Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Is VoIP Really More Cost Effective?

What is Voice over Internet Protocol?

Traditionally, telephones work by sending electricity through the phone wires and phone lines and having it converted back into sound. Today, they have figured out how to do the same process through the Internet. Sounds are sent as data packets over Internet wires and then they are unpacked to make sounds again. VoIP is the product that has come from this innovation. Basically, where you once had to have an expensive business telephone system hardwired to your place of business, you can now do the same for a fraction of the cost by using your company’s bandwidth to send and receive calls.

How Does VoIP Work to Save Me Money?

VoIP presents several options that work to save your business money. They include:

You’re Paying for One Less Thing

Your business telephone system has worked, but the cost is high. Of course, you’ve needed it, but today, VoIP offers just as much in the way of features as a dedicated telephone system, but it does it through your Internet connection; a service that you almost assuredly have and use regularly. 

VoIP is Easier

Since VoIP is delivered via your Internet connection, your staff no longer needs additional infrastructure--such as a wired connection for every phone--to be able to make calls. You can scale your hosted VoIP solution up and back as you need. What’s more, for many solutions you can utilize your staff’s personal devices as reliable work phones through the use of a mobile app. That’s much easier.

VoIP is More Efficient

Most VoIP solutions enable you to provide them with an auto attendant feature that provides directions to callers. This reduces the time that people need to be on the phone. Clients get connected with the person they are calling, while employees won’t need to deal with their phone ringing and causing interruptions.

There are many other benefits to VoIP solution. If you would like to learn more about implementing VoIP and saving money in the process, reach out to Coleman Technologies at (604) 513-9428!

Continue reading

End of Life Event on the Horizon

January 14, 2020

Microsoft has announced that Windows 7 will no longer be supported after January 14, 2020. Computers that are running the software will no longer be protected, and put your business at risk. After January 14th, any computer still running Windows 7 will not be receiving technical assistance from Microsoft. First released in late October 2009, Windows 7 was one of Microsoft’s most effective and popular operating systems, but the time has come to upgrade.

Why Shouldn’t You Run Unsupported Software?

Simply put, by running unsupported software your business becomes much more vulnerable to cyberattack. Supported software is routinely patched to keep potential vulnerabilities from becoming disasters for your company. A data breach can flatten any forward momentum a business has, and today, with ransomware being a consideration, making sure all of the software you depend on is supported keeps your business secure.  Besides the security issues, there are other considerations to contend with, like a loss in functionality 

What are Your Options?

Since you have around a month left to upgrade away from Windows 7, you still have time to switch your Windows 7 workstations over to Windows 10. Windows 10 is the current standard and has been for nearly five years. To upgrade to Windows 10 requires at least a 1 GHz processor, 2 GB of RAM, and 20 GB available on a hard drive. Since these specs aren’t much over what Windows 7 required, it may not be necessary to overhaul the hardware on each of your workstation. 

Extended Support

For organizations that simply won’t have time to upgrade their machines there are a couple of options that you should know about. Microsoft is offering a costly extended support package that will available for all Windows 7 Pro and Windows 7 Enterprise customers with volume licensing through January 2023. Most businesses will not qualify, but if yours does, the costs for Enterprise will be $25 per device from 2020-2021, $50 per device from 2021-2022, and $100 per device from 2022-2023. The cost of support for Pro versions will be double that. 

There are, at this moment no plans to support this software after 2023.

Microsoft 365

If your business is looking for an option that will move you on from Windows 7, Microsoft now offers the Microsoft 365 bundle. Available in enterprise, business, and education platforms, the cloud-based bundle provides users with Windows 10, the productivity and storage applications in Microsoft Office 365, and the security and control settings you’ll need to get the most out of the subscription service. Paid by the user, per month, major hardware upgrades can be tabled or done incrementally, allowing a business to pay as they go until they get to where they want to be. 

If your organization needs help upgrading your software, or keeping it patched and up-to-date, call the IT professionals at Coleman Technologies today at (604) 513-9428.

Continue reading

A Brief Look at Project Management Tools

What is Project Management?

This may seem pretty self-explanatory, but project management is the planning and systematic organization of a project’s tasks. Unfortunately, anything that ends up going wrong in a project is immediately the result of bad project management. That’s why it is essential to have tools that allow for efficient and effective project management. 

Project managers typically oversee the creation, delegation, and completion of tasks that are coordinated in a way where the tasks result in a finished product. Therefore, a lot of what a project manager does “quarterbacking” a team of resources. Solid communications, time and resource management, and constant and diligent assessment are the staples of a successful project manager.

Parts of Solid Project Management

Every project is different, but there are some of the elements that the PM has to manage. 

  • Planning- It’s the PM’s job to plan out each task and assign it to the resources that are available for it. Being able to properly schedule resources is a core responsibility of the project manager mainly because most projects not only have multiple people that work on them, but also because tracking the time that the project takes is how organizations measure the profitability of the project.
  • Time tracking - Typically integrated with the scheduler to streamline operations, time tracking is essential to manage resource involvement and be able to properly assign tasks. 
  • Collaboration - Today, businesses have collaboration options that fuel efficient project work. It is the PM’s responsibility to ensure every resource not only has access to a collaboration tool, but also uses the tool provided to complete their tasks as efficiently and effectively as possible. 
  • Documentation - In order to have a complete and thorough assessment of any finished project, you’ll need to have complete and thorough documentation to go through. Many of today’s productivity options have integrated a great set of tools that help PMs analyze contributor value.
  • Assessment - At the end of a project, after the delivery of the product to the customer/client, a complete audit of the project will provide all the successes and failures that took place in the duration of the project, helping a business know what it needs to improve on and, ultimately, if their project is bringing a large enough return (or a return at all). 

With the success of an individual project tied to the management of the resources it takes to complete it, proper coordination, documentation, and assessment are especially important. 

Project Management Tools

Most of the actual tools needed to fuel your organization’s projects have now been integrated into one or two pieces of software. They provide PMs with all of the information they need to place resources, assign tasks, and oversee the whole project. A few of these tools include:

  • Gantt chart - A Gantt chart is a visual representation of the project. The Gantt chart is used to illustrate how a project will run. It makes recalculating the timeline of a chart and shuffling resources around to meet demand much easier. 
  • PERT chart - PERT stands for Program Evaluation, and Review Technique. It’s essentially a chart that shows where each task assigned in a project is connected to other tasks in a project. Also represented through what is called the Critical Path method, this allows project managers and their teams to get a clear representation of how all the tasks in a project end up creating the end product. 
  • Moscow analysis - An analytic technique that stands for: must, should, could, won’t it allows PMs to work with project stakeholders to create the scope of the project. Obviously there are things you must do in the scope of a project, those need to be planned for and scheduled first. Then the things that should be done, followed by things that could be done to improve value, and finally eliminate things that simply don’t need to be done. 
  • WBS chart - WBS stands for Work Breakdown Structure, and is a common tool to help people visualize the entire scope of a project. This provides a comprehensive list of individual tasks. 
  • The Cone of Uncertainty - This is a visual tool that shows the measures of uncertainty vs. time. As the project goes forward uncertainty decreases. As risk is mitigated and governance is solid, confidence will increase. By managing risks properly, any project’s cone of uncertainty will show static improvement, ultimately leading to a successful finale.  

There are several other tools that a project manager can use, and many of them are incorporated in today’s powerful collaboration software. Many Customer Relationship Management software titles provide project management tools. If yours doesn’t, you can get stand-alone project management tools for your email client that provides PMs a set of useful options.

What is happening more today, however is that PMs are beginning to use collaboration apps like Microsoft Teams and Slack that come with dozens of software integrations strategically designed to make project management--which is, of course, a traditionally messy endeavor--easier. These titles alone do a lot of good mitigating risks and fueling collaboration.

IT projects can often be difficult to implement, but the knowledgeable professionals at Coleman Technologies have a great track record of improving our client’s businesses through strategic project success. Call us today at (604) 513-9428 to see how we can help. 

Continue reading

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

How Does This Happen?

An employee had access to data that they weren’t authorized to have. According to Trend Micro, they were able to “gain access to a customer support database that contained names, email addresses, Trend Micro support ticket numbers, and in some instances telephone numbers. There are no indications that any other information such as financial or credit payment information was involved…”

This employee, who remains unnamed, apparently had planned to steal data, and ended up being able to bypass the internal protections Trend Micro had in place.

Since the data had more than enough information for a scammer to use to trick a user into believing they were calling from Trend Micro (all it really takes is a name and phone number, and knowing that they use the product), this kind of data has a great deal of value to scammers. It gives them an easy way in to steal money from unsuspecting people under the guise of Trend Micro tech support.

Be Wary of Any Unsolicited Tech Support Calls

This isn’t a new problem, and it definitely isn’t only a problem for Trend Micro customers. Fake tech support scammers have been around for years, often preying on older, less-technically-savvy users. They use scare tactics and feign urgency to get their victim to hand over credit card information or allow remote access to the PC. 

More often than not, these calls will come in saying they are “Microsoft Windows Support” or some general computer support. If the scammer thinks they are targeting an individual at a business, they might say they are from the IT department.

It’s important to be wary and educate your employees so they know the proper channels for getting support requests handled. 

The Other Lesson - Don’t Let Employees Access Data They Don’t Need

As a business owner, you need to ask yourself who has a little too much access. Can all employees wander into folders on your network that contain personal or financial information? 

An employee should only have access to the data that they need, although it’s also important to not make it too difficult for an employee to do their job. Establishing the policies for this can be tricky but setting up the permissions on your network just takes a little work with your IT provider.

Enforcing security policies, like controlling who has access to what data, requiring strong passwords, and setting up multi-factor authentication can go a long way in protecting your business and its customers from a rogue employee running off with data. An ounce of prevention is worth a ton of damage control, in this case.

Need help? Our IT experts can work with you to lock down your data. Give us a call at (604) 513-9428.

Continue reading

You Are Most Definitely Using Cloud Computing

A Refresher on the Cloud

“The cloud” is a term that is used extremely loosely, effectively referring to any data that is stored on the Internet. So yes, online storage spaces like Google Drive, Microsoft 365, and Dropbox count as the cloud. Your website’s hosting service counts as the cloud. The social media sites you use, like Facebook and Twitter, qualify as the cloud in a way. Arguably, even online banking is a cloud-based service, as your information is stored on your bank’s online servers.

If you use a store’s photo printing services, or attach a file to an email, or ask your virtual assistant to wake you up early, you are utilizing a cloud service. Businesses around British Columbia use cloud technology to share documents, store data, and host apps and line of business software titles.

Any data you have stored online is data that you have in the cloud.

Is It Okay to Have So Much Data Online?

Truthfully? It all depends upon what data you are storing, and where it is being stored.

It is important to remember that - in essence - all the cloud is, is someone else’s computer that you can leverage. Storing data in the cloud is quite literally entrusting its security to someone else… something that has both benefits and drawbacks.

On the one hand, many businesses have onsite servers in which they keep their company data, which requires them to keep those servers secure. If something happens to this data (despite the network protections and backups that should be in place) it is on that business.

On the other hand, cloud services are typically provided by big-name companies who can feasibly afford to protect the data they have been entrusted with. Who would have more capital available to invest in cloud security… your business, or the likes of Google or Microsoft?

It should also be considered that these larger companies can provide much more value to the people who can successfully hack them. It isn’t unheard of, either… Yahoo, Dropbox, and Apple iCloud have all been breached at some level, and attacks are always happening.

So, Is the Cloud Safe? How Can I Protect My Data?

All this may make you feel as though your most secure option is to eschew the cloud as much as possible - but, depending on what you’re storing and how this data is protected, you may have other options. Here are a few practices to help you balance the potential risks and rewards.

Encrypt BEFORE Uploading

Encryption is a very popular buzzword among cloud solutions. Public cloud providers will throw terms like “256-bit encryption” around, making their services sound pretty great. However, your data will only be encrypted like this as it is being transferred. In storage, it is unencrypted, and is therefore vulnerable. If your data were to be encrypted independently of the cloud, on the other hand, it would be rendered effectively useless to someone who didn’t have the ability to unlock it.

Understand Your Compliance Requirements

Different industries maintain different standards for the security of your customer and client data, in addition to the data privacy laws that are on the books. The medical field has HIPAA, and many businesses need to abide by PCI DSS. In order for you to use a service provider’s cloud solution to store your data, you need to confirm that it is compliant to the requirements imposed upon your industry by such regulations.

Practice Password Hygiene

While this is important to consider when leveraging a cloud service, any of your online activity should abide by the same rules. If you don’t repeat passwords across accounts, you can effectively limit the number of accounts that can be breached through one action.

Be Discerning

Cloud storage and services is a growing industry, thanks to its low barriers to entry and huge potential profits. You need to make sure that you select a service that is fully protecting your data, not just the one that offers you the lowest price.

Coleman Technologies can help you with your cloud service needs, without sacrificing your security. To learn more, give us a call at (604) 513-9428.

Continue reading

Know Your Tech: Fiber Optics

Fiber optic cable is a network cable that contains small strains of glass fiber. Those glass strains are covered by an insulated casing. They transmit data through light. They are often not much thicker than a human hair. They are made up of the core, which is the pathway for light to travel. The core is surrounded by a layer of glass called cladding that keeps light in via reflection to avoid signal loss and keep transmissions true as the wire bends. 

Since the transmission of light is so fast, data can travel long distances quickly.  These cables provide higher bandwidth and can maintain the integrity of data transmission over long distances. Today, this technology supports much of the world’s Internet, cable television, and telephone systems. Their main benefits include:

  • Higher capacity data - The amount of data that a fiber optic cable can carry exceeds that of traditional copper cable. Fiber cables are rated at 10 Gbps, 40 Gbps, and 100 Gbps. 
  • Longer Distances - Since light travels for much longer distances without losing strength, there is less need for signal boosters. 
  • Less Interference - Copper cables require shielding to protect it from electromagnetic interference, but this shielding doesn’t always work. The physical makeup of fiber optic cables works to avoid this outside interference. 

Most fiber optic cable is installed to run long-distance connections, there are some Internet providers that roll out fiber optics for direct access to customers. They are deployed the following ways:

  • Fiber to the Premises (FTTP) - Fiber that is laid to support the use of media services to residential buildings.
  • Fiber to the Building (FTTB) - Also called Fiber to the Block or Fiber to the Business - This is fiber optic cable that supports commercial buildings.
  • Fiber to the Curb of Node (FTTC/N) - This is fiber cable that is laid to the node, while copper wires complete connections to customers.
  • Direct fiber - Fiber that leaves the central hub and is attached directly to a customer. Some of the most expensive network cabling on the market. 
  • Shared fiber - Much like direct fiber, but at the end it’s split up to other customers. 

Deploying fiber optic cable to your place of business is possible, but it is extraordinarily expensive. Due to the mounting costs associated with it, it may not be an option unless your provider is rolling out new infrastructure. 

If you would like to learn more about the technology your business uses, and what kind of effect it can have on your business, return to our blog regularly. 

Continue reading

Solid Training can Make All the Difference

On the surface there is nothing abnormal or wrong about this scenario. The problem, however, that dropping a new hire into the fray with a copy of the employee handbook and a day-and-a-half of software and sensitivity training may actually not be the best way to handle your human resources. This month we are going to talk about how creating a sustained training platform can actually have a marked effect on your business’ ability to stay secure and productive. 

Education vs. Experience

The first place we’ll start is with the hiring process. Many organizations prefer to hire people that have a college degree of some sort. While that may be prudent if you are hiring people for a specialized job, many entry-level job postings are now requiring college degrees, often to the organization’s detriment. Since college graduates are likely to command a higher salary--and they didn’t go to college (and often assume large amounts of debt) to work entry-level jobs--they typically get impatient with their professional growth and hop from job-to-job until they find something more to their liking. In fact, people who have graduated from college since 2010 have averaged four job changes in their first nine years. 

That’s not the only thing. You have people whose education doesn’t match up with the demands of the jobs. People that get their degree in a certain discipline and didn’t work a job relating to that discipline for years, are often further behind than people who have experience in the field. Then you have that person who applies, but majored in Latin in college. Most businesses would be better off filling the position from within than hiring someone from outside the company and lacks real-world experience in the job.

This is where training comes in. For the college graduate who has been exposed to different perspectives, disciplines, and rules than the people that work real-world jobs are exposed to the practical knowledge necessary to troubleshoot even basic problems in a business setting may be a little troublesome to start with. There’s a reason why your average mechanic, plumber, and electrician keep being able to raise their rates: they’re experienced and trained.

Types of Training

The first thing that should be mentioned is that dedicating a lot of time and resources to employee training can become expensive. This is likely why a lot of people don’t do much of it. There are five major types of training that most organizations offer, in varying degrees. They are:

Orientation

Every business has some form of orientation. This is a short run down of the expectations of an employee by management.  Orientation will show new hires all the relevant information about what it means to be an employee at the company. Some businesses go into detail about things like the company mission, values, corporate culture, leadership information, employee benefits, administrative procedures, and any other tasks that need to be completed before any actual training begins. 

Onboarding

Onboarding is different than orientation. When you are onboarding your employees, you train them in the specific duties their job entails. This could be training on software systems they need to be accustomed to using, or training on how your business wants them to complete specific tasks. The idea is to make new hires as effective as possible, as quickly as possible. Some jobs come with a half-a-day of onboarding, while others take over a year to complete. 

Mandatory

There are some things that workers need to know, regardless of the position they hold. Some mandatory training is dictated by Federal and State governments, while others are strictly industry-wide points of emphasis. Public sector jobs often are required to take occupational health and safety courses. This practice is becoming more and more prevalent in the private sector, as is sexual harassment training.

Operational Skills

Skills training is designed to improve an employee’s ability to do the work, or to fill in other positions in your company. There are soft skills training and technical skills training. Soft skills training is designed to improve an employee’s ability to interact with others; and, with the company. These skills include:

  • Presentation and communication
  • Problem solving
  • Conflict resolution
  • Time management
  • Collaboration
  • Emotional intelligence
  • Adaptability

Studies have shown that a dedication to soft skills training works to resolve the normative problems with high turnover and unsuccessful collaborative culture.

Technical skills training enhances the technical proficiency of an employee. Any time employees can get better at the technical aspects of their jobs, it improves the products and services the company they work for delivers. 

Security

Nowadays, with the circumstances that modern workers have to consider, security training is an absolute must. Not only does it improve employees’ ability to protect business assets, it ensures that they are aware of the potential problems that the modern business is exposed to. 

Physical security training is typically limited, but if it is a major part of a person’s role within your company to keep assets secure, they should be given the information needed to accomplish this task. 

What’s more likely is that each person will need to take part in cybersecurity training. Digital assets are routinely targeted by people inside and outside of your business, so knowing how to protect them is a major point of emphasis that decision makers have to consider. The average worker needs to know how to identify a phishing attack, the best practices of data transmission, and what are good and bad practices when interacting with cloud-based and other online-based resources.

At Coleman Technologies, we know just how important keeping malware and unwanted visitors out of your network is and can help you with your cybersecurity and network security training platforms. Our team of professional IT technicians, and our dedication to helping businesses keep hackers from negatively affecting business, can go a long way to help you establish the training platform you need to keep your business' digital assets secure. Call us today at (604) 513-9428 for more information.

Continue reading

IT and Professional Services: A Strategic Relationship

Times have changed.

Today, the professional services industry is experiencing somewhat of a makeover. The effort-based expectations of the past are being replaced with outcome-driven expectations, leaving many professionals looking to technologies to help their businesses manage this shift in expectations. Typically, businesses begin their quest for efficiency by automating mundane portions of the business. This creates cost savings and promotes speed. The problem this model presents for professional services firms is that they don’t have many parts of their business that can be automated.

Since the front office and the back office of many professional services firms have some form of disconnect, and much of the work dictates that a person handles the intricacies of that work, automation isn’t really an option. That doesn’t mean there aren’t ways for professional services to utilize new technology to promote faster, more accurate, and more efficient operations. One way that professional services companies can improve is by making a digital transformation.

What Is a Digital Transformation?

The digital transformation refers to shift from analogue systems to digital ones. Over the past twenty years many analogue systems have been retired to make way for digital ones. This includes cloud-hosted solutions for time and resource management, productivity and collaboration, and even for the archival of information. The added efficiency a professional services firm can gain from committing to digital systems--especially in the processes listed above--is sure to quicken the pace of your business’ operations. Let’s take a look at the technologies some of the most utilized professional services companies are beginning to use. 

Medical Practices

Medical practices have been improving their IT under mandate for almost a decade. How has the digital improvement gone? A study from 2018 showed that 60 percent of practices that have upgraded their information systems have had a positive experience, while 23.5 percent had (what they’re calling) positive-to-mixed results. Only eight percent reported having a negative experience implementing technology. It took healthcare officials at every level working together to achieve digital transformations that help fuel electronic health records and other technologies used to help curtail cost redundancies and promote the delivery of comprehensive care.

Law Practices

There are a lot of lawyers that like to continue to do things the way they always have. After all, it is one of the oldest professions and there is a standard of decorum that many lawyers adhere to. In many ways the legal profession remains unchanged. That doesn’t mean that they aren’t using technology. The profession as a whole may not benefit from automation as much as other professionals, but it still does benefit through other solutions like document management, mobile management, and other digital systems often utilized with remote workforces. 

Most professional services firms are, like most other businesses, using information systems to improve operations and be the best firm that they can be. If you are working in the professional services market and would like to learn more about how your firm would go about making a digital transformation, call the professional service experts at Coleman Technologies today at (604) 513-9428.

Continue reading

Considering How to Monitor Your Employees

Which seems a little ridiculous to me, if I’m being honest. Your staff is one of your biggest investments. On top of that, it is important to remember that, since your employees are human beings, pushing them to do more might actually result in them accomplishing less.

In my experience, the best way to help an employee accomplish their best is to track their performance and evaluate their next steps. Is this always foolproof? No - but as I said, in my experience, it is the best way.

Understanding Employees

Before we go any further, it is important that I make something clear: we are proceeding with the understanding and acceptance that your employees are like any others: flawed human beings, capable of a lot and likewise distracted by a lot. Either way, holding them to the same standards as we would some automated alternative is unfair, as I am sure you would agree.

However, and somewhat unfortunately, this often isn’t the impression that employees get from management. Some common complaints from employees are:

  • Their workplace lacks communication.
  • They have no job security.
  • They aren’t paid what they’re worth.
  • Credit isn’t given for their hard work.
  • Favoritism is alive and well in the workplace.
  • Management constantly has them under a microscope.
  • They have to deal with managers who are incompetent.
  • There’s just too much work to do.

Now, put in a list like this, these don’t look too great, and you may want to shrug them off and assume that they aren’t happening in your company… they almost certainly are.

Having said that, I want you to think back to when you once worked for someone else. How did you feel going in every day? Now look at that list again - some of those line items may have helped motivate you to go into business for yourself.

Let’s face it - entrepreneurship isn’t something that people are really “born to do”...it is a decision that people make, usually after paying their dues and working for other people and seeing ways that they would do things differently (or in their minds, better). Some staff members love working for certain people, and other staff members don’t, occasionally acting on it.

The point of all this: people are people, and as such, there is no single equation for dealing with employees well.

This means that, no matter what you do and what style of management you use, not all employees are going to be a good fit at your company. This means that, along the line, someone was going to feel displeased about their work situation.

Remember, while you should still be doing everything you can to make the work environment as amiable as possible for your employees, some just aren’t going to be a good fit, and may need to be addressed in other ways.

Is It Ethical to Monitor Your Employees? Or... Legal?

At the end of the day, it is important that you realize while payroll can be your greatest investment, it can also be your worst. This means that you need to keep track of how your employees are performing and spending their time in the office, which leads you to the prospect of actually tracking your employees in the workplace.

This opens up a few more questions, starting with the data you are actually collecting. What is it that you are trying to track? Should you keep it simple, monitoring attendance or the number of hours an employee actually spends in the office? Are there different performance indicators that you like to keep updated metrics concerning? Do you want to monitor keystrokes, making sure that they are working diligently throughout the day, or their browsing histories to make sure they aren’t putting your company in jeopardy by visiting sites they shouldn’t be?

This is where things can get a little murky as far as business ethics are concerned. How much do you really need to know, and how much will you collect as collateral data?

As it stands today, employee monitoring software is in high demand, the market growing as more businesses decide to protect themselves against theft by an employee. The consensus seems to be swaying toward the opinion that you can’t trust your employees not to take advantage of you, either by stealing data and other resources, or dishonestly reporting their time.

There is also a lot of license given to businesses in terms of what can legally be done to protect their own assets, especially where an employee’s privacy is concerned. Courts have ruled in some cases that a company can track an employee’s behavior after they have left the confines of the office. Consider the permissions that a user needs to agree to in order to access work-related files on a personal device. There is little to stop the employer from also going through private messages with that access.

So yes, it is currently legal to monitor your employees, which means the decision really falls to you and your conscience. Of course, this may change, or it could just as likely stay the same. Privacy is a contentious subject these days, with no clear indication of how things will turn out when (and if) it is ever settled.

Mindfully Monitoring Employees

One of the hallmarks of employee monitoring is the fact that the monitoring itself is kept about as hidden as the behaviors it is meant to catch. Whether you’re keeping an eye on your surveillance footage, web activity, internal correspondence, or keystrokes, the person being monitored traditionally would only find out if they were told… which isn’t something that companies have traditionally done, either.

I would urge you to actually break from tradition here.

Ethics aside for a moment, it just makes more practical sense to inform your users how their activity is to be monitored. Not only will this transparency help you build and maintain trust amongst your users, but it can also help keep issues from developing in the first place. Think about it - what happens when people realize there’s a patrol car on the highway? They immediately check the speedometer and correct their speed. Transparency has a great way of acting as a deterrent in that way.

You also want to consider the kind of metrics you’re actually collecting before you evaluate your employees based on them. Do the metrics line up with how the employee provides value to the business, and/or the actual value they deliver? Look at it this way - when you’re looking to buy an appliance, like a toaster, you won’t find out how well the toast is browned by measuring the length of the power supply cord. Metrics can be useful tools, but only where they practically apply.

Finally, don’t give up on your employees too quickly. If your monitoring picks up on one of your staff members having a tough time, try addressing the situation as your first option. Sudden downturns in employee productivity are usually caused by something, and that something might be fixable. This isn’t to say that you shouldn’t terminate an employee if you need to, just to consider alternatives before diving into the hiring process again and losing what may still be a valuable resource.

What are your feelings on employee monitoring, and using these kinds of solutions? Share your thoughts in the comments section, and check back in with our blog to learn more about optimizing and securing your business’ technology.

Continue reading

Tip of the Week: Helpful Outlook Tips

Consolidate Your Email with the Clean Up Tool

Businesses will often use email to communicate between groups of people, which is a really useful practice for keeping people apprised and in-the-know of what’s going on. However, these messages can quickly become repetitive, incoherent messes--especially in chains made up of larger groups--as participants reply to them, duplicating the thread within itself. Outlook includes a utility known as the Clean Up tool to fix these problems in your email conversations, and even in entire email folders.

By finding the Clean Up icon in the ribbon at the top of your Outlook window, you can access a drop-down menu. This menu offers to Clean Up Conversation, Clean Up Folder, or Clean Up Folder & Subfolders. Once you’ve confirmed your choice, you can access Clean Up settings, which allow you more granular control over how the tool sorts through your existing conversations.

Schedule Out a Message with Future Delivery

Sometimes you’ll have an opportune moment to send an email, but it isn’t the right time for this email to be received. For instance, if you want to share something with your employees to keep in mind throughout the next day, it doesn’t make sense to distribute it at the end of the day before for it to be forgotten. Outlook allows you to use your opportunity to your full advantage with Future Delivery.

Once you’ve written an email, click on Options, and then Delay Delivery. This opens a Properties box for that specific message, including Delivery Options that include a checkbox labeled “Do not deliver before.” Selecting this option and specifying a time and date will prevent your recipient from receiving your message before that point. Once you’re satisfied, close the Properties box and send the message just like any other.

Taking Advantage of Shortcuts

Keyboard shortcuts are used to simplify access to commonly-used functions in many computer programs and applications, and Outlook is no exception. For instance, Outlook features shortcuts for a wide range of its functionality - covering the basics (like composing a new message by pressing Ctrl+Shift+M), organizational tools (like moving a message with Ctrl+Shift+V) or annotating your messages (like adding flags to important ones with Ctrl+Shift+G).

This is really just the start of Outlook’s capabilities to help your operations. Subscribe to our blog to find out whenever we post other tips or IT blogs.

Continue reading

Software Patching in the Cloud

With so much computing now done in cloud environments, it is important to address how this approach can benefit security, but still need to be secured.

How Patches Benefit from the Cloud

It isn’t a secret that any kind of software, from applications to entire operating systems, can have holes in it. These security flaws and issues could easily leave a business vulnerable to attack if they aren’t resolved. This is why software developers will issue patches, which are just corrections to these mistakes, for users to install. By applying the patch, the user is protecting themselves from threats that would otherwise exploit that vulnerability - but just on the system where the patch is installed.

Now, consider how many computers some companies use, and all of the different software titles that would be found on each.

Can you imagine going to each one and applying an update, each time a patch was released? Furthermore, you have to consider that more and more devices are mobile nowadays. This means that there is no guarantee that every device is present when someone goes on their patch application marathon. Factors like these frequently lead to incomplete patch deployments, and as a result, holes in organizational security.

However, by utilizing the cloud as you manage your organization’s patches, the device no longer has to be present in order to receive the patch. Instead, the cloud can be used to push it out to all of your devices, so once they connect to the Internet, the patch will be implemented. This means you can keep your employees using the solutions you want them to use, assisting both your productive operations and your security.

How the Cloud Benefits from Patches

However, it is important to take note that all the cloud is, is a computer located somewhere else (often owned by someone else). As a result, it can also be vulnerable to flaws and issues of their own - which is why you need to be sure that your cloud provider is properly maintaining the cloud solution with its own patches. This is especially the case if you are using an internal cloud solution.

Coleman Technologies can help you keep up on your updates, whether they involve the cloud or not. Reach out to us at (604) 513-9428 to learn more about our services.

Continue reading

Which Backup Strategy is Best?

Keeping Your Strategy Simple

One basic strategy to sorting out your data is to backup the files that you can’t feasibly replace otherwise. This simple, yet effective approach could easily save your business… but, why go through the effort of sorting through your data at all?

Seeing as your data is one of - if not the - most important resources that your business has, why not just back up all of it?

This endeavor becomes much easier with the Backup and Disaster Recovery appliance that we offer, as it can easily map out and replicate your data stores. Now, it must be said that not every business generates enough vital data to justify a large investment into a data backup. However, as we mentioned above, today’s threat landscape means that what data you do have needs to be protected.

Your Backup Options

There are several different varieties of data backup for you to consider, keeping in mind what it is you are backing up and when you need those backups to be ready. These backups include:

Full Backups

As you may have gathered, a full backup copies all of your data and configurations and saves them to a single platform, whether that be a NAS (network attached storage) device, a cloud backup, or tape (pro tip: don’t use tape backup).

This has the benefits of offering a comprehensive backup that you need, with quick restoration times for single files or folders. A full restore takes a much longer period of time to complete, and full backups are more expensive due to the greater need of storage space. Any backup strategy will typically start off with a full backup.

Incremental Backups

This kind of backup keeps track of any changes that are made to data, which allows it to be used for data that is continuously updated. The costs of an incremental backup are quite reasonable, making it a good choice (despite not being totally comprehensive) for a business that generates large amounts of data.

Differential Backups

Similarly to incremental backups, a differential backup keeps track of changes that are made between the times that a full backup is run, keeping their backups more up to date.

Mirror Backup

This kind of backup is best for redundancy, as it creates a mirror image of the system that is being backed up. While these backups are the fastest to restore, they also take up the most storage space.

Depending on your business’ particular needs, a backup can be run weekly, daily, or even as frequently as every 15 minutes.

Following the 3-2-1 Rule

The 3-2-1 Rule is a simple way to remember what you need to maintain if you want to keep your data protected enough. Here’s how it breaks down:

  • 3 copies of your data
  • 2 stored on different media types
  • 1 copy offsite

This strategy makes it so your data is both secure, and convenient to you.

To learn more about data backups and best practices concerning them, reach out to Coleman Technologies at (604) 513-9428.

Continue reading

Tip of the Week: How to Control File Sharing in OneDrive

In OneDrive, a user can share a singular file or folder pretty easily. All they have to do is log in, right-click on the file/folder, and click Share.

Sharing this way allows a user to share their content with one of their contacts, send it to an email address, or copy a shareable link and send it along through an instant message or, again, and email. Doing so gives the recipient access to make edits to it by default, but the sender can restrict them to read-only access if desired.

However, you probably don’t want to micromanage your entire team to make sure they are sharing files and folders with people actually authorized to receive them. Fortunately, by using the global settings of OneDrive, you can take control past the file/folder basis to control how a user can share documents.

Controlling a User’s File Sharing in OneDrive

Assuming that you have administrative access over your OneDrive account, sign in by visiting https://admin.microsoft.com/ before proceeding with the following steps:

  •  Look for Admin centers on the left side of your display. Click SharePoint.
  • You should then be directed to the new SharePoint admin center. If you are brought to the old one, you can go to the new on by clicking on Open it now.
  • Again, on the left side of the screen, find Policies and click on Sharing.

Doing so means that you have edited the global settings, applying your changes to all accounts. To manage settings on a case-by-case basis, access Users, Active Users, and select the individual who you are attempting to manage. You should find a OneDrive tab, with adjustable Sharing options.

With privacy and security being so critical for contemporary businesses, you need to make sure you are doing everything you can to maintain control of your company’s information. Our security experts can help - reach out to us at (604) 513-9428 to get started.

Continue reading

Are Cloud Servers an Option?

The Decision

It may seem pretty simple, but there really are a lot of variables to consider. How important is uptime to your business? How much capital are you willing to spend? What are you using the server for? These questions (and more) need to be addressed before you decide which way to go with your IT.

Benefits of an In-House Server

The physical server option brings with it some substantial benefits. Firstly, it gives you physical control over your infrastructure, and therefore keeps all data in one central location. It also provides a way for administrators to eliminate third-party access of server resources. Secondly, you have several networking options. It is the only time that the Internet is not necessary, as all inhouse servers can use wired or wireless networking to transmit data over internal network. For the small business, an in-house server can be the most cost effective. 

Detriments of an In-House Server

The biggest detriment of the in-house server is the upfront capital outlay. In order to have an effective IT infrastructure set up, your company will need to fork over thousands of dollars to purchase the hardware. Then, once it’s set up and working, you will need to pay to maintain it, so without a structured IT department or a managed IT service agreement, you won’t have any uptime guarantees. 

Benefits of a Cloud Server

Hosted solutions can be right for your business, but first you have to understand what exactly you are gaining. Firstly, unlike in-house servers, you don’t have to have a pile of cash dedicated to build a cloud server. Moreover, when your business grows, you won’t have to worry too much about scaling the hardware, you can just purchase all the computing that your organization requires. 

Most cloud servers come with all the support that is needed as well as full redundancy, a consideration that has to be made no matter what type of infrastructure you choose to implement.

Detriments of a Cloud Server

The main detriment of the cloud server is that, over time, it will be more expensive than in-house servers.  Another potential deal-break for some organizations is that if they\ absolutely demand to have control over their hardware, most cloud platforms will not abide. Storage costs can also be substantial, especially for businesses that have a lot of media.

Of course, with the technology as it is today, companies can start with a reliable in-house computing structure and expand into the cloud for more productivity-fueled endeavors. One thing is for sure, to keep your business’ data safe, you need to have solid and consistent management of your servers. 

If your business needs some expert help selecting the computing construct that will help you run your business effectively, don’t hesitate to reach out the IT technicians at Coleman Technologies at (604) 513-9428. 

Continue reading

To Save Your Business from Disaster, Backup is Crucial

While not all of your data may be equally valuable, data loss is a bad thing across the board. This is precisely why Coleman Technologies offers comprehensive data backup and disaster recovery solutions.

Backing up your data allows you to sidestep the potential catastrophes that would come with the loss of your most critical information. Here, we’ll review a few situations that could put this data at risk to demonstrate how crucial having a backup really is.

Situation: Actual Disaster Event

Just about every business on Earth could potentially be impacted by some kind of weather event. Some deal with hurricanes, some deal with high winds and tornadoes, others with earthquakes and floods… you get the picture. Unfortunately, whichever one impacts your business, there isn’t very much you can do in the moment - which is why it is important to prepare now, so you can reopen again after the fact. Many don’t prepare, and therefore, don’t reopen.

Acting proactively and maintaining a backup allows you to more quickly bounce back after disaster has struck, allowing your business a second chance.

Situation: Data Corruption or Theft

Cybersecurity is a huge topic today, as there are many, many threats out there designed to target businesses. Take ransomware, for example: all it takes for you to lose access to your files is for an employee to click on the wrong thing. Not good.

However, using a BDR (in conjunction with a comprehensive business continuity plan) to keep your files safely backed up enables you to quickly restore data from an onsite backup copy of your data, while keeping another copy offsite for redundant protections and simplified migrations. This keeps you safe from a variety of threats, including ransomware and many other forms of malware. 

Situation: The Classic Office “Whoops!” Moment

The BDR is supremely useful in that it gives you an on-demand resource to pull your data from, on demand, as it is needed. This is particularly handy if a team is collaborating on a project, and somebody accidentally deletes something absolutely critical to the project. With a backup, your progress won’t be lost to bad luck.

A BDR allows you to breathe a little easier about your files and their security. To find out about adopting one for your business, reach out to Coleman Technologies today. Call (604) 513-9428 to get started.

Continue reading

Like IT or Not, You Need to Keep Up

Admittedly, it can be easy to roll your eyes at statistics like these. If a method works consistently for a business, why go through the trouble of changing it? Why is it that you have to adjust how you do business, just because someone else has?

Well, there are a few reasons.

First, I want you to consider why we use computers today, rather than typewriters, or send emails and instant messages instead of carrier pigeons. It isn’t that the more traditional alternatives were inherently bad, it’s just that the technology that replaced it is better.

The technology that we all use today is still improving - becoming faster, more powerful, and more capable than what was introduced not all that long ago. 

Technology follows something called an s-curve - gradual improvement as a new method is introduced, sudden acceleration in the improvements that are made, and then it peters out as the technology reaches its limits. At this point, a new technology is presumably introduced, and the process resets.

Each time a new improvement is introduced, you have the opportunity to use a better tool than your competition does… but the same can go the other way, too. If your competition pulls too far ahead of you in its capabilities, your customer service capabilities won’t matter when compared to a service that is just better.

Using up-to-date technology solutions makes your business more efficient. When you’re dealing with a business, how long are you willing to wait to receive your promised services? 

Not only do inefficient services wear down a client’s patience, longer operations are inherently more expensive - so, in a way, you wind up spending more money to deliver a less satisfactory product or service.

Not good - but again, easily fixable with more recent solutions, like automation. Automation makes operations a lot quicker by eliminating rote processes, accomplishing this as your employees work on other things. 

Finally, you have to consider your business’ security. When so many cyberattacks are now run almost completely self-sufficiently, the protections that your business relies on will have to work far faster than any human being could.

On the other side of the coin, an increasing amount of cyberattacks are relying on human fallibility in order to take root. When phishing attacks (think the Nigerian Prince scam, but more refined and directed to your users) targeted a reported 76 percent of businesses in 2018, you need to know that you and your employees can spot them. By helping you implement the security solutions you need to protect your business on the digital side of things, and by educating your employees on how to spot threats and issues, Coleman Technologies can help keep your business safe and competitive.

Our team would be happy to talk to you about implementing the IT solutions your business really does need to remain competitive. We can also remotely maintain it for you, allowing you to go about your business without having to worry about it. Please, reach out to us at (604) 513-9428 to learn more.

Continue reading

How IT is Driving Innovative Developments

Innovation Technology

Information technology systems are the foundation of the many processes that a lot of businesses rely on. These systems enable you to store data efficiently, putting it to use and interfacing with it collaboratively - but as these systems are so crucial, they must also be properly monitored and maintained.

After all, without its technology, a business that relies on said technology isn’t going to be able to accomplish much.

This has been a driving force behind innovations to technology - boosting reliability, introducing transformative tools, and advancing both business and society at large. However, since this isn’t particularly easy to put into practice, various industry thought leaders have been actively attempting to transform a variety of considerations, including:

  • Applications
  • Infrastructure architectures
  • Service delivery
  • DevOps
  • Production operations
  • Security
  • Compliance

This has effectively been accomplished by developing solutions to meet assessed needs. As a result, new solutions are being thought up to help expand IT from its role in support to actively promoting key business tasks.

Leveraging Cognitive Computing Investments

Cognitive computing is the processing of business data through a combination of machine learning, artificial intelligence, and other powerful computing resources. With these systems, patterns can be recognized, data mined, and language processed far more efficiently than without. With more information, businesses that leverage cognitive computing can see considerable benefits:

  • Enhanced business agility via quicker decision making
  • Consistent process scaling to meet operational and budgetary demands
  • Improved business performance and efficiency

Using these technologies also allows you to support various other aspects of your operations, both internally (filling out your operational structure) and externally (automating customer retention efforts). By making a business more “intelligent,” these investments can provide a competitive advantage, as well as more diverse means of generating revenues.

Smarter Security

A data breach can be catastrophic for a business - and attacks happen far too often today to be ignored. Quite a few tools have been developed to help block out these threats, as well as improve internal data security initiatives.

Of these tools, many leverage AI and machine learning to adapt a cybersecurity policy to better match the threats a business contends with. However, these systems aren’t impervious to threats, which means that business owners need to identify their potential risks, including:

  • Remote access - With the rise in remote workers and other mobility enhancements that allow data and applications to be accessed from outside the network, the connections that enable this access need to be secured.
  • IoT - The Internet of Things has seen an explosive growth in popularity, but with the unfortunate side effect of bringing insecure endpoints into your business. You need to have a strategy to minimize the risks they present.
  • Regulatory requirements - Some businesses and industries have additional rules that they must abide by passed down by the government. You must ensure you are meeting any conditions that apply to you.
  • Hackers and cybercriminals - While businesses now have access to better tools, so do hackers. This requires you to remain vigilant in your network security.

It is also important to mention that this list is far from comprehensive - there are many more threats out there to resist, avoid, and otherwise defend against. Today’s tools are the most effective way to accomplish this.

To learn more about how you can adopt technology that helps your business succeed, reach out to the IT professionals at Coleman Technologies.

Continue reading

Why Your Technology Needs Upkeep, Updates, and Upgrades

Upkeep is Simplified Via Network Monitoring

It is a well-established fact that, for a computer network and other IT solutions to continue working effectively, it helps to maintain them. In turn, this requires them to be monitored so that potential and developing issues can be resolved… which means that someone will have to be responsible for that monitoring.

Now, you could hire an additional employee to handle that part, but one person just isn’t going to be able to both maintain your business and see to the other considerations we’ll cover here. A better option would be to hire that employee, supplementing them with an agreement with Coleman Technologies. We can handle the network monitoring aspect, allowing your internal resource to help you strategize how your strategy will develop - but more on that later.

Updates are Managed Per the Managed Service Agreement

Between performance improvements and heightened security, it isn’t as though software developers stop improving the solutions they release until the official end-of-life date passes. However, while these improvements may be available, do your employees know that they are?

This could be one more thing you don’t have to worry about with Coleman Technologies on your side. We keep our ears open for industry news and will install updates for our managed service clients… we’ll even do so after hours, so as to not interfere with your operations. 

Upgrades are Strategically Prioritized

It isn’t uncommon for people to turn to an expert opinion for assistance in making a decision. As the IT experts around British Columbia, we’ve fielded a lot of questions about improvements to existing technology. As we said before, we can help you come up with a strategy for your technology that allows you to make optimal use of it, and this strategy includes the upgrades you should make. Upgrades keep your business safer, more efficient, and as a result, help you to be more productive.

We can help you decide which upgrades you need to adopt next, referencing your current solutions and needs to inform your strategy. Then, we can handle your vendor relationships on your behalf, possibly getting you a better deal than you would have otherwise.

Reach out to us to learn more about these solutions and services, or any of the others we offer. Call (604) 513-9428 today!

Continue reading

Protecting Private Data Should Be a Priority

Personal Information

Before we get into the strategies of protection, let’s identify what constitutes personal information. It includes:

  • Full Name
  • Phone Number
  • Email address
  • Birthdate
  • Social security number
  • Passwords
  • Biometric data

If you consider how many times a business has asked you for this information, you will understand just how exposed your personal data is. You may not consider it a big deal until you are in the throes of a situation where your identity has been stolen. 

You Need to Maintain Control

Your personal information is exchanged in nearly every transaction you take part in online. In response to this, you need to understand what these organizations use this information for, and how exposure of your sensitive data diminishes your data privacy. Obviously, the goal is to keep this information out of the hands that will take advantage of it and bring detrimental situations to your doorstep.

Once you realize that you can’t trust companies with your personal information, you have started to understand the lay of the land. In Europe, the establishment of the General Data Protection Regulation (GDPR) brought the first major privacy protection law, and you are beginning to see more governments considering what to do in regard to data privacy. In many parts of the world, privacy has been nonexistent. Monitoring your information is a great way to turn that trend on its head.

As of now, people continuously distribute their information to organizations with the confidence that those organizations are going to keep that data safe. This hasn’t worked out that well for the individual, but that doesn’t seem to deter them from sharing this information anyway. 

Only 10 percent of people feel like they have control over their own data, but less than 25 percent of surveyed respondents believed companies are doing enough to protect it. What is strange is that 92 percent of respondents of the same survey said that they would like to have absolute control over their personal data, with 87 percent seeking the ability to remove personal data from the Internet if it negatively affects their reputation. 

Privacy Solutions

Just being diligent about who you give your data to simply isn’t enough to protect it; and with so few options available to do so, an individual’s best bet is to understand the threats they face. These include:

  • Vulnerabilities in applications - Data breaches are mostly caused by software that isn’t updated with up-to-date threat definitions. This problem can happen to any organization that isn’t diligently updating the software it uses.
  • Poorly trained workers/sabotage - You wouldn’t believe just how many massive data breaches are caused by the people that a business depends on the most. If your staff isn’t properly trained, or you have disgruntled employees that have access to sensitive information, those situations could end poorly for you. 
  • Lack of response - Even if you have all the security you need in place, breach is still a possibility. That’s why it is crucial to be prepared in the event of a breach that your organization has the tools and expertise to mitigate the situation before it becomes a problem. 
  • Refusal to dispose of data - Your organization may find the data it takes in useful for multiple reasons, but if you sever ties with customers, vendors, and staff, it is your responsibility to securely dispose of their personal information. A failure to do so in a timely fashion could lead to a negative situation. Get rid of the data you no longer need, especially if it contains sensitive information.
  • Collection of unnecessary data - If data is a form of currency, it stands to reason that it will be shared between companies. If you don’t need the data, however, why do you have it? Possessing data you don’t intend to use--or don’t need--can lead to losing track of it. 

People provide personal information all the time, and unfortunately, the organizations they are giving it to don’t understand how to protect it properly; or, worse yet, actively use it for their own monetary benefit. With the lack of effort by these organizations, individuals have no choice but to take a diligent approach to keep sensitive data away from hackers, and keep their identities secure. 

If you would like more information about data security, visit our blog at www.colemantechnologies.com today.

Continue reading

Tip of the Week: Your Cybersecurity To-Do List

Preventing Phishing

Phishing has been becoming more and more of a favorite tactic by hackers, meaning that you and your employees need to look at any messages that come in via your email (or other solutions) with a critical eye. Here are some practices to help you minimize the influence of phishing on your business:

  • Watch for “Urgent” messages (or, for that matter, “URGENT!!!!!!” ones). Many phishers will try to manufacture urgency to make sure you click without taking a moment to consider it may be an attack. Resist this knee-jerk response.
  • Review in detail. Many phishing messages show distinct warning signs, such as blatant spelling or grammar errors (but this may just be the person you’re talking to as well). You can find other, more reliable signs by giving any links or the email address of the sender the “hover” test. Without clicking on anything, hover your cursor over the links and a small pop-up box will appear. This box will show you the address that really sent the email, or the link that you would actually be redirected to. Check to make sure all the details are kosher. For these reasons, it’s recommended that you don’t click on any links in emails. Instead, retype the URL into your web browser.
  • Double-check with the sender. If you have access to another means of communication with the supposed sender of an email, reach out to them using that other means to confirm that they sent it. If they didn’t, it’s a pretty safe bet that the email is fraudulent.
  • When in doubt, assume the worst. If you just aren’t sure how legitimate a given email is, don’t click around in it. Assume that it is a phishing attempt, and report it to your IT provider.

Establishing Safe Browsing Habits

Unfortunately, there are plenty of threats that reside online, and it is only too easy for a user to unwittingly allow them in. Make sure your users abide by the following policies to minimize the threats you’ll potentially need to deal with.

  • Think before you click. Similarly to links found in emails, there are plenty of opportunities online to let in a threat. Consider what you’re clicking on before you do so. (The “hover” trick works well here too… check out the bottom of the window.)
  • Reserve business computers for business purposes. Non-work-related browsing can bring users to websites that can host threats without the user realizing. Discourage your users from surfing the web, downloading content, and doing other things online unless they are work-related.
  • Moderate access. Use firewalls and content filtering to keep unwanted content off of your network, and users from accessing unwanted content, respectively.
  • Trust your IT resource. If you are even the slightest bit unsure about something, whether it’s a program you’ve been prompted to install or making sure your settings are focused on maintaining security, reach out to IT for assistance.

Enforcing Strong Passwords

It seems that everything requires a password these days, which makes it all the more important that you and your users are aware of how to keep them safe - especially in the workplace.

  • Don’t recycle passwords. Once a password has been used and replaced, it is best to not use it again - this is why you’ll often find a “you have used this password too recently” message if you attempt to use it again within a certain timeframe. This is the same reason that passwords should not be used for more than one account - if that password is compromised, you’ve just lost control of multiple accounts.
  • Avoid easily-guessed passwords. As a way to try and come up with a password that is easy to remember, many people will resort to using common elements in their password - pet names, maiden names, birthdays or anniversaries - or use a simple phrase or a string of numbers. The entire point of a password is to make it so that others are unable to access one of your accounts, so making it something that can be guessed is counter-productive.
  • Consider leveraging passphrases instead. Passphrases are not only typically more secure than a password, they also have a tendency to be more memorable. Let me ask you this… which of these two would you find more memorable, “F4njUJ29S5” or “pearquiethigh?” You can also use basic substitution to make you passphrase more secure, turning our example into “pe@rqu!e+h!gh” instead.
  • Use a password manager. One of the main reasons that people reuse passwords so often and neglect to change them is the fact that they are scared of forgetting them. A password manager can help reduce this by securely saving all of your different passwords behind one master password. 

Protecting Your Business’ Data

Finally, there are many threats out there to your business’ data - including any you have on your clients or your employees. You have a responsibility to yourself, as well as these clients and employees, to make sure that this data is as secure as possible.

  • Make sure your business’ data is backed up. There are so, so, so many ways that your business could lose its data. While it may be attacked, it could just as (if not more) easily be lost due to equipment failure, user error, weather conditions… the list goes on and on. If your on-site data is lost, you will want to make sure you have an up-to-date copy squirreled away in the cloud to reference.
  • Protect your assets with access control. You need to be concerned about both the security of your digital files, and of your actual business location. If you’re using multi/two-factor authentication to secure your online resources, or requiring identity confirmation in order to enter certain areas of the business… you need to be doing both.
  • Maintain your security solutions. The thing about security software is that it isn’t something that you can just set up and count on indefinitely. Attackers are always examining these solutions to find vulnerabilities, so it is important that you regularly update and patch the ones you use to keep them safe. Every solution you have should actually be set up with security in mind. A glaring example is your company’s wireless. Not only should that be secured with a password, it should be hidden away from outside users.
  • Keep your payment options compliant. For your sake, and the sake of your clients, you should make sure your business is compliant to whatever regulatory standards that apply to it… including the Payment Card Industry Data Security Standard (PCI DSS).

Following these guidelines is a great start to ensuring your company’s security. Coleman Technologies can help get you this far, and beyond. Reach out to us at (604) 513-9428 to learn more about what we can do.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

Business technology can sometimes seem like a hedonic treadmill: you maintain a baseline level of operation with your IT, but it will inevitably fail, leaving you in the tough situation of having to replace it. Today, we want to help you get ahead of...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image