left it someplace and can simply go retrieve it. If that’s not the case, you need to take immediate action to keep your life from being upended completely. Here are some things you should do if you find that you aren’t going to be able to retrieve your phone. 

Cancel Your Service for that Particular Device

The first thing you are going to want to do is call your service provider from another phone and tell them the situation. They will work to shut down service to the phone. They will also help you deal with the situation as you will need to get a replacement phone.

Deactivate Your Personal Accounts

You will need to work fast to deactivate your mobile accounts. You can choose to do this individually, or you can use the service on your phone to wipe everything from the device. This is the best-case scenario when your phone goes missing because it removes the possibility of someone gaining access to the accounts on your phone and making your life that much worse. Most mobile platforms back up your data to the cloud, so you won’t actually lose everything, but it keeps that information from being stolen. 

Change Your Passwords

Obviously, this is a time-consuming task, but you will want to go through and change all of your passwords to ensure that there is no unauthorized access to your accounts. While you should be changing your passwords every so often anyway, being forced to is a big deal and will take a lot of time and effort. 

Report It to Authorities

If you suspect that someone has made off with your smartphone, you will want to file a police report, even if you don’t think the police will do much about it. The more information authorities have regarding any crime that has been carried out, the better they will be about prevention in the future. Additionally, if you happen to have insurance that covers your device, many providers will require a police report to be filed. 

Report the Lost Device to IT

If you use the device for work, you have to immediately report the device lost or stolen if it is. Your IT department will then work to shut down access to work-related devices and can actually go so far as to wipe your phone if it hasn’t already been completed. 

Get a New Phone and Move On

It may be a traumatizing experience to lose your device since you, like many other people, depend so heavily on it, but the best thing is to ensure that you take care of a lost or stolen device and then move into a new phone as soon as possible. 

It’s going to take some work, but you will be back to normal in no time. Check back to our blog regularly for useful technology information that can help you manage the technology you use day after day.

Continue reading

Fledgling Smartphone Market Sees Decline in Innovation




Fledgling Smartphone Market Sees Decline in Innovation

Smartphones are everywhere. Nearly everyone has one either in their pocket or in their hand and that fact would make you think that the underlying smartphone market is one that is remarkably strong. This really isn’t the case. Today, we’ll take a brief look at the smartphone market and how a lack of true innovation is one of the reasons the industry has seen large decreases in sales. 

The Smartphone Market is Shrinking

It wasn’t too long ago that the smartphone market was filled with companies looking to gain a significant market share in the industry. Since then some of the largest companies in the world have ceased their smartphone divisions. LG, Microsoft, and Amazon have stopped making smartphones altogether, while once industry leaders like Motorola have been bought and sold numerous times. 

2022, in particular, was not kind to smartphone manufacturers. In fact, the whole market saw an incredible twelve percent decline. You may be thinking, “How can that be, with so many people using smartphones?” The answer comes from the fact that lots of people aren’t buying new phones every 18 months or two years like they have been for the past decade. Much of this has to do with a lack of innovation.

“Innovation”

Smartphone manufacturers dispute that they aren’t at the forefront of innovation. Today’s budget smartphones are as good as flagships were only five short years ago. The problem is that flagships aren’t moving the needle each year with new features and form factors. Consider for a minute that for years the chipsets, the displays, the user interfaces and cameras on new flagship smartphones were greatly improved in some manner each year. For the past few years, however, there are slight improvements, but a major rise in costs. Even real innovations, such as the foldable smartphone market, haven't taken off because of the cost of the devices vs. the practical need for them. 

The point is that when innovation slows, people aren’t going to jump at the chance to buy a new phone for twice as much money than they paid for a device that works well enough and has relatively the same general makeup. This is why only a handful of companies are actually turning a profit in the smartphone space. In their marketing material they speak about innovation, without proving to customers that they are pushing the space forward. 

While the smartphone market is struggling to capture the imagination of its users, it’s still an extremely important part of today’s society and therefore will be invested in. So, while you may not see marked enhancements in display clarity, device speed, or security features, there are still benefits from getting a new phone every couple of years or so.  

If you are looking to use mobile to your business’ advantage, you’ll need help managing all the new endpoints on your network. Our technicians can help you develop a mobile policy, a Bring Your Own Device (BYOD) policy, and help your organization make mobile productivity a feature of your business. Give us a call today at (604) 513-9428 to learn more.

Continue reading

Tip of the Week: Your Phone Can Work as Your Security Key


As we begin, it is important that we acknowledge that the Android operating system has been granted FIDO2 certification. In other words, the FIDO (Fast IDentity Online) Alliance has given the Android OS their seal of approval in regard to the authentication standards that the Alliance has set.

What Does This Mean?

In very simple terms, any Android device running 7.0 or higher with the latest Google Chrome update installed can be used as part of a two-factor authentication strategy - more specifically, as a security key. This includes the support that FIDO2 offers for onboard fingerprint scanners as a means of identity authentication. Currently, this authentication standard is only supported by Android, with no indication of Apple devices incorporating it.

In no uncertain terms, this all means that passwords may soon be phased out.

Abandoning Passwords

Passwords have been the standardized form of authenticating one’s identity for quite some time, despite the potential issues that are present with them. How often have we seen just how many ways a determined cybercriminal has to obtain a password? Between insecure databases filled with credentials and unfortunately successful phishing schemes, millions of accounts have been exposed - and that isn’t even taking all the times an insecure password was guessed into account.

The biggest weakness that any password has is the fact that it can be shared at all, that someone other than the owner can use it. Over any other reason, this is why FIDO2 is likely to become as popular as it is expected to be. When was the last time you successfully shared a thumbprint with someone, after all? Furthermore, FIDO2 keeps all of the information that is pulled from its biometrics onboard the device, keeping it safe from being stolen on the Internet.

As an added bonus, FIDO2 won’t allow the user to input their fingerprint’s biometric data into websites that don’t have sufficient security measures in place.

How to Use Your Android Device as a FIDO2 Security Key

In order to leverage your Android device as a security key, you need to make sure that it meets a few benchmarks. First and foremost, you’ll need to be running at least Android 7.0, with the latest version of Chrome installed. You will also need to have Bluetooth activated, and a Google account with two-step verification enabled.

This is somewhat simple to do. Logging into your Google account, access the Security section. Here, you’ll find the option to activate 2-Step Verification. After a short process, your smartphone will work as a security key.

Authenticating Google Sign-Ins with Your Phone

As long as you have enabled both Bluetooth and Location on your mobile device, any Google service you try to access will prompt you to confirm the sign-in attempt via your phone. This process is exceptionally simple - all you have to do is press Yes on your phone and wait. Once you’ve done so, you can confidently access your Google account, securely. As more developers adopt FIDO2, this enhanced security will only appear more often.

What do you think of this new authentication method? Share your impressions in the comments! While you’re there, let us know if there are any other tips you’d like us to cover!

Continue reading

Tip of the Week: How an Android User Can FaceTime, Sort Of




Tip of the Week: How an Android User Can FaceTime, Sort Of

When it comes to exclusive user features, one of the better-known ones on the Apple side of the house is FaceTime, a video chat platform. Apple has however made certain features of FaceTime available to Android users, but they come with a catch. Let’s go over how an iPhone user can FaceTime with an Android user, even if some of the features are not quite there.

It’s important to preface this blog by stating that Android users cannot initiate a FaceTime call. The user of the iPhone in question will have to start the call. Basically, what happens is that the Android user will use a specific link to join the FaceTime call in much the same way you would join any typical video conferencing call. Here’s how to get your link.

We’ll start from the iPhone user’s perspective to generate the link. They will have to go into the FaceTime application to select the option for Create Link. This will be available in the top-left menu. The user then sends the link to the Android smartphone. This can be done through text, email, or whatever other method you might use.

After the recipient has the link, they can use it to open the FaceTime web application on their device. Since it is a video call, know that it will need access to your microphone and camera in order to work properly. Once the user has added their name to the call, they can join by tapping on Continue.

Now that the Android user has gotten to this point, the iPhone user can see the option to accept or reject the call.

And now, the call can proceed as usual. The call works mostly the same way as your typical FaceTime call would, but with some feature limitations placed on the Android user. You should be able to enjoy your FaceTime calls no matter the device used by whoever is on the other end of the call!

Of course, FaceTime is far from a business-grade video chat platform, so if you’re using it to conduct business as usual, perhaps it’s time to invest in a video collaboration platform for your business instead. These platforms also won’t be nearly as restrictive or as limited by the type of device used by your workers, meaning that anyone can collaborate in the same way.

Hopefully you find this tip of some help. If you want additional assistance with collaboration platforms or further tips and tricks, be sure to call us at (604) 513-9428.

Continue reading

Tip of the Week: What Happens when a Laptop is Left Plugged In?


For this week’s tip, we’ll dig into this exact question.

How Working from Home Has Impacted the Use of Mobile Devices

Here’s the thing: with stay-at-home orders and other measures being put into place across the country, a lot of people aren’t as mobile as they once were. As a result, the mobile devices that would travel with them back and forth to the office have effectively become temporary desktops in their homes… and as such, are spending more time plugged in than not.

So, Is This a Problem?

That depends on a variety of circumstances, the first of which being the age of your device. Not all that long ago, leaving your laptop plugged in could overload and damage the battery (which was not a good thing by any means). Today’s batteries, made of either a lithium-polymer or lithium-ion, won’t behave that way. Instead, once a device’s battery reaches full power, any additional power brought in will instead power the laptop itself.

However, this doesn’t mean that there aren’t some concerns to doing this.

Any laptop user has likely noticed that, after their device has been charging for so long, the bottom will get hot. While this is to be expected, too high heat for too long can damage the device, impacting the battery’s performance. One study, performed by Battery University, indicated that leaving a laptop that’s fully charged plugged in at different temperatures can bring down the battery’s capacity over time.

Therefore, to answer whether it is safe to always leave your laptop plugged in, the verdict is now yes… so long as it is in a cool and well-ventilated area. Otherwise, you’re apt to run into problems.

Coleman Technologies is here to offer you other useful advice for managing your technology properly, even while your team is working remotely. To learn more about the services and solutions we can provide, reach out to us at Coleman Technologies.

Continue reading

How to Help Keep Your Mobile Devices Kicking for Longer




How to Help Keep Your Mobile Devices Kicking for Longer

It’s a common enough frustration—just as you really need it, your mobile device’s battery is on its last legs. This is something that we all would like to avoid if we could. That’s why we wanted to take the time to share a few ways to prolong your device’s battery life just a bit longer.

Five Tricks to Prolong Your Device’s Battery Life

While there are a few other means of keeping your device charged for longer, we figured it best to stick to the simplest and most cost-effective ones.

Avoid Apps that Drink Up Charge

Different applications will call for different things, and if those demands utilize more of the system’s resources, more power will be necessary to support them. Basically, the more computing that needs to be done, the more power will be used up. This is why using multiple apps at once eats away at your battery faster, too. Apps that keep the screen on, play video, or make your phone generally feel warm to the touch tend to be the ones that consume the most battery.

Keep Locked When Not Actively Using

Locking your phone offers a variety of benefits, not the least of which is the fact that it turns off the screen, thereby saving your device a considerable amount of power.

Update the OS

Your phone’s operating system effectively controls how the device works, which itself will influence how long its battery lasts. In fact, part of the improvements made during updates are generally related to battery optimization.

Therefore, an up-to-date OS and the bug fixes it brings often assists with battery performance and longevity.

Set Sleep Mode to Kick in Faster

As a power-saving measure, most mobile devices have a setting that will turn off the screen and suspend background processes until the phone is actively used once again. Once sleep mode is activated, it requires a password to disengage, making it a basic security feature as well as a power-saving one.

Minimize Notifications and Location Services

While both location services and notifications are meant to make a mobile device’s processes more convenient, they can also result in the battery being drained. Try turning off all non-essential notifications for less drain on the battery. Limiting location services to only kick in when an app is actively being used both maintains your privacy, and your battery!

Trust Coleman Technologies to Ensure Your Business IT Works as Well as Possible

Give us a call at (604) 513-9428 to find out what our managed IT services can do to improve your work processes!

Continue reading

Android Phones Have a Handy Anti-Theft Feature You Should Use




Android Phones Have a Handy Anti-Theft Feature You Should Use

Mobile device security is critical for modern businesses, especially as they play a more prominent and significant role in daily operations. However, data loss is also a problem, regardless of the source… including if a device is wiped via a reset.

While Apple has offered a feature to prevent this for the past year or so, Android 15 now provides the same, referred to as Identity Check. Let’s explore how it works, and how to enable it for yourself.

First of all, we have to start by saying that (as of this writing) this feature is only present on Pixel devices and Samsung Galaxy devices running One UI7. While other device manufacturers may add it to their customized interfaces (and apparently plan to later this year, so they may have already as you are reading this), these instructions currently only apply if you have one of the above devices.

How Does Identity Check Work?

To protect your device, Identity Check blocks any Android account settings from being changed unless the user is in an approved location or can pass a biometric test. This block covers quite a bit, including:

  • Adjusting the screen lock
  • Adding a new fingerprint
  • Adding a new Google account to the device
  • Disabling Find My Device
  • Accessing the Password Manager and the data therein
  • Accessing developer tools and options

…and, of course…

  • resetting the device.

How to Activate Identity Check

Activating Identity Check is simple:

  • Access your Settings
  • Navigate to Google account
  • Select All services
  • Find Theft Protection
  • Enable Use Identity Check

While you’re there, you can also add trusted locations using Manage. Deactivating Identity Check requires you to either authenticate using your biometrics or log into your Google account.

Continue reading

Your Technology’s Batteries, Then and Now


Mobile Phones and Their Batteries 

Cellular phones have been around on the open market for about 35 years. In the 1980s and 90s, these devices were bulky and had considerable heft, as did the nickel-cadmium (NiCD) batteries that powered them. These batteries couldn’t power these phones for very long at all, and had a relatively short lifespan (especially if charged when they still had some juice in them).

This didn’t stop the demand, however, and so improved batteries were manufactured using nickel-metal hydride (NiMH). This material was lighter, charged back up more efficiently, and while they still had a severely stunted lifespan by today’s standards, they degraded more slowly that NiCD batteries. This technology hit the market in the late 1990s, leading to considerable growth in the cellular phone market.

Smartphone Batteries

This growth eventually led to the introduction of the smartphone, making the NiMH batteries an ineffective option - there just needed to be more power in order to run what effectively boiled down to a computer in your pocket. As a result, lithium-ion batteries were developed. These batteries lasted longer, charged more quickly, and didn’t degrade over time. The one drawback to these batteries is the increased price, which helps to explain the sudden increase in the cost of a phone in recent years.

Even more recently, the lithium-poly ion (Li-Poly) battery was developed, offering about 40 percent more power than NiMH batteries. Unfortunately, the cost of production has prohibited them from being used in anything other than flagship devices.

Batteries of the Future

As our technology continues to advance, so must the batteries that power it. Lithium-ion batteries are already being improved by up to three times performance, the graphite they once contained being replaced with silicon. This is far from the most intriguing example of tomorrow’s tech we’re apt to see in our batteries, too:

  • Charging your device with a Wi-Fi signal - What if your Wi-Fi connection could help to charge your phone? Researchers are essentially trying to accomplish as much. By using a rectenna (an ultra-thin and flexible radio wave antenna), the idea is that AC power could be found in Wi-Fi signals and other electromagnetic waves, and harvested. This power could then be converted to DC to supplement a device’s power supply.
  • Literally charging your device by yourself - The human body relies on electricity to function - as in, any and all of its functions. In order to communicate, your cells generate a charge. The reason that lightning strikes are so dangerous to your business’ infrastructure is the same reason they are so dangerous to people - the circuitry is fried. However, research into improvements to triboelectric nanogenerators (TENG technology) implies that we may someday be capable of harvesting the energy produced by the human body and amplifying it, giving us an on-hand (or on-shoulder, or on-foot…) power supply.
  • Lithium-ion batteries will be solid state - The use of solid electrodes and electrolytes to create a battery isn’t a new idea - some devices, like pacemakers, wearables, and RFID sensors, actually already use them. However, due to cost prohibitions, they haven’t yet been incorporated into smartphones… emphasis on “yet.”
  • Batteries will be biological - Proteins are made up of chains of amino acids. Less complicated chains are known as peptides. Scientists have discovered that incorporating peptides into batteries can help improve them further, making them more stable. An Israeli startup, StoreDot, has also used peptides to develop a device capable of charging a smartphone in 60 seconds.
  • Sodium-ion, instead of lithium-ion, will be used - Lithium is abundantly rare, which is why newer devices cost so much - it’s the batteries. Sodium, on the other hand, is just plain abundant, which would make these batteries cheaper to produce, leading to more affordable end-products. 
  • Liquid flow batteries take over - Liquid flow batteries have been shown to be a cost-effective means of increasing power storage in everything from our personal devices to our municipal infrastructures. While there is considerable work yet to be done, these batteries could appear in the near future.

For now, it is probably best to understand the batteries we have around today, and how to best handle them.

Modern Battery Myths and Best Practices

  • Myth: Always let your batteries drain to zero before recharging.
    As mentioned above, this was once necessary, but the batteries we use now no longer have the vulnerabilities that NiCD and NiMH did.
  • Myth: One way to ruin your batteries is overcharging them.
    Again, this isn’t so much a myth as it is a best practice that no longer applies. Modern devices have failsafe defenses built into them to prevent overcharging. However, you still need to be concerned about heat build-up. Make sure your device has some breathing room. 
  • Best Practice: Don’t throw batteries away.
    Many of the materials that go into batteries are hazardous, and have no place in a landfill as a result. Instead, recycle them! We might be able to help with that, depending on what you have to dispose of. Call us at (604) 513-9428 to talk more about that.
  • Best Practice: Check your settings to see what uses the most power.
    If you have a device that just doesn’t seem to hold a charge, you probably have some options to go about fixing it. Reducing the brightness of the screen, adjusting how long the screen stays on, and other tweaks can help extend the life. Some of your applications may be a contributing factor as well.

An increasingly mobile world will require the power to be available to support it. We can help support your business’ mobility in other ways, keeping it secure and reliable. To learn more, call (604) 513-9428 today.

Continue reading

Is Your Business Taking Advantage of Enhanced Mobility?


Employee Expectations

Mobility is becoming a critical component for small and medium-sized businesses largely due to the demand brought by employees. Today, where most tasks can be completed with the use of a smartphone, it creates the kind of scenario that gets employees asking, “Why not?” 

For the business, that has more responsibilities, that sentiment can be shared, but only after all elements are considered thoroughly. This mostly has to do with data security. Once data security can be maintained, mobility can certainly become a major asset. 

What You Need to Consider

There are several considerations that a business owner should make before trusting in an enhancement of mobility. Here are three:

Don’t Get Ahead of Yourself

To get the most out of your business’ mobility, you need to set goals; and it will do you good to be as realistic as possible. If you try to implement a whole mobile policy and give people carte blanche with their mobile devices, you could run into problems. The best practice is to look for issues that mobility could help alleviate, and tailor your strategies to them. Most businesses that extend their mobility focus on customer service and collaboration, but with more business tools creating mobile apps than ever before, more is possible today. Start simple so you can ensure that you can maintain control over mobile data flows. 

Maintain Security

When your employees access your network via mobile devices, you need to secure it, preferably with multiple layers. You need to require password authentication, while also placing solutions in place to encrypt the files. More than that, you should find encrypted solutions to protect data from being intercepted as not all mobile networks are as reliable as a business may need.

You will also want to maintain data backup platforms and mobile management systems to ensure that you not only have control over your business’ data, but also to mitigate any negative situations surrounding data mobility you may encounter. 

Make Sure Your Business is Mobile-Ready

It is important that you understand how mobility is being used. Can your staff access locally-hosted data? Do you use cloud systems that need to be set up for multi-factor authentication? Does your IT administrator have the tools in place to address any mobility-related issues? To be able to take advantage of mobility, you need to have a setup that will allow you to. 

The IT professionals at Coleman Technologies can help outfit your business with the tools and expertise you need to allow for expanded mobility. Call our experts today at (604) 513-9428 to learn more.

Continue reading

Tip of the Week: Is a Laptop the Best Fit for Your Employees?


Reason 1: Mobility
Let’s begin with the most obvious reason laptops are a great option - you aren’t tied to a desk to do your work as you would be with a conventional desktop. Instead, you can just pick it up and take it with you, whether that’s to a meeting on the other side of the office or home for some remote work. I don’t know if you’ve ever seen someone haul an entire desktop workstation around, but if you have, you know that it just isn’t practical to do.

Potentially travelling with a laptop is also much easier. A desktop workstation would need to be carefully stowed in a vehicle, if not shipped to its destination. While it may seem like a hassle at the airport, stowing a laptop in a carry-on is a much more secure and convenient option when all is said and done.

In short, utilizing a laptop makes a lot more sense in an increasingly mobile world than does utilizing its far less mobile cousin, the desktop.

Reason 2: Concision
If the resources are there, one might make the argument that it makes more sense to utilize both a desktop and a laptop - one for the office, and one for home and travel.

Financial considerations aside, there are other issues with this strategy. The major one is the fact that it makes it that much more complicated to ensure that everything you need is where you need it to be, when you need it to be there. There is little that is more professionally frustrating than sitting down to work and realizing that the data you need is on your other device. Hopefully, you have the access to the other device at the time to make the necessary transfer.

While properly utilizing a cloud solution would be another way to approach this difficulty, why use two devices when one will suffice? That way, you can be sure that your employees always have access to the programs and data that they need to be productive.

Reason 3: Consistency
One of the most important considerations for any office technology configuration to take into account is how compatible the many devices it contains are with each other, and the solutions needed to accomplish each day’s tasks. If each employee has a different device, not only is this no longer guaranteed, you have no guarantee that each laptop will have the same shortcuts and features. For instance, if you want to encrypt the data on laptops and allow your staff to sign in with a thumbprint scanner, not all models are equipped with that. Different devices don’t tend to change how complicated it is to manage the devices, but it can vary the experience your users have and limit the policies you can set.

Standardizing your office’s devices becomes much easier when everyone has the same device, which inherently means that everyone has the same capabilities in the office. Of course, if someone needs their device to have more specialized capabilities, they should be the exception. However, for the run-of-the-mill tasks that many are responsible for, the average laptop should suit them just fine.

If you want more help in designing your technology infrastructure and setting it up for prolonged productivity, reach out to Coleman Technologies. One call to (604) 513-9428 is all it takes to start receiving the technology services that you need for success!

Continue reading

Don’t Be So Quick to Scan Every QR Code You See




Don’t Be So Quick to Scan Every QR Code You See

There is no denying that Quick Response codes—better known as QR codes—are a handy little invention. Just a few years ago, many businesses heavily adopted these contactless communication tools, allowing customers with a smartphone to access menus, documents, and more with ease. Having said that, we unfortunately can’t deny that cybercriminals are taking advantage of how handy QR codes are, too.

Let’s talk about the rise in QR code fraud, as well as how you and your team can avoid it.

How Do QR Codes, and QR Code Fraud, Work?

First developed in 1994, a QR code is a two-dimensional version of a barcode, meant to adjust for the limitations of its predecessor. A traditional barcode is limited to 20 alphanumeric characters due to it only being able to be scanned horizontally. The QR code was then developed to hold exponentially more information in its combination of vertical and horizontal data as well as allow this data to be accessed at any angle.

While this makes the QR code a very appealing option for businesses, it also gives cybercriminals a relatively easy means of sharing malicious links and malware that has become largely trusted by people everywhere.

After all, if major brands are now displaying QR codes in their advertisements, they must be safe, right?

Unfortunately not. The utility offered by a QR code also applies to cybercriminals and scammers, who can use them to augment their attacks in numerous ways.

QR Codes Make Effective Phishing Tools

Phishing is one of the most unpleasant cyberthreats out there today, largely because it requires a user to be engaged and aware about their own cybersecurity at all times. It relies heavily on the target to not see it coming.

Now let me ask you this: would you hesitate to scan a QR code on a poster or a menu if prompted? If you’re like most people…probably not. It just isn’t how most people see a threat coming in.

This makes us vulnerable. This is why many of these threats have been spotted that pose as parking tickets, or as offers or loyalty programs attached to storefront doors.

Making this bad situation even worse, these attacks often don’t go into effect immediately. Instead, malware can be uploaded to the device that scans the malicious code where it will lie in wait until the opportune moment to strike arises. Many of these attacks will simply take notice if you use your device to access an account and record the credentials you use to access it, giving the attacker the keys to the castle.

Alternatively, some QR phishing tools will send users to a phishing website—one that poses as a legitimate one to fool the victim into handing their credentials over willingly. Some scams cover what were once legitimate codes with their own, diverting payments to their own accounts.

This Makes It Critical that You Protect Yourself

Whether you’re talking about your business or your personal life, QR code scams need to be avoided. Fortunately, there are a few somewhat familiar steps that you can follow to help ensure that you do so:

  • Just like with other forms of phishing, any suspicious QR codes should prompt you to separately reach out to the party that supposedly shared it to confirm its legitimacy.
  • Similarly, don’t hesitate to manually seek out what a QR code seems to offer.
  • Using the security tools at your disposal, like antivirus or scam alert applications, to mitigate the risks associated with these scams helps protect you from falling victim to these attacks.

Coleman Technologies is here to help protect your business from all types of threats, like this one and others. Give us a call at (604) 513-9428 to learn more about what we can do for you.

Continue reading

You Even Need To Worry About Phishing In Your Text Messages


What is Smishing?

When cybercriminals use phishing scams, they aren’t using advanced technologies to crack their target’s digital defenses. Instead, they hack users by exploiting the assumptions, bad habits, and ignorance of the target to get them to release sensitive information.

Attackers circumvent cybersecurity measures by sending messages purporting to be from an authority figure or trusted contact, thereby convincing the user to undermine their protection. A notorious example of phishing is the email from the persecuted royal family, known as the "Nigerian Prince scam."

Smishing simply applies this principle to SMS instead of the usual email.

You could simply receive an SMS from a number that claims to be a financial institution or service provider, or even if you are doing business with that institution.

This message could contain details that confirm that the sender is who they purport to be, or it could go unnoticed because it is not the kind of message that most people expect to be phished through. More recently, many of these attacks have been sent under the ruse of being from authorities trying to share information about the COVID-19 pandemic.

There is a possibility that a link may be included in the message asking you to log in, but the problem is that this will lead you back to a fraudulent login page where the user’s actual login data is collected. It may prompt you to download a document that hides a variety of malicious programs, and suddenly the attacker has access to all your personal information, such as your phone number, email address, credit card numbers, bank account credentials and other sensitive information.

It's as simple as that.

Now, think for a moment about how much sensitive data you're likely to keep on your phones and what data a hacker might extract from them.

Spotting a Smishing Message

To prevent this from affecting your business, your entire team must be able to detect phishing attempts as soon as they are sent via SMS.

  • Just as with suspected phishing emails, opening a suspected smishing message is extremely risky. If the sender is not familiar to you, do not open the message and definitely do not access any links included.
  • If you cannot verify the legitimacy of the message, do not release sensitive information. If you receive a text message from Facebook informing you of a problem with your account, access Facebook separately to confirm before you resolve it.
  • Some mobile devices can block texts, just like email clients can filter messages. So, make sure you block phone numbers that are suspected of phishing and apply settings that might be helpful.

As a final tip, you need to make sure your entire organization keeps an eye on security during the workday and that they know how to identify and respond to threats.

Of course, it does not hurt to apply certain preventative measures to your network, such as anti-virus, firewall protections, and others. We can help! Coleman Technologies can support your team in its IT requirements for security, productivity, and mobility. Find out about our services by contacting (604) 513-9428.

Continue reading

Smartphones Role In the Modern Workplace


Smartphones in the Workplace

Let’s start with the trickiest bit of this first. Smartphones are a distraction, pure and simple. In fact, according to one survey, employees average about 56 minutes per day on their phones while they are in the office. This equates to a massive productivity leak for many businesses, but just when you think it isn’t equitably fair for the employer to pay for time employees spend scrolling through Twitter, Facebook, and Instagram, responding to personal emails, and browsing websites blocked by the company’s content filter, employers aren’t totally innocent in this situation.

The modern employer is the first person to take advantage of the computing prowess of these devices. Since the modern company tries to do more with less, many employers expect their workforce to always be available; and, that means always. Moreover, managers and executives aren’t any different: they are always on their smartphones too!

Some organizations feel the need to try and strategically design policies to keep people from using their personal devices for personal use on company time. These same people don’t have a problem with them using these devices for the benefit of the organization, just not for personal gain. This is where policies go wrong. They create archaic and completely unrealistic policies and are shocked when even their best performers can’t avoid their phones for long. 

If you want your staff to limit their phone use at work, you have to make that clear. Some companies have implemented a policy that provides small breaks in which they can use their phones, but most companies have come to understand that this isn’t a trend and that phone use is part of day-to-day life. Locking down people’s ability to connect with the outside world for eight (or more) hours a day is only going to serve to bring negative reviews from your team, so your best bet is to embrace it, and realize that as long as your expectations have been communicated properly, most employees won’t take advantage.

Smartphones Out of the Workplace

While the smartphone may be a bit of a distraction to your in-house staff, what happens the moment people leave the confines of your business? They use their phone. In fact, I doubt very much if they make it out to their car or onto the train without a full assessment of the messages sent by applications, people, and others. How long do you last without checking yours?

This brings us to the point that needs to be hammered home. The more people use mobile devices, and specifically smartphones, the more they are willing to do off the clock for work. You don’t think this is true? If you are a business owner or manager, try texting, emailing, or messaging a member of your staff outside of work. They may not appreciate it, but more than likely, they will respond. This effectively extends them to “on-call”, a state that was typically reserved for people with jobs that the public depends on like doctors, lawyers, and the like. Now if you have a question about a project that just can’t wait until the morning, there is an excellent chance that you will be able to get the answer you seek directly from the person who worked on a task last. That can have a lot of benefits for your business.

What About Security?

Mobile malware has become much more prevalent than ever before--so much so that it can be a major problem for your business. The best way to mitigate liability from this is to design and enact a Bring Your Own Device (BYOD) strategy that takes advantage of cutting-edge mobile device management tools. Your staff may scoff at first, but if their two options are using their data or using your wireless network, they will opt in, guaranteed. 

If you need some help ensuring that you are doing everything you can to take advantage of your staff’s reliance on their smartphones, we can provide you with all the information, resources, and technology you need to make employee smartphone use work for your company. To learn more, call us today at (604) 513-9428.

Continue reading

Tip of the Week: Simple Solutions to a Few Android Problems


Screen Rotating Too Much? Lock It in Place!

How often have you been in the middle of doing something, only to shift your phone’s position and have your screen switch orientation as it calibrates to what it assumes is what you are looking for? It doesn’t take long for this to get old, and quick.

Fortunately, Android 9 and later iterations have included a fix for this. In your System Settings, access Display and from there, Advanced. Here is where you’ll find the Auto-rotate screen option and the means to switch it off.

Samsung device users have a bit of a different process. This toggle can instead be found in the Quick Settings menu (the one that emerges from the top of your screen by swiping down twice). It includes an icon labeled Auto rotate, which you will want to switch to Portrait. This effectively disables Landscape mode from switching over unless commanded to in context.

Too Many Notifications? You Have More Options than “Yes” or “No”!

We’ve all been there before, too, and have had those applications that—if given permission to notify you of things—do so seemingly incessantly. Android has now made it very simple to adjust these permissions on the fly. Once you receive one of these annoying notifications, you can press and hold it to access a control panel. This panel can be used to either silence your notifications, or completely turn them off.

Has Your Phone Stopped Charging Well? Clean Up the Charging Port!

Debris that accumulates in your phone’s charging port over time can easily interfere with your device’s ability to charge. So, before you assume the worst and start budgeting for a costly repair job, why not try cleaning out this debris?

With extreme caution, take a toothpick or a cotton swab and try to tease out any junk that the device has collected over time. Then, try charging your device again and see if you have any more success in doing so. You may just find that your issue was little more than pocket lint, and not a problem with the hardware.

For more useful technology information, advice, and tips, subscribe to our blog!

Continue reading

Protect Smartphones Like Any Other Computer


Mobile malware is not new. It has been around since people used flip phones, but it doesn’t get the attention that the malware that targets Windows PCs do. This is mainly due to it being a little more rare, but if you are the unfortunate recipient of it, it can cause a lot of the same problems. 

Many people won’t consider it simply because of the way they use their device. A person’s smartphone is with them around the clock and they don’t often use it in the same manner as they would a PC. This doesn’t mean that there aren’t major threats that can users can be exposed to. Let’s take a look at each major mobile OS.

iPhone Malware

One of Apple’s favorite marketing strategies is to point out that iOS is the safest mobile operating system. They actually do a commendable job, but devices running iOS aren’t always completely safe, especially on “jailbroken” devices. By not doing this, which is a way to avoid a lot of iOS’ built-in security restrictions, you will be much more secure. 

Another risk that iOS-run devices run into is called a zero-day hack. The zero-day hack target devices haven’t received a security update after the security update has been released to the public. One major issue that users have with iOS security is that there aren’t a lot of ways to prevent issues. Apple itself does a lot of the heavy lifting. Their platform’s success depends on them keeping their reputation, so having trust in Apple to keep your device secure is not without its merits.

Android Malware

Android is a completely different situation altogether. With more devices comes more malware, and with so many different manufacturers making (and supporting) their various versions of Android, it gets a little dicey.

Android is much more flexible than iOS, which is one of its main benefits, but it can also be problematic when it comes to keeping the device secure. For example, if you want to install an application that’s found outside of Google Play, you can, but any negative situation you get into as a result is on you. It is also possible to jailbreak an Android device, which can override some of the built-in security restrictions.

There have been situations where installing apps off of Google Play have caused problems. Google has had to play games with app developers to keep some serious threats off their store. It just means that users need but it has become clear that it really comes down to the user being careful with what they install. It’s not normal for malware to be attached to Google-sponsored apps, but it has happened, so if you are an Android user, you don’t have to be too careful if all of your software comes from Google.

How to Protect Your Smartphone from Malware

Keep App Downloads to Major App Providers - Both Android and iOS feature their own app stores, Google Play Store and Apple App Store, respectively. Even though Android devices can install applications that aren’t on the Google Play store, modern smartphones make this a little more difficult by making users acknowledge that they are putting their devices at risk by doing so.

If you refuse to jailbreak your phone, and you only install applications that are thoroughly vetted, positively reviewed, and come directly from the Apple App Store or Google Play, you will greatly reduce the risk of infecting your device.

Don’t Get Phished - Many of the most insidious threats today rely on user error. Phishing attacks are an annoying example of this. A user will get a legitimate-looking email from some account they actively use and will be directed to submit login credentials. Unfortunately, the email account is spoofed and on the other end is potential disaster.

Install Anti-malware - You have antivirus software for your PC right, why not get it for your mobile devices? Most providers have Android apps and can go a long way toward protecting your device from harm. 

Enact Policies - If you are a business owner and your employees use their personal devices to do work-related tasks, it’s a solid practice to establish an end-to-end mobile device policy. You can require users to enable security options like device locking and encryption, and since this gets set up on your network, the device (and therefore the user) has to comply with any requirement’s your IT admin requires. 

We have a dedicated plan to help all of our clients maximize their data and network security. If you want to talk more about it call our consultants today at (604) 513-9428.

Continue reading

Tip of the Week: Locating a Misplaced Smartphone


The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of Coleman Technologies.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

20178 96 Ave C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am–5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image