Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Is Your BYOD Strategy About to Backfire?

How Can BYOD Manifest Issues?

Unfortunately, for all its benefits, there is no shortage of drawbacks to BYOD - at least, if it is implemented without conscious deliberation and preparation. Here, we’ve listed a few such drawbacks:

Business and Personal Data Often Mix, but Shouldn’t

Do you really expect an employee to have a personal device that isn’t for personal use? If this device is used for work purposes as well, it can become very easy to combine this data and put some of it at risk. What if an employee who brought their own device in then left the company, the device in question full of your company’s sensitive data? Without some kind of policy in place to eliminate this risk, BYOD is simply too risky to allow.

Your Business Will Be Vulnerable to More Risks

Unfortunately, a poorly-strategized BYOD policy opens your business up to a variety of issues that could have severe and lasting ramifications.

This is mainly due to the many risks that mobile devices inherently have in terms of data leakage, malware infection, and other vulnerabilities. If your employees aren’t vigilant in keeping their devices updated and secured, your network will be subject to the same vulnerabilities. Malware infections can also be introduced via an employee not treating their device as carefully as they should be. If malware is installed on their device, it can easily be spread to your network - free to wreak havoc and steal data.

Your Infrastructure Will Likely Need Reworking

This one is admittedly less of an issue as it is an inconvenience. Simply put, adding an influx of devices and ensuring that your IT remains compliant to any policies can be a huge investment of time - and if not done correctly the first time, this investment will only grow.

How to Prevent These Issues Via Policies

As we briefly mentioned above, any BYOD initiative you introduce to your company needs to be controlled through a stringent use policy. This policy needs to clearly describe how an employee is to use their device during work hours, as well as the prerequisites that your employees need to abide by and agree to in order to use their own device. We recommend the following:

Mobile Device Management and Endpoint Protection

This technology helps to keep any company data isolated from any personal data on the device, which means that it allows you to control your data without intruding on an employee’s privacy. As a result, if a device is stolen, you can remotely remove any business data from it to ensure your data is protected.

Another precaution to enact is endpoint protection software. This software essentially performs a preemptive security scan of any device trying to access the network, identifying if a device has been infected. This means that your network isn’t introduced to whatever malware is present on the device, and the owner is then aware of their security issue as well.

Access Controls

The fact of the matter is that not every employee needs access to every byte of data you have. Therefore, it makes sense to implement role-based access controls. These controls can help keep an employee focused on the data they need for their work duties, and can help you identify where a breach occurred, should one happen. Some access controls can even prevent a device that isn’t up to date from connecting to the network at all. You should also investigate two-factor authentication measures that might assist you in limiting access to those who should have it.

Exit Strategies and Safeguards

Finally, you also have to consider what to do if something happens to one of the devices that has been used for BYOD purposes. First of all, you need to have your employees agree to have a lost device wiped remotely, applying the necessary solutions to each device used. Your employees also need to report a lost or stolen device immediately so these precautions can be put to use.

Finally, should an employee leave your business, you also need to make sure you have already secured the authorization to remove your company’s data from their device. You don’t want someone walking around with access to your data, whether their departure was amicable or not. Including this in your BYOD policy will ensure that anyone who leverages their mobile device is aware of your capability to remove your company data from their device, and will allow them to opt out of BYOD if it makes them uncomfortable.

With these policies backing up your Bring Your Own Device planning, you should be able to make use of a great productivity tool without sacrificing your data security. For assistance in putting BYOD into practice, reach out to Coleman Technologies at (604) 513-9428.

0 Comments
Continue reading

Smartphone Manufacturers Building Foldable Screen Devices

OLED Foldable Screens
Compared to the traditional light-emitting diode (LED) displays, OLED devices are a step in the right direction. LED technology works by emitting light from the electricity that circulates through it (a process called electroluminescence). The electrons in the semiconductor recombine with electron holes, releasing energy in the form of photons. The color of this light varies depending on how the photons cross the energy gap of the semiconductor.

OLED displays work through an electroluminescent anode that is made of an organic compound situated between two electrodes. The electrodes move and recombine, emitting light through the organic layer. OLED displays deeper black levels that aid in image contrast. These devices can be made much thinner and more flexible than your traditional LED devices.

Over the past five years, manufacturers have made considerable progress toward OLED displays. Some have utilized passive matrix designs or active matrix designs to great effect. The major difference between these two is that PMOLED has control over each line of pixels sequentially, whereas AMOLED displays have a transistor that accesses pixel function directly.

Bendable Displays
The organic compounds in the OLED anode allows for a much easier manipulation compared to other designs, as long as the transistor used to carry the energy is flexible, too. Once this was confirmed to work as intended, scientists had to find a substrate layer that could flex without breaking. This is why glass isn’t used in flexible screens. Some particularly flexible OLED displays contain a plastic substrate that gives them strength and flexibility required to become a foldable device.

Foldable Options
Motorola and Apple have rumored to be producing foldable smartphones in the near future, but there are others that are taking more immediate advantage of this technology. Here are a few of them.

Samsung Galaxy Fold
https://youtu.be/7r_UgNcJtzQ

In just a week, on April 26th, 2019, the Samsung Fold will become the first foldable smartphone to reach the U.S. This device can reach 5G speeds and sports an impressive foldable screen. The screen unfolded reaches 7.3 inches with a dynamic AMOLED display, while it reaches 4.6 inches folded with a super AMOLED display on the front of the phone. The innards are also quite impressive, featuring a 64-bit octa-core processor with 12 GB of RAM, 512 GB of internal storage, and a 4,380 mAh battery.

Huawei Mate X
https://www.youtube.com/watch?v=1_c2KGtZP64

Chinese manufacturer Huawei is providing a foldable smartphone in the form of the Huawei Mate X. The foldable display isn’t actually protected, but it is used in a way that differs considerably from the other options. With a foldable component that wraps around the device, the Mate X has a viewfinder that helps with taking pictures. This means that there is no need for a front-facing camera on this device. Other specs for this device include a Kirin 980 octa-core processor with 8 GB of RAM and 512 GB of onboard storage. This device also has a 4,500 mAh battery with a 55W fast charging standard. This product will be available in the near future, so keep an eye out for it if foldable screens are what you’re looking for in a device.

What do you think about OLED technology? What about foldable screens? Let us know in the comments.

0 Comments
Continue reading

Tip of the Week: How to Encourage a Good Team Dynamic

Method One: Clarify Roles

One of the first things that you should do is to ensure that everyone knows exactly what their role is with no misunderstandings. This will assist in establishing processes in which certain team members have a clear sense of what they are responsible for, and how that ties into the larger goal.

There are a few direct benefits that this transparency with your team can bring. First, you can give your team ample feedback into their performance and assign them new challenges and objectives to accomplish. Secondly, you can empower your team members to approach these objectives - all benefitting the same end goal - in their own way. By giving them this power over their own process, you encourage them to take ownership over their work and the end result.

I don’t know about you, but I’d rather produce something good if my name was going to be associated with it, if my contributions could be traced back to me.

Method Two: Praise the Team

One of the biggest obstacles to true teamwork is the ego. To avoid creating interpersonal tensions amongst your team through your praise, try praising the team as a unit. While giving one member of your team the spotlight can easily make the other members more jealous than anything else, focusing that spotlight on the team as a whole will help to improve the collaborative efforts of the team. You can always praise that team member in a one-on-one conversation.

There is one caveat to this: while you shouldn’t single out a team member in public, you should make sure that all work done within the team remains transparent. This visibility will help to discourage team members from slacking off and piggybacking on their coworkers, keeping everyone accountable for their share of the work.

Method Three: Encourage Staff Socialization

In order for your workforce to act as a team, they will need to see themselves as a team. This can be accomplished in a few ways.

The real key is to ensure that your staff is frequently spending time as a group.

In an operational sense, team meetings can be invaluable, so long as they also remain productive. Not only can these meetings provide your team with valuable facetime with one another, you can focus on your business’ strategy by analyzing your staff’s status reports side-by-side.

On the more casual side of things, there are a few ways that you can draw your employees closer together. Social activities can help to build camaraderie and friendly relationships. While it might seem corny, ice breakers can be a good way to get your team to open up to one another and, well, break the ice between coworkers. Otherwise, lunches or an after-work meetup for happy hour can help your team see each other as something other than just coworkers, but as friends. Even if nobody finds their “best friend forever”, your team will at least know each other better, allowing them to work together more effectively.

Method Four: Leverage Technology

Finally, if your team is going to act like a team, they’re going to need the tools that enable them to do so. This is what makes collaboration solutions so critical to the modern business. With the right solutions, your team can work cooperatively regardless of where they are, sharing and editing files together.

Of course, not every team member will need to see the same documents, based on their role, which is where the capability to assign network and file access permissions come into play. With these permissions, you can ensure that each team member can locate and access the files they need to be productive and contribute to the greater goals of the group.

Coleman Technologies can help you implement these technologies to support your other team-building endeavors - as well as the success of your business as a whole. To learn what else we have to offer, give us a call at (604) 513-9428.

0 Comments
Continue reading

Considerations for Your Business’ Collaboration

Hardware

Fortunately, the biggest hurdle to collaboration isn’t usually having the right solutions in the office, it’s primarily making sure that these solutions are being put to use properly.

Consider your Internet setup - is it strong enough to wirelessly provide your entire office with connectivity, or would you be benefitted by implementing additional access points? Do you have the hardware needed to communicate and share data with mobile employees, and most importantly, can you properly secure all of it? Speaking of mobility, you will also want to consider if you want to provide your staff with company-owned mobile devices instead of leveraging a Bring Your Own Device Policy. There are options out there to procure these devices for well below retail rates, as long as these devices are bought in bulk.

Software

Depending on your type of business, you may have more or less to do in order to promote collaboration in your organization. A brick-and-mortar establishment will likely have its resources centralized, which means that employees will need to have access to these resources in order to properly communicate with one another, sharing progress on their work. While a private cloud platform would serve this need quite well, these solutions are typically far too expensive for the average SMB to consider.

These SMBs do have other options. Cloud-hosted software allows a business to leverage just about any computing resources they need, whether its a productivity suite, a business management platform, or a communication tool. Adding to these benefits, these resources can be accessed wherever an Internet connection can be established thanks to an integrated access management system. This same system allows administrators to keep threats out of their network as well.

Policies

Finally, for there to be collaboration, there needs to be the policies in place that “encourage” (enforce) the stress-free sharing of pertinent data with team members. In other words, you need to know that you have a way for your employees to access the data they need to complete their tasks as the need arises.

Having these policies can be to your organization’s advantage. While some of your data needs to be kept on a “need-to-know” basis, giving your employees some guidance to navigate how other data should be shared can help you to keep your business’ data that much more secure. It also doesn’t hurt that digital communications are becoming more of the norm, so it only makes sense to give your employees an outlet to communicate in what is likely their preferred manner.

In short, businesses are communicating in new and exciting ways. Not only should you not want to be left behind, you can’t afford to be. For assistance in expanding your internal collaboration and business communications to fully embrace today’s capabilities, reach out to Coleman Technologies’s IT professionals at (604) 513-9428.

0 Comments
Continue reading

Higher Education Using Technology to Manage Operations

The fact of the matter is that universities have a lot of industry-specific technology that goes into making a functional institution of higher education, and that’s without mentioning secure access to student records, maintaining the productivity suites in computer labs, and providing intuitive smart technology for better lectures. We know a guy who’s well-versed in the types of solutions utilized by institutions of higher education, and we think you might find what he has to say to be interesting.

Degree Progress Management
Each student that is matriculated into a degree program has to complete a set of requisite courses. These courses will vary drastically from program to program, but the fact remains that each student must complete these requirements if they hope to graduate with a degree. Some programs have electives (any course the student wants) or selectives (any course from a selected group of classes), which complicates the process of choosing classes and opens up the door for students to take courses that don’t necessarily fulfill their degree requirements.

To minimize the risk of this happening, real-time degree progress can be viewed through programs like DegreeWorks. This program can show students, faculty, and staff advisors how many credits and courses must be completed by a student, as well as which classes fulfill specific requirements. Students can even process “what if” reports, which can show them how their degree progress is affected by something like changing their major.

Student Retention
It’s not a stretch to say that some students enter higher education underprepared for the increased workload. Whether it’s because of students not knowing how to access the proper resources, needing educational supplements like tutors, or simply requiring a support system that the student doesn’t have at home or on-campus, student retention and persistence can be a challenge for many institutions.

In an effort to improve these statistics, student retention software can be used by faculty and staff to assign flags, create to-do lists, and make appointments with students who are in need of assistance or support. In this way, the support structure that many students need to succeed is both accessible and informative for them.

Online Learning
In today’s increasingly-connected world, online learning has become a viable alternative to traditional, or synchronous, learning. When we say “synchronous,” we mean the traditional lecture style of education, in which a student must be physically present in the classroom to participate in discussions. Asynchronous learning, which is significantly less structured and more of an “at your own pace” approach to education, has provided students with limited time and geographic resources an opportunity to learn at their own pace in a less structured environment.

Depending on the institution, the online learning application might be something like BlackBoard, Angel, or Brightspace, rebranded to suit the proprietary needs of the university. Either way, the end result is generally the same. Online learning uses a centralized environment for all of a student’s learning needs, providing access to message boards, learning modules, grade books, open educational resources, and so much more.

Again, we understand that not all of our readers have stakes in the education sector; we just wanted to share some interesting solutions that are used by professionals in this industry. Are there any other industries you want to learn more about? Let us know in the comments and be sure to subscribe for more great technology-related blogs.

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image