Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

What Exactly is Personally Identifiable Information?

What Exactly is Personally Identifiable Information?

It’s incredibly important to keep your personally identifiable information secure, but what exactly constitutes PII? Today we offer a definition and suggestions or strategies to help you keep your PII safe.

0 Comments
Continue reading

Careful! There’s an Infected Version of WhatsApp Out There

Careful! There’s an Infected Version of WhatsApp Out There

WhatsApp is one of the world’s most popular messaging applications. With over 2 billion users, WhatsApp is known for its relative security, as it is one of the few messaging applications that offers end-to-end encryption. A modified version of WhatsApp, called YoWhatsApp, has been reportedly deploying malware.

0 Comments
Continue reading

The Haunting of North Shore Software

The Haunting of North Shore Software

The following story and events are true, however, to protect the families of the innocent, all names have been changed. Any resemblance to actual persons, living or dead, or businesses, is purely coincidental. Enjoy and happy Halloween!

0 Comments
Continue reading

“No More Ransom” is Leading the Fight Against Ransomware Abroad

“No More Ransom” is Leading the Fight Against Ransomware Abroad

Ransomware is one of the more dangerous threats out there today, and since it is so prominent and dangerous, it is a popular choice amongst hackers. To combat this threat, a community has formed around the cause, encouraging users to not pay the ransom by providing free malware removal tools for the most popular ransomware threats.

0 Comments
Continue reading

What the Heck is Patch Tuesday, Anyways?

What the Heck is Patch Tuesday, Anyways?

If you watch technology news, you might notice that there is one day out of every month that gets a lot of attention from the technology sector, and that day is what is called Patch Tuesday. This is the day each month when Microsoft issues all of their patches and security updates, and it’s important to know when this day falls each month—at least, for your IT team it is.

0 Comments
Continue reading

Almost 20% of Enterprise Windows Servers Lack Endpoint Protection… Does Yours?

Almost 20% of Enterprise Windows Servers Lack Endpoint Protection… Does Yours?

We’re not shy about sharing how important it is for a business to have comprehensive cybersecurity throughout its entire infrastructure. That’s why we wanted to share what some recent data has shown about the importance of having visibility into your infrastructure.

Spoiler alert: it’s really, really important.

0 Comments
Continue reading

Security Doesn’t Always Have to Be a Grind

Security Doesn’t Always Have to Be a Grind

At first glance, cybersecurity might seem incredibly complicated and difficult to understand, but even a baseline understanding of some of the principles of cybersecurity can go a long way toward protecting your business. Let’s discuss some of the common-sense ways you can keep your business secure, even if you don’t have an internal IT department to ask for help from.

0 Comments
Continue reading

Is Data a Commodity? Maybe Not, but It Is an Asset

data-commodity

The late American author Kurt Vonnegut once wrote, “New knowledge is the most valuable commodity on earth. The more truth we have to work with, the richer we become.” Written in the 20th century, it has been put in practice by 21st century businesses. As the Internet has grown, the amount of companies expanded, and the amount of data that those companies collect has grown exponentially, especially now that there is a market for such data.

0 Comments
Continue reading

When it Comes to Security, Two Factors are Better Than One

step_authentication

The password isn’t nearly as secure as it used to be. Hackers have begun to take advantage of extremely powerful solutions designed to brute force their way into accounts by using software to rapidly guessing thousands of passwords per second, making it extraordinarily difficult to prepare yourself for them.

What’s the best way to guarantee that passwords aren’t going to be the downfall of your company? A great start is by taking a close look at password best practices and two-factor authentication.

0 Comments
Continue reading

Phishing Gets Around Normal Cybersecurity Protection

Phishing Gets Around Normal Cybersecurity Protection

How often do you get emails from individuals claiming to be working with a business who wants to do business with yours or sell you a product, completely unsolicited and even perhaps a bit suspicious? These types of messages can often land small businesses in hot water, as it only takes one phishing email landing in the wrong inbox at the wrong time to put your business in jeopardy.

0 Comments
Continue reading

How to Avoid Becoming the Next Data Security Cautionary Tale

security_cautionary_tale

Data security isn’t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are far too many simple ways to correct common security issues - enough that it’s foolish not to do so. We’ll review a few ways to fix security issues, after discussing one of, if not the, most egregious security failings in modern history.

0 Comments
Continue reading

It’s Time to Fight Malware with AI

It’s Time to Fight Malware with AI

This past year saw a dangerous 86% increase in the most dangerous types of malware out there, so we want to ask you an important question: are you ready to protect your business from the different types of threats you might encounter? We know a technology solution that might help this mission along, and we want to share it with you today: artificial intelligence.

0 Comments
Continue reading

The Big Difference Between Patches and Updates

The Big Difference Between Patches and Updates

It’s easy to use the terms “patches” and “updates” as if they mean the same thing, and they are often used interchangeably within the same context. However, understanding the difference between the two can make a world of difference in terms of how you approach implementing each of them. We’re here to clear things up a bit and help you better understand the patches and updates you deploy on a month-to-month basis.

0 Comments
Continue reading

Hey You… Update Your Google Password, Right Now!

If you haven’t taken the time to go through and update your passwords lately, particularly the one protecting your Google account, you should do so… despite it undeniably being a pain. After all, Google serves various purposes and is attached to many accounts for most. Considering the number of data breaches and other cybersecurity issues this potentially contributes to, you will want to ensure your Google account is properly locked down.

0 Comments
Continue reading

Why Is It Super Important to Keep Your Software Updated?

Your business’ software is one of its critical assets, so it really can’t also host many risks to your security and business continuity. Therefore, keeping your software up-to-date and fully patched should be a priority. Let’s go over what patch management entails and why it is so important.

0 Comments
Continue reading

How Not to Teach Your Team About Phishing, Courtesy of GoDaddy

GoDaddy’s Phishing Message:

GoDaddy—the domain registrar and web-hosting company once famed for its risqué advertisements—is facing some significant backlash for a much different reason. On December 14th, GoDaddy’s employees received an email that appeared to be from the company, promising a holiday bonus. However, while the email was from the company as it appeared to be, it was actually a phishing test that the hosting provider decided to run.

0 Comments
Continue reading

Watch Out for Malicious Browser Extensions

How Do These Threats Work?

These attacks work similarly to how a phishing attack or a spoofed email would, as a user is promised one thing but winds up receiving something very different. While a malicious application may perform the task it claims to, it also may redirect the user to a phishing website or ad (making the cybercriminal some money) or simply steal some of the user’s information, like their birthday or email address.

0 Comments
Continue reading

Some Consumers are Aware of Data Privacy, But It’s Not Enough

The User Experience and How Security Fits

Let’s face it, the majority of Internet consumers have no idea about data security until something terrible happens. Until they get malware, or get their identity stolen, or their accounts hacked, they assume that there is enough built-in security to facilitate any behavior online. This is not ideal, obviously, but there are a small number of people, around 29 percent, that have enough security awareness to avoid certain websites. 

0 Comments
Continue reading

You Even Need To Worry About Phishing In Your Text Messages

What is Smishing?

When cybercriminals use phishing scams, they aren’t using advanced technologies to crack their target’s digital defenses. Instead, they hack users by exploiting the assumptions, bad habits, and ignorance of the target to get them to release sensitive information.

Attackers circumvent cybersecurity measures by sending messages purporting to be from an authority figure or trusted contact, thereby convincing the user to undermine their protection. A notorious example of phishing is the email from the persecuted royal family, known as the "Nigerian Prince scam."

0 Comments
Continue reading

The End is Nigh for Adobe Flash Player

Adobe Flash Player was deprecated back in 2017, but its official end of life date lands at the end of this year. What this means is that the software will gradually show more and more vulnerabilities that will not be mitigated, and therefore, the software will be far more susceptible to attack. Therefore, it is important that you check to make sure that anyplace that Flash Player would be—including your Internet browsers on your computers and mobile devices—to make sure that Flash isn’t still installed there.

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image