Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

How Secure is Your Use of Cloud Solutions?

To do so, we’ll be discussing the concept of cloud security, which is pretty much what it sounds like: security concerning the data, infrastructures, and applications that are hosted in the cloud. In many ways, these considerations aren’t all too different than the ones that would be involved with your local IT. When really boiled down, any security you have implemented should meet a few benchmarks:

  • Assurance that data/solutions are safe
  • You have a transparent view of your security’s status
  • Instant alerts to unusual events and issues
  • These events and issues can be followed back to their source and addressed

Of course, we don’t mean to say that everything is identical between the security of your local infrastructure and a cloud system. We just wanted to establish this as the foundation of any security you implement.

Demystifying Cloud Security

By its nature, cloud computing can be intimidating, especially when you start to consider how it has impacted the business technology landscape. Fortunately, many of the security considerations that cloud now demands aren’t necessarily huge leaps from what your security should be normally. Let’s walk through a few differences between traditional security and what is required in the cloud.

Different Perimeters to Protect

Consider how data can be protected when it is localized. You can effectively prevent a lot of threats just by preventing access to the area where your data is stored. The cloud makes this significantly more difficult by being so very connected.

However, if you know this moving forward, you can adjust your security to meet these needs. One effective way to do so is to make sure that all data to be stored in the cloud is encrypted, and that access to the cloud itself is protected with multi-factor authentication requirements with the appropriate best practices baked in.

More Advanced Threats

Unfortunately, not even cloud providers are immune to attacks. The development of Advanced Persistent Threats (which you may see referred to as APTs) and other means of breaching data make it difficult to be sure that your data is truly safe. While the jury is still out on how these threats can be overcome, you need to accept the responsibility of keeping up with the practices that can help in the meantime.

Software Challenges

As the cloud relies on software to deliver hosted data, there is an assortment of potential variables that need to be addressed. Therefore, the cloud needs to have security controls in place to address these variables as they present themselves. This is the case whether data is being transported at the time, or if it is filed away.

Coleman Technologies can assist you with your data security needs, as well as assist you with whatever cloud implementation you decide to put into place. To learn more, reach out to us by calling (604) 513-9428.

Continue reading

More Industries are Seeing Accountability and Security with Blockchain

What is “Blockchain” Anyway?

Blockchain is defined as a distributed ledger system that creates a single encrypted and unalterable file whenever any transaction is made to help preserve its continuity. As every device involved in the blockchain helps to store it, the blockchain itself is unprecedentedly transparent. This allows business systems to be both more accountable, and secure.

Accountability

Let’s return for a moment to how the blockchain works—each time a transaction of any kind is made, be it adding new data or revising some that already existed, a new “node” (think of it as another link in the chain) is created to document the transaction and encrypt it. As a result, you wind up with a running record of reliable data. As you might imagine, this offers itself quite well to many industries.

Banking and Financial Services

With the importance of the record-keeping that these organizations maintain being so apparent, it only makes sense that blockchain is used to automatically keep track of where funds are being moved.

Real Estate

Real estate processes are notoriously intricate and confusing. Blockchain provides an option that could make the entire experience of buying and selling real estate much more transparent.

Wills and Inheritances

Tragically, wills and inheritances can be very hotly contested, and their veracity may be called into question. The transparent and immutable logs of the blockchain could eventually lead to many fights being averted in the future.

Voting

Elections now face more scrutiny than ever before, as votes are counted, recounted, contested, and recounted again. Using the blockchain could help to eliminate most challenges and issues that call the integrity of an election into question.

Supply Chain Management and Logistics

Managing all the moving pieces of a supply chain could be made much simpler by integrating blockchain technology. Goods and resources could be easily tracked and directed where they need to go, with confirmation when they arrive at their destination.

Security

Communications have gone digital, with unprecedented numbers sent and received each day. As more people than ever rely on these communications for a variety of reasons, data sharing needs to be more reliably secure. The blockchain is well suited for this task, as each transfer of data remains fully transparent, while the data contained in the nodes remains undisclosed. This technology can even be safely used to hold parties to their shared agreements by facilitating proper compensation once certain requirements are met. These capabilities will likely lead to advancements in:

Education

Consider how many files any educational institution needs to maintain and verify, and the amount of personal information shared in these records. Blockchain makes it so that these paper files are no longer necessary, while also making it easier to verify registration, management, and financial aid-related data.

Healthcare

Any patient who needs to see multiple physicians knows the frustration of working with providers who operate in different healthcare networks. However, healthcare has a good track record with embracing innovative technology solutions. Introducing blockchain could ultimately lead to self-managed healthcare records.

Stock Trading

There are many ways that stock exchange processes could be made better with the assistance of blockchain technologies. Two clear improvements: convenience, and of course security.

Public Records

Many states are still overly reliant on paper documents, which are very easy to alter and otherwise manipulate (never mind steal). Shifting to digital documents that are supported by blockchain could do a lot to reduce fraud, ensure accountability, and generally improve security.

The Internet of Things

IoT devices are overwhelmingly insecure, but if they were decentralized through the blockchain, some of this insecurity could be resolved.

To learn more about blockchain technology, feel free to call Coleman Technologies to discuss it, as well as the options you currently have to leverage for your business. Reach out at (604) 513-9428 today!

Continue reading

Coronavirus: A Threat to Your Staff, Cyberthreat to Your Operations

How to Minimize General Exposure in the Office

Based on what is currently known about the coronavirus, the Centers for Disease Control and Prevention have some recommendations as to how to keep the potential impact of coronavirus to a minimum:

  • Encourage employees who are ill to stay home. This will help to minimize the spread of infection within your business. Make sure that your employees are aware of this policy by reiterating it verbally, and by posting notices around the office encouraging them to stay home if under the weather.

    Emphasize hygiene and etiquette. Properly stifling coughs and sneezes and keeping hands clean are surprisingly effective ways to keep your workplace healthier. Rather than using their hands to catch a cough or sneeze, your employees should use a tissue or--if unable to do so--use the upper part of their sleeve.

    The CDC recommends that tissues and alcohol-based hand sanitizer should be made readily available. Make sure your employees are washing their hands with soap and water for the recommended 20 seconds.

  • Engage in keeping the workplace clean. There is a chance that coronavirus (and other illnesses) could be spread via infected surfaces. Make sure that all surfaces that are touched frequently, like desks, workstations, and doorknobs, are kept sanitized. Provide your employees with disposable wipes so they can proactively disinfect these surfaces before use.

If you find that one of your employees is confirmed to have been infected with coronavirus, make sure that you inform their coworkers of their possible exposure while still maintaining the confidentiality that the Americans with Disabilities Act requires. These employees and those who are living with a sick family member should assess their risk of exposure using the CDC’s guidelines.

Coronavirus as a Cyberthreat

Unfortunately, coronavirus will also require you to also keep an eye on your network security, particularly if you operate within the healthcare industry. Hackers and cybercriminals have taken advantage of the widespread concern that the disease has caused. For example:

  • Scammers have phished healthcare providers with updates that appear to have come from the World Health Organization or hospitals local to their area, but actually introduce keyloggers into their systems.
  • Those involved in the medical supply chain have been targeted with emails referencing the coronavirus that install malware to steal information.
  • Ransomware has been introduced into consumer systems by promising recipients of an email information about COVID-19’s spread.

While the current climate may not make it easy, these emails and other threat vectors can be overcome through the same best practices that foil other cyberthreats. In addition to comprehensive digital protections, training your employees to spot these threats will be crucial.

Of course, you should also maintain a comprehensive backup in case you need to recover from a successful attack.

How to Maintain Productivity with Your Team at Home

With today’s technology, sending an employee home sick doesn’t necessarily mean that you will be sacrificing that employee’s productivity. We now have many ways that your team can work effectively from home, still contributing to your organizational agenda without exposing their coworkers to their illness.

Equipping Your Employees

Remote access solutions, paired with virtual private networking technology, can allow your employees to securely continue their work from home, safely accessing the applications and data their tasks require through an encrypted connection. As collaboration will certainly be necessary, you will want to be sure that your employees are also equipped with the communication tools that facilitate this collaboration as well.

Network Protections

You will also want to thoroughly secure your network infrastructure to help prevent threats like phishing attacks and other methods from being successful… as well as preparing for a potential breach or emergency with data backups and disaster recovery policies and procedures (including contact information for your employees) to help mitigate a worst-case scenario.

Employee Awareness

Finally, make sure your employees are on the lookout for any suspicious activity that could be a cybercriminal’s attempt at using the coronavirus as a means to an end. Not only should your employees know how to spot these attempts; they should also know the proper procedures for reporting and handling them.

Is the coronavirus scary? At this point, it is safe to say that it is, but does it have to interrupt your business operations entirely? Not if you are properly prepared.

For more assistance in preparing your business for any kind of disaster, reach out to the professionals at Coleman Technologies by calling (604) 513-9428.

 

What is COVID-19?

COVID-19, better known as coronavirus, is a respiratory illness that first appeared in Wuhan, China, and was reported in the United States on January 21st, 2020.

As of March 3rd, 12 states have reported 60 total cases of coronavirus and six confirmed deaths, with no vaccines or specific antiviral treatments for the illness. Symptoms of the virus include fever, shortness of breath, and a cough, while those with complications from the virus can experience pneumonia in both lungs, failure of multiple organs, and death. 

Continue reading

VoIP Can Replace Analog Phone Systems

VoIP Allows You to Do More

While at its core, a VoIP system is a telephone system, it allows for many more options. Since it uses an organization's available bandwidth rather than a dedicated RJ-11 connection, there are more dynamic options available. It may raise the cost of the solution a bit, but VoIP can come with instant messaging, conferencing, and call archival built in.  

VoIP is More Secure

VoIP is far more secure to use than the traditional landline because it is easier to secure a digital connection than it is to secure an analog one. The use of encryption protects all information transmitted through the system.

VoIP is More Portable

This is a big benefit. VoIP solutions can be linked to mobile applications. This means that any smartphone can become a work phone, and can be linked to the same number as the user’s business phone. This allows people to get calls on their phone without having to give over their personal number. This is either done through forwarding or by installing a simple app on the phone.

VoIP Offers Automated Client Interaction

A VoIP system can be configured to support an entire business. There are integrated automated menus that can offer a lot of value by directing calls to voicemails, alternative members of your team, and allowing employees to avoid distractions and not neglecting their incoming calls. Call forwarding, parking, and many more options can be tied to a VoIP account for additional costs.

VoIP is a technology solution for all of your business’ calling needs. Call Coleman Technologies today at (604) 513-9428 for more information about VoIP and you can get the telephone system you’ve always wanted for your business.

Continue reading

Office 365 and Your Business

Office 365 and Your Business

office-365.jpg

Office 365 Will Change Your Business  

If you are not using Office 365 in your office you are missing out on a packaged product that could create an increase in your company’s efficiency. The efficiency of a company directly affects the success of the company. When your company isn’t running as efficiently as it can, it can cause significant financial losses for your company. Fortunately, Office 365 can improve the efficiency of your company, here are 5 ways how!

Work From Home and Remote jobs are becoming more popular as tech companies make it easier to connect! With Office Online you can work from anywhere you can connect to the internet and work with team members in real time. All of this with the familiar design and features of the regular Office products! 

With Office 365, teamwork becomes a breeze! Collaboration between teams and departments will never be easier due to Microsoft’s SharePoint. SharePoint, a software that comes with Office 365, will make sharing information and files easier as well as allow your employees to work on projects simultaneously.

Power BI is a business analytics tool by Microsoft that allows your business to track your data and share insights across your organization. You can then take that data and embed it into your website(s). Power BI will collect your data and provide you with visual reports that you can collaborate, publish, and share. Power BI will save your business valuable time and resources!

Keep your office and employees organized and on track with Microsoft’s Outlook. Outlook conveniently allows you to keep all of your emails, calendar entries, contacts, tasks, and more together in one place.

Cloud-based storage has become increasingly popular among businesses. OneDrive is the cloud-based file storage application from Microsoft 365. OneDrive connects you to all your files so you can share and work together from anywhere while protecting your work.

Improve Your Processes with Office 365

To wrap up, Office 365 is an essential business tool to ensure that your office is running as smoothly and efficiently as possible. Microsoft saves you from having to use multiple platforms and has conveniently packaged all of their products together in Office 365. Reach out to us by calling (604) 513-9428 to increase your company’s efficiency with Office 365!

Continue reading

Should Your HR Department Be Worried (About Automation)?

Automation Isn’t the First Threat

Human resources cover a lot of ground in any business. In fact, many smaller businesses extend the human resources role past the seven core functions of HR. These are:

  1. Recruitment
  2. Payroll Administration
  3. Benefits Administration
  4. Training and Professional Development
  5. Performance Reviews
  6. Labor Relations
  7. Managing Compliance

Over the past several years, the company human resources department, especially at small and medium-sized businesses, has been encroached upon by outsourcing. Like many other outsourced platforms Human-Resources-as-a-Service (HRaaS) services use technology to fill in the gaps left by not having dedicated HR professionals on staff. For the business, it reduces the cost, while fulfilling virtually the same roles through remote help desk and software

The Relationship Between Automation and HR

Technology changes things. Does it make it better? That’s a matter of opinion, but for the business owner, not having the human resources department means that they are on the hook to complete the tasks that the human resources department undertakes; and, there is a mountain of it.

That is, unless they can automate them.

The benefits of automation are the same no matter where it is put to use. It opens the way for staff to focus on being more productive, by leaving behind a lot of menial (yet time-consuming) tasks. Aside from enhancing efficiency and productivity, there are many key benefits to automating HR. They include:

  • Reduced employee turnover through improved employee engagement
  • Reduced storage and printing costs
  • Improved risk management and properly managed compliance
  • Improved document management
  • Enhanced business decision making with comprehensive reports
  • Optimized business growth through efficient onboarding

Today, there are plenty of software-based solutions that can keep any business running effectively, but when you get a look at them, these solutions aren’t really human resources platforms, they are human capital managers. 

What is Human Capital Management?

Human capital management is a platform that encourages businesses to treat their workforce as they would any other asset. Its goal is to get the human resources of the business to work as effectively and efficiently as possible. While human resources do more to deal with the individual needs and motivations of workers, human capital management seeks to look for metrics that can be quantifiable and strategically improved upon. It basically aims to change an organization’s view of their workforce from a commodity to an investment. 

What Strategy Is Best for Your Business?

There are multiple ways that automation can be implemented in the HR/HCM process, but depending on what strategy is used, you could be setting your company up for problems from your actual human resources. Most workers don’t like being treated like numbers on a spreadsheet after all. On the other hand, divorcing business decision-making away from typical workforce considerations that aim to sap overall productivity will benefit your organization’s bottom line. 

HR is always a balancing act. 

If you would like to know how automation could help you keep your organization balanced and productive, reach out to the IT professionals at Coleman Technologies today at (604) 513-9428.

Continue reading

Can Outsourcing Be an Option for Your Business?

Financial Benefits 

Looking outside your own business to get work done can be intimidating. Can you trust outsourced talent? Will I lose control over my business? Is it really a value? These questions and many more are reasonable to ask, but if there is one sure thing about outsourcing is that there are clear financial benefits. 

The decreased cost of outsourcing is the most well-known feature of the strategy. Obviously, it is extraordinarily expensive to onboard new help, purchase the resources that new hire needs to do the job you need him/her to do, and expand your benefits package (if you offer one) to another person. When you outsource, you may still pay a comparable rate in pay, but you will get someone that has the specific skills you need them for, and you’ll likely save a lot of capital by eliminating the associated costs.

Operational Benefits 

Your organization may see some major operational benefits from choosing to outsource. They include:

Internal Focus

Outsourcing can present a business’ leadership the ability to be more aggressive with their resources. There is a lot to do at the average business, giving regular employees access to trained and reliable resources can free them up to focus on operational issues while speeding up business significantly. 

Access to Skills

Typically, outsourcers come onboard with very specific skills and no long-term employment contract. This gives the organization the flexibility to find the gig-worker that fits the immediate needs of the company rather than committing to one employee over large swaths of time. 

Minimized Risks

In the course of doing business, decision makers are confronted with variable risks. Outsourcing allows many of the risks to be disregarded, although it creates some others. Overall, however, outsourcing will often present a net-positive situation for any business. 

Coleman Technologies offers high-value outsourced IT services and support for British Columbia businesses. If you would like to learn more, call us today at (604) 513-9428.

Continue reading

Taking a Long Look at Your Company’s Bandwidth Needs

Bandwidth Defined

Bandwidth is one of those terms that you think you understand until you try to explain it to someone else. Basically, bandwidth is how fast data can be transferred through a medium. In the case of the Internet, millions of bits need to be transferred from the web to network attached devices every second. The more bandwidth you have access to, the more data can be transferred. 

Speed vs Throughput

Network speed--that is, how fast you are able to send and receive data--is typically a combination of available bandwidth and a measure called latency. The higher a network’s latency, the slower the network is going to be, even on high-bandwidth network connections. Latency can come from many parts of the network connection: slow hardware, inefficient data packing, wireless connections, and others. 

Throughput is the measure of the amount of data that is transmitted through a connection. Also called payload rate, this is the effective ability for any data to be transmitted through a connection. So, while bandwidth is the presumed amount of data any connection can transfer, throughput is the amount of data that is actually transferred through the connection. The disparity in the two factors can come from several places, but typically the latency of the transmitting sources results in throughput being quite a bit less than the bandwidth. 

What Do You Need Bandwidth For?

The best way to describe this is to first consider how much data your business sends and receives. How many devices are transferring data? Is it just text files? Are there graphics and videos? Do you stream media? Do you host your website? Do you use any cloud-based platforms? Do you use video conferencing or any other hosted communications platform? All of these questions (and a few not mentioned) have to be asked so that your business can operate as intended. 

First, you need to calculate how many devices will connect to your network at the same time. Next, you need to consider the services that are being used. These can include:

  • Data backup
  • Cloud services
  • Email
  • File Sharing
  • Messaging
  • Online browsing
  • Social Media
  • Streaming audio
  • Streaming video
  • Interactive webinars
  • Uploads (files, images, video)
  • Video conferencing
  • Voice over Internet Protocol
  • Wi-Fi demands

...and more

After considering all the uses, you then need to take a hard look at what required bandwidth is needed for all of those tasks. Obviously, if you lean on your VoIP system, or you are constantly doing video webinars, you will need to factor those operational decisions into your bandwidth decision making. 

Finally, once you’ve pinpointed all the devices and tasks, the bandwidth each task takes, and how many people on your network do those tasks, you total up the traffic estimate. Can you make a realistic estimate with this information?  Depending on your business’ size and network traffic, you may not be able to get a workable figure. 

Too Much or Not Enough

Paying for too little bandwidth is a major problem, but so is paying for too much. Bandwidth, while more affordable than ever before, is still pretty expensive, and if you pay for too much bandwidth, you are wasting capital that you can never get back. 

That’s where the professionals come in. Coleman Technologies has knowledgeable technicians that can assess your bandwidth usage and work with your ISP to get you the right amount for your business’ usage. If you would like more information about bandwidth, its role in your business, or how to get the right amount for your needs, call us today at (604) 513-9428.

Continue reading

Thank you network health check

Thank you for requesting your Free Network Health Check!

There is ZERO cost or obligation to buy anything when you request this service. This is simply our way of giving you a risk-free way to ‘sample’ our services before having to make a commitment or payment.

Someone from our team will contact you within one business day to schedule your assessment. If this is an emergency, please feel free to call our office to schedule your appointment now at (604) 513-9428.

Continue reading

Top 3 Ways Hackers Will Attack Your Network - And They Are Targeting You RIGHT NOW

Hackers have many methods they use to break into your network, steal data or put you in a position where you have to pay them money to get your data back. They use a combination of software and skill to make it happen. Here are three ways hackers and cybercriminals attack your network in an attempt to get what they want.

1. THEY GO THROUGH YOUR EMPLOYEES.

That’s right, they’ll use your own employees against you, and your employees might not even realize what’s happening. Let’s say a hacker gets ahold of your internal e-mail list, like the e-mails you have posted on your website or LinkedIn. All the hacker has to do is send an e-mail to everyone at your company.

The e-mail might be disguised as a message addressed from you asking your employees for a gift card, which is becoming an increasingly common scam. Another e-mail tactic is making a message look like it’s from a fellow employee, asking everyone else to open an attached file, which is likely malware or ransomware. A third e-mail scam is directing people to a phishing website, which is a website that scammers have designed to look like popular websites in order to get login information to hack accounts. All it takes is a single click from any employee to let the bad guys into your business.

2. THEY ATTACK YOUR NETWORK DIRECTLY.

Some hackers aren’t afraid of forced entry. Hackers and cybercriminals have access to black market tools and software that helps them get into networked devices – particularly unprotected networked devices.

For example, if you have a PC that’s connected to the Internet and your network doesn’t use any firewalls, data encryption or other network protection software, a hacker can break in and steal data from that PC and potentially other devices connected to that PC, such as portable hard drives. This method of entry isn’t necessarily easy for hackers, but the effort can be worth it, especially if they can walk away with sensitive financial information.

3. THEY HOLD YOUR DATA HOSTAGE.

Hackers are relying on ransomware more and more to get what they want. Hackers rely on e-mail, executable files and fraudulent web ads (such as banner ads and popups) to attack networks with ransomware. It goes back to the first point. All it takes is someone clicking a bad link or file and the next thing you know, you’re locked out of your network.

This has happened to dozens of businesses and even city governments in the last year alone. The thing is that even if you pay the ransom, there is no guarantee the hacker will restore access. They can take the money and delete everything, leaving your business high and dry! This destroys businesses!

All of these points are why you need to take a hard look at IT security solutions and use them. For instance, if you had all of your data securely backed up to the cloud and a hacker came in and tried to hold your data hostage, you wouldn’t have to worry. They don’t really have your data. You can tell them “no,” then all you’d have to do is work with an IT team to get your network back up and running while scrubbing it of any malware or ransomware.

Then, it would be a simple matter of restoring data from the cloud. Sure, you might be out of commission for a day or two, but in the grand scheme of things, it’s much better than losing your business to these jokers.

Hackers are just looking for easy targets and, sadly, a lot of small businesses fit the bill. Just because you haven’t had any major problems yet doesn’t mean you won’t in the future. The threats are out there and they’re not going to go away. Invest in security, partner with an IT security firm and protect yourself. This is one investment that is truly worth it!

Continue reading

Tip of the Week: Fixing a Slow Internet Connection

You Don’t Have Enough Bandwidth

When you purchase an Internet package, you get certain speeds. Today, these speeds are faster than ever, but if your business has too much going on, it can wreak havoc with your Internet speeds. There is a situation that happens when too much data is trying to pass through a network connection. This situation is called bottlenecking and it is potentially the reason your speeds are slow. Think about it, if you try to put several gigabytes through a connection that is only rated for a few megabits per second, it’s going to take some time to get all the data through. To check this, audit how many devices are at work. Most of the time you’ll be surprised how much data you are sending and receiving. We can help you with this audit before you make the call to upgrade your Internet package.

Outdated Equipment

Another potential issue is that your networking equipment may simply be old and not be able to use the dual bands that are often necessary to get the most out of your wireless network. If you have enough bandwidth, but your Internet is just slow, chances are upgrading the modem, switches, or routers would be a prudent move and will likely fix any problems you have. 

Misconfigured Equipment and Environmental Factors

Once you’ve made sure that the physical components of your network are working as intended, but your Internet connection isn’t improving, you probably need to reconfigure your software on your devices or move your hardware to avoid interference. Specifically, if your wireless network signal is having problems making it through obstructions, you will want to consider using the 2.4 GHz connection rather than the 5.0 GHz channel. The max speed you’ll see will decrease, but the 2.4 GHz connection makes its way through obstructions better. Unfortunately, however, the 2.4 GHz signal can be a victim of electronic interference more than the 5.0 GHz channel. 

If you need help with your business’ networking, don’t wait and lose more money. Contact the professionals at Coleman Technologies today at (604) 513-9428.

Continue reading

The Mobile Device: A Brief History

At the Beginning

The invention of the radio in the late 19th century and the development of the medium in the early 20th century has more to do with modern day cellular devices than you’d think. As with most new technologies, two-way radio was used by militaries, used in the late stages of WWI, throughout the Russian (and October) Revolutions, and into the Spanish Civil War. Mobility allowed for enhanced communications, but that is a long way from the iPhone 11. 

Over the next half-century, it became the go to mass communications method, effectively making it the first wireless consumer device. In fact, over 95 percent of American households had one by the end of WWII in 1945. Radios then went mobile. The development of the portable radio was the first time people understood the convenience of having portable technology. The worldwide reliance on the medium was incredible. In the 1950s, it took the television (a drastically superior medium) over a decade to supersede the radio as the predominant technology of the time. 

Early Wireless Devices

In the early 1970s, technology had reached a point where the idea of a mobile phone was being bantered around. Prototypes were made, and the technology worked! The first set of wireless phones were added to luxury cars and train cars and other places where affluent people could take advantage of the technology. 

The first cellular phones, the 0G generation were introduced to the market in the late 1970s. Meanwhile, personal computers were trending upwards.

Amazingly enough, it would take almost 40 years before the trajectory of the two markets would intercept.

In the early 1980s, something changed. Cellular technology began to improve, as did the form factors of mobile devices. In 1984, the Motorola DynaTAC 8000X Advanced Mobile Phones System was introduced. The phone, which weighed in at a whopping 28 ounces, cost $4,000, and took 10 hours to charge for 30 minutes of talk time. Irregardless, the device, and others of that era had great demand. Motorola sold around 1,200 phones in 1984 alone; and, based on that success, innovation was priority number one.

It took until 1981 for manufacturers to develop anything resembling what we would call a mobile PC. The Osborne 1 was the first, but it wasn’t practical at about the size of a suitcase. The Epson HX-20, a PC that had a four-line display and used a microcassette to store data, would forever be known as the very first true laptop.

Just like cellular phone technology, the innovation of the laptop was moving faster.

‘90’s Mobility

By the mid-90s, mobility had started to become a priority for consumers. The huge, brick-sized cellular phones of the 80s were replaced by smaller, more portable devices. They also dropped significantly in price. Cell phones such as the Nokia 5110 made cellular calling commonplace.

On the mobile PC front, the laptop form factor of the ‘90s largely resembled the laptops we use today, the first touchscreen devices started to pop up, and mobile networks started to become better at transmitting data. 

In the same era, major PC manufacturers began to make laptop computers. These devices regularly fetched $3,000 or more. Once supply started reaching the public’s insatiable demand for these devices, there was a rapid reduction in price. Device manufacturers such as HP, Dell, and Compaq took advantage of the computing boom, and grew quickly. 

Cameras started to show up on devices in the late 1990s. It became obvious that cell phone device demand, as well as access to the brand new World Wide Web was pushing innovation. As a result, each year it seemed as if the new phones were getting more features, were better constructed, and dare I say, smarter.

The New Millenium 

In the dawn of the 21st century, more and more people had a cell phone. Constant innovation of hardware, software, battery technology, and more were powering a technology boom like the consumer world hadn’t seen since the advent of the color TV.

At this time, device manufacturers such as PALM, Nokia, and Apple started putting together the smartphone; devices that could function like a computer in your pocket. Then, in 2006 Steve Jobs unveiled the iPhone. The launch of Apple’s iPhone in 2007 set the standard for what consumers would come to expect from their devices. 

Luckily for consumers, the establishment of the iPhone was quickly followed by ‘copycats’. Dozens of other electronics companies started to put together smartphones. The companies may change, but this competition is still raging away today. Today there are 3.5 billion smartphones, most of which are powered by the Apple App Store and the Google Play Store. With millions of apps on each, the smartphone is now the predominant computing device in the world. 

How Smartphones Have Changed Business

Today, the manner in which we communicate, collaborate, and compute has completely changed. These devices have changed the way that people can be productive. This uptick in mobility has helped develop the following changes:

  • Remote workers - Today, remote workers are commonplace. Thanks to all the solutions built for mobile devices, employees can do work from anywhere just like they would have done it at the office. 
  • Social media - The subsequent development of social media provides mobile users contact with their family, friends, and contemporaries from any place at any time. 
  • Immediate demand - This may be the most important consideration that increased mobility has offered people. With the ability to get what they want when they want it, they expect quick responses and resolutions to problems in a blink of an eye. 

The smartphone is one of the best tools you can use. Today’s options are more powerful than ever. For more information about how to maximize your business’ productivity through mobility call the professionals at Coleman Technologies today at (604) 513-9428.

Continue reading

Is there a Difference Between Restarting and Just Turning It Off?

What’s the Difference Between the Shut Down and Restart Processes?

Before Windows 8, there was no difference whatsoever (aside from the obvious fact that Restart would start the device back up). This changed, however, with the introduction of Windows 8, and a new feature: Fast Startup.

Shut Down

Still present in Windows 10, Fast Startup shortens what was once a much longer start process after a user had clicked Shut Down.

While all a user’s files and programs are still shut down, the heart of the operating system is just put into standby mode. Please note that it does power down everything, unlike hibernate and standby. This makes it much easier for Windows to reactivate. However, since not all processes are completely stopped, present issues won’t be affected. Your problem will still be there the next time the workstation is turned on.

Restart

On the other hand, restarting the device actually does put a stop to all processes and resumes operations with a fresh boot on the motherboard level. This is why restarting your computer seems to take so long as compared to manually turning it off and on again.

So, the difference is really in the granularity of the shutdown process. Counterintuitively, “shutting down” a computer leaves more components active than a restart does, which is why restart is the process recommended when troubleshooting an issue.

So, while we may recommend that you “turn your computer off and on again,” or “reboot,” what we really mean is “restart your computer.”

For more assistance in dealing with pesky technology issues, lean on the managed services that Coleman Technologies provides. Learn more about what we offer by calling (604) 513-9428.

Continue reading

A Brief Review of Various Cybercrime Statistics

Ransomware

Imagine trying to access your computer (or your network as a whole), only to find yourself locked out and presented with a demand for payment in exchange for your files to be decrypted. This is precisely the scenario that ransomware puts its victims into, usually with a deadline to pay up under threat of the destruction of the encrypted files. If you’ve heard about Cryptolocker, WannaCry, or Petya, they are what we are referring to.

In 2019, a business was infected with ransomware once every 15 seconds, racking up a total of $11.5 million in total losses. Spam and phishing attacks were responsible for infecting 66 percent of affected companies, and in 2017, almost half of companies surveyed were affected by ransomware.

Denial of Service

Denial of Service (DoS) attacks, and their more-popular offshoot, Distributed Denial of Service attacks are the most common form of cyberattack. Using automation, an attacker has resources batter a target with the aim of taking it down. The rise in Internet of Things-enabled devices now allows an attacker to take over these devices and turn them against a single webpage. Naturally, this takes the website down.

The biggest DDoS attack on record happened on March 5, 2018, but was fortunately unsuccessful in taking down the targeted ISP… despite clocking in at 1.7 TB/s. On average, one of these attacks costs somewhere between $20K-to-$40K each hour, or in other terms, just under the average American worker’s annual salary. In the UK, businesses lost £1 billion to cybercrime in 2019.

Man-in-the-Middle

A Man-in-the-Middle attack compromises any communications between a business and their contact. Any and all data can be interfered with, allowing cybercriminals to have their way with personal data, business correspondence, or financial data that is transmitted. It can be intercepted, altered, or redirected, potentially causing more problems than can be counted. The worst part: because Man-in-the-Middle attacks are relatively easy to carry out, they are rising in popularity on a daily basis. They are most commonly used to extract information, whether personal or professional, that otherwise wouldn’t be available. This includes things like login credentials, banking information, or payment card data.

Okay, that wasn’t the worst part. The worst part is that the majority of servers are still vulnerable. As in, 2016 saw 95 percent of HTTPS servers still at risk.

Phishing

Believe it or not, phishing attacks are ranked as the biggest threat to businesses out there today. Phishing is a kind of social engineering where an attacker will reach out to the victim through some format, from email to instant messaging and beyond, in order to gain access to a secure system by fooling their victim into erroneously trusting them. While phishing emails have been around the block a few times, today’s attacks have grown to be quite sophisticated.

Many statistics surrounding phishing emails demonstrate how effective this relatively simple attack has proved to be. Phishing is involved in 93 percent of all social engineering attacks, and was directly responsible for 70 percent of government network breaches. In the last 12 months, 64 percent of organizations had first-hand experience with phishing, notably, 82 percent of manufacturers. The aforementioned ransomware relies on phishing for 21 percent of its delivery. As recently as 2016, 30 percent of phishing messages were opened.

SQL Injection

Abbreviating a structure query language injection, an SQL injection attack does what it says on the box - it injects malicious code into a target’s SQL servers and feeds the database information back to the attackers. While this is another “golden oldie” of an attack, web-based applications that call for database access have given new life to SQL injection attacks and allowed attackers to extract very valuable info.

It should then come as no surprise that 65 percent of all web application attacks are performed through SQL injections. So, if your organization draws information from a database for an application, you could easily be victimized to a significant degree. Even gamers need to be concerned, as 12 billion out of 55 billion detected SQL attacks that Akamai security experts found were leveled at the gaming community.

Malware

If only these other attacks meant that attackers didn’t have time to try anything else, but unfortunately, that isn’t the case. Malware attacks still rank among both the worst, and most common, attacks against businesses. Of course, there are many types to consider, including:

  • Trojan horses - Malicious code will be concealed within other files and applications and allow an attacker a point of access to a computing system or network.
  • Worms - Malicious and self-replicating applications that travel along and infect networks and individual devices.
  • Viruses - Samples of malicious code that infect applications for a variety of motives, including sabotage and theft of data and other resources.
  • Spyware - Code that, while it seems harmless, piggybacks to software and gathers information about how a device or network is used.

There are many ways for malware to be introduced into a system. Again, phishing messages can be responsible, but many attackers will use something called “droppers.” Droppers are specialized programs that will install a virus after bypassing cybersecurity solutions. Since there is nothing inherently malicious about the dropper, protections usually don’t flag them.

Fortunately, there are ways to protect your business’ resources, network, and infrastructure from the millions of different versions of these attacks - and you need them, as your business is actively targeted by these attacks. To learn more about putting these protections into place, reach out to the professionals at Coleman Technologies by calling (604) 513-9428.

Continue reading

Verified Business SMS Added to Messages

Most users that have an Android device use the Messages application to send and receive SMS messages. Companies that use this platform for marketing could have their messages routinely ignored because people don’t trust the content that comes from seemingly random numbers. 

With verified SMS, however, every message that is sent to a prospect or customer is verified to actually come from the company. In fact, the recipient won’t even receive the message until it is verified. The content is transmitted with the business’ name, logo, and confirmed with a verification badge. Google has stated that the content is never revealed to them, meaning that the content is secure and sent privately like any other text message.

How Do You Turn on Verified SMS?

Obviously, you need to have a device that runs a recent version of Android mobile OS. To turn on Verified SMS:

  • Open the stock Android Messages app
  • In the three-dot menu, access your Settings
  • Access Verified SMS
  • Switch on Verify business message sender 

Now you don’t have to waste time with unverified marketing or sales content. 

For more great tips, visit our blog regularly.

Continue reading

Pros and Cons of Leaning on a Wireless Network

The Wireless Connection

The Pros

There is one obvious benefit: No wires! Not having to run cable is a massive benefit, but the biggest benefit of this might just be the ability to connect devices to a wireless network inside your business. By giving your team access to network resources wirelessly, you’ll see better collaboration, improved productivity, and produce better products and services. 

Additionally, with a strong wireless network, you can promote some strategies that can work to improve your operational effectiveness. One of those strategies is a Bring Your Own Device (BYOD) strategy. Many of your employees bring their smartphones with them when they come to work. By enacting a BYOD strategy, your staff can take advantage of the devices they are most used to advance the goals of the company. 

The Cons

Even many wireless technologies aren’t actually wireless. Even the ones that are, need to be charged regularly, so while expanding your wireless network will provide the ability to compute inside the network’s perimeter, setting up a more collaborative workspace still comes with some drawbacks. Namely speed and security.

Wireless connections are more vulnerable than wired ones. It’s easier for unauthorized individuals to hijack the signal of a wireless connection and can provide a third-party that is looking to gain access, more of it to the critical information that is transmitted wirelessly. 

The Wired Connection

The Pros

When dealing with wired networks, IT admins have more control over what devices can connect to the network. This presents values several ways. First, there is more control over the security protocols on those devices, making contracting malware and other negative outcomes less likely. 

Wired connections also enhance an organization’s ability to keep their devices free from security threats. Controls have improved to the point where it is actually more difficult for attackers to break into a wired network.

Additionally, it may go without saying, but wired networks are overall faster than wireless networks. This speed boost is magnified if there are walls, floors, ceilings, or any other potential interference to seeing optimal speeds over Wi-Fi.

The Cons

The biggest setback to a wired Internet network is the act of wiring the network. Initial setup is a pain, as you need to hide cables and find ways to run cable as to not hinder the thoroughfares around your business. It is also a hindrance for maintenance if a cable fails or hardware has to be moved around due to business growth or restructuring. 

Another detriment to the business is that a wired connection doesn’t allow for the type of mobility many businesses are looking for nowadays. With a wireless connection meetings are faster, more to the point, and collaborative work can be fluid.

You have a business decision to make; and, while it may not be the most crucial one you will make, it can have an effect on how your business functions. For help networking your business, call the professionals at Coleman Technologies today at (604) 513-9428.

Continue reading

Tip of the Week: Four Fundamental Small Business Tech Tips

1. Adopt Technology Solutions

Regardless of your industry, who your business serves, or even where you operate, there are some universal changes that technology has brought to how the average small-to-medium-sized business functions. Methods of collaboration have shifted to digital formats, “coming to work” is no longer a prerequisite to working, and the filing cabinet has been rendered woefully obsolete by other, better options. Cloud solutions are a major contributor to this. I want you to take a moment and consider something: why were any of these changes made in the first place?

It is for the same reason that the assembly line process was adopted, or why we cook our food before eating it: it provides greater benefits than the old way. It is the same with business technology, and you will see this as a common theme throughout these tips. Don’t disqualify yourself from competing by removing your ability to do so.

2. Don’t Shortchange Email

Email is now the gold standard for business communications, for numerous reasons. While a small business might find it redundant to email an announcement, doing so can prove useful to their operations. For instance, let’s say Mary manages a small office with four or five employees. She could easily just announce an important message to the room, but what if James was at the dentist that day, or Rob had excused himself to the bathroom just before? What if Ellen had just connected for an important phone call?

Email provides an easy way for you to communicate with others in your workplace that ensures everyone gets the message, without disrupting operations too much.

3. Go Mobile

While we’re on the subject, let’s consider Ellen for a moment. In the past, making a phone call would tie her to her desk, so any distractions in the office would be an unavoidable issue. Nowadays, there are many ways that Ellen could hypothetically remove herself from the situation while still fulfilling her responsibilities. For instance, a Voice over Internet Protocol solution could allow her to make and take calls from anywhere she could establish a connection, so she could presumably find a quieter area to work without sacrificing her ability to do so.

Other solutions also offer some form of mobility, assuming they are backed up with enough security. For instance, if James was unable to get to the office after his dental appointment, he could still work on his assigned tasks from home with the right cloud-based solutions.  Again, this helps eliminate his reliance upon getting to the office in order to produce.

4. Don’t Underestimate the Cloud

We’ve already touched upon how the cloud has shifted businesses, primarily focusing on how useful it is for hosting and storing data. However, this isn’t the only thing the cloud can do. Cloud technology enables today’s businesses to make use of tools that would ordinarily be out of reach. Yes, its storage capabilities can help make data more accessible to team members who need it, but it can also assist you in preserving your data in case of some disaster, give you access to computing resources that you couldn’t procure yourself, and provide you flexible access to your business applications.

5. Improve Your Security

A small business’ size once protected it from cybercrime, but nowadays, all businesses are fair game. In order to remain secure against these attacks, the right defenses need to be put in place. Things like firewalls, spam blockers, antivirus, and assorted other solutions help to reduce these risks. Additionally, any employee could potentially let in a significant threat, so all need to be educated on how to spot them, and the proper procedures to dealing with them.

Coleman Technologies is here to assist you in implementing these modern IT essentials, as well as maintaining them for you through our remote monitoring and access capabilities. To learn more about how else we can help your growing business, give us a call at (604) 513-9428.

Continue reading

Integration Brings Benefits to Business

Planning Stages

Most businesses use some type of management program to streamline things. Whether that be a simple Customer Relationship Management (CRM), a more intuitive Professional Services Automation (PSA), or an end-to-end Enterprise Resource Planning (ERP) software, your company relies on software to get the job done.

Today, there is an opportunity to mix your business' production software--whether it be communication integration, file sync and sharing, another form of back-end integration, or a customer-facing application--with your management platform. Planning an integration like this can have big benefits, especially if you are beginning to use analytics to help you make critical business decisions. After all, the whole point in integrating your various business components is to make data flow better.  

The main hurdle to accomplishing this is, of course, how do you go about getting this done? If your organization doesn’t have on-staff developers, outsourcing your integration project quickly becomes your only recourse. If you are going to pay someone outside your company to connect your proverbial pieces, then you need to have an idea of what you want to accomplish ready when you start the relationship. It is essential that the outsourced developer knows your needs, and that you provide them with tools and access needed to complete, and thoroughly test, the integration. Most simple integrations can be done cheaply, and can provide massive returns on your investment, while larger integrations may not see the immediate return, but over time can provide massive cost-and-time-saving benefits.

Integration Benefits

Speaking of benefits, we’ve already touched on the main benefit of software integration: Unimpeded data flow. Integration can also result in:

  • Cost savings
  • Increased end-to-end efficiency
  • Organizational growth
  • Improving business with no downtime
  • Enhanced business analysis and intelligence

According to one study, small businesses that build a completely integrated suite can boost sales by upwards of 12 percent, reduce overhead by increasing inventory reporting, and increase revenue-creating situations by almost 50 percent.

If your organization has seemingly tried it all to boost productivity and efficiency, you may be missing out on a great way to improve both, while also providing a way for businesses to better plan for the future. Do you think that integrating your business’ software will help your business? Leave your thoughts in the comments section below.

Continue reading

IT Trends SMBs Should Focus On in 2020

Business Automation

As businesses have strict cost considerations to take into account, it is likely that automation will grow in popularity. While perhaps more expensive to initially implement, automated solutions can easily provide a return on investment by clearing schedules of the annoying (if necessary) repetitive tasks that otherwise eat up your human employees’ time. This combination of machine learning and artificial intelligence is known as Robotic Process Automation and enables businesses to greatly reduce how often human employees need to interfere in these tasks.

Some professionals have been hesitant to invest in AI-driven solutions, primarily due to incomplete algorithms and the negative opinion towards “replacing human jobs with robots.” However, artificial intelligence has seen some success in reducing HR costs through its inclusion in some software, and so RPA is experiencing considerable growth.

Furthermore, many of the solutions available today can be used in more simple applications, including the improvement of communications, reducing process inefficiency, and eliminating redundancy.

The Internet of Things

“Smart” devices are quickly becoming the new norm, even in the business environment. Many establishments are directing their budgets toward devices meant to improve security, evaluate utility usage, manage supply chains, and other operations.

The prevailing motivation behind implementing and integrating these devices is simple: better cost control. If a business has the tools to track and manage their costs, the entirety of the business can be better optimized. When fewer resources are expended on a business’ crucial interactions and processes, the business inherently becomes more sustainable.

Various Cloud Services

While it may seem like there has been ample time to take advantage of every aspect of the cloud’s capabilities, new services and utilities are still emerging. Sure, most businesses have adopted the cloud to support their email and file sharing needs, but this is the relative tip of the iceberg as far as the cloud’s potential is concerned. Businesses can now consider options like Infrastructure as a Service (IaaS), Security as a Service (SECaaS), and even AI as a Service (AIaaS), confident in the reliability of these increasingly popular utilities and others.

Cloud vendors are also creating new services to see to a business’ needs. The largest cloud vendors can effectively fill any requirement a business has through increasingly specific services. As a result, SMBs definitely have options to help resolve their operational hurdles.

Cybersecurity Awareness

At this point, there is plenty of precedent to establish -- without any doubt -- that businesses of every size, industry, and resource level need to have a cybersecurity strategy in place. While many may argue that enterprise-grade security solutions are above their means, the aforementioned precedent makes this argument untenable. 66 percent of all SMBs were targeted by some kind of cyberattack in 2019, and 2020 is already projected to be just as bad, if not worse.

Fortunately, there are ways that a business can improve their cybersecurity preparedness, such as:

  • Staff training - It is a simple concept: the more able your employees are to spot and properly handle a potential cyberattack (like phishing), the less likely your organization is to be victimized. Security has improved greatly, thanks to methods like encryption, rendering your employees your most vulnerable point. Properly training your staff to identify and report suspected threats, the safer your network will be.
  • Threat intelligence - If you know how you are most likely to be attacked, based on the vulnerabilities that cybercriminals usually target, you will be better prepared to handle these attacks. Think of this as the practical application of “knowledge is power.”
  • Multi-layering - With all the potential security issues that businesses face today, businesses of all sizes need to have a strategy in place to reduce all risks that face them. Therefore, all businesses and especially small businesses, need to have redundant file backup, DNS protection strategies, and AI/machine learning-enabled security features in place.

Improved Mobility

For the past decade, businesses have struggled with mobilizing their workforce. As a result, with today’s emphasis on remote work and other mobility-related concerns, solutions that enable a mobile workforce while eliminating risk have increased in importance. Now, increased connectivity, improved data security, and data protection policies like Bring Your Own Device (BYOD) allow your operations to be completed from inside and outside of your workplace, with resources safely delivered to your employees as they need them.

Coleman Technologies can help businesses around British Columbia adopt these approaches, or improve their use of them, to assist their operations and boost profitable productivity. To learn more, give us a call at (604) 513-9428.

Continue reading

Tip of the Week: How to Avoid Phishing Scams

What Exactly Is Phishing?

The practice of phishing is not new. It has been used for much of the past decade. The strategy goes like this: hackers use deception to get a user to provide their own credentials, thus giving them unknowingly to the hacker. The hacker then accesses the account legitimately (as the user) and has free reign over the entire account. Sometimes they will go in and siphon data and sometimes they will hijack the entire account, but regardless of the hacker’s intentions a successful phishing attack is a successful transfer of power over an account. 

What’s worse is that you can get phished in multiple mediums. Email is the predominant channel where phishing attacks are carried out, but people can (and do) get phished over social media, instant message, or via text message. There are even phone-based or snail mail phishing attacks that direct users to go to a fake website where they would provide their credentials and/or personal information. 

There are even different forms of phishing based on their intended targets. The general strategy behind traditional phishing attacks is to send emails out to as many people as possible, hoping to snare unwitting recipients into their phishing nets. Today, with more personal information available about people, there is phishing that targets individual people. This is called a spear phishing attack. Then there are spear phishing attacks that are carried out against business and organizational leaders. These are called whaling attacks. The intended imagery aside, phishing attacks are getting more direct, more deceitful, and more serious. 

Spotting Phishing

For all of the bad news surrounding phishing attacks, there is some undeniably good news: with a critical eye, you can tell when you are being phished. You aren’t going to fall for these types of attacks if you know what to look for. Today, we’ve put together a short guide on how to determine if you are dealing with a phishing attack and how to proceed when you are.

Look for Warning Signs

There are a litany of warning signs that will help you spot a phishing attack. Most of them are pretty obvious, and some of the more subdued ones come with telltale signs. 

Does the message have spelling and grammar mistakes? 

Not many businesses will send out official correspondence with grammar and spelling mistakes. This should be the first sign that something is amiss. Most phishing messages come from supposedly-reputable organizations and while a spelling or grammar mistake does happen from time-to-time, several mistakes won’t happen.  

Does the message deal with curious circumstances? 

One of the biggest telltale signs that you are dealing with a phishing attack is the tone of the message that is received. Does the message reference immediate situations that need to be remedied? Does it mention money or illicit a sense of fear or anxiety? If it has these elements, it’s probably not legitimate. Think about it: most organizations that need you to act immediately will have specific ways of contacting you and that correspondence will make it clear that you are dealing with a legitimate organization.

Does this message have a trusted URL?

Most phishing attacks will redirect to a website that is set up by the hacker. You probably shouldn’t be clicking on any links sent to you in an email unless you are sure who sent the email. One way to determine whether or not a link is from a reputable source is to mouse over the link and see where the link goes. If you get an email from Amazon and the link goes to amazorn.com, you are staring at a phishing email.

Protecting Your Assets

There are a couple simple ways to ensure that you or a member of your staff doesn’t fall for phishing attacks:

  • Use technology. A spam blocking filter on your email will go a long way towards removing unnecessary and potentially-malicious emails from hitting employee inboxes in the first place.

  • Training. Make sure your employees are trained to spot and properly handle attempts that may come through. By starting with the end user, you’re taking away a lot of the power that phishing has.

At Coleman Technologies, we appreciate the importance of secure workplace practices. If you’d like to learn more about phishing, and how we can help stop it from hurting your business, reach out to us at (604) 513-9428.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

Business technology can sometimes seem like a hedonic treadmill: you maintain a baseline level of operation with your IT, but it will inevitably fail, leaving you in the tough situation of having to replace it. Today, we want to help you get ahead of...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image