Award-Winning IT Services Backed by 25 Years of Experience – (604) 513-9428

Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

How You Can Get Microsoft Office Certified

Why You Want An MOS (Or Any Other) Certification
The more your internal staff can handle, the less they have to lean on others for assistance.

Chances are, these “others” would be the members of your internal IT team (assuming that you have more than one person in the first place). Otherwise, they’ll likely spend a bunch of valuable time trying to Google the answer to their question.

Therefore, it only makes sense to have your staff be capable of as much as possible independently, without the need to turn to someone else or an Internet search. That way, everyone’s time is used more efficiently, maintaining productivity and allowing everyone to focus on what needs to be done.

When a solution is as commonly used as Microsoft Office is, this only becomes even more evident.

Certifications are effectively seals of approval from an authority. If someone was to be certified as a Microsoft Office Specialist, it more or less is just proof provided by Microsoft that this someone does indeed know their stuff when it comes to the Office software suite. Having certified people on staff means that a business is able to handle more advanced situations.

The Operational Benefits Of A Microsoft Office Specialist
Microsoft’s productivity software titles are among the most commonly used in the business world, to the point where many of their applications’ names are now synonymous with the documents they produce - how often have you heard someone call a presentation a “Powerpoint” instead of a “slideshow?”

As a result, chances are fairly high that your business is one that uses at least one of the applications included in the “Microsoft Office” suite.

Like we said before, a lot of time can easily be wasted trying to do something in an Office program, especially if the person is having difficulty remembering how to perform a task that they do not need very often, or have never encountered before.

However, if your team has a few Microsoft Office Specialists on it, they would be able to assist with a quick message, reducing the stress put on your IT staff and allowing them to continue their other duties without interruptions coming in (at least, interruptions from Microsoft Office requests).

How to Become Certified
To learn more about this certification, visit Microsoft’s official page describing it. The official test is exclusively administered by Certiport testing centers, who provide a useful test center locator to help you figure out where and when your next testing opportunity is.

To otherwise assist your staff with their technology issues, and take some more of the workload from your internal IT staff’s shoulders, Coleman Technologies is here to help. Reach out to us at (604) 513-9428 to discuss our solutions with one of our professionals.

Continue reading

VoIP and Other Business Phone Options

Selecting the Right Type of Phone
It might be tempting to discredit the importance of telephony for your organization, but you should resist this notion. Businesses still rely on the phone to communicate both internally and externally, and eliminating it can create a situation where your clients have one less way of getting in contact with you. Therefore, the importance of the telephone in the office cannot be understated, as your reputation with your patrons hangs in the balance. As you can imagine, there are several different kinds of phones out there, each with their own pros and cons. It’s up to your organization to determine which solution best suits your needs.

Landline
For a long time, the landline was the only kind of telephone solution for businesses. This utilizes the connections provided by a telephone company which consisted of private branch exchange (PBX) hardware in the office. This would give businesses the option to create extensions for employee and office, as well as opportunities for other services like call transferring and directories. Even though these are so familiar, many organizations are ditching landlines in favor of other solutions that are more flexible and efficient. It just so happens that the Internet and all its developments are much better at accommodating the needs of businesses, including new telephone solutions.

Virtual Phones
A virtual phone system can be considered a middle ground between the traditional form of telephony and a Voice over IP system. Incoming calls can be processed through a traditional telephony method, and they are then forwarded to the right employee through a VoIP system. This gives a business with both in-house employees and remote workers the opportunity to unify their communications. Additional features can also be added in for a more dynamic solution.

Voice over Internet Protocol
Voice over IP is a system that aims to cut out the need for traditional telephone solutions entirely. VoIP fully utilizes the Internet connection of your organization’s office to fulfill all of its telephony needs. The right solution can give your business all it needs to be functional on any device from a desktop to a mobile device. There are some different ways to use VoIP, so you’ll want to make sure you select the right method out of the gate to get the best return on your investment.

  • An in-house VoIP system will be an expensive up-front cost, as the equipment needed to host the system can be quite taxing on any normal budget. There will also be a monthly fee for the components needed to make calls, and any maintenance the solution requires must be administered by your in-house staff. The benefit to all of this is that you’ll have complete and total control over your business’ telephone system--something that no other solution can offer.
  • A cloud-hosted VoIP system means that everything is taken care of so your organization can instead focus on remaining productive with your time. This means that there is no need to buy hardware or maintain it on your end. In the event your phone system goes down, the provider is the one responsible--not you--meaning that you’ll be somewhat reliant on others, but the productivity spike can mean all the difference. In the event your Internet goes down, you’ll also be left without service, but again, this isn’t something that’s directly yours to influence.

It’s easy to see why VoIP is such a great solution, but is it right for you? Find out by giving us a call at (604) 513-9428.

Continue reading

SMB Human Resources and Payroll Find a Home in the Cloud

Human Resources may not be the meat and potatoes of any business, but it is exceedingly important. With all the mandates a business has to stay in compliance of, having people whose job it is to deal directly with the staff on behalf of the company makes a lot of sense. Since some SMBs don’t have a dedicated HR department, there are now platforms available that provide those services. But, let’s first start by outlining what kinds of tasks the average small business has to deal with, with a list.

The top six issues a HR department would have to deal with are:

  • Employee retention
  • Health and safety
  • Personnel
  • Payroll
  • Training and compliance
  • Employee management

Software developers have been creating dynamic human resources software, aiming to take the hassle out of a crucial part of your business. Some are pretty advanced, providing human resources directors useful automations that help them control many of the vast responsibilities placed on them. Some useful HR-related software you’ll see includes:

  • Human Resource Information System (HRIS)
  • Applicant Tracking System (ATS)
  • Onboarding
  • Benefits Administration
  • Time and Compensation Management
  • Training Management Performance, and Recognition Management
  • HR Analytics
  • Wellness Management

It seems overwhelming, but most of today’s most popular and utilized tools check most of the boxes as far as including a useful cache of tools that will allow them to manage any small or medium-sized human resources department competently.

While it once was popular to host all the applications a HR department would use on a single computer or on a very small network, today there are a few HR software vendors that provide a completely hosted solution. This means the software is hosted on secure servers that are managed by a provider, and accessible from anywhere there is an Internet connection.

Human Resources as a Service
Some small businesses have begun to completely outsource their human resources, with some success. HR as a service (HRaaS) basically eliminates the need to hire human resources staff, as the service provides resources that allow for a holistic approach to all the important tasks a human resources director would accomplish without the resounding costs associated with traditional human resources strategies.

Not only does a HRaaS platform eliminate a large section of the costs associated with human resources, it standardizes the approach to HR, eliminating the hiccups that often happen with the traditional method. A business will have their HRaaS platform customized for them and would be assigned a HR professional to help keep everything working properly.

Ultimately, it will be up to you to determine how to do human resources right. If your business is searching for a consultant to help you through hard business and technology decisions, reach out to the professional IT technicians at Coleman Technologies. Call (604) 513-9428 to get started building a more efficient business.

Continue reading

Tip of the Week: Useful Shortcuts for Google

Google Drive

  • X allows you to select or deselect items.
  • Shift + A allows you to select all visible items. You can use Shift + N to clear your selection of visible items.
  • Enter or O will let you open an item you have selected, while N will let you rename it.
  • Z lets you move an item to a selected folder, while S will star or unstar them.
  • You can use these shortcuts to create various items:
    • Folder - Shift + f
    • Document - Shift + t
    • Spreadsheet - Shift + s
    • Presentation - Shift + p

Google Docs

  • Ctrl + K: Insert or edit a link.
  • Alt + Enter: Open a link.
  • Alt + Shift + 5: Type with a strikethrough in your text.
  • Ctrl +: Format your text with a superscript.
  • Ctrl -: Format your text with a subscript.
  • Ctrl + Alt + F: Insert a footnote.

Google Sheets

  • Ctrl + Space: Select all contents in one column.
  • Shift + Space: Select all contents in one row.
  • Alt + Shift + 7 or Ctrl + Shift + 7: Apply a border to your selected cells.
  • Ctrl + \: Clear formatting of your selection.
  • Ctrl + Page Up or Ctrl + Page Down: Jump to either the previous sheet or the next sheet.
  • Ctrl + ~: See the list of formulas.

Google Slides

  • Ctrl + D: Duplicate a slide or object.
  • Page Up/Page Down, Up/Down: Move from slide to slide in the filmstrip.
  • Ctrl + Alt + Shift + F: Move over to the filmstrip.
  • Ctrl + Alt + Shift + C: Move back to the canvas.
  • Alt + Shift + Left/Right Arrow: Rotate objects by one degree.
  • Alt + Left/Right Arrow: Rotate objects by fifteen degrees.

By using these shortcuts, you should be able to get more out of your Google services. There are far too many shortcuts to include here, so for the complete list, you’ll need to be in Drive, Docs, Sheets, or Slides. Once you’re in, just use Ctrl + / to pull up the list of keyboard shortcuts for the Google app you’re using.

Do you have any tips and tricks to share? Let us know in the comments.

Continue reading

The Benefits of Data Backup Far Outweigh the Costs

Imagine, for a moment, just how much you have to lose from a data loss incident. Your business depends on its data, and if it suddenly loses access to it, you could be in a position where downtime significantly impacts your bottom line. In situations like this, you have no time to waste. You have to get back in the game as soon as possible or you risk losing so much traction that it could be hard to keep the doors open.

With this in mind, you can’t possibly achieve this goal without data backup. You have to think of it in terms of a potential loss incident--essentially it is professional risk management. While it’s true you don’t want to make decisions based solely on the what-ifs, it’s hard not to justify it in this case. What it boils down to is this: if you don’t have data backup and suffer from a disaster, your business will, more likely than not, fail. Therefore, the best way to ensure the possibility of success is to implement data backup and prevent a potential loss incident from surfacing in the first place.

Basically, the sheer fact that you know you need to back up your data is enough to justify having a solid backup solution.

The point that we are trying to make is that we shouldn’t have to convince you to go all-in on your business’ data backup and disaster recovery solution. It should be common sense. After all, you’re trying to preserve your business and its future against the possibility that a disaster scenario cuts its life short. You have no reason not to invest in something that could potentially save your business. It doesn’t matter whether it’s from a natural disaster, user error, or hardware failure--there is always the chance that an unforeseen event could spell the end of your organization.

The right data backup solution can go a long way toward keeping your business afloat, even in a worst-case scenario. To find out more about BDR, reach out to Coleman Technologies at (604) 513-9428.

Continue reading

What Cloud Applications Are You Using?

Applications
Applications, or “apps,” are pieces of software that can be used for specific purposes in the workplace--but you probably already knew that. If used properly, they can streamline specific processes within your organization. Some apps don’t use connectivity, but there are countless others that utilize it to connect all kinds of workers from the professional spectrum together. These kinds of connected apps are generally found in the cloud, and their wide range of use is one of the defining things about them.

The Cloud
You can think of the cloud like a big data center that gives you access to all sorts of software, processing, and storage options through your Internet connection. Computing resources tend to be made available to users through an “as a service” model, in which users secure access to it by paying a monthly fee rather than purchasing a license outright. Apps deployed through the cloud are slightly more expensive as a result, but the flexibility offered by being able to cancel at any time or add new users makes it a valuable opportunity to save money in the long run. Basically, it creates a situation where you transfer your capital costs of purchasing licenses to an operational cost.

Public, Private, Hybrid
There are several different ways that a cloud solution can be constructed. For example, most of the Software as a Service (SaaS) apps are offered as a public cloud solution, which means that the application and any processing or storage associated with it is on shared hardware. It’s made available through the browser or dedicated app, and for this purpose, its costs are generally lower than more private solutions.

In comparison, a private cloud that’s hosted in-house on a network or server unit is much more secure and customizable, as you’re controlling all of the maintenance and management of the system. For this specific reason, however, we recommend private cloud systems only for businesses that have the assets to take care of them; this includes those who outsource IT maintenance or those who have an in-house IT department who can provide the necessary management and oversight of the system.

For the best of both worlds, a hybrid approach can work. After all, some data is more sensitive than other data is, so anytime-anywhere access to it might not be in your business’ best interests. By combining the cost-effective public cloud model with the security of the private cloud, you can maintain adequate accessibility and data security.

Cloud Services
Just like there are many different types of clouds, there are many different cloud services, all for both businesses and individual users. There are generally three major categories that these cloud services are split into:

  • Software as a Service: Software delivery is the name of the game here, including communications (like telephone and email), productivity (Office 365), and even security.
  • Platform as a Service: Development is the main reason to go this route. This lets users create applications, collaborate on projects, and test new software without purchasing or paying for hardware.
  • Infrastructure as a Service: Virtualized environments that can be used for processing, storage, software, and so much more, are what a user gets from Infrastructure as a Service.

To learn more about how the cloud can help your business, reach out to Coleman Technologies at (604) 513-9428.

Continue reading

Tip of the Week: How to Replicate and Relocate Text Easily

Once you have your content selected, whether it’s text or an image, all you have to do is press two keys.

To cut a word or phrase from one place in your content, press Ctrl + X. To copy this content instead, keeping the original and duplicating it elsewhere, press Ctrl + C. Pasting your content is just as simple - with the place you want the content added selected, press Ctrl + V. This will insert your content where you want.

If you happen to be copy-pasting from a website to another document, it may not be a bad idea to paste it without bringing any formatting from the website over. Otherwise, it is apt to look funny on your documents. Pasting without formatting is almost as simple as regular pasting, you just add another keystroke in the middle: Ctrl + Shift + V.

Of course, any of the tasks can be accomplished with the mouse alone. Right clicking on a word, an image, or a group of selected text will bring up a menu that includes all of the above options. However, your cursor is generally more accurate than the mouse, so you may have to undo your efforts (Ctrl + Z) a few times before it’s right.

Real World Example:
Let’s say you want to send a webpage link to someone in an email or instant message. In your web browser, click the address bar (that’s the part with the ‘http://… “). That will highlight the URL. Hold down Ctrl and press C. Then go into your email or instant messenger, click where you want to paste the URL, and hold down Ctrl and press V.

Whichever you use, it’s bound to be more time-efficient than rewriting anything that needs to go in a different spot. Make sure you subscribe to our blog, so you can be alerted whenever we upload more content!

Continue reading

Fingers Crossed! The Robocalls May Soon Stop

Chances are, you’re all too familiar with exactly the kind of scam I’m describing. The one that makes the Do Not Call List sound like wishful thinking, that makes it look like someone from your area - or even your contacts list - is trying to reach you.

Chances are, you’ve answered one of these calls, only to hear silence, broken after you say “Hello?” As soon as you do, a (likely prerecorded) voice launches into its tirade, being a nuisance and bothering people.

Chances are, you may have even received angry phone calls from people you’ve never met, let alone called, claiming that your number has been the source of repeated calls just like these.

You aren’t alone.

Unfortunately, the scammers responsible are talented at skirting rules and regulations.
Calls like these have been harassing users for quite some time, simply because the scammers understand how to cheat and find loopholes. This is all despite the efforts of regulatory bodies like the FCC (the Federal Communications Commission).

In November of 2017, the FCC enabled telephone providers to block calls that were presumably fraudulent. This was based on many factors, like the calls coming from invalid numbers or numbers with no service provider attached.

However, the rules outlined in the 2017 Call Blocking Order weren’t enough to stop scam robocalls for long.

Now, we all have had to deal with the huge nuisance of neighbor spoofing. Neighbor spoofing has almost certainly affected you directly, and if you’ve been lucky enough to avoid it, it’s happened to someone you know.

But you may be asking, what is neighbor spoofing?
If your phone rang, and you have caller ID enabled, you’ve probably developed the habit of checking the number before you answer it - after all, a local number is probably safe to pick up.

Neighbor spoofing has made it so that assumption is no longer the case.

Instead of using a fake number to call their targets, scammers using neighbor spoofing will actually use someone’s real number to call someone relatively nearby - sometimes literally next door. If you’ve ever received an angry phone call from someone demanding an explanation for someone with your number repeatedly calling them and harassing them, your number just so happened to be the one that these cybercriminals spoofed.

There have even been reports of people receiving calls from their own number, claiming to be from the phone company as an attempt to “verify a hacked account.”

Neighbor spoofing is also a very effective method for scammers because it can bamboozle the automated protections already in place to stop scam calls, just like it fools the targeted phone’s user. This also keeps the Do Not Call list from affecting these scammers’ attempts (as if it ever stopped them before).

Additionally, many apps may add some unwanted complications, even if they are effective.
There are mobile applications available that are intended to stop robocalls from ringing your smartphone in the first place. One such application, the aptly-named RoboKiller, does this in two ways. First, RoboKiller references a list of numbers identified as spam, and blocks these calls completely. Second, it uses a patented analysis of the call’s audio fingerprint to compare it to those of other spam calls. Regardless of the number it appears to come from, RoboKiller can identify if it is a match to a known attempt.

You’ll only know that you were targeted after you read the notification that RoboKiller provides.

Meanwhile, RoboKiller responds to the scammer with a time-wasting prerecorded message. You can then review the calls that RoboKiller blocked by opening the app on your phone. There, you can listen to a recording of blocked calls to determine which calls were spam, and which were legitimate attempts to reach you. From there, you can whitelist a number by pressing the Allow button.

Users of RoboKiller can also add numbers to their list of permitted callers to allow them to come through. RoboKiller is a subscription-based application that charges $2.99 each month ($24.99 for an annual subscription), which may be seen as a relatively low cost if you’ve received enough of these calls.

As RoboKiller states on their website, “With RoboKiller, you don’t stop neighbor spoofing. You take action in the fight against the robocall epidemic.”

However, this approach isn’t without some worries.

For one, consider the cost of admission for this app. Yes, $2.99 may seem like a bargain if you have a smartphone, but what about all the people who still don’t? Furthermore, many mobile users today are of older generations, and may not understand how to work the application (or again, may not have a device that is compatible with the app). Yet, these worries may not be necessary for long.

Both the government and the telecom industry have had enough.
It wasn’t long after the 2017 Call Blocking Order was released that the attorneys general from a full 40 states came together to form the Robocall Technologies Working Group. This is a bipartisan commission intent on collaborating with service providers to learn about robocalling technology with the ultimate goal of stopping it.

On October 8th, the attorneys general of 35 of those states signed a letter to the FCC stating that the efforts of law enforcement had not and would not be sufficient to stop abusive scam attempts and robocalls. In this letter, the attorneys state some chilling facts:

  • 30.5 billion illegal robocalls were made in 2017 alone, up from the estimated 2016 total of 29.3 billion.
  • Estimates have placed the total calls made by the end of 2018 to be somewhere near 40 billion.
  • Phone scams allowed cybercriminals to steal an estimated $9.5 billion in 2017.
  • August of this year saw 1.8 billion scam attempts in the 4 billion illegal robocalls made that month.

Facts like these only highlight the pervasiveness of these scams, and how important it truly is to eliminate them as much as possible. In fact, the Federal Communications Commission has gone on the record to demand that mobile providers figure out a standardized system to help prevent these calls from reaching mobile users, echoing the demands made by the attorneys general.

This system would rely on call authentication to ensure that only legitimate calls would make it though, and that spoofed calls would be caught by requiring all calls be verified as coming from the correct source.

Not only did Commissioner Ajit Pai release a statement to the press demanding that this system be created, he sent a letter to 14 telecom CEOs, including AT&T’s John Donovan, Charter’s Tom Rutledge, Verizon’s Hans Vesterburg, T-Mobile’s John Legere, Comcast’s Brian Roberts, and Google’s Sundar Pichai.

Pai demanded that these changes be ready to deploy in one year, giving telecoms a ticking clock to establish what they call the SHAKEN/STIR framework (Secure Handling of Asserted information using toKENs/Secure Telephone Identity Revisited). This move was met with the approval of the attorneys general, who went on to encourage the FCC “to implement additional reforms, as necessary, to respond to technological advances that make illegal robocalls and illegal spoofing such a difficult problem to solve.”

As the attorneys general said: “Only by working together, and utilizing every tool at our disposal, can we hope to eradicate this noxious intrusion on consumers’ lives.” Fortunately, this will also benefit the businesses that have been affected.

With any luck, we’ll only have to deal with the robocalling nuisance a little while longer. For assistance in keeping other scams from interrupting your business and putting it at risk, reach out to Coleman Technologies. We have the experience to stop the other threats you would otherwise deal with on a daily basis. Call (604) 513-9428 today.

Continue reading

You May Be Surprised What You Are Missing Without a Help Desk

Of course, not all businesses have the luxury of hiring in-house technicians to function as a help desk. In cases like these, outsourced solutions are viable alternatives, if they aren’t outright better overall. Here are some of the best reasons why your organization should implement an outsourced help desk solution.

Help Desk Support Minimizes Downtime
You may have heard the excuse, “I would have done the work, but I didn’t know how,” or “My computer wasn’t working properly.” If you don’t have anyone available to help your staff with their issues, chances are they are being ignored and piling up, resulting in a situation where your staff simply can’t do their jobs--not because they don’t want to, but because they literally can’t. If you have someone your staff can reach out to for assistance with the technical side of their job, they’ll be more likely to get assistance and improve their productivity. Most importantly, you’re keeping downtime to a minimum, as it is a huge blow to your bottom line if left unchecked.

Help Desk Support Provides a Single Point of Contact
Even more confusing for some employees is who to actually contact in the event they need help with their technology. Sometimes the organization will have several numbers compiled in a location for all to see, but this isn’t helpful, as the employee might wind up having to reach out to several vendors just to resolve a basic issue. By using a help desk solution, there is only a single phone extension or email address to inform, making this kind of assistance much more accessible.

Help Desk Support Can Augment In-House Assistance
Let’s say that your internal IT department is responsible for helping your employees out with their technology troubles. This is fine and all, but chances are that they don’t have enough time to implement new solutions, keep your hardware and software updated, monitor your network for inconsistencies, and manage all of your organization’s devices, let alone take a call from Susan down the hall because she can’t access her email. You can help your business’ IT department out by taking this one responsibility off their shoulders and handing it to an outsourced, remote help desk.

If your business finds itself falling short in terms of help desk support, look no further. Coleman Technologies can help your business get the support it needs to maintain operational efficiency. To learn more, reach out to us at (604) 513-9428.

Continue reading

Cybersecurity In 2018, What You Need to Know

The Internet of Things Shapes Security Policies
Connected devices are now commonplace in both the personal lives of users and offices all over the world. The Internet of Things typically consists of devices that can connect to the Internet, but aren’t traditionally connected devices, like home appliances and other objects. To protect themselves from the security issues related to these devices, businesses have implemented solutions and tried to control devices brought to the office by their employees. Basically, you need to determine if the measures you are taking are adequate to ensure IoT devices aren’t going to become a problem for your organization. If you take action now, you decrease the risk of these devices compromising your security.

Ransomware Decreases in Usage, But It’s Still Dangerous
As of last December, Malwarebytes indicates that the rate of direct ransomware infection has dropped to about 10%. This is a major change compared to the ransomware spike that occurred in 2017. Of course, it’s still important to ensure that you are protecting yourself from this dangerous malware, as well as have plans in place to recover from an encounter with ransomware.

Cryptomining is More Popular than Ever
One big development in 2018 is an increase in cryptomining threats that can install themselves on devices and covertly mine Bitcoin without the user’s knowledge. These kinds of threats can have side-effects on your computers that can slow down the device or create more work for the device than usual. You definitely don’t want cryptomining software on your device, so be sure to protect it from these threats as well with a comprehensive security solution and active resource monitoring.

Proactive Security is Still the Best Option
Thankfully, more organizations are seeing the benefit of actively preventing security threats from becoming an issue by implementing proactive solutions on their infrastructure. This includes patching vulnerabilities and updating software as soon as new fixes are issued, as well as seeking out threats on a regular basis to eliminate anything that has potentially installed on their devices. This basically takes a reactive approach that some businesses still rely on--resolving issues as they pop up rather than preventing them entirely--and converts it to a proactive stance.

IDG has released a new survey that reveals the security priorities of many businesses. These respondents found that the following aspects of network security were priorities:

  • 74%: Best practices
  • 69%: Compliance mandates
  • 36%: Responding to a security incident that occurred in their own organization
  • 33%: Mandates from the board of directors
  • 29%: Responding to a security incident that occurred in another organization

Cybersecurity is more important than ever before, so how is your organization working to keep itself safe? Coleman Technologies can help. To learn more, reach out to us at (604) 513-9428.

Continue reading

Tip of the Week: Three Pro Business Tips

Be Prepared to Lose Power
Electricity is perhaps the most important part of using technology in the workplace, as without it, the devices that empower your business’ operations just won’t function. In some cases, you might suddenly lose power, leading to data loss and other disaster scenarios that could strike your business down if you’re not prepared for them. With progress grinding to a halt, downtime will ensue, creating a considerable loss for your business.

Even if you’re not losing power, an excessive amount of it can create a surge, damaging the infrastructure itself and harming the individual components that make it up. It’s ultimately in your best interest to take measures against these events, as you made an investment that needs a substantial return. Surge protectors can be helpful to prevent excessive power from crippling these important machines, but in some cases, you’ll want a more powerful solution. An uninterruptible power supply, or UPS device, can help your servers, workstations, and other important technology shut down properly in the event of a power outage or surge, giving you the ability to minimize damage done.

Maintain a Steady Internet Connection
The Internet is an invaluable tool that can help your business succeed, and the Internet plays a larger role in its functionality than it ever has before. A lack of Internet ultimately becomes downtime for many organizations, as they depend on the Internet for various services and communications. More often than not, there’s nothing you can do about a lack of Internet if it comes from your service provider. To keep this kind of downtime from sinking operations, many businesses have implemented backup Internet connections, just in case they ever have to use it. This comes with a downside--you’ll have to maintain that connection--but it will likely be worth the investment if you ever need it.

Place Boundaries on Your Staff
Even the best employees are known to make mistakes from time-to-time. While you can trust them for the most part, nobody is perfect, nor should you expect them to be. Some might even try to implement their own solutions with the intention of making their jobs easier and more efficient. This is called shadow IT, and it can be dangerous. You have no way of knowing whether it’s putting your business at risk. You can implement measures to ensure that your employees aren’t downloading unauthorized applications through the use of administrator and user privileges. If you limit what your users can do with their machines, then you have less to worry about.

Coleman Technologies can help your business ensure managing IT doesn’t become a hassle. To learn more, reach out to us at (604) 513-9428.

Continue reading

Searching Bing for Google Chrome Takes Users to a Place They Don’t Expect

What’s the Problem?
What’s the first thing that anyone who prefers Google Chrome does when they open Microsoft Edge? Simple--they download Google Chrome. Since Chrome isn’t available by default on Windows 10 devices, users have to download it, which means that they are reliant on Bing’s search results to find Google Chrome. The problem with this is that some malware sites have disguised themselves as sponsored ads for Google Chrome in Bing’s search results.

These sponsored ads would appear when a user searches for Google Chrome in the Bing search engine. Basically, instead of a legitimate sponsored ad leading to the Google Chrome download page, the malicious ad would instead bring the user to a phishing site disguised to look like the Google Chrome download page. This page would have a URL of ‘googleonline2018.com.’ If you try to access this page through Google Chrome, it’s actually blocked, but Bing and Edge don’t do this, making it a huge security issue.

These Issues Aren’t the First
Making the situation even worse is that this isn’t the first time Bing has encountered issues like this. Even as far back as April of this year, this same threat was reportedly identical to the recent version. The ad has been pulled as of this writing, but it’s strange that no explanation has been issued regarding this threat by Google, or even a confirmation that the issue has been resolved. All of these factors combine to create a situation where it’s not that unbelievable a situation like this could happen again.

Other Bing Problems
There are other problems related to Bing that have caused issues in the past, including a history of providing offensive or alarming content through its image search. For example, if you were to search for objectively neutral terms, there is a chance that, even with SafeSearch on, the image search will deliver racist search suggestions or other similarly-offensive content. Bing has also been known to push conspiracy theories through its suggested searches. Searching for the wrong thing could potentially expose users to material that they didn’t want to view in the first place, or content that could land viewers in hot water with the law.

To remain updated on similar situations to those explained above, as well as the latest security breaches and threats, subscribe to Coleman Technologies’s blog.

Continue reading

Exciting Blockchain-Fueled Applications Are Coming

What is Blockchain Technology?
In essence, a blockchain is a distributed ledger that builds a collection of records that is continually growing, all protected with encryption. By design, blockchains are meant to be resilient to edits and changes, making them quite reliable in terms of ensuring the integrity of these records. Each block (or node) of data has security measures to keep it from being changed, as well as timestamps for each record and information about the transaction. If a record needs to be altered, all subsequent records must also be altered, which requires the permission of the network majority.

How Is It Used?
Originally, blockchain was developed for cryptocurrency purposes, but the fact that it’s encrypted and resilient to changes makes blockchain ideal for other purposes. Public blockchains are used for cryptocurrency like Bitcoin to provide a distributed ledger, but it’s thought that private blockchain systems might be helpful for business purposes.

How Will It Be Used in the Future?
One of the most noteworthy ways that blockchain could be implemented in the future is the sharing of health records between various provider offices. Since it’s a distributed network, all doctors on someone’s medical plan would have access to the same unaltered data so they could provide the best service possible. Other opportunities for blockchain technology include a transparent ledger for public viewing, which has a wide range of uses for tracking payments for services rendered and other information.

Coleman Technologies can help your business check up on the latest technology solutions on the market, including ones that will help you improve operations or efficiency. To learn more, reach out to us at (604) 513-9428.

Continue reading

8 Data Backup Terms You Should Know

The Types of Backup
Here are four of the most common types of backup that you can expect to see in an office environment:

  • Full backup: This type of backup makes a copy of all selected files in their entirety. Most backup solutions will have to initially go through this process, and since this is such an intensive process, it will take longer than other data backup types. If this is your preferred method of backup, it will likely have to be done after-hours, as it takes a long time and could tie up processes that are needed during the workday.
  • Differential backup: This type of backup only backs up changes made to the data. This allows for faster backups, but the process of recovery is much slower.
  • Incremental backup: This type of backup is much like a differential backup, with the main difference being that an incremental backup will always back up the data regardless of if a full backup was completed or not.
  • Mirror backup: A mirror backup makes a real-time duplicate of the source and backs it up. This creates complete redundancy, but it also comes with various issues. For example, if the material is deleted by mistake, the mirror will also be deleted. This reason alone dissuades IT technicians from using mirror backups as a viable solution for their backup needs.

Now that the types of data backup have been explained, we’ll go over some of the backup-related terms you might want to know.

  • Business continuity: A business continuity plan is designed to help your business get back in proper functioning order if you’re ever hit by an unfortunate situation. All organizations need to have a business continuity plan in place.
  • Disaster recovery: Disaster recovery is specifically there in the event your business suffers from a disaster involving data loss. This includes cyberattacks, sabotage, user error, and even weather-based disasters that destroy infrastructure.
  • Recovery Point Objective (RPO): RPO is a benchmark that represents which data will be recovered by your business if it wants to get back to normal business operations following a disaster.
  • Recovery Time Objective (RTO): RTO is a benchmark that represents the time needed for your business’ data to be restored. Minimizing this number is critical to keep downtime as low as possible.

Coleman Technologies can help your business by equipping it with a comprehensive data backup and disaster recovery system. To learn more, reach out to us at (604) 513-9428.

Continue reading

Tip of the Week: Using Templates in Evernote

What Are Templates?
Evernote’s templates are handy, pre-built structures for notes that provide users with a simpler means of organizing specific types of information. Instead of taking time struggling with your formatting each time you start a new note, you can apply one of the templates that Evernote offers on their website. Those with a subscription to Evernote Plus, Premium, or Business can even use formatting they’ve created in past notes to generate their own templates for repeated use.

Applying Templates in Evernote
Once you’ve acquired a few templates, either from the Evernote website’s collection or from a past note, applying one of your choosing is relatively simple.

  • In Evernote, start a new note.
  • In the body of the note, click Templates to view the ones you have saved.
  • From there, you can search for any templates you have, delete ones you no longer want or need, edit their names, and of course, apply them to notes.
  • If you want to edit a template, follow the same process, and once you’ve made the changes that you want, save it as a new template. Note: only those with Plus, Premium, or Business accounts are able to do this.
  • Plus, Premium, and Business users are also able to create their own templates this way.

So, what do you think? Is this a welcome change to Evernote? What other improvements would you like to see them make down the line? Let us know in the comments!

Continue reading

What Do You Know About the Microchips That Power Your Technology?

Generally speaking, microchips in computers are made out of a variety of materials, but the most common is silicon. These microchips are responsible for acting as semiconductors and give your devices the ability to perform various tasks. We’ll get into the details about a couple of them here.

Memory
One of the more notable uses of microchips in devices includes temporarily storing data. These kinds of chips have a familiar name that you’ve probably heard before--Random Access Memory, or RAM. As long as the chip is receiving power, it can store data on the device. Once the device is turned off and the chips are no longer receiving power, this temporary data is wiped. Depending on what the device is used for, the computer might have many RAM chips installed on it; otherwise, the device will be slowed down considerably by resource-intensive tasks.

Microprocessors
Microprocessors have a lot to do with your device’s CPU, or central processing unit. You’ll often hear the comparison of a CPU to the brain of the human body. The CPU is responsible for processing all of the programmable commands on the device. Microprocessors generally rely on logic to function as intended. Of course, depending on the kind of device, various strength microprocessors will need to be used, as the same kind of microprocessor won’t work for every single kind of device out there.

Other Kinds of Chips
Depending on the device used, you might find various device-specific chips in use. For example, some devices that have cameras might have chips specifically designed for use with video recording or picture taking. Others that have networking abilities might have chips designed for use with those. Basically, chips are responsible for both the everyday functionality of your devices, as well as some of the specific, more advanced features that not everyone will be using.

For more information about technology or devices, stay subscribed to our blog.

Continue reading

Make Data Retention Your First New Year's Resolution

What Makes a Good Backup Strategy?
It’s easy to underestimate just how valuable data is for a business, especially in today’s modern office environment. Protecting your data by any means necessary is critical to your continued success. The best way to do this is by using a comprehensive data backup solution that also has a disaster recovery component. While it might be tempting to back up all data on your network, it’s worth remembering that some data isn’t as valuable as other data. You’ll have to decide which data is worth more and design a strategy around making sure this is always available.

Resolutions for 2019
You should always strive for excellence in everything your business does, and data backup is one way your organization can improve itself for 2019. If you’re not sure how you can improve data backup and disaster recovery for your business, try following some of these guidelines:

  • Implement a backup platform that lets you back up the data necessary to the operations of your business, minimizing downtime to keep costs low.
  • Work with your IT administrator to plan your data backup solution based around specific factors like your recovery point objective and recovery time objective.
  • Test your backups regularly to ensure that they work as intended. This means that any time you have to actually deploy a backup, you can know with certainty that they will work.

If you don’t have an IT administrator available who can help you with the process of implementing a data backup and disaster recovery solution, reach out to Coleman Technologies. Our professionals have seen their fair share of nasty situations that have led to the demise of unprepared business, like natural disasters, hacking attacks, and even user error; we don’t want it to happen to you as well.

We can help your business minimize downtime and expedite the restoration process with a data backup and disaster recovery solution from Coleman Technologies. To learn more, reach out to us at (604) 513-9428.

Continue reading

Should Innovation Ever Take a Backseat to Proven Procedure?

Innovation
Before we tell you how innovation may hurt your business, we’ll talk a little bit about how it is absolutely essential. Business is, for most companies, a very human endeavor. Humans that do the same thing day-in and day-out, don’t take all that long to get proficient at it. This proficiency, if not tested can soon turn into complacency, but if it is tested too much, it can turn into productivity-sapping frustration. Innovation is the process of renewal. Taking something that has worked, and making it work even better.

A constant need for renewal fuels the technology industry. Take, for example, a legacy computing system. A business can still utilize it because it knows what to expect. It’s been using the applications and the software for quite a while. Since it creates no new problems, and the management of it is routine, it works for your business, until it begins to cause other problems.

How could it be then, that this kind of unquestionable efficiency is actually hurting your business?

Well, the answer is pretty standard. With solutions available that take less capital to maintain, are available on newer technologies, and enhance your workers’ ability to be collaborative/productive, the expectation would be that embracing new technology systems will actually cost the business less than maintaining and supporting a legacy system. The legacy system will eventually be untenable because it will be so expensive to maintain, or, it will lose effectiveness. Either reason suggests innovation is an inevitability.

Innovation Betrayal
We’ve already established how serious business owners (and other decisions makers) need to be innovative in their procurement and deployment of business-class solutions to get more out of their business investments. What happens when the innovations they choose do the opposite? What if everything they’ve been told by industry leaders, by mentors, and by their vendors turned out to be completely ineffective?

What if by innovating some of their IT, waste and inefficiency spiked? What if the end result of a dedication to accepting new hardware and other solutions is that capital, that could be spent elsewhere (or, to maintain systems that worked properly for some time), is completely wasted? How can you justify taking capital from a functioning system and leaving your staff with a shiny, new system that doesn’t deliver the same effective computing platform (or operational effectiveness) that their old system did?

We all know that supporting a legacy computing platform is not just costly, it is risky. With the thousands of threats out there just looking to feast on unprotected, network-attached systems, upgrading to more secure systems that don’t need as much diligent oversight should likely be a priority of every business.

How do you make these two concepts play nice? One way is to virtualize. In the past, legacy applications were a major problem for IT administrators, but nowadays, there are solutions that make legacy application virtualization not only possible, but efficient. That way, you’ll be able to maintain the use of your legacy applications, but host them on a public or private cloud platform. This presents any organization with several benefits that include:

  • Better for continuity
  • Cost reduction
  • Improved security
  • Easier software licensing
  • Boosts in accessibility

It may seem ironic that, by using some of today’s most dynamic technologies, you won’t have to move off of your old software systems, but that is the case. To virtualize your data, your applications, and any other part of your business’ computing systems the IT professionals at Coleman Technologies can help. Our technicians can provide you with the information and resources you need to successfully move your locally-hosted applications to the cloud, whether you choose to host that locally or not.

Customer Relationships
Another way that businesses have improved the way they do business through innovation is by overhauling the way that they handle their customer relationships. If your business has found success by pressing the flesh and getting out and having face-to-face relationships with customers and prospects, you shouldn’t change that now. However, today there are solutions that can make those face-to-face relationships more valuable.

By integrating technology solutions designed to help you better manage your customer relationships, you can subsidize those face-to-face relationships with automated correspondence and other services designed to promote enhancement to your organization’s sales and support. One solution is called Customer Relationship Management (CRM).

A CRM integrates all facets of your business together with one piece of software, not only improving customer relations, but also streamlining processes for sales, productivity, and support. By having all the information your team needs in one simple-to-use solution, they can produce more, provide better support, and collaborate better than ever before.

Another technology that is working to improve customer relationships is social media. There are dozens of different social media sites for a business to consider, but depending on the industry your business services, you may be able to get away with minimizing your social media presence and still have it work to enhance your relationships with customers and prospects. The major social networks like Facebook and Twitter can be of great benefit for businesses to promote their brand and interact with customers.

At Coleman Technologies, we help businesses just like yours do more with the use of technology. Our managed IT services work to proactively manage your business’ IT to ensure that you are experiencing the technology in the way it is designed to be experienced; and, that your company gets the most out of it. For more information about how Coleman Technologies can help you improve your business, call us today at (604) 513-9428.

Continue reading

How to Get the Best Wireless Connections in Your Office

What Do You Expect from Your Wi-Fi?
Many businesses have a tendency to either deal with their Wi-Fi as-is or will haphazardly add new networking components to their infrastructure as needed. Neither of these approaches is ideal, especially in light of the fact that you’ll need your Internet connections to be reliable as you grow your network.

A much better alternative is to design your Wi-Fi network keeping a few additional factors in mind, including your office’s particular setup and any future growth plans you may have. This way, you will not only create a network that works for your current needs but is also flexible enough to shift and adapt as your business does. Whether you’re first designing your office’s floor plan or taking another look at its setup, the key is to go about it from a strategy-first perspective.

The Process
Your first order of business is to determine where the demand for a signal will be the greatest. After all, if you have a group of employees reliant on their wireless connectivity huddled together in one area of the office, you aren’t going to want to place your equipment in a way that creates a dead zone there. This will help you to identify obstacles and inform you of where you may want to consider placing additional routers to make up for their effects.

Once your Wi-Fi has been set up and your employees are settled, you should still be collecting performance data and listening to the input that employees have about their connections. Remember, wireless is still an evolving technology, so as it develops it is likely that you will need to adjust your strategy to accommodate it.

Long story short, you’ll probably need to make this an ongoing process to ensure that your Internet is as usable as possible for everyone in the office.

The professionals at Coleman Technologies are also here to assist you with any of your technology needs. If you need help with your business’ IT solutions, give us a call at (604) 513-9428.

Continue reading

The Fundamental IT Defense Plan

 

A Brief History in IT Security (And Why it Matters to SMBs)

Over the past two decades, IT technology has altered the business topography making it easier to produce, collect, and collaborate on data. However, the use of modern-day, internet-connected equipment for any purpose opens your business up to threats. Whether you simply use email for business correspondence, or your point-of-sales solution integrates with your website’s ecommerce system, protecting your data and infrastructure from online threats isn’t something you want to skip.

Without going too deep into the nerdy details of cybersecurity, let’s take a brief look at where the world is at so far:

  • In 1988, computer scientist and entrepreneur Robert Tappan Morris developed the first computer worm that self-replicated across the Internet. This worm single-handedly caused an Internet blackout.
  • In the 1990s, computer viruses were quickly becoming widespread and were getting a lot of media coverage. You might remember the ILOVEYOU and Melissa viruses that infected tens of millions of PCs. None of these viruses really had any clear objective other than causing disruption.
  • These viruses led to the development of Internet security companies and antivirus solutions. It also started to build awareness for online security threats, which only led to trickier types of malware and threats.
  • Email was (and still is) one of the prominent ways viruses were spread, so businesses that relied on email were just as susceptible to online threats, however businesses started to have more at stake. If emails were compromised, the integrity of the business, or at the very least, the level of security of the business, would be questioned by clients and prospects.
  • During the 2000s, internet threats started to become more organized and strategic. No longer were viruses just an annoying nuisance that spread haphazardly. Instead, many major threats were identified that had serious financial objectives.
  • Starting in 2005, Criminal organizations were targeting retail outlets, syphoning credit card information. One of the first and largest was when 45.77 million credit cards were stolen from TJ Maxx, costing the company $256 million to repair damages.
  • Finally, businesses were starting to take cybersecurity more seriously, because there were clear and heavy consequences for falling victim to an attack.
  • Today, it hasn’t gotten any better. Over the past few years, huge brands like Sony, Target, Apple, Premera Blue Cross, Anthem, Chick-fil-A, Kmart, Dairy Queen, and even the US Postal Service have been targets of very successful, very aggressive, and very expensive hacks.
  • With the massive popularity of mobile devices, smartphones and tablets are now being targeted more than ever. It’s estimated that 11% of all smartphone users get hacked each year, and that number is expected to rise.
  • Don’t forget data theft. Laptops, tablets, and smartphones are extremely susceptible to this. Beyond the physical device being stolen, hackers can easily intercept data being sent from a mobile device over insecure Wi-Fi hotspots like those found in coffee shops, trade shows, and hotels.

Of course, these are all the big names we’ve heard in the media. Smaller companies don’t get the same publicity (thank goodness), but smaller companies are actually at a higher risk because they tend to have little to no defense. While a criminal organization might like to steal the data of 56 million customers from Home Depot, several hundred records from a small business can be done in a fraction of the time.

The points to take away from this are that cybercriminals are becoming smarter and more organized, and that it doesn’t matter how big or small your business is.

Protecting Your Business

To protect your business today, it takes several different approaches. There’s no single answer or software to purchase that will protect you from each type of risk. However, that doesn’t necessarily mean that throwing money and solutions is going to protect your assets.

Beyond the security measures in place, a sense of awareness needs to come into play. You and your staff need to keep security top-of-mind, and rely on an IT security consultant when questions arise.

Let’s start with the basics - the solutions on your network that should handle the heavy-lifting of your IT defense plan.

Backup and Business Continuity Planning

While data backup isn’t really a preventative security measure, it is a major player when it comes to your security plan, as well as a fundamental piece of your business continuity plan. A managed, properly monitored backup solution is basically the last line of defense. If all else fails, at least you can restore your data. It should be hoped that you never need to come down to this, because if you are compromised, much of the damage is already done, but if you are compromised and your data is gone, there’s little chance of survival.

Your backup solution should store data securely offsite, and backups should be ran regularly, several times per day. Other features to look for in a good backup solution would be fast restore times (image-based backups instead of file backups), versioning, and virtualization capabilities.

Managed Antivirus

A staple of traditional IT security, having antivirus properly installed and managed across your entire network will prevent the millions of different viruses and basic threats that cause computer downtime and other issues. Antivirus isn’t going to prevent more targeted attacks, but all businesses should have it in place.

Although there are plenty of great free antivirus solutions for home users, your business will want a solution that is centrally deployed and managed to ensure virus definitions and other updates are always in place, and that scans are ran regularly.

Firewall

Equipping a centrally controlled firewall will block incoming attacks. Not to be confused with the software-based firewalls that piggy-back on many antivirus suites, a business-class firewall typically sits on your network between your other devices and the wild Internet.

Spam Protection

As mentioned before, email is one of the main ways threats get into your business. Although most email clients have decent spam filtering, junk email is still getting into your organization. Utilizing a separate spam filter solution blocks these threats from getting delivered.

Secure WPA2 Wi-Fi

Unsecure Wi-Fi can give a user full access to your network and your data. Although this only opens you up to localized threats (the user has to be within range of your company Wi-Fi), ensuring that your routers are locked down and secure is a best practice. Many modern routers have this functionality built-in, it just needs to be properly configured.

Secure VPN Access

Data theft is a huge problem when traveling. Wireless hotspots, like those found at airports, coffee shops, and hotels can be very insecure. Hackers can easily intercept your data without your knowledge. A VPN (Virtual Private Network) solution lets you access your company files and applications securely without transmitting sensitive data. This also means that sensitive data doesn’t need to be stored on the device.

Mobile Device/BYOD Policies

With the widespread usage of devices like smartphones and tablets, employees are becoming much more likely to use these devices for work. This can improve communication, collaboration, and productivity, however there are downsides certain precautions aren’t put into play. Your organization needs to develop a BYOD (Bring Your Own Device) policy with specific rules corresponding to the storage and transferring of company data on personal mobile devices. These policies need to be read and understood by all employees, and enforced by the organization.

While you don’t want to be so strict that you prevent engaged users from utilizing their own smartphones or tablets for work, you need to enforce the protection of your data (and your clients’ data). Setting up the ability to remotely wipe a lost or stolen device, or revoke the access to company email if the employee quits is a good start, while establishing document management solutions like cloud hosting or a VPN provides even more incentive to follow best practices.

Industry-specific Compliances

Depending on your business, there may be other regulations and compliances that you need to meet. It’s best to cover these on a case-by-case basis, as each regulation will have very specific requirements. We highly recommend you reach out to the IT security experts at Coleman Technologies for an evaluation.

Ongoing Management, Updates, and Testing

What good is a smoke detector if the batteries are dead? The same goes for IT security that isn’t properly managed, kept updated, and regularly tested.

Don’t wait for a security breach or data loss to start thinking about IT security. To get started, and to find out what it would take to establish the solutions found in our fundamental IT defense plan, give us a call at (604) 513-9428.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you didn’t know Windows can save a list of the text and images you copy, I feel for you—you’ve missed out on a simple trick that could’ve saved you a lot of time. But don’t worry, it’s easy to set up, and I’ll show you how.

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image