Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

3 Scary Things About Ransomware That You Should be Wary Of

3 Scary Things About Ransomware That You Should be Wary Of

Ransomware is one of the more dangerous threats out there for businesses of all industries and sizes. To help emphasize just how dangerous it is, however, you have to look past the initial threat of having to pay a ransom and look at the other risks associated with it. We’re here to try to get the point across that ransomware is something your business should absolutely be taking seriously.

0 Comments
Continue reading

Ask a Tech: All Your Questions About Ransomware, Decrypted

Ask a Tech: All Your Questions About Ransomware, Decrypted

Ransomware is such a common occurrence these days that it has entered the public discourse, but we also want to note that it’s such an important topic to discuss with your team that you can never talk about it enough. We want to address some of the most common questions we get asked about ransomware and what can be done about it.

0 Comments
Continue reading

Four Things to Keep in Mind When Upgrading Your Organization’s Technology

Four Things to Keep in Mind When Upgrading Your Organization’s Technology

It is the right thing to do to use technology in your business’ attempt to be more productive and efficient, but it can also be a giant headache if you don’t deploy new technology proficiently. It can be expensive and really a hindrance to the way that you run your business, your staff’s ability to meet your productivity guidelines and more. In this month’s newsletter we want to give you four things you should consider when planning out any new technology additions. 

0 Comments
Continue reading

Have an Old Google Account? Google Might Delete It Soon

Have an Old Google Account? Google Might Delete It Soon

Do you have an old Google account that you created years ago, only to replace it later with one that is more on-brand and less filled with spam messages? You’re not alone, but as you might expect, these accounts can create more problems than they are worth if you let them sit around unused for too long. Perhaps that is why Google is planning to shut down any old Google accounts that have remained dormant for the past two years.

0 Comments
Continue reading

Major Technology Company Barracuda Suffers Zero-Day Vulnerability

Major Technology Company Barracuda Suffers Zero-Day Vulnerability

Even the solutions designed to keep businesses and organizations safe are vulnerable to the threat of a cyberattack, as when it all boils down, these tools are still software solutions, no matter how secure they might be. The company in question today—Barracuda—is a huge name in the cybersecurity industry, and it has become the victim of a zero-day exploit. Let’s go over how you can prevent your business from experiencing the same thing.

0 Comments
Continue reading

How Will the Regulations Surrounding the Cloud Continue Shifting?

How Will the Regulations Surrounding the Cloud Continue Shifting?

Cloud computing is a major growth industry as businesses and individuals look to use the computing strategy to either save money or get resources that they would typically not be able to commit to. With cloud computing becoming more and more integrated into business each year, it stands to reason that the once Wild West of cloud computing would start to see a lot more regulation. This week, we’ll take a look at how the cloud is regulated and what to expect out of cloud regulation down the road. 

0 Comments
Continue reading

Is Your Team Becoming Desensitized to Your Business’ Cybersecurity Precautions?

Is Your Team Becoming Desensitized to Your Business’ Cybersecurity Precautions?

Password changes, multi-factor authentication, and countless changes in policy and procedure can make daily workflows more and more complicated. Cybersecurity can truly be a pain—a necessary pain, granted—but a pain nevertheless, and one that can gradually lead to burnout if you aren’t careful. Let’s go over how to mitigate the likelihood of it.

0 Comments
Continue reading

What Your Organization Needs to Know About the FTC Safeguard Rule

What Your Organization Needs to Know About the FTC Safeguard Rule

The Federal Trade Commission, or FTC, has put together a Safeguard Rule to help establish guidelines for how businesses store and interact with customer information. Enacted in 2003, this rule was recently revamped in 2021 to stay relevant with the latest technology used by businesses. Let’s look at some of the policies and procedures that your business needs to know about the FTC Safeguard Rule.

0 Comments
Continue reading

Are You Being Phished? 4 Things to Look Out For

Are You Being Phished? 4 Things to Look Out For

Your business’ computing infrastructure is a pretty resilient system. It has all types of tools added on to keep malicious code, bad actors, and even sabotage from ruining the good thing you have. This reliability has led to hackers changing the way that they go about their business. Nowadays, most of the attacks that affect businesses are phishing attacks. In today’s blog we will go through the elements of a phishing attack and how you can protect your business from them.

0 Comments
Continue reading

How Schofield’s Laws of Computing Can Benefit Your Business’ Security

How Schofield’s Laws of Computing Can Benefit Your Business’ Security

There are quite a few platitudes that we support, in terms of business IT. Some that we haven’t really touched on, however, are Schofield's Laws of Computing. Let’s fix that today by reviewing where they came from, and what these laws entail.

0 Comments
Continue reading

How to Secure Your IoT Devices at Home

How to Secure Your IoT Devices at Home

The Internet of Things is everywhere and that means that it’s important to understand how much of a potential security risk these devices can be. From smart speakers to smartphones, it's important that you understand how these devices can create problematic situations. In this week’s blog we will discuss how you can protect yourself against IoT vulnerabilities at home.

0 Comments
Continue reading

A Look at Ransomware and What to Do About It

A Look at Ransomware and What to Do About It

There is a lot made about ransomware, for good reason. It is quite simply one of the nastiest cyberattacks out there and it demands your attention. A lot of people understand what exactly ransomware sets out to do, but they don’t understand how it got that far and how to address the situation if they have the misfortune of being put in that position. 

0 Comments
Continue reading

Tip of the Week: 3 Steps to Avoiding a Ransomware Infection

Tip of the Week: 3 Steps to Avoiding a Ransomware Infection

We talk a lot (and we mean a lot) about cybersecurity, with ransomware getting a lot of our focus…and for very good reason. Ransomware is a huge threat that today’s businesses need to be prepared to deal with. In light of this, we wanted to share a few tips to help you avoid the negative ramifications of ransomware.

0 Comments
Continue reading

The Less Intrusive Your Cybersecurity Plan Is, the More Effective It Will Be

The Less Intrusive Your Cybersecurity Plan Is, the More Effective It Will Be

Threats are everywhere in business today. You can quite literally be sitting at your desk actively working in your email and be exposed to multiple scams. With this revelation, it is essential that every organization takes the steps necessary to secure themselves against the immense amount of threats that could put their network and infrastructure at risk, and do so without making it difficult on their staff. Let’s dig into what that takes in this month’s newsletter.

0 Comments
Continue reading

Cybersecurity is a Constantly Evolving Industry

Cybersecurity is a Constantly Evolving Industry

Security is extremely important for every single organization that uses IT. Like any other part of a business where practices and demands change frequently, there is bound to be significant innovation involved with the strategies built to protect users and the business as a whole. Let’s look at why it is important to continuously innovate your organization’s cybersecurity policies and procedures.

0 Comments
Continue reading

Think Before You Click - Don’t Simply Trust Emails

Think Before You Click - Don’t Simply Trust Emails

Phishing is a common issue that businesses of all kinds can experience, whether they are a small startup or a large corporation. Hackers are always trying to extol information from your employees, including account credentials, remote access to your systems, and in some cases, funds directly from a bank account. It’s up to you to teach them how to identify and respond to phishing attacks.

0 Comments
Continue reading

One Employee Can Put Your Business in the Red (By Mistake)

One Employee Can Put Your Business in the Red (By Mistake)

You know the old phrase, “A chain is no stronger than its weakest link?”

It’s a pretty good idiom, but when it comes to cybersecurity, I think the idea is worth revisiting. It’s not that you aren’t as strong as your weakest link, or in terms of cybersecurity, it’s not that you aren’t as secure as your most vulnerable endpoint…

You are less secure the more users you have.

0 Comments
Continue reading

What You Need to Know to Avoid Phishing Attacks

What You Need to Know to Avoid Phishing Attacks

Phishing is a remarkably dangerous tactic used by hackers to take advantage of those who might not be quite as in-the-know about security practices. Phishing attacks can be carried out against both businesses and individuals alike, and due to the many different forms these attacks can take—including email, text message, and even fraudulent websites—they can be quite problematic.

0 Comments
Continue reading

The FBI is Looking to Talk to Businesses Affected by Ransomware

The FBI is Looking to Talk to Businesses Affected by Ransomware

This past January, the Federal Bureau of Investigation issued an announcement that they had targeted and taken down the servers for a Dark Web organization responsible for the Hive ransomware group. While there is certainly cause for celebration here, one major statistic is enough reason to continue being concerned.

0 Comments
Continue reading

The Pain Points of Mobile Computing

The Pain Points of Mobile Computing

Mobile utilization in business has been on the rise for quite some time and today’s business has to stop and confront the issues that come along with it before they become problems. Like any technology that people have come to rely on outside of their job, a business’ first consideration is how to make use of it for business as well. This month, we thought we would take a look at some of the pain points organizations can experience when managing their mobile devices.

0 Comments
Continue reading

Customer Login

News & Updates

When it comes to growth and advancement, small and medium-sized businesses (SMBs) in British Columbia have been effectively leveraging Coleman Technologies’ affordable enterprise-level IT practices and solutions since 1999. The proof: Coleman Technol...

Contact us

Learn more about what Coleman Technologies can do for your business.

Coleman Technologies Inc.
20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Operations Center
6600 Chase Oaks Blvd, Suite 100 Plano
TX 75023

 

2 year badge

Copyright Coleman Technologies. All Rights Reserved. Privacy Policy