Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

There’s Value in Outsourcing Your IT, Part I

A Proactive Approach 

Which scenario which would you prefer to be in:

You take your car to a shop for a tune up. A technician calls to inform you that your engine has hardly any oil in it due to a leak. However, he replaces a gasket and tops your oil off. The simple fix has cost just $80. 

OR

You notice your car is leaving dark black stains in your driveway, but after a quick google search determine that your car is probably fine, and the money you could be spending on a tune up could be better spent on an iPhone. Once all the oil is gone, your motor has completely seized due to the lack of lubrication, and you have to use your brand new iPhone to call a repair shop. The new motor will set you back $3,000. 

Your answer to the question should be obvious, but how can you take the same proactive approach with IT? The strategy most businesses choose is one that has proven its worth -- managed IT services

What are Managed IT Services? 

Managed IT services monitor systems through the use of remote monitoring. This strategy is extremely beneficial as an IT staff does not need to be on-site at all times. By using state-of-the-art tools, managed IT providers are able to monitor your business' network and hardware, ensuring they are operating correctly. If it is not working correctly, a technician is typically able to resolve the issue remotely. This, of course, means you might not even be aware of a potential issue--and most of the time--it will be resolved before you know it. 

Having a fix-it-when-it-breaks attitude has no place in any business. The value that managed IT services delivers cannot be matched. The only comparable proactive solution is having an on-site IT staff working around the clock. How much do you think that would cost you?

Imagine paying staff to sit around waiting for something to break. Now imagine paying the non-IT staff to sit around, while your IT staff tries to resolve the issue. The biggest cost a business faces with malfunctioning hardware is typically the downtime that results from it. 

Avoid Expensive Downtime

Coleman Technologies provides simple yet effective means which act before little issues turn into operational catastrophes. One solution we offer is a comprehensive patch management service. Not updating software leaves your business susceptible to data breaches. A data breach could put not only all of your data at risk, it could jeopardize your entire business. 

To learn how easily you can adopt proactive measures into your business, give us a call at (604) 513-9428. Be sure to check for part two of this series on Friday.

0 Comments
Continue reading

Taking a Long Look at Microsoft 365

What is Microsoft 365?

Microsoft 365 is a bundle containing Office 365, the Enterprise version of Windows 10, along with Microsoft’s Enterprise Mobility + Security. Microsoft 365 is comprised of all of these solutions, meaning your business will benefit from all of the features that come with these solutions, with just one package. So, what does this package include exactly?

Here are all of these solutions you could or should be taking advantage of with Microsoft 365:

Here at Coleman Technologies we understand this list is extensive. However, it is worth viewing as there could be solutions your business could benefit from. Coleman Technologies has the technicians needed to help you procure, implement, and manage the right solutions for you. Reach out to us at (604) 513-9428 to learn more.

0 Comments
Continue reading

Technologies that Fuel a Remote Workforce

#1: Communication and Collaboration Solutions

Let’s face facts… you’re going to have to be able to work with your remote workers in order to accomplish what needs to be done, so you need to make sure you have a solution that maintains open lines of communication between you and your staff. All of the solutions that a business should use to enable communications while in-house should also be leveraged by a remote workforce, including email, chat platforms, video conferencing, and Voice over Internet Protocol.

On top of that, your line of business apps and the everyday software your staff needs should be available to remote workers. A prime example of a necessary solution for your remote employees is a file sharing platform that allows your team to work side-by-side on documents and data… whether or not they’re actually side-by-side.

#2: Project Management Tools

Time management is one of the biggest challenges inherent in remote work, so giving your staff direction through project management software can help your remote workers stay on task, while keeping the team as a whole apprised of progress towards a shared goal. In this way, project management solutions can help your team more efficiently reach their objectives - while keeping all members more accountable for what they need to accomplish.

This can be a considerable benefit, especially if an employee is going from a structured office environment to the more laissez-faire arrangement that remote work provides. Looming deadlines, combined with a fluid schedule, have been known to increase work-related stress. A reliable project management solution can return some of the structure to a remote worker’s day, giving them the purpose, they need to accomplish their goals.

#3: Cybersecurity

Any of the benefits of remote work are rendered moot if this remote work leads to a breach or some other security incident. This means that your remote workforce needs to be equipped with the same cybersecurity measures that you should have protecting your business’ on-premise infrastructure.

As a result, you will want to be sure that you’re having your remote workers utilize multi-factor authentication measures, and that their solutions are equipped with fully up-to-date security software. In order to connect back to your business’ network resource, they should also be leveraging virtual private networks to fully ensure your business’ data remains secure while in transit.

In many ways, a password management system would also be classified as a cybersecurity need - especially where remote workers (and thereby, remote access) are involved. 

#4: Time-Tracking Software

Finally, you need to make sure that your remote employees are spending their time effectively, as well as that you are properly reimbursing them for their time. There are many tools to help track how time is being spent while in the office, and these tools work equally as well for remote workers.

Whether you need to track how long a task took for billing and invoicing purposes, you’re trying to optimize your workflows, or you are simply ensuring that your team is being efficient and productive, understanding how time is spent during the workday is crucial. Implementing time-tracking software for remote workers can simplify payroll, allowing you to focus on other pressing business matters.

Coleman Technologies can help you out, by introducing the solutions that will make your remote working strategy far simpler. To learn more about what we can accomplish for you, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Essential Network Security Best Practices

Leverage Authentication Measures

One of the first steps to securing your network against threats is to create strong authentication procedures. Most of the devices with permission to access your network will already have an authentication system in place, based on a password. If the passwords used are strong enough, this can actually mitigate most threats - but you still have to worry about the ones that this doesn’t discourage. Leveraging something called multi-factor, or two-factor, authentication can help minimize the chance of something slipping past your security.

Two-factor authentication works in a relatively straightforward way. As with most login systems, a username and password are entered - but instead of being granted access, the user is asked for another credential. This is usually a randomly-generated code that a specialized authentication app will generate. Mobile devices are popular to use with 2FA, as their convenient nature makes them more likely to be available when needed. In order for a user to leverage their mobile device, the 2FA system administrator has to authorize it.

Tip: Make sure that you don’t let your password best practices slip, even if leveraging 2FA. Your passwords still need to be sufficiently complex. If you are one of those who find remembering different passwords difficult, consider using a password management system in conjunction with your 2FA. 

Protecting Your Business’ Computing Environment

Whether you use a Local Area Network or a Wide Area Network, the security practices that you need to deploy are fairly predictable. Once you’ve seen to your authentication needs, you need to combine three approaches to security into one all-encompassing strategy: your software-based security, your physical security measures, and your security awareness and best practice training.

Software-Based Security

There are many examples of how software can help keep your business’ network secure. From firewalls to content filtering to antivirus to spam detection, each of these tools protect your business data from a different kind of threat. You may even want to consider adding encryption to your email solution to make it a lot less likely that the contents of your messages will be intercepted.

Tip: If you aren’t sure which solutions are the right ones to implement, think about how your data moves about your business. The more insight you have into how your data operates, the more effectively you will be able to plan its protections.

Physical Security Measures

Somewhat ironically, we seem to have become so focused on our digital security that it can sometimes seem like we forget that there are very real reasons to protect our physical locations and infrastructure, as well. Consider the damage a bitter ex-employee could do in moments, should they manage to get into your server room. It has become fashionable to leverage biometric authorization measures to protect your server room - and there’s a lot to be said about a good, old-fashioned surveillance system, complete with alarms and cameras (as well as some updates to make this system considerably less old-fashioned).

Tip: Bring in a consulting professional to help you determine your physical security needs. Not only does this save you time by eliminating work you would otherwise have to do for yourself, it ensures that your system will be designed by an experienced professional that knows what will work best in different situations.

Security Awareness and Best Practice Training

Would you be surprised to hear that your employees are likely your biggest vulnerability? Of all of the pieces that make up your network security, the people who use your technology are the leading cause of security issues. With the number of ways that your business could be attacked, your staff needs to be educated on how to identify them and avoid them.

Tip: Both businesses and individuals have experienced difficulties with phishing and it adversely affecting them, so it makes sense to begin your training there. Not only is it a common issue, it is conceptually very simple to grasp, so it is a good starting point before moving on to increasingly complex concerns. The more your staff knows about how they can resist attacks, the more likely they’ll be able to do so if the needs arises.

Remote Solutions Via the Cloud

Modern organizations need to contend with potential threats to their network infrastructures, as businesses always have in some form. The difference is that issues can now come in on the mobile devices owned by their staff, and company resources can be routinely accessed from outside the business’ area network.

This has helped contribute greatly to the growth of cloud computing technologies - although the relative cost savings don’t hurt either. Using the cloud, your staff can access their work data and applications from a remote location, while the resources stored in the cloud are kept secure by the platform’s baked-in security and privacy.

Mobile devices have also been a disruptor to business-as-usual, which means that businesses need to plan on leveraging them if they don’t want them becoming a distraction. Designing a Bring Your Own Device policy and enforcing it through mobile device management solutions is an effective and secure way of reaching a compromise and minimizing the time wasted by mobile devices in the workplace.

Tip: Remember that cloud services are inherently scalable, so you don’t need to worry about overreaching your capabilities. However, you also don’t want to waste capital that doesn’t need to be spent. Auditing your resources is an effective way to identify and eliminate redundant costs leeching from your budget.

Network security can be complicated, but it is an absolutely crucial element to your technology strategy if you want to have any success. Coleman Technologies can help take care of the technical side of things for you, and help teach better habits to your staff. To learn more, keep reading our tips, and reach out to us at (604) 513-9428.

0 Comments
Continue reading

Your Technology’s Batteries, Then and Now

Mobile Phones and Their Batteries 

Cellular phones have been around on the open market for about 35 years. In the 1980s and 90s, these devices were bulky and had considerable heft, as did the nickel-cadmium (NiCD) batteries that powered them. These batteries couldn’t power these phones for very long at all, and had a relatively short lifespan (especially if charged when they still had some juice in them).

This didn’t stop the demand, however, and so improved batteries were manufactured using nickel-metal hydride (NiMH). This material was lighter, charged back up more efficiently, and while they still had a severely stunted lifespan by today’s standards, they degraded more slowly that NiCD batteries. This technology hit the market in the late 1990s, leading to considerable growth in the cellular phone market.

Smartphone Batteries

This growth eventually led to the introduction of the smartphone, making the NiMH batteries an ineffective option - there just needed to be more power in order to run what effectively boiled down to a computer in your pocket. As a result, lithium-ion batteries were developed. These batteries lasted longer, charged more quickly, and didn’t degrade over time. The one drawback to these batteries is the increased price, which helps to explain the sudden increase in the cost of a phone in recent years.

Even more recently, the lithium-poly ion (Li-Poly) battery was developed, offering about 40 percent more power than NiMH batteries. Unfortunately, the cost of production has prohibited them from being used in anything other than flagship devices.

Batteries of the Future

As our technology continues to advance, so must the batteries that power it. Lithium-ion batteries are already being improved by up to three times performance, the graphite they once contained being replaced with silicon. This is far from the most intriguing example of tomorrow’s tech we’re apt to see in our batteries, too:

  • Charging your device with a Wi-Fi signal - What if your Wi-Fi connection could help to charge your phone? Researchers are essentially trying to accomplish as much. By using a rectenna (an ultra-thin and flexible radio wave antenna), the idea is that AC power could be found in Wi-Fi signals and other electromagnetic waves, and harvested. This power could then be converted to DC to supplement a device’s power supply.
  • Literally charging your device by yourself - The human body relies on electricity to function - as in, any and all of its functions. In order to communicate, your cells generate a charge. The reason that lightning strikes are so dangerous to your business’ infrastructure is the same reason they are so dangerous to people - the circuitry is fried. However, research into improvements to triboelectric nanogenerators (TENG technology) implies that we may someday be capable of harvesting the energy produced by the human body and amplifying it, giving us an on-hand (or on-shoulder, or on-foot…) power supply.
  • Lithium-ion batteries will be solid state - The use of solid electrodes and electrolytes to create a battery isn’t a new idea - some devices, like pacemakers, wearables, and RFID sensors, actually already use them. However, due to cost prohibitions, they haven’t yet been incorporated into smartphones… emphasis on “yet.”
  • Batteries will be biological - Proteins are made up of chains of amino acids. Less complicated chains are known as peptides. Scientists have discovered that incorporating peptides into batteries can help improve them further, making them more stable. An Israeli startup, StoreDot, has also used peptides to develop a device capable of charging a smartphone in 60 seconds.
  • Sodium-ion, instead of lithium-ion, will be used - Lithium is abundantly rare, which is why newer devices cost so much - it’s the batteries. Sodium, on the other hand, is just plain abundant, which would make these batteries cheaper to produce, leading to more affordable end-products. 
  • Liquid flow batteries take over - Liquid flow batteries have been shown to be a cost-effective means of increasing power storage in everything from our personal devices to our municipal infrastructures. While there is considerable work yet to be done, these batteries could appear in the near future.

For now, it is probably best to understand the batteries we have around today, and how to best handle them.

Modern Battery Myths and Best Practices

  • Myth: Always let your batteries drain to zero before recharging.
    As mentioned above, this was once necessary, but the batteries we use now no longer have the vulnerabilities that NiCD and NiMH did.
  • Myth: One way to ruin your batteries is overcharging them.
    Again, this isn’t so much a myth as it is a best practice that no longer applies. Modern devices have failsafe defenses built into them to prevent overcharging. However, you still need to be concerned about heat build-up. Make sure your device has some breathing room. 
  • Best Practice: Don’t throw batteries away.
    Many of the materials that go into batteries are hazardous, and have no place in a landfill as a result. Instead, recycle them! We might be able to help with that, depending on what you have to dispose of. Call us at (604) 513-9428 to talk more about that.
  • Best Practice: Check your settings to see what uses the most power.
    If you have a device that just doesn’t seem to hold a charge, you probably have some options to go about fixing it. Reducing the brightness of the screen, adjusting how long the screen stays on, and other tweaks can help extend the life. Some of your applications may be a contributing factor as well.

An increasingly mobile world will require the power to be available to support it. We can help support your business’ mobility in other ways, keeping it secure and reliable. To learn more, call (604) 513-9428 today.

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image