Award-Winning IT Services Backed by 25 Years of Experience – (604) 513-9428

Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Cloud Services Are the Rideshare of Business Computing

How the Cloud is Like a Rideshare

Cost Efficiency

Let’s say you are with three people and you need to get someplace and don’t have access to a car. You all could call an Uber or a taxi that would cost you $20 or so. If you are going to the same place, you could all share the cost of a ride for $7 each. You all get to the same place for a fraction of the cost. 

This is a lot like how cloud services work. Since you are paying for access to storage, processing, or application deployment on an outside computer, you are just paying rent for the privilege. This means that you can get the computing resources your business needs at a substantial cost savings. This is because you are often not the only one using these resources. 

Just like you pay less if you split your transportation costs, cloud service companies allow for substantial cost savings by virtualizing computing resources and making them available at attractive rates. 

Reduced Maintenance

The combination of leasing these virtualized computing resources, while taking on a majority of the management of these resources, provides substantial value for businesses and individuals. 

Let’s say that, to continue the rideshare metaphor, you decide to lease a car from a local dealership. One day the car breaks down. You’ve spent a premium amount of money trying to get a reliable ride to work, but if you don’t have access to your car, your investment isn’t cost effective. This is the same experience a business has that purchases hardware and has issues with it. Outsourcing the computing resources (or the management) ensures that you have continuous, reliable access to them. 

Productivity

Finally, just like ordering a shared ride, cloud services allow you maximize productivity. With cloud computing you can even work from anywhere with an Internet connection and utilize your time reliably. Turning to cloud computing resources is a great way to free yourself from the costs of purchasing expensive hardware, while giving you the resources your business needs to get where you want to go.

If you would like more information about cloud services and how they can improve your business, call the It experts at Coleman Technologies today at (604) 513-9428.

Continue reading

The Three Key Steps to Stop Malware

Lock. Everything. Down.

Did you know there are entire websites out there, devoted to providing the default factory passwords for different devices? They aren’t on the Dark Web, either - this is on the visible, indexed Internet. Imagine if I were to come in with some idea of what brand of routers you had… if I had the right default credentials with me, I could easily access your router and wreak havoc in your business.

You need to consider every potential access point into your business and ensure it is properly secured. The same goes for any online accounts associated with your business, like cloud storage. Take the time to make sure that everything is secured with a password that meets best practices, and if memories are an issue, use a reputable password manager to simplify the task for your employees.

This also goes for your physical location. Many access control solutions exist that enable you to keep track of who accesses a certain area, and when, with the added benefit of keeping those without authorization out.

Keep Your Antivirus Updated

Many people may assume that, once they’ve installed an antivirus/antimalware solution, they are all set. The trouble is, more malware is being developed all the time, and there’s a good chance it is being developed to help the malicious software get past your antivirus. As it happens, the developers of the antivirus are aware of this, and frequently add new threat definitions to the software to make it more effective.

However, all the threat definitions in the world will do diddly-squat if your antivirus solution isn’t updated to include them. This is why it is important to keep an eye on your network’s health and take the time to check that you have the latest definitions included.

Keep a Backup

Finally, you have the nuclear option against malware… mutually assured destruction, that only you can recover from. That is, as long as you’ve been maintaining a proper backup.

If you should fall victim to a malware infection, completely wiping your devices and quite literally starting from scratch with them is your best hope of getting rid of it. However, in order to keep yourself from crippling your own business while doing so, you need to maintain an ace in the hole. By keeping a backup that passes best practices, you can be sure to have your data if you have to sacrifice your original copy.

Coleman Technologies can help you do all of this, and more. Reach out to us at (604) 513-9428 to learn more.

Continue reading

Business Continuity Includes Preparing for Death

We talk about Business Continuity a lot. Usually when we discuss it, we’re talking about backing up your data or having a plan in place to bounce back after a major disaster were to happen.

For example, if a fire were to take out your server room, what steps have you taken to prepare for it, and how quickly can you be back up and running?

The answer should be something like this:
We have our data backed up to an internal device in the server room. We can always rely on that, provided that the backup device remains operational. In the event that the backup device suffers from the disaster, we also back up our data in the cloud. The restore is a little more complicated, but we can manage for a few days from the cloud-based backup while new infrastructure is installed onsite.

That’s a really solid answer, and that is something that we specialize in helping British Columbia businesses achieve. However, that’s your backup strategy. That’s just a small part of your overall business continuity. That data backup is a real lifesaver when it comes to a physical disaster, but what happens when the disaster is a loss of life, or incapacitation, or even just a key individual suddenly walking out the door?

Let’s Look at a Scenario

Let’s say Bob is the business owner. He makes all of the decisions, he signs the contracts, he pays the bills. If Bob gets sick or suffers a stroke and becomes incapacitated, who takes over until he recovers? If Bob’s son works for the company, does the son have legal authority to take over?

We’re covering a lot of ground here, but technically, only the courts can intercede and make these types of decisions if it isn’t properly prepared for. You might run into a scenario where the court will choose someone to run the business temporarily while it is decided what to do next. This process can be slow, and the outcome might not be ideal.

If Bob establishes an Estate Plan, he can pick a successor to have legal authority to run the business. The Estate Plan should include a Revocable Living Trust and Powers of Attorney.

Let’s take a moment here to admit that we are not lawyers, and not offering professional legal advice, and that you should consult your lawyer before making any legal decisions. 

On top of all of this, you’ll want the family of the incapacitated business owner to maintain its lifestyle while keeping the business chugging along.

Business Continuity is About Smooth Recovery

Just like how we always recommend a backup device that can restore data quickly without a lot of overhead, the rest of your business continuity plan should cover a broad enough range of emergencies to enable the business to stay afloat during the toughest tides.

That plan should include taking a significant person or role out of the loop and continuing to operate normally. That may require thorough documentation and training for other capable employees before something bad happens.

Does your business continuity plan, or Emergency Action Plan (EAP) clearly cover this? If you would like to have a deeper conversation about business continuity, please reach out to us at Coleman Technologies to set up a call.

Continue reading

A Brief Look at Emerging Technologies

Technology #1 - Blockchain

You’ve probably heard of blockchain before. It is widely known as the technology that makes cryptocurrency possible. Software developers have been working to use the encrypted distributed ledger system to create applications that can help a business secure its processes and create situational transparency. 

Thus far blockchain’s applications are mostly security-related, but the applications for the technology are limitless. Right now, a business can start using blockchain to boost the security of their accounts-receivable process, for contract transparency, and aid the efficiency of their supply chain. 

Technology #2 - Business Process Automation 

Automation has been the name of the game for some time. Today, however, there are more devices than ever to build automated systems with. The smart-technology boom called the Internet of Things (IoT), coupled with advancements in machine learning (ML) and artificial intelligence (AI), is giving businesses more options in which to enhance efficiency. 

Business Process Automation (BPA) incorporates these technologies into business management systems to help a business be able to accomplish more. This boost in productivity can often be pretty obvious on the bottom line. 

Technology #3 - Powerful Collaboration Tools

With technology making collaboration much easier, businesses have begun to promote collaborative efforts. Today, there are several options for the modern business. Businesses are using complete productivity suites like Microsoft Office 365 and Google’s G Suite for collaborative work. They also have begun instituting new communications tools like Slack and Microsoft Teams that couple useful messaging software with dozens of application integrations.

Moreover, businesses are significantly expanding the technology they use to make their BPA strategy more comprehensive. Bringing in interdepartmental collaboration tools that include customer resource management (CRM) is helping businesses operate smarter and more efficiently. 

2020 could be your business’ year to shine. By integrating some of these emerging tools, you could create the efficient operations boost you are seeking. Give us a call at (604) 513-9428 today to learn more about what Coleman Technologies can do for your company.

Continue reading

Windows 7 Has Nearly Ticked Its Last Tock

By many, we mean about a quarter of them.

With the deadline just a week and a half away, we wanted to reiterate what a solution reaching end of support means, how it would impact you, and what your options are.

The first thing to address is what “end of support” actually means. It doesn’t mean you won’t have the ability to use whatever software it is (in this case, the Windows 7 operating system) after the end of support date. What it means is that Microsoft is no longer doing anything to it - including improving its security and patching issues. As a result, the software will lose its functionality over time. Worse, the computer running the software becomes vulnerable, which makes the entire network vulnerable - not a good thing.

To be fair, there are some ways that you can protect your network while still using these devices. For instance, if you rely on a particular line-of-business application that requires Windows 7, you could theoretically isolate a Windows 7 device to allow you to do so. However, to be completely fair, there isn’t any guarantee that you will be protected from vulnerabilities, short of completely taking problematic systems entirely offline.

Therefore, it only makes sense to explore your other options.

Your Other Options

With the deadline as close as it is, you will need to hustle to put any of these alternatives into action:

Upgrade to Windows 10

Objectively speaking, Windows 10 is better than Windows 7, if only for its improved security. Furthermore, it isn’t one of those solutions that requires insanely higher specifications to run. In fact, the minimum numbers you need to operate Windows 10 are as follows:

  • Processor - 1 GHZ or faster
  • RAM - 1 GB for 32-bit or 2 GB for 64-bit
  • Hard disk space - 16 GB for 32-bit or 20 GB for 64-bit
  • Graphics card - DirectX 9 or later with WDDM 1.0 driver
  • Display - 800 x 600 resolution

Mind you, this is all it takes to run Windows 10, not to run Windows 10 well. To improve your performance, we suggest that you make a few alterations - upgrading to a 2 GHz dual-core processor, increasing your RAM to between 4-and-8 GB, and Increasing your hard drive space to 160 GZB, at least.

Purchase New Hardware

While it will cost you a pretty penny, obtaining new hardware (that comes with Windows 10 installed) may be the easiest option, especially when you take your looming deadline into account. Windows 10 and regular updates to it are all included, but it may take some time to configure everything properly.

Virtualize with a Thin Client

In a similar vein as leveraging Chromebooks instead of Windows, you could use your old hardware as a thin client to virtualize your needed solutions. However, despite the reputation that virtualization has as a solid option for businesses, it may not be a practicable option with the deadline pressing so close.

Alternatively, you could simplify this process using one of Microsoft’s services. Microsoft 365 offers a combination of Windows 10, Office 365, One Drive with an included terabyte of storage, and fully featured security. Available at a predictable monthly flat-rate per user, it gives you a solid alternative for at least your productivity-software-using employees.

Regardless, you need to take action now. Reach out to Coleman Technologies today for help. We’ll figure out which approach is best for you and help you with your upgrade process. Call us at (604) 513-9428 to learn more.

Continue reading

Tip of the Week: Working with PDF Files

Rotate the Document

It is very easy to accidentally scan a document into your computer so that it doesn’t appear upright on your display. A program like Adobe Acrobat Pro offers an in-menu option that allows you to do just that - in Document, find Rotate Pages. This option will allow you to select the pages that need to be rotated, and how to rotate them. Other programs may feature a toolbar button that allows you to rotate each page.

Fixing your pages, despite taking a few moments of time, is certainly a worthwhile thing to do, as it makes the document easier to read, promoting accuracy and convenience.

Password Protecting the Document

As long as the person or people who need to see a particular PDF have the proper password, protecting the document in question with a password is a generally good idea - especially if it contains “for your eyes only” information. To make these files as secure as possible, make sure that the passwords are distributed through secure means.

In Word, you can save your files as a PDF using the “Save as” function, simply selecting the PDF option as you do so. You will also see a button offering More options, which brings up a second dialogue box where you can find “encrypt document with a password” in that box’s Options button. By selecting encrypt document with a password, you will have the option to provide a password (and confirm it). At that point, anyone opening the PDF will need to enter that password to view it.

Merging PDF Files

It isn’t uncommon for different parts of the same document to be saved as different PDF files, or for multiple copies to be saved with different information filled in. It is usually better to have all of this information consolidated, to make reviewing it much easier. While many free and paid software titles can allow you to do this, you should reach out to us before you select one, as we can help you make the right choice for your needs - you probably don’t want the program’s watermark on your finished document, or find yourself needing to merge more documents than a free program will allow.

If you’ve already acquired Adobe Acrobat, merging your files is fairly simple. After opening the program, access the Tools menu and select Combine files. Doing so will give you the ability to Add Files… and once you have selected all of the files that should create your new PDF, click Combine. Once they are combined, clicking Save as will allow you to store it where it belongs.

Signing a PDF

Many times, a contract that needs to be signed will arrive as a PDF. While many resort to printing these documents out to sign them, there is an easier way - signing them electronically.

This time, the free Adobe Reader software can get the job done, but you should still check with your IT resource before using it.

If Adobe Reader is approved and installed by IT, you can easily sign PDFs electronically. By opening the PDF file with Reader, you have access to a Fill & Sign button. Click it, then Sign and Add signature. You’ll then have access to three options:

  • Type - you simply type your name into the field, and an electronic signature is rendered (which will not look like yours).
  • Draw - you use your mouse to draw out your signature.
  • Image - you use a scanned image of your actual signature that is then saved for future use.

Once you’ve positioned your signature where it should be, click apply and make sure you save your revised PDF.

Always remember to check with your IT team before you download any software! For more IT tips and other useful pieces, make sure you subscribe to our blog!

Continue reading

Technology: Then and Now

Before we discuss what the last decade brought us, I wanted to remind everyone just how limitless innovations are. Many years ago, many of these inventions or technologies seemed unrealistic for the times.

Let’s go through the past decade’s biggest hits, as well as what we might see in years to come.

2010: When Innovation Thrived

While many technologies were introduced in the 2000s, the 2010s saw these technologies used in bigger, more innovative ways. Let’s take a brief look at the past ten years and what improvements we saw.

4G

While 4G was actually first developed in 2009, but primarily spreading in the early 2010s, 4G wireless changed the capabilities of wireless data transmission. As a result, further innovations were made, encouraging (and sometimes forcing) technologies to improve. The companies that worked in real-time and heavily depended on application deployment were suddenly given the tools they needed to really take root. Furthermore, 4G was responsible for the viability of many of today’s biggest players, including Spotify, Instagram, Uber, and Snapchat - among many others.

Apple iPad

Can you believe that the iPad has only been around for about a decade? It was the first of many mass-produced consumer tablets, and it took other companies a few years to catch up as they followed Apple’s lead. Powered by iOS, and featuring a large screen, the explosive initial sales of the iPad cemented the tablet’s reputation as a useful device, both at home and in the workplace.

IPv6

In June of 2012, the longstanding wireless networking standard was upgraded for the first time in years. This sixth standard allowed a new age of connectivity, permitting a far larger number of devices to be connected to the Internet.

Chromecast

As we suggested in the section on 4G, streaming was growing in popularity, and it is safe to say that the first Chromecast was partially responsible for that. While it may seem practically ubiquitous today, integrated casting was revolutionary upon its release… and in many ways, it changed how businesses could communicate ideas. Conference rooms everywhere are now equipped to work with this (or similar) technologies.

Virtual Assistants

Today, every major technology brand has its own take on the virtual assistant. Apple has the OG - Siri - while Microsoft has Cortana, Google has its Google Assistant, Amazon has Alexa, and Samsung has Bixby. As such, the development of this technology spurred a new competitive spirit among these rivals, to the benefit of the user. With all of these companies working to create advanced, better assistants to sway consumers, machine learning has improved exponentially through these efforts.

USB-C

Despite largely flying under the radar, one of the most impactful advancements of the decade is the development of the USB Type C connector. With the exception of Apple, it has been accepted as the industry’s standard connection for power and data transmission, and can therefore be found on most post-2015 devices.

Windows 10

As they attempted to put together a mobile OS, and their redesigned Windows 8.1 OS failing to replace the aging Windows 7, Windows 10 was developed to standardize the Windows experience and modernize it for longevity. Now, Windows 10 has been established as the standard, running on 64 percent of all PCs in existence, a number that will grow even higher as Windows 7 is finally put out to pasture.

2020: When Things Will Thrive

While there is an argument that, technically speaking, the Internet of Things is more of a 2010s development, the 2020s are poised to be the decade that Internet-connected devices are truly viable tools, with the necessary integrations, functionality, and (most critically) security finally in place. This is predicted much for the same reason that mobile technology took off last decade - the fact that wireless networks improved. 

Frankly, there’s so much more we have yet to accomplish, as the near future is poised to turn what was very recently science fiction into fact. For instance, the next 10 years will likely see the following technologies come more into the mainstream:

5G Connectivity

With certain areas currently rolling out the 5G wireless standard, and more guaranteed to follow, there is hope of a fundamental shift in how people can use their technology. As if today’s networks weren’t already burdened by our data demands, we are only increasing these demands as time passes. However, 5G potentially promises a variety of benefits - including ubiquitous access, powered by broadcast sites that focus on delivering performance to each user rather than to a given neighborhood. Today’s 5G users have experienced speeds measured in gigabits, so just imagine this capability spreading.

Artificial Intelligence

While the phrase “artificial intelligence” has been somewhat inflated by popular culture, the more practical use of artificial intelligence is slated to increase by a significant amount in the 2020s. Today, neural networks are already in use as a means to recognize data patterns, assisting in automation processes. With the amount of data increasing exponentially, these neural networks are bound to see exponential benefits, and we will be able to put AI to use in more complex and dynamic applications.

The IoT

Like we said, the Internet of Things is only going to grow as time passes, and the many technologies and solutions that are included under this umbrella term will finally have the wireless capabilities needed to make a real impact. Cities will be made smart, using AI to increase the efficiency of crucial services and eliminate waste. Driverless cars will make commuting and traveling safer, and crucial systems in finance, healthcare, and infrastructure will be improved.

Mixed Reality

There has been a notable trend toward increasing how immersive our technology is, and that will culminate in something known as mixed reality. As the predicted replacement to today’s mobile platforms, MR would provide interactive overlays in real-time for all kinds of applications, ultimately reducing data strains. As a result, we could see a variety of applications be completely revolutionized, including education, entertainment, and social interaction.

Just as it did throughout the last decade, technology is sure to transform throughout the coming one. What innovations do you hope to see? Let us know in the comments!

Continue reading

Five Steps to Better Basic Cybersecurity

One crucial component of any successful cybersecurity practices is the active effort to eliminate risk wherever possible. Here, we’ve compiled five practices that will contribute to your business’ capability to recognize where its threats come from. While these aren’t exactly policies to help protect your data, they can help you collect the data you need to form these policies.

1. Inventory All of Your Assets

When you resolve to protect everything, as many business owners do, it helps to know what exactly “everything” includes. Maintaining a comprehensive inventory of all of your technology-- each wire, additional peripheral, and software title your business has acquired--makes managing your technology far simpler and more efficient.

2. Push Cybersecurity Best Practices

Your staff, being the ones with their hands on your business technology, need to be trained on how to maintain its security. As it happens, this training should transcend just security and cover their cyber hygiene as well. The more they know about how to better secure their use of your technology and identify threats and issues, the more secure your business will be.

3. Address Shadow IT Head-On

Shadow IT is an insidious problem that many don’t even consider an issue. The phrase “shadow IT” basically serves as a blanket term for any software that an end user has downloaded without the knowledge and approval of the IT administrator. While there are many potential issues with shadow IT, the worst of them likely comes from the vulnerabilities that unapproved and unpatched software can bring into the network. By enforcing a policy of utilizing only the solutions that IT has vetted and approved, you can protect your business from one of the least expected threats there is: the employee who was just trying to do their job.

4. Ensure the Proper Tools are Implemented

Cybersecurity, on paper, isn’t such a difficult process. The issues come from the fact that everyone involved needs to understand the threats facing them and why the practices and tools they are expected to utilize are so crucial to security. Unfortunately, if the reasoning behind using antivirus and anti-malware, firewalls, spam blocking and content filtering (among other security tools) is never addressed, their use is more likely to be taken for granted, and ultimately neglected. Not only should these tools be in place, there needs to be an organizational commitment to using them… otherwise, threats are more likely to be an issue.

5. Keep IT Refreshed

As a general rule, the older your technology gets, the less effective it is at serving its intended purpose. This can be resolved by making a point of systematically and strategically patching, updating, and upgrading the technology you rely on to operate. More up-to-date solutions have better security and can better keep your assets safe, threats less of a consideration (but still one to be consideration).

Coleman Technologies can help you put these practices in place for the betterment of your business and its security. Reach out to our team for improved cybersecurity by calling (604) 513-9428 today.

Continue reading

Print More Intelligently with Print Management

Business Printing

In the past, businesses greatly relied on the use of their printers, but it really can’t be said that this use is particularly monitored, even now. As a matter of fact, a survey conducted by Buyer’s Laboratory suggests that a full 90 percent of companies (yes, nine-zero) don’t keep track of their printing costs - a number that can regularly add up to over five percent of a business’ total revenue. If this seems high, take a moment to consider the different expenses that contribute to this total.

Naturally, you have to consider the resources you need in order to use a printer. You need the requisite paper and ink, but not many people would think to include the electrical costs of keeping the printer in operation. You also need to take the time (about 15 percent of it) that your IT department spends dealing with printer-related issues and the 23 percent of help desk calls that are made in regard to these issues.

This all impacts your operational budget, and there’s a chance that you weren't even aware of it.

What Can Be Done?

For starters, you need to begin tracking your printing costs, as it will be beneficial to find out how much of your budget is potentially being eaten away by unneeded spending there. Secondly, you should implement a print management solution to make it easier to continue this tracking in the future.

In order to really get the most out of your print management solution, you should have a strategy that allows you to do so. By granting you with greater insights into your printing, you can figure out ways to minimize or eliminate excessive costs, without negatively impacting the accessibility of printed materials.

When considering your options for a print management platform, we recommend that you look for the following features:

  • Comprehensive Assessments - As we said, many organizations don’t use any tools to keep track of their printing costs. This tool in particular will give you a better idea of how much is being printed, where it is being printed from, and when your devices are due for maintenance.
  • Print Management - A print management platform can provide you with precise controls over how your printers can be used.
  • Paper-to-Digital Conversions - By transferring your printed resources into digital ones, you can evaluate the value that they provide when printed and better optimize your printing costs.
  • Better Security - It stands to reason that your data security can improve when you have more control over this data. Hard copies inherently mean that you have less control, and a greater risk of a security issue.
  • Tracking Capabilities - By tracking how much is being printed, you can help optimize your costs through implementing certain controls, like user limitations on how much can be printed in a set amount of time.
  • Setting Print Policies - You can set up resource-saving policies like enforcing double-sided printing and establishing print quotas to prevent users from abusing the office printer.

If your business’ documents are resulting in excessive costs, reach out to our IT experts today! Coleman Technologies can help you keep your printing under control. Call (604) 513-9428 to learn more.

Continue reading

The Latest Android Malware is Almost Impossible to Remove

Meet xHelper, The Malware That Refuses to Go Away

As of right now, it is suspected that xHelper has infected around 50,000 devices, which is a big number, but relatively low when it comes to malware of this type. The big names in cybersecurity, Symantec, Malwarebytes, and the like, don’t have any clear answers on how to actually remove the threat. If that’s not enough, deleting everything on your smartphone and doing a factory-reset won’t remove the malware either. Once you set your device back up, the threat will be back.

What Does xHelper Do?

We have good news and some bad news. The good news is that right now, it seems that xHelper just gives you annoying pop-up spam and notifications. It’s goal? To get you to install more applications, and likely these applications could come with additional threats.

It is also suspected that xHelper can download and install apps on its own. It hasn’t been officially detected doing this in the wild yet, but if it could do that, then you would essentially lose control over your device.

Don’t Forget, You Can’t Get Rid of xHelper Once You Get It

As of right now, there is no way to uninstall xHelper, and even resetting your device to factory settings keeps the malware installed. There is essentially no help for you other than getting a new phone, or waiting for Google or one of the major players in cybersecurity to figure out a way to remove it. This could take a while…

For Now, All You Can Do is Avoid Getting xHelper

The malware seems to get installed from scammy websites. The app isn’t found on the Google Play Store (at least at the time of writing this). Only install apps from the Google Play Store, and never from any other website. Google has a vetting process that keeps most apps on the Google Play Store relatively safe (it’s not a perfect system, but it does weed out most of the danger).

When it comes to cybersecurity, the best place to get started is being aware of the threats and employing safe habits. That, and ensuring that your business data is thoroughly protected. Don’t wait for a problem to happen, give Coleman Technologies a call at (604) 513-9428 today.

Continue reading

IT is a Wonderful Life

It had been a rough quarter at Thatcher-Jenkins. Sales were down as two of the company’s largest clients ceased doing business after they found suppliers that would offer the same services for less. In an attempt to stop the figurative bleeding, Parker had initiated a major overhaul to the management system the company would use. Much of the production staff, who is made up of a lot of people that had been working at the company for several years, found the new technology intrusive to production. Then there were problems with deployment which cost the company some time and a fair amount of capital. The IT staff that was in place at the time simply didn’t have the resources to cover a rushed end-to-end software implementation and their typical workload, leading to production interruptions and other inefficiencies.

So, as Parker stood with his hand on the glass of the window in his office, his thoughts weren’t of the impending holiday, his family, or how fortunate he was; they were firmly focused on the latest bought of downtime that took down production for half a day. Who knows how much money it had cost the company?

The phone rang. He walked back over to his desk, tripping over the exposed wire to his new VoIP phone that nobody bothered to hide. He snatched at the phone.

“Hello,” he answered, angered.

On the other end of the phone was his wife. Mrs. Parker was wondering when Parker would be home. After all, it was Christmas Eve.

“I’m just wrapping up here...Love you too.”

He hung up the phone, glanced aimlessly around his office, and slumped down into his desk chair. He sat for a few minutes before he got up, remotely started his car, put his coat on, shut down his computer, turned the lights off, grabbed his bag, and walked out the door.

As he slowly shuffled to his car, the snow was falling lightly, but it might have been just the ice in the air as it was a little too cold for snow. His car was the last car in the parking lot. This made him feel very alone. He got in the car and slowly drove away.

As he drove past all the houses lit up for Christmas, he started to cheer up. He stopped off at the liquor store to get some brandy and as he was walking out of the store he ran into one of his clients.

“Hey there Parker, Merry Christmas,” the stout man in a black pea coat said.

“Oh, hi there Jack, same to you,” Parker answered as he almost dropped the bottle of brandy he had just bought.

“Whatcha got there?” Jack asked inquisitively.

“We do Brandy Alexanders on Christmas Eve. Family Tradition,” Parker answered.

“Well that’s nice. Look, have a Merry Christmas. Give my best to your family. We’ll talk next week,” Jack said before he scurried away inside the liquor store.

Parker walked back to his car, wondering what Jack meant by the “we’ll talk next week” remark. He sat behind the wheel for a minute, before driving away. The uneasy feeling he had in his office was more like panic as he drove down the street toward his house.

Parker started talking to himself in his car, “What did Jack mean? If his company leaves, I’ll have to lay people off,” At this point he had worked himself up. He popped the top of the brandy bottle and started to take intermittent swigs. He drove past his house to the bridge on the outskirts of town. He parked his car on the side of the road and got out of his car and walked up the bridge.

Traffic continued to go by, but there wasn’t much of it to speak of, being Christmas Eve and all. He walked up to the center of the bridge with the bottle of brandy firmly in hand. He stood up and looked at the sliver of moon that poked out behind the passing clouds. He looked at the river. He took a pull of his brandy and put the cap back on. All of a sudden what seemed like a shadow approached him from the far side of the bridge.

“Not the Christmas Eve you planned on having, huh Parker?” the voice said as he came into the light. The man was short and older than Parker. He had a wool cap and jacket on.

“Who are you? How do you know my name?” Parker asked.

‘My name is Gary and I know all there is to know about you,” he said, “What are you doing up here?”

Where only moments before had Parker been engulfed in self-pity, now there was only fear. He moved away abruptly, but didn’t say anything.

Gary kept after him.

“Can I have a drink?” he asked.

“What the hell are you doing out here?” Parker demanded as Gary reached for the bottle of brandy. Gary stopped moving toward him.

“Please?” Gary asked.

The three or four drinks that Parker had were now starting to kick in. He extended the bottle and Gary took it, opened it, took a drink, and handed it back in rapid succession.

“So, Parker, what are you doing out here on Christmas eve?” Gary asked rhetorically.

“I’m not sure that’s any of your business,” Parker replied.

“Were you planning on jumping off of the bridge?” Gary asked abruptly.

Suddenly, Parker realized that maybe he had gone up there to do just that.

“I don’t know,” Parker replied, “Sometimes I feel like everyone that depends on me would be better off if I wasn't the one making the decisions.”

“Well...There is a way to find out.” Gary said as he rushed at him. Parker, still clutching the bottle of brandy, sidestepped as Gary dove off the bridge into the river. Shocked, Parker dropped the bottle, took off his coat and ran to the other side of the bridge and jumped in after Gary.

As he hit the nearly frozen water, it sent a shock through his entire system. He grabbed Gary, who was thrashing around in the current and dragged him to the bank of the river.

Both men lay on the frozen bank of the river. Gary begins to laugh. Incredulous at Gary’s levity, Parker started to yell at him.

“What the hell do you think you were doing?!” Parker started, freezing and soaked, “If I didn’t jump in after you, you would have surely died!”

“Don’t be so sure,” Gary said, “I am your guardian angel, you needed to stop feeling sorry for yourself in order to know what it is that I know.”

“Guardian angel? You are touched, man!” Parker yelled as he got up and started making his way back toward the bridge.

‘There are no such thing as guardian angels. You are a crazy old man who just had his life saved by someone who didn’t feel like living ten minutes ago.”

“Parker, many people depend on you, and feeling sorry for yourself will never get you to where you want to go.” Gary said, scrambling after him.

“Look, friend. I’m going home. Tonight is Christmas Eve, and I need to be with my family...Not sopping wet listening to a crazy man.”

Gary stopped following him.

“I may be crazy, but I am here to tell you that you can’t lose hope,” Gary shouted after him, “We will meet again soon.”

Parker made his way back to the bridge, picked up his jacket and his bottle of brandy and started back to his car. He opened the door to his car, but before he got in looked around for Gary. He was nowhere to be found. With mixed emotions Parker got in his car and returned home.

---

When Parker returned home, he found a strange car in the driveway. He walked in the front door, still wet from his time in the river, only to find his IT administrator standing in the foyer of the house waiting for him.

“Where have you been?” the man asked

“What are you doing here?” Parker answered as his wife walked in the room.

 

“We’ve been hacked,” The IT admin started, ”I’ve got the team at the office now doing everything...wait a minute, why are you wet?”

“Yeah, what happened to you?” Mrs. Parker asked.

“What do you mean we were hacked?! I just left the office an hour ago!” Parker said helplessly.

“Yeah, Harold and Matt are at the office right now and Brett will be there soon. We should go.” The IT admin said.

“Wait a second, mister, you aren’t going anywhere before you tell me why you are sopping wet.” Mrs. Parker said sternly.

“I saved a man from drowning, Jewel, but now I really have to go down there to make sure we aren’t going to lose everything. Pete, let me get changed.”

After getting changed quickly and assuring his wife that everything is going to be okay, he rode to the office with Pete. Pete was the IT administrator for Thatcher-Jenkins. He had been working there for the past seven years and was Parker’s right hand man when it comes to IT. He had hired Pete at 23 to work in his IT department after Pete had been released from jail for hacking.

Pete was the son of one of Parker’s wife’s best friends and agreed to take him on as a favor, but had come to depend on his computer skills.

“What do we know about the hack?” Parker asked as they were driving.

“You know as much as I do right now, but when we couldn’t get a hold of you, I came right to your house. Your wife was worried.” Pete said.

“The craziest thing happened to me tonight. I was on the bridge and some crazy old guy came up to me and jumped in the river. I had to jump in after him so he didn’t drown.” Parker continued, “I had never seen this man before, but…”

“He knew who you were?” Pete said in Gary’s voice. Parker looked over and it was Gary driving the car, not Pete.

“What is going on?!” Parker bellowed with fear.

“Don’t be afraid, Parker. I am your guardian angel and I’m here to show you just how important you are to the people in your life.”

“Stop the car! Stop the car!”

“I’ll do you one better.” Gary said as he swerved off the road and into a building.

---

Parker woke up in his bed, but his wife was nowhere to be found. He jumped out of bed and ran downstairs, but the house was different. It wasn’t decorated for Christmas, it was like you would find in on any other day. He opened the front door and it was snowy and the streetlights had the Christmas ornaments hanging from them. As he stood in the doorway of his house, he noticed a well-dressed man walking down the unkempt sidewalk that ran perpendicular to the road. As the man got closer, he recognized him. It was Gary.

“What the hell have you done?! Where is Jewel?! Where are my kids?!” Parker yelled as Gary, now dressed in a top hat and a flawless waistcoat made his way up the front sidewalk in front of Parker’s house.

“Who are you and what have you done with my family?!” He continued as Gary walked past him into the house.

“I told you that I would show you just how important you are. Get dressed, it’s time for a tour.” Gary replied.

“I’m not going anywhere with you.” Parker adamantly stated.

“The faster we can get through this, the faster you will be allowed to go back to your old life.” said Gary.

“I hate my old life,” Parker yelled.

That’s when Gary said, “It’s up to you to change it.”

----

Parker got changed and got in the driver’s side of the car.

“Good, you can drive. I’m a terrible driver, “ Gary said sarcastically, “Let’s head over to your office.”

“What am I, Ebenezer Scrooge? Are you a ghost sent here to teach me a lesson?” Parker asked before starting the car.

“Nothing like that,” Gary started, “I’ve told you already, I am your guardian angel and I am here to show you just what life would be like for the people you care about if you weren’t a part of theirs.”

“Do you know how crazy this is?” was Parker’s retort.

“It’s no more crazy than your feelings of loneliness and frustration.” Gary said.

“Things just haven’t been going well at work. We’re trying to put in this new system and its messing with production.” Parker started, “There’s really very little I can do about it, either. We’ve lost two of our biggest accounts and trying to modernize is costing us a fortune. The world isn’t the same now as it was when I started working there. We may not have any choice but to lay off some people. It’s a really bad situation.”

“It could be worse,” Gary said as they took a left onto the industrial park.

Parker’s demeanor changed and immediately got more hostile.

‘What the hell do you mean it could be worse?! People depend on me to make good decisions and I’m letting them down! Don’t you get it?!”

“Oh, I get it,” Gary began, “but I know things could be worse. Just look at that.”

At this moment they came upon the Thatcher-Jenkins offices; or, more like where the Thatcher-Jenkins offices should be. The building, which sat just off the river at the north end of the industrial park was vacant. There were pieces of plywood over several of the floor-to-ceiling windows that lined the second-floor facade. The parking lot was unplowed, so when Parker opened the car door and got out, he crunched through the layer of cold-tempered snow.

“What the…” Parker trailed off as he crunched through the snow toward the building.

 

Gary got out and shouted after him, “I told you things could be worse.”

Parker turned around and glanced at him, “What is happening?”

Gary flashed a smile, “This is what happens if you aren’t the one making the decisions. 56 jobs are gone. The place boarded up and left vacant.”

Parker started back to the car.

“Where am I, then?” he asked sternly.

“Well you’re right here, of course. Get in, and I’ll show you more.” Gary said.

Parker got in the car and they made their way out of the Industrial Park and drove toward downtown. As they drove down Main street Parker noticed his wife, Jewel. She didn’t look like herself, however. Instead of the well-manicured woman, she was wearing a heavy wool coat, a wool hat with matching mittens and standing in the doorway of George’s Hardware ringing a bell. She was taking in donations for the Salvation Army.

“She always loves to help people,” Parker said as he started to roll down the window. They drove on by, causing Parker to watch her in the driver's-side mirror until she was no longer in sight.

“She’s wonderful, but her life is nothing like her life is with you,” Gary said, “Without you, she marries, but has a miscarriage and gets divorced. She never has the family that you two have created. She suffers each day with the loss.”

Parker started to tear up. Gary reached in his topcoat and grabbed a handkerchief and offered it to Parker. Parker took it, and blotted his eyes as the town passed them by.

“Where are you taking me now?” Parker asked helplessly.

“We have a couple more things to see before you make your decision,” Gary responded.

“What decision?” Parker asked several times. Gary gestured him to keep course. They came to a stop in a parking lot in front of Ophelia’s Diner, on the east edge of town near the interstate highway.

“Park the car here.” said Gary.

“Why are we stopping here? I’m not hungry.” Parker inquired with desperation in his voice.

“Good,” Gary said, “because we’re not going in.”

Gary led him around the side of the building to a camper that was set up about 50 feet behind the restaurant.

“What the hell is this?” Parker asked.

“Something you’ll need to see.” Gary responded.

They approached the camper. There was the faint smell of cigarettes and muffled noises coming from inside. Gary walks up and knocks on the door. After some rustling and audible muttering, the door swung open. The man standing in the doorway was Pete. He had a two-day stubble and had a cigarette hanging out of his mouth.

“What do you want?” Pete said, not taking the cigarette out of his mouth.

“Pete?!” Parker asked aloud. Pete looked as if he hadn’t bathed in a couple of days and was wearing a cook’s whites, but no apron. He wasn’t wearing shoes.

“Yeah. Do I know you?” Pete said with a twinge of hostility. The men just stood there and stared at each other for a minute at which time Pete had had enough.

“Well, I’m busy,” Pete slammed the door, leaving the other two men standing in the snow.

“Let’s go,” Gary said as he began to walk back to the car.

“I guess he had a rough time of it.” Parker said trailing after Gary, “Jewel got me to hire him after he got out of jail. I guess without me all his talents would have been put to waste. He’s one hell of an IT guy. He’s been with me for years; I was about to make him CIO.”

The two men reached the car and Gary got in and started it up. Parker looked back at the camper one more time and got in the passenger seat.

“I think I get the point,” Parker said softly when they were driving back toward town.

“Yeah, people depend on you, but I have one more thing to show you,” Gary said.

“Why don’t you just take me back?” Parker demanded.

“That’s not the way it works, Parker,” Gary responded, “Like I told you, you are here. I can’t just take you back. I’m just your guardian angel.”

“I understand why I’m so important now. I have you to thank for it.” Parker admitted.

“You need to see one more thing.” Gary said as he drove.

Parker was silent. As he watched the town drift by, he realized that it was getting late in the afternoon and it was starting to get dark.

“I’ll be able to pick up where I left off, right, Ghost?” Parker asked.

“I’m not a ghost and you are not Ebenezer Scrooge. If any of this helps you, it will be on you to get back to the place where you can make a difference.” Gary said.

“But how do I get back?” Parker asked helplessly.

“You’ll see,” Gary said, “the decision will be yours.”

Just then they arrived at the supermarket. Gary got out of the car and told Parker to follow him. He walked into the store and went to the aisle where you’d find Thatcher-Jenkins best-selling product. Gary pointed at the shelf. There were no products from Thatcher-Jenkins, just twice as many from their biggest competitor Capra Industries. Parker shook his head and smiled.

“Now you are ready,” Gary said with a smile, “Let’s go.”

They returned to the car and drove across town to the bridge in silence. Gary parked the car in the same place where Parker had parked it, what seemingly was a day prior, but that’s not the way this works.

The men walked up to the place on the bridge where they had first met. Gary reached in his coat and offered Parker an unopened bottle of brandy.

“Now go home to your wife.” Gary said.

“Thank you, angel.” Parker said and extended his hand. Gary didn’t shake his hand, he tipped his cap and abruptly walked away.

---

Parker drove home fast, much faster than he normally would have. Once he got home, he jumped out of the car and ran inside. Without taking off his shoes and coat he ran into his family room to find his children sitting on the couch playing on their tablets. His heart was filled with warmth, he made his way to the kitchen where his wife was.

“Oh, Jewel,” is all he said before he wrapped his arms around her.

“Wow, is everything okay?” She asked him.

“Everything is great. I love you so much.” He said to her stepping away and looking her in the eyes. He kissed her.

He placed the bottle of brandy on the counter.

Confused, Jewel asked, “What happened to you?”

“I just had a long day and I’m happy to be home.” he said.

Parker didn’t think about work for the whole next day. It was the longest he had actually relaxed in years. He spent the holiday with the people he loved, happy, and feeling as if anything was possible.

---

When he returned to work on the day after Christmas, he got there extra early. He noticed the Coleman Technologies business card that he left lying on his desk, so he went ahead and called Pete into his office. He was determined to find solutions to his business’ IT overruns.

“You asked for me, Boss?” Pete said as he walked in the open door.

“Yeah, Pete, shut the door.” Parker demanded. Pete walked in nervously and stood behind the chairs that were in front of the Parker’s desk.

“Have a seat,” Parker started, “Pete, over the Christmas holiday I had some harsh truths to face. It’s no secret that we’ve been having some technology problems lately and if they keep up, we’ll likely have to lay some people off.”

“Okay, we’re doing all…” Pete started before Parker interjected.

“I’m not blaming you, Pete. Like I said, I had some harsh truths to face. One of them is that I have to take a step back from the technology end of the business. My demands are some of the main reasons we’re having problems. I called you here to promote you, Pete. You’ve done one hell of a job for us and I was wondering if you would like to join the management team as CIO?”

Pete’s face was filled with surprise and pride, “How would it change the job I have now?”

“Do you want it, Pete?” Parker pressed.

“Yes, sir.” Pete responded.

“Wonderful, you are the right man for the job. The first course of action that you need to focus on is getting the resources in here to get our new system in place and get the people trained up on it. It is essential to the future of our company, and I think you are up to the challenge.”

“Thank you, sir.” Pete said earnestly, “I think the first thing we should look at is getting Coleman Technologies in here to help us cover our regular management while we finish the deployment.”

“Pete, if it’s in the budget, it is your call now. I’ll call a staff meeting later today to announce your promotion.“ Parker answered. “For now, though, I have some things I need to attend to.”

Parker walked around the desk to shake Pete’s hand and walked him out of the office. Once Pete was gone, Parker walked over to the window and put his palm on the glass. He hadn’t felt this proud in some time.

---

I’m glad to announce that Pete’s plan was implemented the very next day. The following week, Coleman Technologies did their first assessment, and soon after took over the management and maintenance of the computing infrastructure and network. For several months, Thatcher-Jenkins’ IT technicians, led by CIO Pete, implemented a system with Coleman Technologies supporting their technology. Now the two companies are full-time collaborators, and Thatcher-Jenkins continues their steady growth.

If you enjoyed this take and think that Coleman Technologies can breathe some new life into your business’ technology strategy, give us a call at (604) 513-9428 and one of our expert consultants can tell you how we can help you. Happy Holidays.

Continue reading

With Multiple Windows EOL Events, You Need to Have a Plan

Upgrade Your Hardware and Migrate Over Your Data

Unfortunately, this option has two considerable downsides: it’s going to be pretty darn expensive, and since there is a very limited amount of time to get it done, you’ll likely have to pay even more to expedite the process. Furthermore, despite the professionalism and skill that our consultants at Coleman Technologies will bring to the table, rushing this normally slow and controlled process is bound to create complications. Sure, Windows Server 2008 R2 and Windows 7 may still work, technically speaking, but it will only become harder to find the other components that play nicely with the software you rely on - not to mention riskier to even attempt.

Before you bite the bullet and replace all of your hardware, you may have the option to simply upgrade the solutions present in your infrastructure already. Windows 10 has a few fairly attainable benchmarks. They include:

  • Processor - 1 GHZ or faster
  • RAM - 1 GB for 32-bit or 2 GB for 64-bit
  • Hard disk space - 16 GB for 32-bit or 20 GB for 64-bit
  • Graphics card - DirectX 9 or later with WDDM 1.0 driver
  • Display - 800 x 600 resolution

Having said that, these are the minimum points for Windows 10 to work, so don’t expect your users to break any records using it with those specifications. Instead, we recommend that you have a dual-core processor rated to at least 2 GHz, anywhere from 4-to-8 GBs of RAM, and a 160 GB hard drive at the minimum.

Virtualize Your Data Via the Cloud

Of course, you also have the option to simply use virtualized solutions, rather than acquire new in-house hardware. Not only are virtualized servers more cost effective than purchasing a new in-house system, you have much more flexibility in the types of servers you can host. Microsoft Azure, for instance, offers virtual machine capabilities that cover the gamut of a business’ needs.

It also should be said that virtualization also assists with budgeting for your IT, as the purchases you would have made otherwise are turned into predictable operating expenses, rather than a pricey capital expense; plus, with services like Azure, your solutions are maintained as a part of the cost, so when compared apples-to-apples, virtualization could easily be the less-expensive option for you to go with.

Empower Your Team with Microsoft 365

Admittedly, while Microsoft 365 won’t do much to resolve your difficulties with Server 2008 R2, you can implement it quickly, which helps when you’re trying to beat an End-of-Life deadline. As it offers a comprehensive assortment of key solutions--including Windows 10, the Microsoft Office 365 productivity suite with Microsoft Teams, Outlook, and OneDrive--supported by the tools you need to keep your data secure and under your control, you could certainly do worse than implementing Microsoft 365.

Microsoft 365 Business takes these benefits even further than other cloud systems, while never losing sight of the productivity benefits that you are looking for from your business’ chosen solution. Additionally, with easily scalable licenses, this is likely a great choice for your organization to implement.

While Windows 7 and Server 2008 R2 were once the standard for businesses to utilize, those days are long past. Don’t let their lack of support create problems for your business. Call Coleman Technologies today to ensure that all of the solutions that you leverage in your operations are able to serve you well. Give us a call at (604) 513-9428 to learn more.

Continue reading

Networking Isn’t What It Used to Be

Connecting Your Office

The modern office functions a lot like the office of twenty years ago in terms of networking. Most of the time, endpoints connect to switches that connect to routers that connects to servers and the internet. This has been the way it has been for a couple of decades. Sure, the technology itself has been improved drastically, bandwidth dwarfs older connection speed, but all-in-all it is pretty similar to the way that office networking has been structured for some time. 

One major change is the reliance on Wi-Fi. Wireless internet provides a more flexible work environment, giving staff a better ability to collaborate through the use of mobile devices such as laptops and smartphones. The integration of wireless connections necessitates the integration of security infrastructure and policies that work to keep unauthorized entities off of the business’ computing network. 

What Is Changing?

You can count on one hand the inventions that have had the type of impact that the Internet has had on modern society. It’s no secret that there is a worldwide push for ubiquitous Internet access. This push will no-doubt be felt inside the offices of businesses big and small for years to come. There are new considerations coming to the forefront of networking technology. Some of which promise to change the way networking works. These include:

Improvements to Wi-Fi

Wi-Fi 6, or 802.11ax, upgrades the current highest-speed Wi-Fi available, 802.11ac. It brings a substantial improvement in efficiency across all current Wi-Fi bands, including older frequencies, such as 2.4 GHz. The biggest improvement Wi-Fi 6 brings is it increases the density of devices that can co-exist in a single space, increasing the networking speed on all devices. 

Additionally, Wi-Fi 6 will improve performance by supporting packet scheduling that will make for dramatic improvements in power utilization by mobile devices. This will improve the wireless experience for every user and will substantially improve the way the Internet of Things is leveraged in the workplace. 

Improvements to Wireless Mobile Networks

If you haven’t heard about 5G yet, you will. The fifth-generation wireless network is going to be a game changer. Wireless carriers are beginning to roll out 5G slowly and manufacturers have balked at going all-in on building 5G devices, but soon 5G will be the predominant wireless Internet platform and it will change everything. 

5G will bring improved speed and battery life to smartphones and expand high-speed Internet for home users.

For the business, 5G will have less of an impact, but it will have one. 5G fixed access will be a useful option as a WAN connection for organizations that have multiple branches. Additionally, as 5G rolls out, it will present more opportunities for organizations to leverage the Internet of Things in new and useful ways.

Smarter Networking

In managing a modern network, administrators need powerful tools to be able to make everything play nice together. This type of coordination, especially as new wireless technologies take hold, needs to happen in real time. Businesses will start to use machine learning to learn more about all aspects of their network. In doing so they will be able to prioritize the efficiency of their networks. 

Machine learning, a type of artificial intelligence, will help push this along by optimizing network performance, enhance security, and do it at a reduced cost. It accomplishes this through strong pattern identification that will reduce the amount of time and effort spent by administrators on issues that aren’t critical in nature.

The immediate future will see gains in the way businesses and individuals are able to share, collaborate, and produce. If you are looking for some more information about innovative new networking technologies and how they can work to help your organization, call us today at (604) 513-9428.

Continue reading

Facebook and Your Privacy (Part 3)

While we wish we could show you how to really accomplish true privacy on Facebook, the only way to actually reach that threshold would require you to have never signed up in the first place. This doesn’t mean, of course, that there is nothing that you can do now to protect your information - sharing more cognizantly and keeping it within circles you trust.

A Few of Facebook’s Issues

Like we said, Facebook has seen some pretty egregious security issues during its time. While we aren’t going to go too far into the weeds with these events, a quick summary might help to illustrate how careful users should really be as they use the platform:

  • In 2007, Facebook introduced a feature that would allow companies to track purchases made by users and notify their friends of what they had purchased… without requiring any consent from the user.
  • In 2011, the FTC charged Facebook for allowing private user information to be accessed by third parties, making this private information public without any notification.
  • In 2013, Facebook introduced a Donate button that would allow users to make charitable contributions to such organizations. Unfortunately, a bug in the code allowed the email addresses and phone numbers of over six million users to be leaked.
  • In 2014, Facebook actively experimented upon their users, testing their ability to manipulate their emotional states with the content the user is exposed to. Depressing content was prioritized to see if they could elicit depressed feelings. As it turns out, they can.
  • In 2015, Facebook took action to assuage their users’ concern for their privacy, and rolled back the access that apps had to user data… but one has to wonder, just how much were applications privy to before this rollback?
  • In 2018, Facebook suffered a massive data breach, losing the data of 50 million users. In response, Facebook did nothing… that is, until their reputation started to suffer. It was only then that they responded to the underlying issues.

Unfortunately, concerning events like these happen far too regularly to Facebook. There just seems to be difficulty in keeping their user data secure. This is why you need to pay particular attention to the settings on your own Facebook profile. Let’s go over how your information can most effectively be protected by ensuring these settings are configured properly.

Configuring Your Facebook Privacy Options

On your desktop, log in to your Facebook account. At the top-right of the page, there will be a small down arrow. Click it to access a menu, then click Settings.

You will be brought to another page, with Privacy in your list of options. Click into it.

From here, you can set your privacy options that restrict who has access to your information. For example:

Public - Setting your privacy to public is effectively turning off your privacy options. Not only can all other Facebook users potentially see your profile, even people who aren’t signed in could access it. Hypothetically, this means that the search engines could find you are well.

Friends - This setting restricts viewing privileges to only your confirmed Facebook friends.

Friends except… - If there are particular friends or members of a particular group who shouldn’t see certain information, you can prevent them from seeing this on their Facebook.

Only me - This means that (outside of Facebook) you are the only person with access to what you have posted. Just to be safe, we recommend that you still refrain from sharing anything that you wouldn’t be comfortable sharing publicly.

You also have the ability to choose the audience for each individual post. While this may give the impression of improved control over your privacy, the biggest threat to your Facebook security is probably Facebook itself.

Of course, that doesn’t mean that you aren’t given plenty of privacy options to play with. Let’s go over some of them now:

Who can see your future posts? This setting establishes a default privacy setting for the content you post on Facebook in the future. This helps insulate you from sharing content out to those who shouldn’t see it.

Review all your posts and things you’re tagged in. By using the Activity Log, you can review the entirety of your timeline and manage the permission settings of past posts. You can also review posts you have been tagged in from here.

Limit the audience for posts you’ve shared with friends of friends or Public. This is a semi-nuclear option when it comes to locking down what you’ve posted in the past. By clicking Limit Past Posts, you can change all of what you posted publicly or to friends of your friends to only be accessible to those on your Friends list. Fair warning - Facebook doesn’t provide any way to revert this, so you would have to go through your posts by hand to change them back if you so wished.

Who can send you friend requests? Depending on your preference, you have the option of picking between Everyone or Friends of friends. Unlike many of the other settings on this list, leaving this set to Everyone is probably okay.

Who can see your friends list? On the other hand, there is no reason that the rest of the world needs to see who you are connected with on Facebook. Setting this to Only me will keep this information between you and Facebook, nobody else.

Who can look you up using the email address you provided? Do you want someone who has your email to be able to find you on Facebook using it? Most likely not - so restricting this to Friends or Only me is probably in your best interest.

Who can look you up using the phone number you provided? Again, it’s really your call whether or not to allow Facebook users to find you via your phone number, but it really isn’t that necessary. You’re fine setting this to Friends or Only me.

Do you want search engines outside of Facebook to link to your profile? This one really depends on your situation. Facebook can work to prevent the assorted search engines out there, including Google and Bing, from indexing your profile (allowing searchers to find it). Most people will likely want to switch this off, but if your personal brand is part of your business, it makes more sense to turn this option to Yes.

Dictating What Others Can Do On Your Personal Facebook Profile

We all have embarrassing friends, and so you may want to avoid having them be able to freely post content to your wall - for instance, your college buddy Greg seems to have no problem with sharing candids from the good ol’ days… and tagging you in them.

Potential situations like this make it all the better that Facebook gives you control over who can post to your timeline, and who can see this content. You can access your many options to do so by clicking into Timeline and Tagging (which can be found on the left side of your Settings).

Who can post on your timeline? Naturally, you will definitely want to put a limit on this, as there is no reason that a total stranger should be reaching out on your personal profile. This is why it makes sense to only allow your Friends to do so - or, perhaps you alone with the Only me setting.

Who can see what others post on your timeline? This setting will largely depend upon who you have permitted to post on your timeline. If your Friends can post to your timeline, you definitely want your Friends to be the only ones who can see it - assuming you don’t want to maximize your privacy (and hedge your bets) with the Only me setting.

Allow others to share your posts to their stories? Ask yourself: do you want anything you post publicly to be shared by your Friends? If so, leave this one enabled.

Who can see the posts you’re tagged in on your timeline? Tagging can be an incredibly useful thing for someone trying to cultivate an image as an engaged thought leader, but it can also hurt your reputation, never mind your privacy. If people keep tagging you in assorted posts and you’d rather the public at large didn’t see these posts, you can keep these posts to your Friends, or even to Only me.

Review the posts you’re tagged in before the post appears on your timeline?
Alternatively, this is likely the best option for someone looking to be visible via tagged posts, while still remaining in control of which posts that are linked to them. Basically, you can be notified if you are ever tagged in some Facebook content, and can opt whether or not it will appear on your timeline. Fair warning - any mutual friends you have with the person who has tagged you will be able to see the tagged content before you have a chance to review it. Regardless, it is best to keep this setting on.

Review tags people add to your posts before the tags appear on Facebook? Again, this is something you’ll want control over, so set this to on as well.

Managing Your Public Post Settings

Again, from the Settings page, click into the Public Posts option on the left-hand side.

Who Can Follow Me - Rather than adding users as Friends, public figures can provide the option to just be followed by interested people. If you want to give the public at large this option, set this to Public. Otherwise, you can keep your posts among your Friends by setting this to Friends.

Public Post Comments - Or, who can comment on the posts that you’ve shared publicly. It is probably best to keep this restricted to either Friends, or perhaps Friends of Friends.

Public Profile Info - Some facets of your Facebook profile are generally available for anyone to see (like your name and profile picture). Who do you want to be able to comment on your profile picture? Keeping this capability restricted to your Friends or - maybe - Friends of Friends is probably best.

How Much Do You Want Facebook to Know About Where You Are?

Facebook has the capability to track your location history. While this information isn’t shared with your Friends or followers (beyond letting your Friends know that you are nearby), the only real reason we could come up with for Facebook to track this is to be able to target you with ads more effectively. Hopefully, that’s the reason, but even so, it is better to be safe than sorry. After all, Facebook has a history of data security missteps.

Again, starting from the Settings page, click where it says Location on the left-hand side. From there, you can see what Facebook already knows by requesting to View your Location History. However, to disable this, you’ll need to use the mobile application.

Using the Mobile Application to Turn Off Location

From the app, access the 3-bar hamburger icon (found at the top-right), and scroll down until you see Settings & Privacy. From there, you should access Privacy Shortcuts, where you’ll see a new area with various settings and documentation regarding Facebook’s identity controls.

Find Manage your location settings (you shouldn’t have to scroll to find it). Once there, you should:

  • Turn off Location History (found in Location Access)
  • Turn off Use Location (in Location Services)
  • Find and disable Background Location

While you’re at it, you may as well delete your existing Location History.
Again, from within Privacy Shortcuts, select Manage your location settings and then View Your Location History. You will be asked for your password, and then you will see another 3-dot menu in the top-right. From there, you should Delete all location history.

Take note: if you post a photo with your location tagged, or check into some public place, you may be allowing Facebook access to your location data again.

Yes, this is a lot to take in.

Thank you for sticking with us for so long! We hope this helps you to secure your personal privacy on what is known as the social network. To learn more about protecting your privacy and information, geared more toward your business, reach out to Coleman Technologies at (604) 513-9428, and make sure to subscribe to our blog.

Continue reading

Facebook and Your Privacy (Part 2)

That’s why we wanted to make sure that you knew how to reclaim your personal data and make sure it is protected. We’ll start by protecting the information that you’ve shared.

To do this, you will want to access your Facebook account on a computer. This is going to be a lot to manage, and the mobile app would only be too much trouble to navigate.

Your Security and Privacy Options

From any page on Facebook, look for the menu, which will appear as a little downward-facing arrow. This should be at the top right-hand corner of the page. Click into Settings. This little arrow is your lifeline during this process, you can always find your way back to the beginning with that menu.

Verify the Accuracy of Your General Account Settings

Your first order of business should be to confirm that you still have access to all of the email accounts tied to your Facebook. If an account that you no longer have access to was used, account recovery becomes monumentally more difficult.

Find Out Where You’ve Used Facebook with Security and Login

On the right, you should see the Security and Login option. Click it, and Facebook will show you all of the devices where your account is logged in. Fair warning, this can be shocking - especially since it includes where and when you last used that device, and what browser you were using to do so. The longer a user has been engaged with Facebook, the more devices will likely show up here.

If one of these devices is one that you don’t recognize, you will want to change your password immediately - we’ll go over how in a moment. First, you will want to log out of Facebook on any device that you aren’t actively using. This can be done through the three-dot icon menus next to each device listed.

Change Your Password

While we’re on the topic, this is when you will want to make it a point to update your password. It will only take a minute and might just help keep your Facebook friends from being spammed and phished. You can do this using the process provided on the Security and Login page.

Remember, you should never use a password for more than one online account.

Using Two-Factor Authentication

After your password settings, you’ll see the option to set up two-factor authentication (2FA) to help protect your account. To set it up, select Use two-factor authentication and click edit, and Facebook will provide you with the instructions you need to follow. Click Get Started

You have two options to select from as your Security Method, either using an authentication app, or to receive a text message with an additional code. Between the two, the application is the more secure option, although it does mean you need to have access to the mobile device whenever you want to check your Facebook.

Setting up the authentication app option is pretty simple. Open your application (which, if you have a Google account, might as well be Google Authenticator) and, on the computer, select the Authentication App option, as pictured, and click Next

Facebook will display a QR code, which your authenticator app should allow you to scan when you add a new account to it. The app will then give you a six-digit number to provide to Facebook as a Confirmation Code. Simple.

If you decide to use the text message option, Facebook will simply send you a code that you have to provide upon login. It isn’t quite as secure as the app, but it will do. All you have to do to configure this is to confirm an initial code with Facebook, and you’ll be walked through the rest.

Add a Backup

Once you have two-factor authentication enabled, it only makes sense to add an additional means of 2FA as an emergency backup - in this case, whichever method you didn’t choose. Honestly, you might as well set up both, and make use of the Recovery Codes option, to boot.

Under the Add a Backup option on the Two-Factor settings page, there is also a Recovery Codes option. By clicking Setup, Facebook will provide a brief explanation, and the opportunity to Get Codes. Facebook currently gives you a list of 10 single-use 2FA codes. These are one-shot codes, but you can generate a new list whenever you want from the Two-Factor Settings page. Make sure you keep these codes in a safe place.

Setting Up Extra Security

Back on the Security and Login page, scroll down to find Setting Up Extra Security. This area lets you opt-in to alerts being sent via email or text, notification, or Facebook Messenger.

You can also Choose 3 to 5 Friends to Contact if you do find yourself locked out of your account. Make sure that these are people you truly trust.

Stay tuned for part three of this series, coming soon.

Continue reading

Cyber Security

Cybersecurity

Cyber Security Protection for British Columbia Businesses

No Business is Exempt; It’s Time to Take IT Security Seriously

 

Is Your Data Safe?

Consider how much of your business operations rely on computers - you store your business and customer data digitally, including financial accounts, personal information, and other specifics. Unfortunately, while this data is clearly invaluable to your business, do you know who else would find your data valuable?

Cybercriminals, that’s who.

Cyber security is the approach that businesses take to ensure that their data is protected against theft, breaches, or other threats by cybercriminals and user error, leveraging a variety of solutions and practices to accomplish this goal.

 

What Does This Mean for Your Business?

How would you respond if a business you entrusted your data to had betrayed that trust and neglected to protect it? Probably not well, and the same goes for everyone whose data you possess. They would feel the same way if you failed to protect their data. Allowing a cyber security incident to happen, either through neglect, negligence, or naiveté, will only bring you trouble. For instance, you will likely have to deal with:

  • Upset clients and customers
  • Time lost notifying those affected 
  • Regulatory backlash
  • Severe reputation damage
  • Financial repercussions and reparations
  • Bad press
  • Litigation

Obviously, none of these outcomes are good, and should be avoided.

 

Let’s Protect Your Business

We Can Help You Meet and Exceed Industry Compliances and Protect Your Business, Staff, and Customers

These days, just having antivirus and a firewall aren’t enough to protect you from the majority of cyberattacks. That’s why we offer fully managed, always-on, enterprise-level IT security solutions to keep your business safe.

  • 24/7 Network Security
  • Unified Threat Management
  • Content Filtering
  • Spam Protection
  • Mobile Device Management
  • Email Encryption
  • Access Control and Password Policies
  • Penetration Testing
  • Software Updates
  • Staff Training

For help with any of these considerations, Coleman Technologies is here for you. Reach out to us to have a conversation about how your cybersecurity should take shape by calling (604) 513-9428, or filling out the form on this page.

Continue reading

Facebook and Your Privacy (Part 1)

What Does Facebook Know About Me?

Consider how many opportunities Facebook has to collect information about you: there’s quite a few. For one thing, you literally tell the platform the things you “Like.” Semi-joking aside, there’s also the stuff you post, which advertisements attract your attention, and many other means for them to construct a pretty solid profile on you.

You can see this profile for yourself. In the aftermath of the Cambridge Analytica scandal - where third-party users were granted free reign and access to Facebook user info - Facebook made a promise to be more transparent. This profile is part of that transparency.

Viewing this information is pretty simple, whether you’re on your computer or you’re using the mobile application.

On a desktop or laptop:

  1. Log in to your Facebook account.
  2. Click the down arrow on the top right and go to Settings.
  3. On the left, click Your Facebook Information.
  4. Facebook will present you with five options. Look for Download Your Information.
  5. Click View, Facebook will give you a screen where you can choose the date range and format of the data. Since we want to download everything, we’re going to set the Date Range to All of my data and set Media Quality to High. This will give us a higher quality version of all of our photos and videos in the download.
  6. Click Create File and Facebook will start building the download. This can take a while, but Facebook will give you a notification when your data is ready for download.
  7. Once Facebook gives you the notification, click it and Download your data.

From the Facebook mobile app:

  1. Tap the 3-bar hamburger icon in the top right of the app.
  2. Scroll down and tap Settings & Privacy, and then tap Settings.
  3. Tap Download Your Information.
  4. Leave all of the options checked, and scroll down. Ensure the Date Range is set to All of my data and that Media Quality is set to High.
  5. Tap Create File and Facebook will give you a notification when the data is ready for download.

The “data is ready” notification will probably come after about an hour - it really depends on how long you’ve been a user, and how active you’ve been. Most people will probably have a file that takes up a few gigabytes.

Now that the report is available to you, click on Your Facebook Information.

Access Your Information - Facebook provides you with an itemized and viewable list of your Posts, Photos, and Location history ready for viewing.

Activity Log - Consider this a comprehensive timeline recap - almost a scrapbook, prepared by Facebook.

Deactivation and Deletion - People used to complain that deleting a Facebook account was a difficult process. Not anymore!

So, How Much Does Facebook Know About Me?

When you do review your file, the information they have can be shocking, mainly due to the location-based aspect of it all. You can pull up a given day and find out exactly where you were and what you did. Facebook kept track for you.

Then, you need to consider the Ads. This section will show you all of the advertisers who provided Facebook with a contact list your name appeared on. It isn’t that Facebook gave away this information, advertisers already had it and gave it to Facebook to target you on the platform.

What Does This Mean?

While it completely makes sense that Facebook would know a lot about you, seeing it all laid out (and how much of it didn’t come from your profile) isn’t exactly comforting… Facebook has been too involved in a few major data breaches. Just think - there’s a profile just like the one you retrieved about you, for over a quarter of all of the people in the world.

This rabbit hole goes deeper, too. Make sure you check back soon for part two of three of this Facebook privacy blog series.

You probably had a notion that Facebook had a bunch of your information, but how much information outside of your general profile makes you nervous when they are accused of major data breaches. What’s scarier is that the service is used by over a quarter of the world’s population. 

This is only the tip of the iceberg of the information we will share about this social media giant. Check back for part two of our three-part blog series about Facebook privacy.

Continue reading

Recent Data Breaches You Should Know

September

9/5 

Providence Health Plan - 122,000 members of the Providence Health Plan had personal information leaked when an unauthorized party accessed the company’s servers. Information that was stolen included plan member names, addresses, email addresses, dates of birth, Social Security numbers, member ID numbers, and subscriber numbers.

Facebook - Facebook had an unprotected server with over 419 million records accessed.  Users had their Facebook’s user ID and phone number exposed. In some cases, user’s names, genders, and locations were also leaked.

9/16

Dealer Leader, LLC. - 198 million prospective car buyers were left exposed by an unprotected server. The information that was left out there included names, email addresses, phone numbers, addresses, and IPs.

9/27

DoorDash - The popular food delivery app had 4.9 million customers’ information breached by a third-party. The information left exposed included the names, delivery addresses, phone numbers, hashed passwords, order history, and the last four numbers of each’s credit card number. In the same hack, over 100,000 delivery drivers had their driver's license information leaked. 

9/30

Zynga - The mobile game maker, Zynga, the developer of popular mobile games such as Farmville and Words with Friends has announced that 218 million players had their data exposed after their network was breached by a hacker.  The company had player names, email addresses, login IDs, phone numbers, Facebook IDs and more left exposed.

October

10/17 

Methodist Hospitals of Indiana - The Methodist Hospitals of Indiana fell victim to an email phishing scam and it allowed hackers to steal 68,000 records that included names, addresses, dates of birth, Social Security numbers, driver’s licenses, and more. 

10/21

Autoclerk - Autoclerk, a hotel property management software developer had an open database infiltrated exposing data that included names, dates of birth, home addresses, phone numbers, dates of travel, travel costs, room numbers, and some masked credit card details of hundreds of thousands of guests. 

10/22

Kalispell Regional Healthcare - Over 130,000 Social Security numbers, addresses, medical record numbers, dates of birth, medical histories and treatment information, and names of treating physicians were exposed by hackers.

10/26

Adobe - Data was exposed that included email addresses, usernames, location, Adobe product licenses, account creation dates, and payment statuses. 7.5 million users were affected.

10/27

Network Solutions - The world’s oldest domain name provider has been exposed in a hack. Millions of individuals’ data that included names, addresses, phone numbers, email addresses, and service information was compromised.

November 

11/9 

Texas Health Resources - The Texas-based health care provider reported a data breach where 82,000 patient records were exposed. Included in the breach were names, addresses, email information, health information, and more. 

11/16 

Disney Plus - The brand-spanking-new Disney+ streaming service had new user account information hijacked by hackers. Login credentials wound up on the Dark Web soon after. 

Magic the Gathering - The popular online strategy game has reported that an unsecured website database has exposed 452,000 player records that include names, usernames, and more. 

11/18

State of Louisiana - The State of Louisiana has been a victim of a ransomware attack that took down many state agencies’ servers. Although no data is said to be lost, the state’s crucial computing infrastructure was down for several days as systems were restored from backup.

11/19

Macy’s - Macy’s had their ecommerce site hacked. Hackers embedded malicious code into their checkout page and put a skimming code on the company’s Wallet page. The malware retrieved names, addresses, phone numbers, email addresses, payment card numbers, card security codes, and card expiration dates.

11/22 

T-Mobile - T-Mobile had over a million customers’ information accessed by a hacker. Information accessed included names, billing addresses, phone numbers, rates, and calling features.

Unknown - An unsecured server containing over 622 million email addresses and 50 million phone numbers, and millions of pieces of other information was discovered. It is unknown what organization this data is tied to as the time of writing.

With hundreds of millions of records being exposed each month, it’s hard to feel confident about giving your personal or financial information to anyone in the current threat landscape. If your business needs help trying to be secure, call us today at (604) 513-9428.

Continue reading

Protect Smartphones Like Any Other Computer

Mobile malware is not new. It has been around since people used flip phones, but it doesn’t get the attention that the malware that targets Windows PCs do. This is mainly due to it being a little more rare, but if you are the unfortunate recipient of it, it can cause a lot of the same problems. 

Many people won’t consider it simply because of the way they use their device. A person’s smartphone is with them around the clock and they don’t often use it in the same manner as they would a PC. This doesn’t mean that there aren’t major threats that can users can be exposed to. Let’s take a look at each major mobile OS.

iPhone Malware

One of Apple’s favorite marketing strategies is to point out that iOS is the safest mobile operating system. They actually do a commendable job, but devices running iOS aren’t always completely safe, especially on “jailbroken” devices. By not doing this, which is a way to avoid a lot of iOS’ built-in security restrictions, you will be much more secure. 

Another risk that iOS-run devices run into is called a zero-day hack. The zero-day hack target devices haven’t received a security update after the security update has been released to the public. One major issue that users have with iOS security is that there aren’t a lot of ways to prevent issues. Apple itself does a lot of the heavy lifting. Their platform’s success depends on them keeping their reputation, so having trust in Apple to keep your device secure is not without its merits.

Android Malware

Android is a completely different situation altogether. With more devices comes more malware, and with so many different manufacturers making (and supporting) their various versions of Android, it gets a little dicey.

Android is much more flexible than iOS, which is one of its main benefits, but it can also be problematic when it comes to keeping the device secure. For example, if you want to install an application that’s found outside of Google Play, you can, but any negative situation you get into as a result is on you. It is also possible to jailbreak an Android device, which can override some of the built-in security restrictions.

There have been situations where installing apps off of Google Play have caused problems. Google has had to play games with app developers to keep some serious threats off their store. It just means that users need but it has become clear that it really comes down to the user being careful with what they install. It’s not normal for malware to be attached to Google-sponsored apps, but it has happened, so if you are an Android user, you don’t have to be too careful if all of your software comes from Google.

How to Protect Your Smartphone from Malware

Keep App Downloads to Major App Providers - Both Android and iOS feature their own app stores, Google Play Store and Apple App Store, respectively. Even though Android devices can install applications that aren’t on the Google Play store, modern smartphones make this a little more difficult by making users acknowledge that they are putting their devices at risk by doing so.

If you refuse to jailbreak your phone, and you only install applications that are thoroughly vetted, positively reviewed, and come directly from the Apple App Store or Google Play, you will greatly reduce the risk of infecting your device.

Don’t Get Phished - Many of the most insidious threats today rely on user error. Phishing attacks are an annoying example of this. A user will get a legitimate-looking email from some account they actively use and will be directed to submit login credentials. Unfortunately, the email account is spoofed and on the other end is potential disaster.

Install Anti-malware - You have antivirus software for your PC right, why not get it for your mobile devices? Most providers have Android apps and can go a long way toward protecting your device from harm. 

Enact Policies - If you are a business owner and your employees use their personal devices to do work-related tasks, it’s a solid practice to establish an end-to-end mobile device policy. You can require users to enable security options like device locking and encryption, and since this gets set up on your network, the device (and therefore the user) has to comply with any requirement’s your IT admin requires. 

We have a dedicated plan to help all of our clients maximize their data and network security. If you want to talk more about it call our consultants today at (604) 513-9428.

Continue reading

Tip of the Week: 3 Signs of a Phishing Attempt

1. There’s an Unexpected Attachment or Link

It’s one thing to get an unexpected email from someone, it’s completely another thing entirely to get an email from someone that includes an unexpected attachment or link. Neither of these is a good thing. Attachments can easily contain hidden malware files, and links can be disguised with very little effort.

Don’t believe me? Try visiting google.com. Go ahead!

Not exactly what you were expecting, eh? Keep in mind that you can double-check links by hovering your cursor over them, and if you weren’t anticipating an attachment, don’t click it unless you have confirmed its legitimacy through some other means.

2. The Sender’s Email Seems Off

It isn’t uncommon for scammers to disguise a fraudulent email address by making it look at lot like a legitimate one would. For instance, let’s say that you normally worked with a business vendor, hypothetically named “Super Business Supplies.” A scammer might send you an email from “sales (at) superbusinessupplies.com.” Looks pretty okay, until you notice that there’s one fewer ‘s’ than there should be. Scammers can get downright devious with these replacements, replacing “Amazon” with “Arnazon” and other blink-and-you’ll-miss-it tricks.

In short, read carefully.

3. There are Other Questionable Elements

While that may be a very vague tip, it is only because there is such a wide variety of warning signs that an email is actually a phishing attempt. For instance:

  • Spelling and grammar errors. Look at it this way: would you anticipate a company like Microsoft, or Google, or the likes of such to send you an email riddled with mistakes? Of course not, so if you receive an email that purports to be from a company of high repute, but features these kinds of errors, red flags should be going up.

  • Time-sensitivity. One of a scammer’s go-to tools is to put their target off-balance, especially by pressuring them into immediate action. If you receive an email that offers you a great deal by acting right now, or threatens to shut down your account unless you act right now, the first thing you should do is pick up the phone and call up the organization or individual that sent the email.

  • Requests for personal information. Similarly to any messages that rely on cultivating a sense of urgency, you need to look at any emails that request personally identifiable information, access or financial credentials - really, any data that you and your company rely on - with a critical eye. This is another case where calling to confirm is probably your best bet.

Email can be an extremely helpful business tool, but it can also be an equally useful tool for cybercriminals looking to victimize your business. Coleman Technologies can help you secure it, with best practices and practical solutions to lock it down. To learn more, reach out to us at (604) 513-9428.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you didn’t know Windows can save a list of the text and images you copy, I feel for you—you’ve missed out on a simple trick that could’ve saved you a lot of time. But don’t worry, it’s easy to set up, and I’ll show you how.

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image