Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Coronavirus: A Threat to Your Staff, Cyberthreat to Your Operations

How to Minimize General Exposure in the Office

Based on what is currently known about the coronavirus, the Centers for Disease Control and Prevention have some recommendations as to how to keep the potential impact of coronavirus to a minimum:

  • Encourage employees who are ill to stay home. This will help to minimize the spread of infection within your business. Make sure that your employees are aware of this policy by reiterating it verbally, and by posting notices around the office encouraging them to stay home if under the weather.

    Emphasize hygiene and etiquette. Properly stifling coughs and sneezes and keeping hands clean are surprisingly effective ways to keep your workplace healthier. Rather than using their hands to catch a cough or sneeze, your employees should use a tissue or--if unable to do so--use the upper part of their sleeve.

    The CDC recommends that tissues and alcohol-based hand sanitizer should be made readily available. Make sure your employees are washing their hands with soap and water for the recommended 20 seconds.

  • Engage in keeping the workplace clean. There is a chance that coronavirus (and other illnesses) could be spread via infected surfaces. Make sure that all surfaces that are touched frequently, like desks, workstations, and doorknobs, are kept sanitized. Provide your employees with disposable wipes so they can proactively disinfect these surfaces before use.

If you find that one of your employees is confirmed to have been infected with coronavirus, make sure that you inform their coworkers of their possible exposure while still maintaining the confidentiality that the Americans with Disabilities Act requires. These employees and those who are living with a sick family member should assess their risk of exposure using the CDC’s guidelines.

Coronavirus as a Cyberthreat

Unfortunately, coronavirus will also require you to also keep an eye on your network security, particularly if you operate within the healthcare industry. Hackers and cybercriminals have taken advantage of the widespread concern that the disease has caused. For example:

  • Scammers have phished healthcare providers with updates that appear to have come from the World Health Organization or hospitals local to their area, but actually introduce keyloggers into their systems.
  • Those involved in the medical supply chain have been targeted with emails referencing the coronavirus that install malware to steal information.
  • Ransomware has been introduced into consumer systems by promising recipients of an email information about COVID-19’s spread.

While the current climate may not make it easy, these emails and other threat vectors can be overcome through the same best practices that foil other cyberthreats. In addition to comprehensive digital protections, training your employees to spot these threats will be crucial.

Of course, you should also maintain a comprehensive backup in case you need to recover from a successful attack.

How to Maintain Productivity with Your Team at Home

With today’s technology, sending an employee home sick doesn’t necessarily mean that you will be sacrificing that employee’s productivity. We now have many ways that your team can work effectively from home, still contributing to your organizational agenda without exposing their coworkers to their illness.

Equipping Your Employees

Remote access solutions, paired with virtual private networking technology, can allow your employees to securely continue their work from home, safely accessing the applications and data their tasks require through an encrypted connection. As collaboration will certainly be necessary, you will want to be sure that your employees are also equipped with the communication tools that facilitate this collaboration as well.

Network Protections

You will also want to thoroughly secure your network infrastructure to help prevent threats like phishing attacks and other methods from being successful… as well as preparing for a potential breach or emergency with data backups and disaster recovery policies and procedures (including contact information for your employees) to help mitigate a worst-case scenario.

Employee Awareness

Finally, make sure your employees are on the lookout for any suspicious activity that could be a cybercriminal’s attempt at using the coronavirus as a means to an end. Not only should your employees know how to spot these attempts; they should also know the proper procedures for reporting and handling them.

Is the coronavirus scary? At this point, it is safe to say that it is, but does it have to interrupt your business operations entirely? Not if you are properly prepared.

For more assistance in preparing your business for any kind of disaster, reach out to the professionals at Coleman Technologies by calling (604) 513-9428.

 

What is COVID-19?

COVID-19, better known as coronavirus, is a respiratory illness that first appeared in Wuhan, China, and was reported in the United States on January 21st, 2020.

As of March 3rd, 12 states have reported 60 total cases of coronavirus and six confirmed deaths, with no vaccines or specific antiviral treatments for the illness. Symptoms of the virus include fever, shortness of breath, and a cough, while those with complications from the virus can experience pneumonia in both lungs, failure of multiple organs, and death. 

0 Comments
Continue reading

VoIP Can Replace Analog Phone Systems

VoIP Allows You to Do More

While at its core, a VoIP system is a telephone system, it allows for many more options. Since it uses an organization's available bandwidth rather than a dedicated RJ-11 connection, there are more dynamic options available. It may raise the cost of the solution a bit, but VoIP can come with instant messaging, conferencing, and call archival built in.  

VoIP is More Secure

VoIP is far more secure to use than the traditional landline because it is easier to secure a digital connection than it is to secure an analog one. The use of encryption protects all information transmitted through the system.

VoIP is More Portable

This is a big benefit. VoIP solutions can be linked to mobile applications. This means that any smartphone can become a work phone, and can be linked to the same number as the user’s business phone. This allows people to get calls on their phone without having to give over their personal number. This is either done through forwarding or by installing a simple app on the phone.

VoIP Offers Automated Client Interaction

A VoIP system can be configured to support an entire business. There are integrated automated menus that can offer a lot of value by directing calls to voicemails, alternative members of your team, and allowing employees to avoid distractions and not neglecting their incoming calls. Call forwarding, parking, and many more options can be tied to a VoIP account for additional costs.

VoIP is a technology solution for all of your business’ calling needs. Call Coleman Technologies today at (604) 513-9428 for more information about VoIP and you can get the telephone system you’ve always wanted for your business.

0 Comments
Continue reading

Should Your HR Department Be Worried (About Automation)?

Automation Isn’t the First Threat

Human resources cover a lot of ground in any business. In fact, many smaller businesses extend the human resources role past the seven core functions of HR. These are:

  1. Recruitment
  2. Payroll Administration
  3. Benefits Administration
  4. Training and Professional Development
  5. Performance Reviews
  6. Labor Relations
  7. Managing Compliance

Over the past several years, the company human resources department, especially at small and medium-sized businesses, has been encroached upon by outsourcing. Like many other outsourced platforms Human-Resources-as-a-Service (HRaaS) services use technology to fill in the gaps left by not having dedicated HR professionals on staff. For the business, it reduces the cost, while fulfilling virtually the same roles through remote help desk and software

The Relationship Between Automation and HR

Technology changes things. Does it make it better? That’s a matter of opinion, but for the business owner, not having the human resources department means that they are on the hook to complete the tasks that the human resources department undertakes; and, there is a mountain of it.

That is, unless they can automate them.

The benefits of automation are the same no matter where it is put to use. It opens the way for staff to focus on being more productive, by leaving behind a lot of menial (yet time-consuming) tasks. Aside from enhancing efficiency and productivity, there are many key benefits to automating HR. They include:

  • Reduced employee turnover through improved employee engagement
  • Reduced storage and printing costs
  • Improved risk management and properly managed compliance
  • Improved document management
  • Enhanced business decision making with comprehensive reports
  • Optimized business growth through efficient onboarding

Today, there are plenty of software-based solutions that can keep any business running effectively, but when you get a look at them, these solutions aren’t really human resources platforms, they are human capital managers. 

What is Human Capital Management?

Human capital management is a platform that encourages businesses to treat their workforce as they would any other asset. Its goal is to get the human resources of the business to work as effectively and efficiently as possible. While human resources do more to deal with the individual needs and motivations of workers, human capital management seeks to look for metrics that can be quantifiable and strategically improved upon. It basically aims to change an organization’s view of their workforce from a commodity to an investment. 

What Strategy Is Best for Your Business?

There are multiple ways that automation can be implemented in the HR/HCM process, but depending on what strategy is used, you could be setting your company up for problems from your actual human resources. Most workers don’t like being treated like numbers on a spreadsheet after all. On the other hand, divorcing business decision-making away from typical workforce considerations that aim to sap overall productivity will benefit your organization’s bottom line. 

HR is always a balancing act. 

If you would like to know how automation could help you keep your organization balanced and productive, reach out to the IT professionals at Coleman Technologies today at (604) 513-9428.

0 Comments
Continue reading

Can Outsourcing Be an Option for Your Business?

Financial Benefits 

Looking outside your own business to get work done can be intimidating. Can you trust outsourced talent? Will I lose control over my business? Is it really a value? These questions and many more are reasonable to ask, but if there is one sure thing about outsourcing is that there are clear financial benefits. 

The decreased cost of outsourcing is the most well-known feature of the strategy. Obviously, it is extraordinarily expensive to onboard new help, purchase the resources that new hire needs to do the job you need him/her to do, and expand your benefits package (if you offer one) to another person. When you outsource, you may still pay a comparable rate in pay, but you will get someone that has the specific skills you need them for, and you’ll likely save a lot of capital by eliminating the associated costs.

Operational Benefits 

Your organization may see some major operational benefits from choosing to outsource. They include:

Internal Focus

Outsourcing can present a business’ leadership the ability to be more aggressive with their resources. There is a lot to do at the average business, giving regular employees access to trained and reliable resources can free them up to focus on operational issues while speeding up business significantly. 

Access to Skills

Typically, outsourcers come onboard with very specific skills and no long-term employment contract. This gives the organization the flexibility to find the gig-worker that fits the immediate needs of the company rather than committing to one employee over large swaths of time. 

Minimized Risks

In the course of doing business, decision makers are confronted with variable risks. Outsourcing allows many of the risks to be disregarded, although it creates some others. Overall, however, outsourcing will often present a net-positive situation for any business. 

Coleman Technologies offers high-value outsourced IT services and support for British Columbia businesses. If you would like to learn more, call us today at (604) 513-9428.

0 Comments
Continue reading

Top 3 Ways Hackers Will Attack Your Network - And They Are Targeting You RIGHT NOW

Hackers have many methods they use to break into your network, steal data or put you in a position where you have to pay them money to get your data back. They use a combination of software and skill to make it happen. Here are three ways hackers and cybercriminals attack your network in an attempt to get what they want.

1. THEY GO THROUGH YOUR EMPLOYEES.

That’s right, they’ll use your own employees against you, and your employees might not even realize what’s happening. Let’s say a hacker gets ahold of your internal e-mail list, like the e-mails you have posted on your website or LinkedIn. All the hacker has to do is send an e-mail to everyone at your company.

The e-mail might be disguised as a message addressed from you asking your employees for a gift card, which is becoming an increasingly common scam. Another e-mail tactic is making a message look like it’s from a fellow employee, asking everyone else to open an attached file, which is likely malware or ransomware. A third e-mail scam is directing people to a phishing website, which is a website that scammers have designed to look like popular websites in order to get login information to hack accounts. All it takes is a single click from any employee to let the bad guys into your business.

2. THEY ATTACK YOUR NETWORK DIRECTLY.

Some hackers aren’t afraid of forced entry. Hackers and cybercriminals have access to black market tools and software that helps them get into networked devices – particularly unprotected networked devices.

For example, if you have a PC that’s connected to the Internet and your network doesn’t use any firewalls, data encryption or other network protection software, a hacker can break in and steal data from that PC and potentially other devices connected to that PC, such as portable hard drives. This method of entry isn’t necessarily easy for hackers, but the effort can be worth it, especially if they can walk away with sensitive financial information.

3. THEY HOLD YOUR DATA HOSTAGE.

Hackers are relying on ransomware more and more to get what they want. Hackers rely on e-mail, executable files and fraudulent web ads (such as banner ads and popups) to attack networks with ransomware. It goes back to the first point. All it takes is someone clicking a bad link or file and the next thing you know, you’re locked out of your network.

This has happened to dozens of businesses and even city governments in the last year alone. The thing is that even if you pay the ransom, there is no guarantee the hacker will restore access. They can take the money and delete everything, leaving your business high and dry! This destroys businesses!

All of these points are why you need to take a hard look at IT security solutions and use them. For instance, if you had all of your data securely backed up to the cloud and a hacker came in and tried to hold your data hostage, you wouldn’t have to worry. They don’t really have your data. You can tell them “no,” then all you’d have to do is work with an IT team to get your network back up and running while scrubbing it of any malware or ransomware.

Then, it would be a simple matter of restoring data from the cloud. Sure, you might be out of commission for a day or two, but in the grand scheme of things, it’s much better than losing your business to these jokers.

Hackers are just looking for easy targets and, sadly, a lot of small businesses fit the bill. Just because you haven’t had any major problems yet doesn’t mean you won’t in the future. The threats are out there and they’re not going to go away. Invest in security, partner with an IT security firm and protect yourself. This is one investment that is truly worth it!

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image