Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Should You Use Wired or Wireless Connections?


Why a Hardwired Connection?

Security

The fact is that a direct connection is inherently more secure than one that is broadcast over the airwaves, as these have the potential to be snagged in transit much more easily. Therefore, if security is paramount, a wired connection is the better option by default. That said, there are ways to secure your wireless connection, utilizing a VPN.

Speed

Wired connections are also much faster than a wireless one, whether data is being communicated within your business network or to and from the Internet. In terms of efficiency, the wired connection comes out on top.

Stability

Save for a case of infrastructure failure, the only way you could lose a wired connection would be if the wire were to be unplugged. This stability not only makes them more reliable; it contributes to the consistency of the aforementioned higher speeds.

Why a Wireless Connection?

Convenience

The lack of cables that a wireless connection requires just makes Internet access so much simpler for a business to implement. Without the need to adapt any existing infrastructure to run wires and such things, it is far easier to add, subtract, and move users around as need be.

Mobility

Wi-Fi’s inherent mobility works so well for businesses because a user can pick up what they're doing and bring it with them if they have the right device. This makes it much more practical to implement in the workplace, especially if collaboration requires meetings to happen in various places in the office.

Scope

Speaking of the right device, a wireless connection enables work to be done on a much wider, and yes, more mobile assortment of solutions. On a related note, businesses that interact with the public regularly can configure their Wi-Fi to offer guest functionality. This enables these businesses to offer their patrons a convenient perk.

Why Hybrid May Be Best

This is the real important takeaway: you don’t have to choose between wired and wireless connectivity.

Embracing both options can effectively negate the shortcomings of either, ultimately improving your business’ capability to get work done—large tasks performed over the wired connections, with communication and collaboration sticking to Wi-Fi. It all comes down to your business’ individual needs and situation.

Whichever option works best for you, you can count on Coleman Technologies being the best resource you can turn to. Find out what we have to offer in terms of assistance and support by calling (604) 513-9428.

Continue reading

A Router Password Repository Helps Keep Access Secure




A Router Password Repository Helps Keep Access Secure

What do you do if you have forgotten your wireless router’s password? You could restore the router back to its default settings, of course, but what if you have, like a dummy, never changed the router’s password in the first place? This Internet password repository could be your saving grace.

RouterPasswords.com

RouterPasswords.com is a website built to document default usernames and passwords for wireless routers. It’s run by a community of users for a community of users. Essentially, anyone can submit their default username and password for their router to help anyone out who may have forgotten it somewhere down the line. They make a point to highlight that the username and password of the router is not the one set by your Internet service provider–rather, they want the factory-set default credentials. Once the credentials have been reviewed by an administrator, they are added to the online repository.

It’s also worth mentioning that this site can be helpful from a technician’s perspective as well, as identifying the default username and password for a device can mean less work and less time spent troubleshooting an issue, if that is indeed the problem at hand.

In addition to having the largest default router password repository on the Internet (according to them, at least), the website also provides tips and tricks for how to manage router settings, reviews for the latest wireless routing technologies, and news related to wireless technology.

There is a Dark Side to This Website Existing

Of course, there is also the negative consequence of a website like this existing in that, if you can use it, so can anyone else on the Internet—hackers included. Imagine that you are a hacker and you’re trying to find the path of least resistance into a wireless network. You notice that the device’s wireless network name was never changed or set up beyond the factory default, so you assume that the wireless network’s password is also the factory default.

From there, well, you can guess where this story goes.

You should always change your wireless network’s name and password for this very reason. Tools like this exist to make users’ lives easier, but they inadvertently also make the lives of hackers easier, too.

Reinforce Your Wireless Practices with Us!

Coleman Technologies can of course help you shore up any weaknesses that might exist in your business’ wireless network policies and connections. With us on your side, you’ll have a staunch ally in the fight against cybercrime. To learn more, contact us at (604) 513-9428 today.

Continue reading

Improve Your Business With These Documentation Practices


What Should My Documentation Include?

Basically, your documentation should be a complete inventory of all the technology you have, first divided between your hardware and software solutions.

Hardware

There’s a lot of information regarding your hardware solutions that you will want to keep a record of, as it will make a lot of processes a lot simpler moving forward.

Serial/Model Numbers – These will help you to ensure that the device you are working on is the one you think it is, in addition to simplifying things for your support team.

Purchase Dates – If any of your decisions are going to be based on the age of the device (i.e. whether to repair or replace), knowing how long you have had it will help you to evaluate if you got the value from your investment.

Warranty Information – On a related note, knowing the terms of an item’s warranty can help you make the best decision for your business while taking this into consideration.

Installation Dates – Let’s say that one of your workstations is acting up. If you knew that it was installed the day before an extended brownout hit your office, this information could help you narrow down the issue.

Physical Locations – It is important to know where a device is supposed to be. This makes it easier for the service team to keep it maintained, as well as boosts your security somewhat.

Device Names – Having a name for a specific device, aside from the one the manufacturer assigned, adds another level of differentiation.

IP Addresses – If you need to find something on your network, knowing the IP address will help immensely.

Software

Just as is the case with your hardware, there’s a lot of information about your software to carefully record and track. Make sure you’re establishing the following in your documentation:

Product Licenses – Similarly to the serial number, keeping track of your product licenses ensures you are aware of how many copies of a given title you have available to use.

Purchase Dates – Again, as with your hardware, knowing when you acquired something helps you find out of your purchase is still under warranty, along with other pertinent details.

Install Dates – Once again, if you know when a given software was installed on a system, you’ll know a lot more about it through inference and deduction.

Subscription Details – If you maintain a subscription to a software suite or similar tool, keeping track of your subscription details can ensure your ability to use that title.

Usernames or Registration Emails - Knowing who in your organization is associated with your various software titles can help you log in to a vendor’s website or otherwise receive support later.

Version History – Finally, keeping up with your software’s current version in your documentation can help you keep track of where updates are needed, and where you may be susceptible otherwise. Of course, your documentation should outline the proper update procedures as well.

Why Bother with All This Documentation?

Simplicity. Security. Peace of mind.

Maintaining your technology will be so much easier with these details recorded for future reference, allowing you to get the maximum value for your investments into IT. For assistance in establishing these processes, or for insights about what we track, give us a call! Our professionals can be reached at (604) 513-9428.

Continue reading

VoIP Can Replace Analog Phone Systems


VoIP Allows You to Do More

While at its core, a VoIP system is a telephone system, it allows for many more options. Since it uses an organization's available bandwidth rather than a dedicated RJ-11 connection, there are more dynamic options available. It may raise the cost of the solution a bit, but VoIP can come with instant messaging, conferencing, and call archival built in.  

VoIP is More Secure

VoIP is far more secure to use than the traditional landline because it is easier to secure a digital connection than it is to secure an analog one. The use of encryption protects all information transmitted through the system.

VoIP is More Portable

This is a big benefit. VoIP solutions can be linked to mobile applications. This means that any smartphone can become a work phone, and can be linked to the same number as the user’s business phone. This allows people to get calls on their phone without having to give over their personal number. This is either done through forwarding or by installing a simple app on the phone.

VoIP Offers Automated Client Interaction

A VoIP system can be configured to support an entire business. There are integrated automated menus that can offer a lot of value by directing calls to voicemails, alternative members of your team, and allowing employees to avoid distractions and not neglecting their incoming calls. Call forwarding, parking, and many more options can be tied to a VoIP account for additional costs.

VoIP is a technology solution for all of your business’ calling needs. Call Coleman Technologies today at (604) 513-9428 for more information about VoIP and you can get the telephone system you’ve always wanted for your business.

Continue reading

How to Establish Fast, Secure Wi-Fi for Guests to Your Healthcare Organization


Your Main Hospital Wireless Network Needs to be Locked Down

First of all, your main office Wi-Fi cannot be used for guest access. The same network that your computers, tablets, laptops, and other equipment run on needs to be completely segregated from the rest of the traffic and secure. This might be pretty obvious for most healthcare professionals, especially those who have an understanding of HIPAA compliance, but it’s worth mentioning because it poses such a huge security risk (and breaks compliance).

Your guest network allows anyone to log in, which means a malicious person could log into it, or an honest person who has a compromised device. Both scenarios can result in serious problems if sensitive health data is accessible.

You need to ensure that your internal network is properly locked down, and that the password is never given out publicly, and is regularly updated. We can audit your existing network to look for vulnerabilities and shortcomings, and help you meet compliance standards—just reach out.

Guest Networks Don’t Necessarily Mean New Hardware

As long as the routers and access points you already have are capable, you usually don’t need to purchase additional hardware in order to establish a separate Wi-Fi network for guests. This is a huge perk—not only are you obviously not having to purchase new equipment, but you don’t need to worry about the installation of additional hardware. Of course, if your network is older, your requirements might be a little different.

One thing to think about, is how much bandwidth your existing wireless network allows. Most modern access points can be split so bandwidth usage is segregated between staff and visitors. You’ll want to make sure that the network can handle guest traffic without interfering with internal operations. You don’t want a visitor in your waiting room streaming Netflix to prevent your front desk from being able to print or access records.

It’s important to establish restrictions—not just deciding what a guest can see or do on the network, but how much bandwidth they are allocated.

Even Guests Require Policies

You don’t want to simply deploy a free-for-all network for your patients to access without setting some ground rules. You should require users to agree to terms of service, and you should definitely be able to monitor logs to detect any fraudulent activity. Depending on your practice, you may consider setting time restrictions so unauthorized users can’t access the network when your facilities are closed. We can also restrict access to certain locations to prevent access from outside your facilities.

Deploying a guest network doesn’t have to be extremely expensive, but it does require a lot more than simply enabling a feature on your wireless router. If you’d like help, we can start with a network audit and review your existing network, and help you establish the security and best practices you need to keep your visitors and patients safe and happy.

Give us a call at (604) 513-9428 to get the process started.

Continue reading

How to Get the Best Wireless Connections in Your Office


What Do You Expect from Your Wi-Fi?
Many businesses have a tendency to either deal with their Wi-Fi as-is or will haphazardly add new networking components to their infrastructure as needed. Neither of these approaches is ideal, especially in light of the fact that you’ll need your Internet connections to be reliable as you grow your network.

A much better alternative is to design your Wi-Fi network keeping a few additional factors in mind, including your office’s particular setup and any future growth plans you may have. This way, you will not only create a network that works for your current needs but is also flexible enough to shift and adapt as your business does. Whether you’re first designing your office’s floor plan or taking another look at its setup, the key is to go about it from a strategy-first perspective.

The Process
Your first order of business is to determine where the demand for a signal will be the greatest. After all, if you have a group of employees reliant on their wireless connectivity huddled together in one area of the office, you aren’t going to want to place your equipment in a way that creates a dead zone there. This will help you to identify obstacles and inform you of where you may want to consider placing additional routers to make up for their effects.

Once your Wi-Fi has been set up and your employees are settled, you should still be collecting performance data and listening to the input that employees have about their connections. Remember, wireless is still an evolving technology, so as it develops it is likely that you will need to adjust your strategy to accommodate it.

Long story short, you’ll probably need to make this an ongoing process to ensure that your Internet is as usable as possible for everyone in the office.

The professionals at Coleman Technologies are also here to assist you with any of your technology needs. If you need help with your business’ IT solutions, give us a call at (604) 513-9428.

Continue reading

Getting to Know About Phishing Attacks Can Keep Your Business Safe


As a result of this increase in phishing attacks, endpoint security has grown much more focused, but the issue with phishing isn’t necessarily an issue with the strategies surrounding your technology--rather, it’s an issue relating to your organization’s users and their tendency for failure. Now, we know this sounds a little harsh, but it’s been proven time and again that employees need security training on how to handle credentials and other sensitive information. Let’s take a look at a couple different types of attacks you can be exposed to, and what you can do to keep your organization from becoming just another company that has suffered from a data breach.

Deceptive Phishing
Deceptive phishing is one of the most common types of phishing scams, and it aims to fool unsuspecting users into handing over sensitive information. This happens when the hacker sends a message to users that impersonates an actual person or company that the organization has some sort of relationship with. These hackers use deceptive phishing to convince users to hand over information like passwords, usernames, account numbers, etc. Since official credentials are being used to access these accounts, it doesn’t immediately become a security concern.

For the most part, these deceptive phishing messages are either ignored by the users, caught by filtering technology, or disregarded when they’re accessed. Unfortunately, the handful that actually do fool the end user are worth the hundreds-of-thousands that are sent to others. To keep your business from making this fatal mistake, you need to focus on increasing awareness of what makes phishing attacks so much different from your average legitimate email.

Some of the telltale signs of phishing messages include misspelled words, problems with sentence structure, and suspicious attachments or URLs. Always hover your mouse over a link before clicking on it to determine its location, and never download an attachment unless you know who’s sending it. Another thing to look out for is any financial institution or vendor demanding payment or access to your account--there are other, more official methods of outreach for methods such as these; and no bank or similar institution will ever, ever ask you for passwords.

Spear Phishing
Spear phishing attacks are targeted attempts against a specific user. For example, someone who sees a message from a coworker might let their guard down, but this doesn’t necessarily mean the message is safe. It just means that some hacker managed to find a way to mimic the sender in a way that is extremely convincing. Spear phishing attacks will often know the target’s name, title, company, work phone number, and much more--all to seem as authentic as possible so the user will click on a malicious attachment or URL.

Even social media isn’t safe from this trend. LinkedIn, for example, is one of the most common places where spear phishing is leveraged. It might be used for connecting with other business professionals, but it’s not hard for a hacker to imitate a business professional. We aren’t saying that you need to avoid social media like the plague, only that you should approach it with some sensible caution.

Pharming
That being said, more people are learning about these attacks by the day, meaning that some hackers have ceased these types of attacks for fear of their efforts being for naught. Instead, they turn to a practice called pharming, which is using an organization’s DNS server to change the IP address associated with the website name. This gives them a way to direct users to malicious websites to steal their legitimate credentials.

To prevent this from happening, it’s very important that you tell your staff to be sure they are entering their credentials into a secured site. The best way to make sure this happens is to look for the “https” in the hyperlink, as well as a padlock icon next to the address. It also never hurts to have an antivirus solution on each endpoint within your organization.

Coleman Technologies can help your business stay as secure as possible. To learn more, reach out to us at (604) 513-9428.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

20178 96 Ave C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am–5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image