Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Taking a Long Look at Your Company’s Bandwidth Needs

Bandwidth Defined

Bandwidth is one of those terms that you think you understand until you try to explain it to someone else. Basically, bandwidth is how fast data can be transferred through a medium. In the case of the Internet, millions of bits need to be transferred from the web to network attached devices every second. The more bandwidth you have access to, the more data can be transferred. 

Speed vs Throughput

Network speed--that is, how fast you are able to send and receive data--is typically a combination of available bandwidth and a measure called latency. The higher a network’s latency, the slower the network is going to be, even on high-bandwidth network connections. Latency can come from many parts of the network connection: slow hardware, inefficient data packing, wireless connections, and others. 

Throughput is the measure of the amount of data that is transmitted through a connection. Also called payload rate, this is the effective ability for any data to be transmitted through a connection. So, while bandwidth is the presumed amount of data any connection can transfer, throughput is the amount of data that is actually transferred through the connection. The disparity in the two factors can come from several places, but typically the latency of the transmitting sources results in throughput being quite a bit less than the bandwidth. 

What Do You Need Bandwidth For?

The best way to describe this is to first consider how much data your business sends and receives. How many devices are transferring data? Is it just text files? Are there graphics and videos? Do you stream media? Do you host your website? Do you use any cloud-based platforms? Do you use video conferencing or any other hosted communications platform? All of these questions (and a few not mentioned) have to be asked so that your business can operate as intended. 

First, you need to calculate how many devices will connect to your network at the same time. Next, you need to consider the services that are being used. These can include:

  • Data backup
  • Cloud services
  • Email
  • File Sharing
  • Messaging
  • Online browsing
  • Social Media
  • Streaming audio
  • Streaming video
  • Interactive webinars
  • Uploads (files, images, video)
  • Video conferencing
  • Voice over Internet Protocol
  • Wi-Fi demands

...and more

After considering all the uses, you then need to take a hard look at what required bandwidth is needed for all of those tasks. Obviously, if you lean on your VoIP system, or you are constantly doing video webinars, you will need to factor those operational decisions into your bandwidth decision making. 

Finally, once you’ve pinpointed all the devices and tasks, the bandwidth each task takes, and how many people on your network do those tasks, you total up the traffic estimate. Can you make a realistic estimate with this information?  Depending on your business’ size and network traffic, you may not be able to get a workable figure. 

Too Much or Not Enough

Paying for too little bandwidth is a major problem, but so is paying for too much. Bandwidth, while more affordable than ever before, is still pretty expensive, and if you pay for too much bandwidth, you are wasting capital that you can never get back. 

That’s where the professionals come in. Coleman Technologies has knowledgeable technicians that can assess your bandwidth usage and work with your ISP to get you the right amount for your business’ usage. If you would like more information about bandwidth, its role in your business, or how to get the right amount for your needs, call us today at (604) 513-9428.

0 Comments
Continue reading

The Mobile Device: A Brief History

At the Beginning

The invention of the radio in the late 19th century and the development of the medium in the early 20th century has more to do with modern day cellular devices than you’d think. As with most new technologies, two-way radio was used by militaries, used in the late stages of WWI, throughout the Russian (and October) Revolutions, and into the Spanish Civil War. Mobility allowed for enhanced communications, but that is a long way from the iPhone 11. 

Over the next half-century, it became the go to mass communications method, effectively making it the first wireless consumer device. In fact, over 95 percent of American households had one by the end of WWII in 1945. Radios then went mobile. The development of the portable radio was the first time people understood the convenience of having portable technology. The worldwide reliance on the medium was incredible. In the 1950s, it took the television (a drastically superior medium) over a decade to supersede the radio as the predominant technology of the time. 

Early Wireless Devices

In the early 1970s, technology had reached a point where the idea of a mobile phone was being bantered around. Prototypes were made, and the technology worked! The first set of wireless phones were added to luxury cars and train cars and other places where affluent people could take advantage of the technology. 

The first cellular phones, the 0G generation were introduced to the market in the late 1970s. Meanwhile, personal computers were trending upwards.

Amazingly enough, it would take almost 40 years before the trajectory of the two markets would intercept.

In the early 1980s, something changed. Cellular technology began to improve, as did the form factors of mobile devices. In 1984, the Motorola DynaTAC 8000X Advanced Mobile Phones System was introduced. The phone, which weighed in at a whopping 28 ounces, cost $4,000, and took 10 hours to charge for 30 minutes of talk time. Irregardless, the device, and others of that era had great demand. Motorola sold around 1,200 phones in 1984 alone; and, based on that success, innovation was priority number one.

It took until 1981 for manufacturers to develop anything resembling what we would call a mobile PC. The Osborne 1 was the first, but it wasn’t practical at about the size of a suitcase. The Epson HX-20, a PC that had a four-line display and used a microcassette to store data, would forever be known as the very first true laptop.

Just like cellular phone technology, the innovation of the laptop was moving faster.

‘90’s Mobility

By the mid-90s, mobility had started to become a priority for consumers. The huge, brick-sized cellular phones of the 80s were replaced by smaller, more portable devices. They also dropped significantly in price. Cell phones such as the Nokia 5110 made cellular calling commonplace.

On the mobile PC front, the laptop form factor of the ‘90s largely resembled the laptops we use today, the first touchscreen devices started to pop up, and mobile networks started to become better at transmitting data. 

In the same era, major PC manufacturers began to make laptop computers. These devices regularly fetched $3,000 or more. Once supply started reaching the public’s insatiable demand for these devices, there was a rapid reduction in price. Device manufacturers such as HP, Dell, and Compaq took advantage of the computing boom, and grew quickly. 

Cameras started to show up on devices in the late 1990s. It became obvious that cell phone device demand, as well as access to the brand new World Wide Web was pushing innovation. As a result, each year it seemed as if the new phones were getting more features, were better constructed, and dare I say, smarter.

The New Millenium 

In the dawn of the 21st century, more and more people had a cell phone. Constant innovation of hardware, software, battery technology, and more were powering a technology boom like the consumer world hadn’t seen since the advent of the color TV.

At this time, device manufacturers such as PALM, Nokia, and Apple started putting together the smartphone; devices that could function like a computer in your pocket. Then, in 2006 Steve Jobs unveiled the iPhone. The launch of Apple’s iPhone in 2007 set the standard for what consumers would come to expect from their devices. 

Luckily for consumers, the establishment of the iPhone was quickly followed by ‘copycats’. Dozens of other electronics companies started to put together smartphones. The companies may change, but this competition is still raging away today. Today there are 3.5 billion smartphones, most of which are powered by the Apple App Store and the Google Play Store. With millions of apps on each, the smartphone is now the predominant computing device in the world. 

How Smartphones Have Changed Business

Today, the manner in which we communicate, collaborate, and compute has completely changed. These devices have changed the way that people can be productive. This uptick in mobility has helped develop the following changes:

  • Remote workers - Today, remote workers are commonplace. Thanks to all the solutions built for mobile devices, employees can do work from anywhere just like they would have done it at the office. 
  • Social media - The subsequent development of social media provides mobile users contact with their family, friends, and contemporaries from any place at any time. 
  • Immediate demand - This may be the most important consideration that increased mobility has offered people. With the ability to get what they want when they want it, they expect quick responses and resolutions to problems in a blink of an eye. 

The smartphone is one of the best tools you can use. Today’s options are more powerful than ever. For more information about how to maximize your business’ productivity through mobility call the professionals at Coleman Technologies today at (604) 513-9428.

0 Comments
Continue reading

A Brief Review of Various Cybercrime Statistics

Ransomware

Imagine trying to access your computer (or your network as a whole), only to find yourself locked out and presented with a demand for payment in exchange for your files to be decrypted. This is precisely the scenario that ransomware puts its victims into, usually with a deadline to pay up under threat of the destruction of the encrypted files. If you’ve heard about Cryptolocker, WannaCry, or Petya, they are what we are referring to.

In 2019, a business was infected with ransomware once every 15 seconds, racking up a total of $11.5 million in total losses. Spam and phishing attacks were responsible for infecting 66 percent of affected companies, and in 2017, almost half of companies surveyed were affected by ransomware.

Denial of Service

Denial of Service (DoS) attacks, and their more-popular offshoot, Distributed Denial of Service attacks are the most common form of cyberattack. Using automation, an attacker has resources batter a target with the aim of taking it down. The rise in Internet of Things-enabled devices now allows an attacker to take over these devices and turn them against a single webpage. Naturally, this takes the website down.

The biggest DDoS attack on record happened on March 5, 2018, but was fortunately unsuccessful in taking down the targeted ISP… despite clocking in at 1.7 TB/s. On average, one of these attacks costs somewhere between $20K-to-$40K each hour, or in other terms, just under the average American worker’s annual salary. In the UK, businesses lost £1 billion to cybercrime in 2019.

Man-in-the-Middle

A Man-in-the-Middle attack compromises any communications between a business and their contact. Any and all data can be interfered with, allowing cybercriminals to have their way with personal data, business correspondence, or financial data that is transmitted. It can be intercepted, altered, or redirected, potentially causing more problems than can be counted. The worst part: because Man-in-the-Middle attacks are relatively easy to carry out, they are rising in popularity on a daily basis. They are most commonly used to extract information, whether personal or professional, that otherwise wouldn’t be available. This includes things like login credentials, banking information, or payment card data.

Okay, that wasn’t the worst part. The worst part is that the majority of servers are still vulnerable. As in, 2016 saw 95 percent of HTTPS servers still at risk.

Phishing

Believe it or not, phishing attacks are ranked as the biggest threat to businesses out there today. Phishing is a kind of social engineering where an attacker will reach out to the victim through some format, from email to instant messaging and beyond, in order to gain access to a secure system by fooling their victim into erroneously trusting them. While phishing emails have been around the block a few times, today’s attacks have grown to be quite sophisticated.

Many statistics surrounding phishing emails demonstrate how effective this relatively simple attack has proved to be. Phishing is involved in 93 percent of all social engineering attacks, and was directly responsible for 70 percent of government network breaches. In the last 12 months, 64 percent of organizations had first-hand experience with phishing, notably, 82 percent of manufacturers. The aforementioned ransomware relies on phishing for 21 percent of its delivery. As recently as 2016, 30 percent of phishing messages were opened.

SQL Injection

Abbreviating a structure query language injection, an SQL injection attack does what it says on the box - it injects malicious code into a target’s SQL servers and feeds the database information back to the attackers. While this is another “golden oldie” of an attack, web-based applications that call for database access have given new life to SQL injection attacks and allowed attackers to extract very valuable info.

It should then come as no surprise that 65 percent of all web application attacks are performed through SQL injections. So, if your organization draws information from a database for an application, you could easily be victimized to a significant degree. Even gamers need to be concerned, as 12 billion out of 55 billion detected SQL attacks that Akamai security experts found were leveled at the gaming community.

Malware

If only these other attacks meant that attackers didn’t have time to try anything else, but unfortunately, that isn’t the case. Malware attacks still rank among both the worst, and most common, attacks against businesses. Of course, there are many types to consider, including:

  • Trojan horses - Malicious code will be concealed within other files and applications and allow an attacker a point of access to a computing system or network.
  • Worms - Malicious and self-replicating applications that travel along and infect networks and individual devices.
  • Viruses - Samples of malicious code that infect applications for a variety of motives, including sabotage and theft of data and other resources.
  • Spyware - Code that, while it seems harmless, piggybacks to software and gathers information about how a device or network is used.

There are many ways for malware to be introduced into a system. Again, phishing messages can be responsible, but many attackers will use something called “droppers.” Droppers are specialized programs that will install a virus after bypassing cybersecurity solutions. Since there is nothing inherently malicious about the dropper, protections usually don’t flag them.

Fortunately, there are ways to protect your business’ resources, network, and infrastructure from the millions of different versions of these attacks - and you need them, as your business is actively targeted by these attacks. To learn more about putting these protections into place, reach out to the professionals at Coleman Technologies by calling (604) 513-9428.

0 Comments
Continue reading

Pros and Cons of Leaning on a Wireless Network

The Wireless Connection

The Pros

There is one obvious benefit: No wires! Not having to run cable is a massive benefit, but the biggest benefit of this might just be the ability to connect devices to a wireless network inside your business. By giving your team access to network resources wirelessly, you’ll see better collaboration, improved productivity, and produce better products and services. 

Additionally, with a strong wireless network, you can promote some strategies that can work to improve your operational effectiveness. One of those strategies is a Bring Your Own Device (BYOD) strategy. Many of your employees bring their smartphones with them when they come to work. By enacting a BYOD strategy, your staff can take advantage of the devices they are most used to advance the goals of the company. 

The Cons

Even many wireless technologies aren’t actually wireless. Even the ones that are, need to be charged regularly, so while expanding your wireless network will provide the ability to compute inside the network’s perimeter, setting up a more collaborative workspace still comes with some drawbacks. Namely speed and security.

Wireless connections are more vulnerable than wired ones. It’s easier for unauthorized individuals to hijack the signal of a wireless connection and can provide a third-party that is looking to gain access, more of it to the critical information that is transmitted wirelessly. 

The Wired Connection

The Pros

When dealing with wired networks, IT admins have more control over what devices can connect to the network. This presents values several ways. First, there is more control over the security protocols on those devices, making contracting malware and other negative outcomes less likely. 

Wired connections also enhance an organization’s ability to keep their devices free from security threats. Controls have improved to the point where it is actually more difficult for attackers to break into a wired network.

Additionally, it may go without saying, but wired networks are overall faster than wireless networks. This speed boost is magnified if there are walls, floors, ceilings, or any other potential interference to seeing optimal speeds over Wi-Fi.

The Cons

The biggest setback to a wired Internet network is the act of wiring the network. Initial setup is a pain, as you need to hide cables and find ways to run cable as to not hinder the thoroughfares around your business. It is also a hindrance for maintenance if a cable fails or hardware has to be moved around due to business growth or restructuring. 

Another detriment to the business is that a wired connection doesn’t allow for the type of mobility many businesses are looking for nowadays. With a wireless connection meetings are faster, more to the point, and collaborative work can be fluid.

You have a business decision to make; and, while it may not be the most crucial one you will make, it can have an effect on how your business functions. For help networking your business, call the professionals at Coleman Technologies today at (604) 513-9428.

0 Comments
Continue reading

Vendors Can Cost You More Than You Realize

This is what is called vendor management, and it can go a long way toward saving you a lot of time and money. 

What is Vendor Management?

Think about how many vendors you use when it comes to your business’ IT. There’s a pretty good chance that there are quite a few. Hardware, software, services, and much more. As you get established with certain vendors, they become important to your business’ success, but aside from supplying you with their organization’s goods, they also take up a fair amount of time. 

That’s where the challenge lies.

Since you don’t have all the time in the world to keep your vendor representative on your speed dial, but you also need to focus on your business. At Coleman Technologies, we offer what we call a Vendor Management that serves as a go between you and your vendors, providing you the solutions that your business needs without having to spend all types of time being  bogged down talking to vendors. Vendor management helps to alleviate the issue significantly.

How Vendor Management Benefits Your Business’ Bottom Line

Now that we've told you what vendor management is, we can now tell you how it can significantly affect your organization’s bottom line. They include:

Better Use of Time

As we went over above, dealing with your vendors yourself can be a time-intensive process. However, by working with Coleman Technologies and allowing us to manage your vendors, all you have to focus on is your relationship with us. We will handle the vendor relationships, allowing you to focus on your business.

Benefits and Bargains

Since we have long-established relationships with all types of IT vendors, we are often able to procure technology quickly and effectively; saving you money on your technology investments. 

Simplicity

If we are to serve as your single point of contact, it keeps the situation simple. You don’t have to focus an ounce of energy setting up and managing your IT services and relationships. We do it all for you. 

Is a vendor management service seem like something you could really benefit from? If so, call Coleman Technologies at (604) 513-9428 to speak to one of our IT professionals about our managed IT services. 

0 Comments
Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you feel like you have too many browser tabs open at any given time, then you'll be happy to know that you can sometimes save certain browser tabs as a standalone application on your device. This will give them their own icon and make accessing th...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 9:00am to 6:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Inc Proud Member of

Image
Image
Image