Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Collaboration Tools for SMBs

Cloud Productivity

One option a business can take is by adding in a cloud productivity suite. Options like Google’s G Suite and Microsoft’s Office 365 can bring a business a lot of value, without the typically massive capital outlay the yearly software license would command. Besides, you probably already need licenses for a word processor and spreadsheet app anyway. Inside the software there are integrated collaboration options that allow your team to work on documents, spreadsheets, and presentations together in real time.

Communication

Efficient collaboration is not possible without strong communications. Today, there are options out there where an organization doesn’t necessarily need to invest huge sums in replacing their normal communications strategy to get the benefits that innovations made in the solutions can bring. By utilizing instant messaging, web-based conferencing, and cloud-based email companies can improve their top-to-bottom communication without taking on a lot of extra cost.

Collaboration Apps

New innovations in communication software are now available that provide advanced collaboration options. Developed like a forum, but with direct communication options, and integrations with third-party applications, collaboration apps like Slack and Microsoft Teams have a lot of options to help drive team productivity forward.

If you are looking for ways to improve your organizational productivity, call the IT experts at Coleman Technologies today at (604) 513-9428. 

0 Comments
Continue reading

Help Desk Makes IT Support Easier

For many smaller businesses the IT administrator’s position is not one held by a certified IT professional. It is held by whomever is most knowledgeable about computers; or, even worse, the person who most uses a particular machine. This can lead to complete catastrophe.

A help desk, either as a standalone service, or as a part of a larger managed services platform, can provide the kind of comprehensive IT support every organization is looking for. It doesn’t just battle broken technology, either. It also reduces downtime that comes from human error, whether it be from IT related issues or situational incompetence. If your staff can’t do their jobs efficiently because they encounter technology-induced roadblocks, having IT experts available around-the-clock to look into and fix most of the problems your staff could have is a huge benefit. 

Additionally, if you do have a dedicated IT administrator or outsource your IT management to a firm that doesn’t offer help desk, having remote technicians at the ready can help an IT department that is stretched thin. Augmenting your IT staff by instituting a help desk can keep their attention on the projects that will help the organization move forward more successfully. 

If your business finds itself falling short in terms of help desk support, look no further. Coleman Technologies can help your business get the support it needs to maintain operational efficiency. To learn more, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Know Your Tech: Virtual Machine

Before we do that, let’s start you with some terminology that you should know:

  • Virtualization - Virtualization is the process where information that is found on physical hardware (or the physical hardware itself) is transferred into a virtual environment. 
  • Hypervisor - The process that takes hardware resources and combines them in a way where they can be delivered into a virtual environment. 
  • P2V - Short for “physical-to-virtual”, which is the act of migrating resources from a physical server to a virtual one. 
  • Snapshot - An image of the state of a virtual machine at any specific point. In a snapshot you can see all of the data, configurations, and programs that are open at the time, in effect saving all the work that has been done on that system.
  • Clone - An exact copy of a virtual machine that can be transferred to another VM. 

Host and Guest

When committing to using virtualized resources, you need to understand that your VM is the guest of a host machine. The host machine is typically a high-powered server that you would have normally used to host your computing resources, while each virtual machine, whether it is a virtualized server or a virtualized desktop (or something else), are guests on the hosted machine. By being able to fit several guest machines on one host machine, you can save a substantial amount of money. 

Uses of Virtual Machines

Typically, a virtual machine is used for less-critical processes, but it can handle about any type of computing that you need it to. Virtual machines are often used in resource testing. Some more popular uses include:

  • Try out a new operating system (OS) - Running a new OS on a virtual machine can provide technicians and administrators with the perspective needed to determine if the new OS is right for their business.
  • Use Desktop as thin client - By running a virtual machine on your typical computer, the new computing construct notably becomes a guest system. 
  • Testing software - One of the most prevalent uses is to test new software before installing it on a larger computing infrastructure. 
  • Consolidation - These days, virtual machines are being created to do more than ever before. Today virtual server technology can allow organizations to roll out one server and use it to host several. This presents the opportunity for major cost savings.

Has your organization looked into using virtual machines to cut down on your physical IT infrastructure? Call Coleman Technologies’s experts today to discuss your virtualization options at (604) 513-9428.

0 Comments
Continue reading

Think Before You Click: Spotting a Phishing Attempt

Give Me the Short Answer - What’s Phishing?

Phishing is where you get an email that looks like an actual legit email. The goal that a cybercriminal has is to trick you into giving them a password or access to an account (like to PayPal, Facebook, or your bank) or to get you to download malware.

The problem with phishing emails is how real they can seem. A phishing attempt for your PayPal information can look just like an everyday email from PayPal.

Even worse, often phishing emails try to sound urgent. They make you feel like you have to take action quickly, or that a bill is overdue, or that your password has been stolen. This can lower the user’s guard, and force them into a sticky situation.

How to Spot a Phishing Attack

Like I said, it’s not always going to be obvious when you get phished. Even careful, security-minded, technical people can fall victim because phishing is just as much of a psychological attack as it is a technical one.

Still, there are some practices you and your staff should use:

Always Use Strong, Unique Passwords

This can solve a lot of problems from the get-go. If your PayPal account gets hacked, and it uses the same password as your email or your bank account, then you may as well assume that your email and bank account are infiltrated too. Never use the same password across multiple sites.

Check the From Email Address in the Header

You’d expect emails from Facebook to come from This email address is being protected from spambots. You need JavaScript enabled to view it., right? Well, if you get an email about your password or telling you to log into your account and it’s from This email address is being protected from spambots. You need JavaScript enabled to view it., you’ll know something is up.

Cybercriminals will try to make it subtle. Amazon emails might come from This email address is being protected from spambots. You need JavaScript enabled to view it. or emails from PayPal might come from This email address is being protected from spambots. You need JavaScript enabled to view it.. It’s going to pay off to be skeptical, especially if the email is trying to get you to go somewhere and sign in, or submit sensitive information.

Don’t Just Open Attachments

This is nothing new, but most malware found on business networks still comes from email attachments, so it’s still a huge problem. If you didn’t request or expect an email attachment, don’t click on it. Scrutinize the email, or even reach out to the recipient to confirm that it is safe. I know it sounds silly, but being security-minded might build security-mindfulness habits in others too, so you could inadvertently save them from an issue if they follow your lead!

Look Before You Click

If the email has a link in it, hover your mouse over it to see where it is leading. Don’t click on it right away.

For example, if the email is about your PayPal account, check the domain for any obvious signs of danger. Here are some examples:

  • Paypal.com - This is safe. That’s PayPal’s domain name.
  • Paypal.com/activatecard - This is safe. It’s just a subpage on PayPal’s site.
  • Business.paypal.com - This is safe. A website can put letters and numbers before a dot in their domain name to lead to a specific area of their site. This is called a subdomain.
  • Business.paypal.com/retail - This is safe. This is a subpage on PayPal’s subdomain.
  • Paypal.com.activecard.net - Uh oh, this is sketchy. Notice the dot after the .com in PayPal’s domain? That means this domain is actually activecard.net, and it has the subdomain paypal.com. They are trying to trick you.
  • Paypal.com.activecardsecure.net/secure - This is still sketchy. The domain name is activecardsecure.net, and like the above example, they are trying to trick you because they made a subdomain called paypal.com. They are just driving you to a subpage that they called secure. This is pretty suspicious.
  • Paypal.com/activatecard.tinyurl.com/retail - This is really tricky! The hacker is using a URL shortening service called TinyURL. Notice how there is a .com later in the URL after PayPal’s domain? That means it’s not PayPal. Tread carefully!

Keep in mind, everyone handles their domains a little differently, but you can use this as a general rule of thumb. Don’t trust dots after the domain that you expect the link to be.

Training and Testing Go a Long Way!

Want help teaching your staff how to spot phishing emails? Be sure to reach out to the IT security experts at Coleman Technologies. We can help equip your company with solutions to mitigate and decrease phishing attempts, and help educate and test your employees to prepare them for when they are threatened by cybercriminals.

0 Comments
Continue reading

Microsoft is Constantly Improving Office 365

The following apps are included in Office 2019:

  • Outlook
  • Word
  • Excel
  • PowerPoint

Here are some changes that have been brought to these applications.

Outlook

Most people use Outlook for email, but it’s more of a personal information manager, since it can be used as a calendar, task manager, and contact manager. Changes to Outlook 2019 include:

  • One-click fixes for accessibility issues - Enhanced accessibility options are updated to new international standards.
  • Focused inbox - Outlook now features more options to keep you focused on the information you need and less on the glut of email that you may get. 
  • Outlook reads your emails to you - Outlook now offers a text to voice option that will read your emails to you. 

Word

Microsoft Word is the Office suite’s word processor, and Word 2019 is looking to be a great upgrade from Word 2016. Here are some of the best changes:

  • Real time collaboration - Work side-by-side with others to collaborate on documents in real time.  
  • Integrated translation - Microsoft translator gives workers the ability to translate words, phrases, and sentences in many languages.
  • Enhanced reading options - Instead of straining your eyes, choose options to help make it easier on them, including page color, column width, text spacing, or have Word read your document to you.
  • Easier navigation - You can now flip through documents quickly with side-by-side view.

Excel

Excel is a spreadsheet software that comes bundled with Microsoft Office. The latest version gives users plenty of opportunities to take advantage of new and interesting features, several of which give Excel the ability to act as a database. Here are just a few of the new features:

  • New Charts - Users can now create a series of new charts, including map charts, funnel charts, and more. 
  • Precision selecting - Now users can deselect cells that aren’t relevant to their query without having to frustratingly start over.  
  • New and improved connectors - Now there are integrations that allow Excel to be front and center on any of your organization’s analytics initiatives.

PowerPoint

PowerPoint is Microsoft’s presentation-creator app. The software has hundreds of other functions, of course, and PowerPoint 2019 expands PowerPoint’s effectiveness in the long run. Some functions include:

  • Zoom for PowerPoint - Provides custom navigation inside a presentation for more presenter-friendly interaction.
  • SVG image compatibility - You can now insert and edit scalable vector graphics (SVG) images for clearer, more defined imagery. 
  • Export to 4K - Now you can export your presentation to 4K format, slightly better than Ultra High Definition. 

Other software

Office 2019 is also built with a much-improved Microsoft Teams collaboration app--and SharePoint--the industry standard in project management and coordination. Additionally, the ever-popular Microsoft Office 365 now uses Office 2019 as a base for their cloud-delivered products. 

Microsoft lists OneNote as a part of their Microsoft Office platform, but the software giant is starting to move away from OneNote as a part of the productivity suite, building it instead as a part of Windows 10. 

If you would like to talk about what Microsoft products are right for your business and/or personal computing needs, the IT professionals at Coleman Technologies are available to answer your questions and give you suggestions. To speak to one of our certified consultants call us today at (604) 513-9428.

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image