Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Tip of the Week: 5 Ways to Improve Mobile Business Etiquette

Business Doesn’t Stop, But You Should

We’ve all been there. We’re driving or on the train and a phone call comes in that you absolutely have to take. What do you do? Most people will take the call, but the right thing to do is send it to voicemail and return the call as soon as possible. Why? Because you are distracted. It’s best to call back and give the caller the attention they deserve rather than trying to juggle a phone call in the middle of traffic. Okay, this one is pretty basic, but it’s the foundation of all mobile etiquettes.

0 Comments
Continue reading

Some Consumers are Aware of Data Privacy, But It’s Not Enough

The User Experience and How Security Fits

Let’s face it, the majority of Internet consumers have no idea about data security until something terrible happens. Until they get malware, or get their identity stolen, or their accounts hacked, they assume that there is enough built-in security to facilitate any behavior online. This is not ideal, obviously, but there are a small number of people, around 29 percent, that have enough security awareness to avoid certain websites. 

0 Comments
Continue reading

Have You Applied the Recent Chrome Patches?

October saw five vulnerabilities patched in Chrome, with two of those vulnerabilities being classified as zero-day threats. A zero-day threat is an attack that is already being used by cybercriminals by the time security researchers identify it. With the head start that the zero-day threat gives them, these cybercriminals have a dangerous advantage.

0 Comments
Continue reading

You Even Need To Worry About Phishing In Your Text Messages

What is Smishing?

When cybercriminals use phishing scams, they aren’t using advanced technologies to crack their target’s digital defenses. Instead, they hack users by exploiting the assumptions, bad habits, and ignorance of the target to get them to release sensitive information.

Attackers circumvent cybersecurity measures by sending messages purporting to be from an authority figure or trusted contact, thereby convincing the user to undermine their protection. A notorious example of phishing is the email from the persecuted royal family, known as the "Nigerian Prince scam."

0 Comments
Continue reading

The End is Nigh for Adobe Flash Player

Adobe Flash Player was deprecated back in 2017, but its official end of life date lands at the end of this year. What this means is that the software will gradually show more and more vulnerabilities that will not be mitigated, and therefore, the software will be far more susceptible to attack. Therefore, it is important that you check to make sure that anyplace that Flash Player would be—including your Internet browsers on your computers and mobile devices—to make sure that Flash isn’t still installed there.

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image