Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

How Business Email Compromise Puts Your Business at Risk

BadBEC

Can you tell the difference between your colleagues and a scammer with access to their email account? This is essentially what a business email compromise attack involves—a scammer initiates a phishing scheme using an internal mode of communication. These scams are also observed in schools, making them dangerous in the education sector.

0 Comments
Continue reading

Please, Please, PLEASE Don’t Include Sensitive Info in Your Emails

Please, Please, PLEASE Don’t Include Sensitive Info in Your Emails

Email is a great communication tool. However, certain things are just unsafe to communicate via email.

Let’s go through a list of such things. Better safe than sorry, after all.

0 Comments
Continue reading

Dude, Use This RAD Method to Get Your Inbox Under Control

Dude, Use This RAD Method to Get Your Inbox Under Control

Do you have trouble keeping up with your email inbox? You’re not alone; business professionals all over the world struggle to get to the fabled “inbox zero.” If you want to change the way you manage your inbox for the better, you should consider the RAD method. It might just change your life.

The proposed ideas here come from Nick Sonnenberg, founder and CEO of Leverage.

0 Comments
Continue reading

Your Email is Insecure - Businesses Need Email Encryption

Your Email is Insecure - Businesses Need Email Encryption

All businesses use email to communicate, but too many organizations haven’t jumped on the encrypted email bandwagon yet. Encryption is incredibly helpful to keep networks and infrastructure secure, and it can do the same for your email solution. In fact, it is likely required to ensure the secure transfer of critical and sensitive information.

0 Comments
Continue reading

Don’t Share Sensitive Data in Emails

Don’t Share Sensitive Data in Emails

All it takes is one oversight to potentially undo any benefits your cybersecurity protections and other best practices may deliver. For instance, even if you have things like multifactor authentication in place, a phishing scam or even some malware varieties could potentially give an attacker access to your email… and all the data your messages contain, just sitting in your inbox.

0 Comments
Continue reading

Understanding URLs Can Help You Avoid Being Hacked

Understanding URLs Can Help You Avoid Being Hacked

We often advise people to steer clear of clicking on suspicious links, but distinguishing between a legitimate URL and a dubious one has become increasingly challenging. Not only have malicious tactics evolved to the point where everyone has to stay on top of their game to not be fooled, these threats are almost pervasive so they are coming at people from all types of directions. We thought we would focus on a single punctuation mark that can make all the difference in whether a link is legitimately safe or potentially dangerous.

0 Comments
Continue reading

How to Keep Your Email Safe and Secure From Threats

How to Keep Your Email Safe and Secure From Threats

There are few technology solutions that have been as transformative and important for businesses as email. Unfortunately, however, it’s remarkably easy for a hacker to gain access to an email account to cause all kinds of chaos for a business. Let’s consider ways you can protect your business’ email accounts and, by extension, the rest of your organization’s infrastructure.

0 Comments
Continue reading

Three Communications Tools Your Business Needs

Three Communications Tools Your Business Needs

In business, good communication is essential. If you do it right, you can streamline actions that can save your business a lot of money and build incredible efficiencies that can bring your vision to reality. Poor communication, on the other hand, can hinder a business’ ability to prosper. In order for your staff to be able to communicate effectively, they need the tools to do so. Here are three tools that most businesses should have in place to help drive business forward.

0 Comments
Continue reading

Tip of the Week: How to Create an Email Group in Gmail

Tip of the Week: How to Create an Email Group in Gmail

Email groups are remarkably useful. Instead of sending a copy of an email to each individual recipient, you can effectively create a simple forum post that everyone can participate in—a feature that certainly helps when collaboration is a priority. Let’s go over how you can quickly and easily create a group in Gmail.

0 Comments
Continue reading

Knowing Phishing Tactics Can Help You Avoid Scams

Knowing Phishing Tactics Can Help You Avoid Scams

Phishing has become one of the great problems for technology users in the 21st century. The ironic part of the whole thing is that it has taken a good old-fashioned social engineering scam to make today’s robust information systems less secure. Phishing is the predominant way that hackers and scammers gain access to the systems they target. Today, we’re going to spell out what to train your employees on to help them identify phishing attacks. 

0 Comments
Continue reading

Tip of the Week: Setting Your Out-of-Office Message in Outlook

Tip of the Week: Setting Your Out-of-Office Message in Outlook

The holidays are fast approaching and that means people are going to miss work for one reason or another. If you can get away from the office for a little bit, you’ll want to set up an out-of-office message to ensure that others know you will get back to them when you get back to the office. Here’s how you can set up an autoresponder for an out-of-office message in Microsoft Outlook.

0 Comments
Continue reading

Scammers are Phishing for Dollars

How Ransomware Works

Imagine for a second the surprise you would have if you tried to log into your computer and you were presented with a message telling you that your files have been encrypted and that you need to pay in Bitcoin before the clock runs out or you will lose those files forever. Then you noticed the clock clicking down. Would you panic? You probably would. That is ransomware, a particularly ugly malware that could cost you everything. 

0 Comments
Continue reading

Become an Email Champion by Spending Less Time Dealing with Email

Make Your Inbox Do the Work for You

You’ve got better things to do than organizing and prioritizing your emails manually. Granted, you’ll still need to respond to important emails, but most email clients have everything you need to set up a system that automatically parses and sorts emails based on a whole slew of different factors. It will take a little time, and likely a few rounds of adjustments to get your inbox to work the way you want it to, but we’re going to show you the tools that will help get you there.

0 Comments
Continue reading

Gmail Templates Can Speed Up Your Communications

There are multiple add-ons and browser extensions available to help boost your email templates with more dynamic options, but today, we’ll be focusing on the baked-in capabilities that Gmail comes with.

0 Comments
Continue reading

Tip of the Week: Three Ways to Improve Remote Meetings

Give Your Team Members Some Responsibilities

An in-person meeting and a meeting through a conferencing solution can admittedly have two very different feelings to the participants. The kind of participation that comes somewhat naturally in an in-person meeting can suddenly feel entirely foreign, the visual context cues that would normally drive the conversation stripped away using technology. As a result, awkward pauses and missed line items abound. This can easily lead to people increasingly talking out of turn, while others will remain silent. One way to help mitigate this is by distributing an agenda with assigned segments beforehand. That way, each team member will be responsible for some facet of the meeting, with the bonus of being able to prepare ahead of time to increase the meeting’s benefit.

0 Comments
Continue reading

COVID-19 Vaccine Attacks Teach an Important Cybersecurity Lesson

The Cozy Bear Threat

According to the National Cyber Security Centre, a government security organization based in the United Kingdom, a hacking group known as “APT29” (also referred to as “the Dukes” or “Cozy Bear”) has actively targeted the research centers conducting research into developing a COVID-19 vaccine. These claims have been supported by both the United States’ National Security Agency and Canada’s Communications Security Establishment.

0 Comments
Continue reading

Understanding the Benefits of a CRM Solution

What is a CRM?

Short for Customer Relationship Management, your CRM is the tool that helps you track the relationships you have with the people you offer your services to, assisting you in developing these contacts into faithful clientele. As a bonus, these solutions generally come with integrations that give you access to even greater capabilities and resources.

0 Comments
Continue reading

Tip of the Week: Three Simple Measures for More Productive Email

#1: Interact with it less.

As we established from the very start, email can very rapidly shift from an asset to a considerable time commitment, often multiple times throughout the workday. If possible, avoid getting drawn in by reducing the total amount of time you spend in your mailbox. There are a few ways to accomplish this:

0 Comments
Continue reading

Why You Need to Be Concerned about Both Phishing and Ransomware

First, it will help to briefly review how each attack works.

How Ransomware Works

Imagine if you tried to log into your computer, only to be presented with a message that your entire computer had been encrypted, and that (unless money is transferred to the perpetrator, often through cryptocurrency, within a period of time) the contents of your device will be wiped. This is precisely the experience of someone victimized by a ransomware attack.

How Phishing Works

Remember those old scams, where the target would receive an email from some nobility or long-lost relative that asked for a sizable loan or investment (all to be paid back with interest, of course)? These are phishing scams, known as such because the scammer responsible simply distributes a message and waits for someone to take the bait. As time has passed, these schemes have become much more effective - and harder to spot.

These Attacks Can Easily Cooperate 

Cybercriminals have taken to pairing these attacks together to help them take advantage of as many targets as possible. Let’s run through a fairly typical scenario that someone using both may subject you to, and how you can spot these kinds of joint efforts.

Let’s say you open your business email to find a message that appears to come from the Microsoft Support team - which, unnoticed by you, actually reads “Micrrosoft Support” in one or two places. According to the email, there’s a hugely serious security issue affecting systems across the board, which is why Microsoft is supposedly sending out these emails, with the necessary fix bundled in as an attachment.

Trouble is, this isn’t actually a fix to an issue - it’s actually an executable file that installs ransomware when you try to apply the “security fix” and creates a huge problem.

This is exactly why these two distinct attacks combine so well… by incorporating phishing strategies into the distribution of their ransomware, a cybercriminal has the ability to boost how successfully their ransomware can infect the users that are targeted.

How to Spot Phishing to Avoid Ransomware

There are assorted warning signs that a message is a phishing attempt that you should always keep an eye out for in order to protect your business. For example:

  • Details are off - In keeping with our above example, how likely do you think it is that “Micrrosoft” would send out an email in which they misspelled their own name? While this is admittedly happening less in phishing emails, the same goes for the small things that are easily overlooked. Was the email in question sent from “user at example.com”? Or, was it actually sent from “user at exarnple.com?” Tricks like this are common ways that cybercriminals will try to pull the wool over a user’s eyes.
  • There’s excessive urgency - To keep users from paying too much attention to the minutiae of the email - like the “off” details we just discussed - many cybercriminals will write their phishing messages to instill a sense of urgent panic. If an email starts to make you panic, collect yourself and look at it more objectively.
  • There’s a link or an attachment - As the preferred means of delivering a ransomware payload or other issue, attachments or links to websites present no small amount of risk, especially if they are received unexpectedly. If at all possible, avoid accessing these without reaching out to the sender to confirm their legitimacy through another method of communication.

There are many other steps you need to take to protect your business from these insidious threats - from keeping a comprehensive backup to user training to applying spam filtering to your email. Coleman Technologies can help you implement them - give us a call at (604) 513-9428 to get started.

0 Comments
Continue reading

Tip of the Week: Helpful Outlook Tips

Consolidate Your Email with the Clean Up Tool

Businesses will often use email to communicate between groups of people, which is a really useful practice for keeping people apprised and in-the-know of what’s going on. However, these messages can quickly become repetitive, incoherent messes--especially in chains made up of larger groups--as participants reply to them, duplicating the thread within itself. Outlook includes a utility known as the Clean Up tool to fix these problems in your email conversations, and even in entire email folders.

By finding the Clean Up icon in the ribbon at the top of your Outlook window, you can access a drop-down menu. This menu offers to Clean Up Conversation, Clean Up Folder, or Clean Up Folder & Subfolders. Once you’ve confirmed your choice, you can access Clean Up settings, which allow you more granular control over how the tool sorts through your existing conversations.

Schedule Out a Message with Future Delivery

Sometimes you’ll have an opportune moment to send an email, but it isn’t the right time for this email to be received. For instance, if you want to share something with your employees to keep in mind throughout the next day, it doesn’t make sense to distribute it at the end of the day before for it to be forgotten. Outlook allows you to use your opportunity to your full advantage with Future Delivery.

Once you’ve written an email, click on Options, and then Delay Delivery. This opens a Properties box for that specific message, including Delivery Options that include a checkbox labeled “Do not deliver before.” Selecting this option and specifying a time and date will prevent your recipient from receiving your message before that point. Once you’re satisfied, close the Properties box and send the message just like any other.

Taking Advantage of Shortcuts

Keyboard shortcuts are used to simplify access to commonly-used functions in many computer programs and applications, and Outlook is no exception. For instance, Outlook features shortcuts for a wide range of its functionality - covering the basics (like composing a new message by pressing Ctrl+Shift+M), organizational tools (like moving a message with Ctrl+Shift+V) or annotating your messages (like adding flags to important ones with Ctrl+Shift+G).

This is really just the start of Outlook’s capabilities to help your operations. Subscribe to our blog to find out whenever we post other tips or IT blogs.

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image