Award-Winning IT Services Backed by 25 Years of Experience – (604) 513-9428

Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Are You Practicing Good Password Hygiene?

How Hygienic are Your Passwords?

With so many of us relying on so many passwords every day, poor password hygiene can often seem to be a foregone conclusion. Think about your own passwords, right now, and see how they compare to this list of inherently insecure patterns that many people develop:

Continue reading

Tip of the Week: Bookmarking Your Google Documents

If you use the selection of tools that Google offers as a part of its G Suite offering, you’ve probably found a few documents that you find yourself repeatedly returning to on a regular basis. Rather than navigating to them via the appropriate folder hierarchy in Google Drive, there is a simple shortcut that you can take advantage of in Google Chrome: creating a bookmark that navigates directly to the appropriate page.

Continue reading

Understanding the Benefits of a CRM Solution

What is a CRM?

Short for Customer Relationship Management, your CRM is the tool that helps you track the relationships you have with the people you offer your services to, assisting you in developing these contacts into faithful clientele. As a bonus, these solutions generally come with integrations that give you access to even greater capabilities and resources.

Continue reading

Protect Your Personal Information when Using FinTech

Data theft is a big deal, but there are ways that you can protect yourself and your money when utilizing this technology.  Some are more involved than others, so let’s dive right in.

Continue reading

How to Create a Useful Employee Handbook

Tip One: Cover Everything that Your Business Requires

As you’re putting together your handbook, you need to figure out precisely what you want every member of your team to know. This will give your team the advantage of knowing what is expected of them, along with the other information that they will need to know, like:

Continue reading

There Really Are Some Benefits of Going Back to the Office

Back to the Office

With many places taking part in a phased opening, one of the big questions is what kind of workforce will return to the office when the stay-at-home pandemic is all over. For the business whose workforce has been ultra-productive during the pandemic, there probably won’t be as big of a rush to get back to the office, but for businesses that have taken a significant productivity hit, that time can’t come fast enough. It might be a surprise to some business owners that there are some people who don’t like working from home and are ready to get back into the office, but the lion’s share of workers are going to want to have some additional flexibility after working from home for months. Either way, there are some very real benefits to working in the confines of an office. 

Continue reading

Are These Technologies Protecting Your Operational Security?

Let’s review some recommended technologies for you to embrace as you reopen your business.

Updated Hardware and Software Solutions

First things first—while businesses resume their operations, the chaos that will predictably ensue is the perfect time for cybercriminals to take their shot. Therefore, you need to make it a priority that all your hardware and software solutions are fully updated or upgraded as improvements are made available. In doing so, you make sure that the tools your team will use are as secure as they can be against the latest threats.

Continue reading

Backup Data to Protect Your Business

Data loss can happen a few different ways. Malware can cause irreversible data loss, and ransomware can cause reversible data loss, provided you pony up the ransom to hackers. Your end-users can mistakenly cause data loss by overwriting or deleting data, but a disgruntled employee could do even more damage intentionally. Your data is stored on delicate, mechanical devices that are extremely sensitive to shock and damage. Hard drives don’t last forever and will eventually fail, so if your data is only stored in one place, it’s just a matter of time.

Continue reading

Have You Kept Up with Your Security Audits? You Need To, Especially Now!

What Does a Security Audit Entail?

A security audit is intended to determine how effectively your business’ security is doing its job. Covering hardware specifications, your infrastructure as a whole, your network policies, the software you’re using, even how your employees behave, a good security audit will give you a complete picture of the protections and safeguards you have in place.

Continue reading

Get Control Over Your Businesses IT with Managed Services

To keep your IT working for you, you need control over it.  You need to know when a piece of hardware was purchased, who set it up, and when it was last maintenanced. You need a strategy to protect the hardware and the data. You need these because you have made huge investments into this technology, why wouldn’t you spend money to protect it? Moreover, isn’t it easier to get the answers you’re looking for when there are extensive records kept?

Continue reading

Tip of the Week: How to Effectively Communicate with Your Clientbase

1.  Use the Best Tool for the Job

Your contacts should never find it difficult to reach you, so you need to make sure you’re providing them with plenty of options for them to make contact. Don’t pick between a phone number or an email address, give them both, along with a live chat feature, conferencing options, and other forms of communication. Making use of things like a blog and social media give you a great way to reach out to them first, starting the conversation.

Continue reading

Owning Technology is Like Owning a Pet

You Need to Take Care of It

When adopting a dog, you need to be prepared to invest a lot of time and money into your new family member. You’ll need to get her up to date on shots, get her a license, and invest in plenty of toys so she doesn’t chew on your furniture.

Any piece of technology you invest in works the same way. You need to ensure that you are willing to spend money for the infrastructure, the software licenses, the time it takes to run updates, and more. Here are some examples:

Continue reading

PCI Compliance 101

Introducing PCI DSS

With so many people using credit, debit, and prepaid gift cards to pay for goods and services, the economic ramifications of digital payment fraud, data loss, and other side effects of continued reliance on these methods of payment have led the companies that issue these cards to band together to create what is now known as the PCI Security Standards Council. Since its inception in 2006 the PCI Security Standards Council has been overseeing the establishment and coordination of the PCI DSS, or Payment Card Industry Digital Security Standard. Let’s take a look at how PCI compliance works.

Continue reading

Storing Data Is More Complex than You Know

How Do Hard Drives Store Data?

A traditional mechanical hard drive, also known as an HDD, holds your data on small magnetic platters. These platters are layered on top of each other, with a small mechanical arm that rests above them. Think about a record player, with the arm and needle over the record, except you have many, many records stacked on top of each other.

Continue reading

Tip of the Week: Four Tools to Improve Business Productivity

Instant Messaging

Instant messaging is a handy utility for any team to have at their disposal for the brief messages that coworkers must send to one another throughout the day. Not only is it more efficient than checking and responding to endless emails throughout the day, it allows the message’s recipient to stay more focused on their task. After all, instant messaging and texting has hardwired us to switch more efficiently between tasks when we deal with these kinds of quick messages.

Continue reading

Social Media is Being Scrutinized

To start, let’s go back a few years. In the aftermath of the 2016 Presidential election, another major social media company, Facebook, was under fire for allowing foreign companies to influence the outcome of the election through insite advertising. Google and Twitter were also caught up in the mess, but the scrutiny Facebook saw during the ordeal, well...really hasn’t gone away. 

Continue reading

Why You Need to Keep an Eye on Your Data

How a Company Acquires Your Data

For a company to get your data, all they really have to do is ask you for it. Think about what happens each time you make a purchase online, or even create an account—you’re handing over your contact information, and usually pairing it to one of your financial resources.

Obviously, you’re subconsciously entrusting them with this information, assuming that they will keep it sufficiently protected and secure.

Continue reading

Tip of the Week: How to Effectively Task Out Goals and Assignments

The Ideal Task Formula

The consensus of many productivity experts and trusted names is that the equation to build out a task essentially looks like this:

Step + Detail + Deadline + Context = Task

This works well, as it can apply to either a complete project, or each piece of a larger project. Let’s take a closer look at each part.

Continue reading

People Have Been Working From Home Longer than You Think

For Much of History People Worked From Home

In medieval times people predominantly worked at their place of residence. Many people of this era in Europe lived in what are known now as longhouses. They lived a subsistence life, looking after their crops and livestock. Individuals that lived in these communal buildings typically found a way to justify their inclusion by gaining a trade that would help the rest of the people out. In fact, it wasn’t until the mid-18th century where people started going outside their immediate community to go to work; and even then, the people that ran the factories lived and operated out of small buildings adjacent to the main factory.

Continue reading

Don’t Let Scammers Scare You with COVID-19

The Advantage COVID-19 Gives Hackers

To put it bluntly, diversion. With so much attention rightly given to COVID-19 right now, there are many who are remaining in their homes as much as possible to try and prevent the pathogen from propagating. This approach makes the Internet even more important to so many people. Not only are many businesses operating remotely, many rely on support services and other online functions for their in-house processes. Otherwise, people who cannot work remotely are seeking ways to pass the time, turning to social media and other online services for that.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you didn’t know Windows can save a list of the text and images you copy, I feel for you—you’ve missed out on a simple trick that could’ve saved you a lot of time. But don’t worry, it’s easy to set up, and I’ll show you how.

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image