Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Hate your IT? It’s More Common Than You Think

Two years ago, a friend of mine had a swimming pool built behind his house. It had a real nice deck, a deep end, a slide for his kids, and a little sectioned-off shallow end that was heated with jets. Talk about a nice way to cool off after a long week! This pool was in constant use - his kids had pool parties, he hosted cookouts. This investment of his was bringing his family a lot of joy and happiness.

Fast forward to this summer. Apparently the ground had settled and shifted, causing a leak that not only slowly drains his pool, but has been washing out the dirt under the pool. Even worse, some of the excess water has found its way into his newly renovated basement. This is not an ideal situation.

Now the thing that used to bring my friend a lot of satisfaction is the bane of his existence. It’s a problem, and it’s causing stress and costing money.

Your business technology can work the same way. It’s designed to help you do more and keep track of more, but when things go bad, it can really be a disaster, especially if you’ve been relying on it. 

My friend now hates his pool. He regrets it. In all seriousness, I feel terrible for him. More than half of the summer went by before he was able to get the problem fixed. By the time it was fixed, the joy that his swimming pool once brought him was gone. After a particularly hot weekend, I asked him if he was glad that he got his pool fixed so he could enjoy it again. He just shrugged and said it barely crossed his mind.

I was thinking, this guy must be crazy! I would have spent the entire weekend in this swimming pool. Then I realized that I’ve seen this before. I’ve felt this.

It’s really easy to get disenchanted by something that once made you excited or brought you a lot of joy. Once it’s a burden, you can get burnt out by it.

For a lot of business owners, your technology is going to feel the same way. There’s a lot of good it can do for you, but once you’ve dealt with years of annoying issues, unexpected bills, and users reporting problems, it starts to really weigh you down.

I don’t want any of my clients to feel the same way about their business as my friend feels about his swimming pool. I want your technology to work for your business. I want it to help you make more money, not be an expense. If anyone feels burnt out or let down by their IT, please give me a call at (604) 513-9428 so I can help you love it again.

That’s all I wanted to say; there’s no pitch here, there’s no IT lesson. You don’t deserve to be constantly frustrated by your IT, and it doesn’t have to be that way.

Continue reading

3 Popular IT Trends for SMBs

The Cloud

One computing trend is being utilized above all others by all types of businesses from all over the world: cloud computing. The feature-rich options available in the cloud make it a perfect technology for the modern SMB.

The most prevalent of the benefits of cloud computing is that it doesn’t typically come with large capital costs. There are plenty of options where a business can get the computing that they need--outfitted competently with tools, storage, security, infrastructure, and more. By having options to get the computing resources and tools they need, and being charged monthly for them, businesses have access to affordable resources that can really help them build a better business. 

Get Smart (BI & BA)

In a trend that is more recent, SMBs are using business intelligence and business analytics to get more detailed information about their business. Using this information, decision makers can strategically alter operations to fit the needs of their consumer base, spend their marketing budgets more wisely, and obtain a better understanding of their business; and, how to strategically improve it. 

Everything Digital 

Like BI and BA, the digital transformation of a business was, up until recently, thought of as an enterprise gig. A complete digital transformation of a business that includes document management, remote work solutions, and customer-facing computing strategies. Prioritizing a single digital standard will go a long way toward cutting printing and paper costs, and promote boosts to productivity and efficiency. 

If you would like to talk to one of our technology professionals about innovative solutions that bring with them rapid ROIs and higher productivity, call Coleman Technologies today at (604) 513-9428.

Continue reading

Microsoft Releases Rare Bug Fix Off of Regular Patch Schedule

The two vulnerabilities were patched off of Microsoft’s typical “patch Tuesday” due to the urgency. Most Microsoft patches are released on the second Tuesday of the month. The fact that these two were released ahead of time might seem like an insignificant occurrence, but the reality is this event is a major red flag.

Internet Explorer Zero-Day

The most significant patch was for a zero-day vulnerability that was found in Internet Explorer. It may be hard to believe, but people are indeed still using this antique browser to surf the web. The term zero-day suggests that the vulnerability that was discovered, had already been exploited by ill-minded cybercriminals. 

While not much information has been released on the event, Microsoft did call it a remote code execution exploit that, if accessed, could have given a user control of another user’s account. The attack requires phishing someone who is exploring the internet on Internet Explorer, and luring them onto a malicious website. Once there, an attacker would be able to gain access over the victim. 

Internet Explorer is such a forgotten browser that the event did not spark a lot of controversy. This is largely due to the fact that Internet Explorer makes up just two percent of the active market share. However, for the relatively small amount of users that continue to surf, an event like this is still a huge disaster. 

Microsoft Defender DOS Bug

The second patch that Microsoft expedited was a denial of service vulnerability in Microsoft Defender. The antivirus program comes standard in all Windows 10 PCs, and truly is the core of Windows 10’s sterling security record. 

The bug that was discovered wasn’t necessarily obvious, or easily exploitable. In order to do so, the attacker would need the ability to read, understand, and write code. Doing so would allow them to disable Windows Defender components, giving the attacker access. This would give them free rein to do whatever malicious act they chose to deploy. 

Patches aren’t optional. If you are worried about your business’ vulnerability, speak to one of our experts at Coleman Technologies. We have the know-how to keep your software up to date. Give us a call at (604) 513-9428 today! 

Continue reading

3 Business Communications Tools You Should Know

VoIP and Conferencing

Every business needs to have a telephone system, that much is understood. Traditional telephone companies haven’t invested in their infrastructure and it shows. While some telephone companies have started updating their systems, the functionality that the modern business needs necessitates interactive capabilities. This is where a VoIP solution comes in. For a fraction of the cost of a traditional telephone system, companies can use their existing Internet connection to run an enterprise-level telephone system that has all the features they need. 

A base Voice over Internet Protocol solution comes with some of the features you most expect out of a business phone system such as call forwarding, voicemail, call routing, and more; but, when you expand a VoIP solution, you can get very powerful tools such as conferencing, instant messaging, and even video chat solutions. Hosted in the cloud or on dedicated local hardware, VoIP is one of the strongest and most cost-effective communications tools you can get for the modern business. 

Email

Most businesses use an email system for business correspondence. Some even use commercially available solutions. This isn’t ideal as there is plenty of information exchanged in the course of business that would be sensitive in nature. That’s why we believe that it is important for a business to use business-grade email. There are quite a few different options to choose from as businesses can opt to host their own email, or select a cloud-hosted solution. 

If security is a concern--and it almost always should be--a locally-hosted server could be the way to go. Today’s cloud-based email platforms, especially those that come with high-end productivity suites, are created with advanced tools like built-in encryption and artificial intelligence. These tools go a long way toward making the cloud-hosted email a viable selection for the modern business. 

Messaging and Collaboration

No matter what communication solutions a business chooses, it has to be able to fuel increases in productivity. Today, there are cloud-based productivity suites on the market that provide people the ability to work together in real time. This collaborative growth is a main component of the development of new and exciting productivity software.

In fact, the need for organizations to maximize their resources on projects has pushed software developers to begin to create better collaborative software. New software with hundreds of third-party software integrations, real time instant messaging, and other great features are revolutionizing project management. 

With more people working together from different locations, and more businesses outsourcing key parts of their operations, communications are going to continue to be one of the most important aspects of the business landscape going forward. If you would like to talk to an IT professional about which new communications tool would be a good fit for your business--and, how these tools will save your company money--call the IT experts at Coleman Technologies today at (604) 513-9428.

Continue reading

How Cybercriminals Can Add “Be Scammed” to Your Google Calendar

Here, we’ll review the basic experiences that this scam subjects a user to as it sets the trap… and, of course, what your business can do to avoid these threats.

How Users Can Be Scammed

Put yourself in the shoes of a targeted user for a moment: just like any other day, you access your Gmail account and discover what looks like a Google Calendar invite. The invite is apparently for some kind of company-wide meeting (probably to discuss the company’s trajectory, policy changes, or something like that) to take place at the end of the workday. The message includes a link to the complete agenda, which can be accessed once a user confirms their credentials. You do so… and in doing so, fall for a scam.

This scam can be pretty safely categorized as “brilliant in its simplicity,” much like other phishing attacks can be nowadays. By using Google’s own convenience-based features, a fraudulent calendar event can be automatically added to a user’s Google Calendar, notifying the user. Fraudulent links send the user to a faked Google login page, where the user’s credentials are stolen as they attempt to log in. Alternatively, the link just begins installing malware directly to the targeted system. This scam has also proved effective against private users - informing them of some fabulous cash prize they’ve “won” through these fake Calendar entries.

How the Scam Was Uncovered

As it turns out, the details of this scam were reported to Google by an IT security firm in 2017, but Google has not made any steps to resolve it until recently.

The firm stumbled upon this discovery when a coworker’s flight itinerary appeared in an employee’s Google Calendar. From there, the researcher realized the implications of this accidental discovery, and quickly determined that users just don’t anticipate phishing attacks to come in through their Calendar application.

Can This Scam Be Stopped?

Now that Google has acknowledged the issue, a fix is currently being developed as of this writing. Until the point that a successful fix is deployed, you need to make sure your users are protected against this vulnerability.

The first thing they need to do is ensure that no Gmail events are automatically added to their Google Calendar. Under Settings in the Google Calendar application, they need to access their Event settings. From there, they need to deselect the option to Automatically add events to my calendar from their Events from Gmail.

To disable invitations to events from automatically adding themselves to the Google Calendar, a user needs to go through the same process, this time switching the Automatically add invitations option to the much safer “No, only show invitations to which I have responded.”

With any luck, this - combined with a little vigilance from your users - will protect your business from a phishing attack via its schedule. To learn more about how to protect your business against a variety of threats, subscribe to our blog, and give Coleman Technologies a call at (604) 513-9428.

Continue reading

Bad Experience


Coleman Technologies

 

We strive for 100% customer satisfaction. If we fell short, please tell us how so we can make amends.

Continue reading

Experience

Coleman Technologies

Please take a moment to review your experience with us.

Continue reading

Work From Home

Get Double The Work Out Of
Your Employees While Slashing Overhead
Costs, Padding Your Bottom Line And Securing Incredible Loyalty From Your Staff

Sound too good to be true? I assure you it’s not…

There is a fast-growing trend among small and medium businesses that is drastically increasing productivity, cutting costs, and driving more profit to the bottom line. Is it a new management style or marketing trend?

No – it’s telecommuting, which is a $5 word for allowing your staff to work from home or while on the road.

Sure, it doesn’t sound very sexy when you first hear it, but when you see the bottom line impact it has on profits and productivity and talk to business owners who rave about how much money it’s saving them, you’ll start to see what all the excitement is about.

What Is Telecommuting And How Is ItGoing To Help My Business?

Telecommuting is a fancy word for allowing employees to work from home, in remote offices, or while on the road. While this is not a newconcept, recent advancements in remote access technology and security have made it very affordable and easy for even micro business owners.

The Ultimate Small Business Guide To Setting Up A
‘Work From Home’ Or Remote Network Access System
For Your Staff

If you are the owner of a small or medium sized business that is thinking about implementing a “work from home” program for your employees – or if you want to install a virtual network to enable you and certain key employees and managers to work on the road or from a remote office – DON’T – until you read this eyeing guide.

Our free report will explain in plain, non-technical terms best practices for setting up remote access for you and your staff, as well as important questions you should ask any computer consultant to avoid making the most commonly made, costly mistakes made when setting up the technology for a work from home program.

Critical Facts And Insider Secrets Every Business Owner Must Know Before Installing A ‘Virtual Network’ To Allow Employees To Work From Home, On The Road, Or From A Remote Office

In this free report, you’ll discover:

  • What “telecommuting” is and why so many small and medium sized businesses are rapidly implementing work from home programs.
  • The single most important thing you MUST have in place before starting any work from home or remote office initiative.
  • How one company saved $11 million after implementing a work from home program – and how you implement the same money-saving strategies for your small business.
  • How to get a FREE “Home Office Action Pack” ($97 Value).

Complete the form to the right to getINSTANT ACCESS to this free report! 

Continue reading

Activate My Free Support

I Want To Give You 2 FREE Hours
Of Computer Support To Resolve Any IT
Or Computer Issue You Have To Prove
We Can Do A Better Job Than
Your Current IT Service Company

Submit the form here on this page to activate your 2 hours of FREE technical support. You’ll have us “on-call” to solve any unexpected technical problems that you run into for your business. Please note that you are not obligated to do or purchase anything by activating this free 2-hour support visit when you take us up on the offer.

Why Are We Giving Away Free Support?

Some people think that we are crazy for offering free services. The truth is, some people may take advantage of us, but we know that most [City] [Business Owners] are just honest people trying to find someone they can trust to fix and maintain their computer network. I know that we are hands down the best at what we do, but I don’t think it’s fair for you to risk your money to find out.

How You Can Use Your 2 Free Hours:

  • Diagnose any computer network problem you are experiencing.
  • Check your network’s security against hacker attacks and viruses.
  • Scan and review spyware.
  • Check your network backup system to make sure it is working properly.
  • Diagnose slow, unstable PC’s.
  • Have us conduct our proprietary 57-point IT Systems Security And Performance Assessment.
  • Discuss a project or upgrade you are considering, or even give you a second opinion on a quote you received.
  • [Insert or replace any bullet points with your desired solutions of what they can do with the 2 free hours.]

Simply fill out the form on the right to get started.

You can even indicate on the form whether you need help now or if you just want to activate this free support for use when you need it in the future. I look forward to working with you.

Let Us Show You What Fast, Affordable,
and Hassle-Free IT Support Should Be Like!

Continue reading

Secure Your Network

Exclusive FREE Report:
“21 Critical Questions Your IT Consultant
Should Be Able To Say ‘Yes’ To.”

Even if you aren’t ready to make a change right now, this report will give you important questions you should ask your current IT person to make sure their policies, procedures and service standards won’t leave you vulnerable to expensive problems, lost data, viruses, hacker attacks and a host of other problems.

Read This Guide and You’ll Discover:

Secure Your Network Report

  • The “dirty little secret” to the computer repair industry that most people don’t know and will never be told by their IT guy (knowing this ALONE could save you from wasting tons of money and untold aggravation when outsourcing your computer support).
  • 21 Revealing questions that will help you instantly spot an unethical or grossly incompetent computer repair/support technician in minutes.
  • 4 Costly misconceptions most business owners have about computer maintenance and repair; one you will need to know BEFORE even picking up the phone.
  • Viruses, worms, spyware, and hackers: what you need to know to protect yourself.
  • 5 Mistakes to avoid when choosing a computer consultant.
  • Why “cheap” or “lowest price” computer repair shops aren’t the bargain they initially appear to be.
  • The one surefire sign that you should run – not walk – away from a computer support firm.

Choosing the wrong computer consultant to support your network can not only be incredibly frustrating and expensive, but you could end up costing you in downtime, data loss, and expensive repair bills, not to mention the headaches and frustration!

Get Your Report Now By Completing The Form On This Page

Continue reading

The Truth About Compliance and Cybersecurity

IT Security

Let’s start with IT security because it’s undeniably important if you want to maintain not just IT regulatory compliance, but business on your own terms. IT security, like the act of complying with regulations, is an act of risk mitigation. In the case of IT security, the risks are many and complex. You have the risk of operational issues like downtime. You have the risk of system corruption from hackers and other outside entities who are trying to break through (or in) and get access to your assets. There is also internal risk to physical systems, central computing infrastructure, and every endpoint on the network.  

In IT security, the amount of risk often dictates what kind of action is necessary, since reacting to the problems themselves isn’t a viable option. Thus, when protecting your network from threats, you will likely have to be much more comprehensive about your attention to detail as you would even under the most strictest compliance standards.

IT Compliance

Compliance also is all about minimizing risk, but to stay compliant, it’s more about focusing on following set-in-stone rules than it is about keeping systems secure. Most of the regulations that have been passed down by a government entity, third-party security framework, or customer contract have very specific requirements. This gives network administrators a punch-list of tasks that need to happen to keep their organization’s IT compliant with their various IT mandates. 

Insofar as it works to maintain digital asset security, many regulations are created to ensure that risky behavior is not introduced, while others are very specific about what data needs to be protected, and what systems need protection. In fact, some regulations barely touch the IT infrastructure, only dictating that the business purchase regulation-compliant hardware. 

Where Your Company Stands

Compliance standards typically depend on which vertical market your business does business in, or more specifically, how it uses sensitive information in the course of doing business. That doesn’t speak to your organization’s complete IT security strategy. In order to keep all of your digital (and physical) assets secure, there needs to be a dedicated plan to do it. After all, today the user is the most common breach point. 

With that truth it is important for the business that operates under the watchful eyes of a regulatory body to understand that you may be compliant, but still be at risk. It’s important that aside from meeting all the compliance standards set forth by your industry’s regulatory mandates, you need to put together a cybersecurity strategy that prioritizes the ongoing training of your endpoint operators. 

At Coleman Technologies, our technicians are experts in modern compliance standards and cybersecurity. Our team can work to simultaneously build an IT infrastructure, the policies to govern that infrastructure, and the endpoint monitoring and protection solution that will keep your business secure from threats, while also being compliant to any mandated regulations your business is under. Call us today at (604) 513-9428 to learn more.

Continue reading

How is Artificial Intelligence Changing the Face of Cybersecurity?

Some of the best cybersecurity methods are practices developed over the past few years. This is because social engineering, specifically phishing, has become a major problem. There are billions of phishing emails sent each year, and some of those are so convincing that even people who have had some basic cybersecurity training fall victim to them. To fight this, security firms have started to look to tomorrow’s technologies to help them mitigate risk today. 

Artificial Intelligence - The Future of Cybersecurity 

One of the most effective ways of combating this rise in hacking is to use the most dynamic technology you have access to and make a tool that will help you mitigate the massive risks. One way is to reduce the effectiveness of these hacks. In this case the technology is artificial intelligence.

When we talk about artificial intelligence, we are talking about having a machine that learns as it is continually exposed to threats. This will work to solve common issues at first, but as these systems advance, and are exposed to user behaviors, they will be able to replace access management systems. Since the AI will be constantly monitoring systems, as well as user behaviors, workplace roles, and common actions, it will be able to recognize a person without, the need for password-protected accounts and creating ubiquitously secure endpoints. If the system recognized any deviations, an additional form of authentication such as biometrics would grant or deny access. 

Cost will initially be a factor for businesses, especially small and medium-sized businesses, but as large companies begin to truly trust these platforms, they will have viable endpoint-protection systems for small businesses. 

Cybercrime Accelerates with 5G

5G and beyond will bring a lot of changes to the user experience, of course, but it will also make huge changes to cybersecurity. Before long, the AI systems that are being developed to thwart today’s cyberthreats will become essential systems for the sustainability of mobile computing. Just think about how much cyberthreats have multiplied over the past decade after the jump from 3G to 4G. The jump to 5G isn’t going to any less dramatic.

It will be crucial for cybersecurity professionals to be able to leverage systems that are both ubiquitously available to search through large streams of data while also being capable of learning on the fly in order to ascertain what data is potentially malicious and what data is less so.

Luckily there are still years before these types of systems will be needed. Unfortunately, there are enough threats out there to be a major problem going forward. The IT professionals at Coleman Technologies can help you protect your hardware and data. Give us a call at (604) 513-9428 today!

Continue reading

Big Data for the Small Business

To Identify Trends

The number one thing you need to know about data analysis is that the data you use needs to be structured in a way to allow you to get the most accurate information possible. This isn’t always easy. In order to put your business in the right position you can’t just rely on decision makers to go with their gut reaction, you need a definitive plan fueled by empirical data so that you avoid huge costs to solve small problems. The simplest way to do this is to identify trends inside and outside of your business. You can do this through a dedicated business analytics platform, using your organizational data to help you make sound business decisions. 

Improving Operational Effectiveness

Another part of the business that can be improved through the use of analysis is operations. Traditionally, the more efficient your business is, the more effective it is. This doesn’t change because you have data; but, with the data you can get a better perspective about how your business works, how your customers interact with your company, and a lot more. The better you understand the separate parts of your business the more you can confront its pain points and build effectiveness. 

Shifting Your Revenue Generation Strategies

Since you are in business to make money, it stands to reason that using any resources to help you do that is beneficial for the company. Combing through your operations and marketing data can provide opportunities that you didn’t know were there. It can make all the difference for the small business that needs to transition quickly in order to sustain operations. 

It’s been said that data is the new oil. That may or may not be true, but for the small business, drilling into your data to see the best way forward is a solid practice that will become commonplace before long. To get out in front of it, call the IT professionals at Coleman Technologies at (604) 513-9428 and we will help you get started using your data to benefit your business today.

Continue reading

URL Manipulation and What to Do About It

The URL

Before we get into the manipulation of the URL, let’s define its parts. 

The first part of the URL is called the protocol, which tells the computing network which language is being used to communicate on said network. Most of the time, the URL will use the protocol “HTTP”. The HyperText Transfer Protocol makes it possible to exchange web pages. Other protocols that are used include File Transfer Protocol, News, and Mailto. 

The second part of the URL is the ID and password, which makes it possible to access secure servers on the network. This part is typically removed because the password will be visible and transfer unencrypted over the computer network.

The third part of the URL is the server name. It allows users to access information stored on specific servers whether through a domain or the IP address associated with the server. 

The fourth part of the URL is the port number. This number is associated with a service and tells the server what type of resources are being requested. The default port is port 80, which can be left off the URL as long as the information that is being requested is associated with port 80.

Finally, the fifth, and last, part of the URL is the path. The path gives direct access to the resources found tied to the IP (or domain).

Manipulating the URL

By manipulating parts of the URL, a hacker can gain access to web pages found on servers that they wouldn’t normally have access to. Most users will visit a website and then use the links provided by the website. This will get them to where they need to go without much problem, but it creates their own perimeters.

When a hacker wants to test the site for vulnerabilities, he’ll start by manually modifying the parameters to try different values. If the web designer hasn’t anticipated this behavior, a hacker could potentially obtain access to a typically-protected part of the website. This trial and error method, where a hacker tests directories and file extensions randomly to find important information can be automated, allowing hackers to get through whole websites in seconds. 

With this method they can try searching for directories that make it possible to control the site, scripts that reveal information about the site, or for hidden files. 

Directory traversal attacks, also known as path traversal attacks, are also popular. This is where the hacker will modify the tree structure path in a URL to force a server to access unauthorized parts of the website. On vulnerable servers, hackers will be able to move through directories simply.

What You Can Do?

Securing your server against URL attacks is important. You need to ensure that all of your software is updated with the latest threat definitions, and keeping a detailed configuration will keep users in their lanes, even those who know all the tricks. 

The IT experts at Coleman Technologies can help you keep your business’ IT infrastructure from working against you. Call us today at (604) 513-9428 for more information about how to maintain your organization’s network security.

Continue reading

The Support Portal

Get to Know Our Support Portal

This valuable tool only gets better when you understand more of its features.

The support portal serves as a direct line of communication between you and our support team, also providing access to a complete record of your technology components, support history, and more. Take a moment to watch this video to learn about how you can use the support portal to its full extent.

Continue reading

Cybersecurity: An Origin Story

Let’s start with where we are now. History is best told on a timeline, so let’s start from the present. Cybercrime today is profiting over $1.5 trillion each year, and that figure continues to climb. Some have predicted that this figure will nearly quadruple by 2021. Security breaches are up by 67 percent over just the past five years.  

How is this figure climbing so quickly? Well, let’s examine the most popular form of cybercrime: phishing. The method that cybercriminals are using are able to deploy all types of malware, yet also has data-stealing abilities. Whether that data is your sensitive personal information, or login credentials to your bank account, phishing gives a cybercriminal direct access. The worst part for people who have fallen victim, is until something dramatic happens, they are clueless that they have even become a victim. Phishing attacks have led to billions of records being exposed, stolen, or corrupted each year.

Cybercrime has become a real concern for all business owners. So how did all of this start?

The Beginning 

This information Coleman Technologies is about to reveal may be hard to believe, but cybercrime was Bob’s fault. This trillion-dollar criminal trend is the result of a research project held by a man named Bob Thomas. Bob Thomas made the observation that a program is able to move across a computer network, leaving a trail behind. He then proceeded to write a code that was named “Creeper”. This code resulted in a program that was designed to travel between Tenex terminals on the ARPANET. The message that came across? “I’M THE CREEPER : CATCH ME IF YOU CAN”. 

The research project sparked the attention of email inventor Ray Tomlinson. Tomlinson altered this program into a self-replicating one. This resulted in the first computer worm. Immediately after this discovery, he wrote an additional code which was titled “Reaper”. This chased down the Creeper code, and deleted it; which resulted in what was effectively the first antivirus software

So how did Bob’s experiment start all of this? Well, in the 1980s Soviet hackers considered the applications of this experiment. Academics designed applications that could be used to infiltrate other networks. This ideology quickly spread, and in 1986 German hacker Marcus Hess hacked into an internet gateway which was hosted at the University of California at Berkeley. This hacked connection was then used to piggyback onto the ARPANET. He hacked into a total of 400 computers, including mainframes hosted at the pentagon. 

How did this turn into such a profitable “business”? Hess planned on selling the secrets found on these computers to the Soviet KGB. Before he was able to do so, he was caught by the group effort put forth by the FBI and the West German government. His conviction was the first of its kind -- cybercriminal activity sentencing. The abnormality of the case resulted in a 20-month suspended sentence. 

At the same time as this was occurring, computer viruses started to become a serious threat. With the exponential growth of the internet, there were more connections that viruses could infect. The virus started to become a real problem.

The Middle

In 1988, Robert Morris woke up and decided he wanted to see just how big the internet had become. Morris, a software engineering student at Cornell University, wrote a program designed to spread across various networks, work themselves into Unix terminals, and begin replicating. The software replicated so quickly that it actually slowed down the early Internet, which caused major carnage. This carnage become known as “the Morris Worm”. Morris’ worm resulted in the formation of the Computer Emergency Response Team, known as US-CERT today. Morris was the first person convicted under the Computer Fraud and Abuse Act (CFAA). This act was introduced with the intentions to protect against unauthorized access. 

After Morris’ worm was handled, viruses began being developed at an absurd rate. The antivirus industry, which started in 1987, began to grow as a result. By the time the Internet was an accessible user-product in the 1990s, dozens of solutions were available to prevent devices from being infected. These solutions scanned the binaries on a computer, and tested them against a database of known virus-code. There were major problems with this protection method, such as the abundance of false positives. They also had a tendency to use a lot of the systems’ resources to scan for these viruses. Remember how slow dial-up used to feel? Your anti-virus could have been the culprit. 

The mid-90’s to late-2000’s were a prospering time for the world of viruses. While the figure was estimated to be a few thousand known viruses in the mid 90’s, that figure was estimated to be around five million by 2007. These different malware strains were either worms, viruses, trojan horses, or other forms. By 2014, 500,000 different types of strains were being created daily. This time truly was the malware boom. 

Who was stopping this boom? Well, nobody. Cybersecurity professionals needed to make an effort. Antivirus solutions simply couldn’t keep up, and while they might detect malware, they had a hard time preventing it. Innovations in cybersecurity developed quickly. First, endpoint protection platforms (EPP) that didn’t just scan for known code, they also scanned for code similarities. This meant that unknown viruses could be detected.

The End?

With advanced malware defeating endpoint protection regularly, it was time to further innovate cybersecurity measures. The timeline innovators had was cut short with the deployment of WannaCry. WannaCry was, at this point, the most devastating piece of malware that existed. WannaCry even shook the world of the most capable security professionals. It encrypted the data on a computer and forced the computer owner to pay in Bitcoin to regain access to these files. This deployment sparked an explosive increase in the cybersecurity industry. It was time for cybersecurity to surpass the capabilities of cybercriminals, instead of being constantly behind.

The only way anyone was able to determine if they were being infiltrated was to have a transparent network. Administrators began using endpoint threat detection and response (EDR) services to monitor their networks. This solution is still cutting edge by today’s standards. While this isn’t the end for cybersecurity, EDR services are extremely capable of keeping malware out of your network. 

If you would like to learn more about cybersecurity, or are interested in keeping your business’ data safe, call Coleman Technologies today. Our professionals can be reached by calling (604) 513-9428.

Continue reading

There’s Value in Outsourcing Your IT, Part V

Businesses Depend on IT

There are a lot of different pieces of technology that go into a business, and like a puzzle they all need to fit together and work. So where do all of these puzzle pieces come from? Let’s examine different types of technology.

Servers and Networking

Here are two scenarios, and the different methods businesses use to handle them:

Walter’s business is growing extremely quickly, but his servers are the same ones he’s been using for years. He realizes he is running low on storage space, and his increasing staff puts pressure on him to upgrade his server. Walter manages to cobb something together, hoping it will suffice for the time being. When Walter attempts to merge his servers into one slightly larger server, he misconfigured a few components resulting in downtime for his entire staff. Not only has he wasted his own time, but now he is experiencing the most expensive segment of downtime he has ever experienced. 

Jesse, on the other side of town, also is experiencing extraordinary growth. Jesse however, makes a simple phone call to his managed service provider. He is connected to a professional, who advises Jesse on server options that will sufficiently support his growing business. His managed service provider not only points him in the right direction, but also comes on site to install this new technology. Jesse knows he isn’t a tech know-it-all, so he leaves deployment of servers to the professionals. His business is ready for increased data storage that same week he decided it was time to expand. 

Workstations

Your business’ employees are only capable of what their technology can handle. When it comes time to upgrade or add additional workstations, there are a few options one can take. Let’s see how our two business owners handle these situations.

Walter, who is an impulse spur of the moment shopper, sees what he believes is a fantastic deal on eBay. He decides that these second-hand computers will be able to handle all of his employee’s programs without issue. However, upon arrival Walter notices that his computers are missing a few components. It turns out that the eBay listing was actually for five home-made computers that the builder was never able to get to operate properly, rather than complete working PCs. Overlooking the description just set him back a large amount of money, and the computer repair shop charges nearly as much as a brand new PC would have. 

Jesse, has a few empty desks he would like to fill with capable computers as well as a few new employees. He reaches out to his managed service provider to discuss which computer might fit the needs of his business. The professionals are able to use their connections to get Jesse a fantastic deal, and most importantly, the purchase of the computers comes with free installation.

Software as a Service

What good would a computer be without the necessary software? Businesses should be utilizing the latest and greatest software. There are a few different approaches a business owner can take to procure the necessary software to boost productivity within the office.

Walter knows that software can be expensive, so he decides to torrent a few versions hoping that he doesn’t get caught. Unfortunately, however, Walter is exposed as a fraud and his business is the center of attention for all things media. His business suffers massively, and he wishes he had spent a fortune on the software instead. 

Jesse too knows how expensive software can be. Unlike Walter, he once again leans on his managed service provider. They offer what is known as software-as-a-service. This service gives you all the latest and greatest software, for a low monthly cost. It’s like renting a tool, as opposed to buying it outright. Not only does this tool come with free installation as well as support, but it doesn’t set Jesse back a large sum of money. He is able to give his employees all of the programs they need to proficiently do their jobs. 

Which Experience Sounds More Enjoyable?

If you had a choice to be Jesse or Walter, which would you choose? Managed services truly offer support for all of your business needs. If you would like to learn more, reach out to our professionals by calling Coleman Technologies at (604) 513-9428 today!

Continue reading

There’s Value in Outsourcing Your IT, Part IV

As we have done throughout this series, we will compare the experience that a managed service provider is able to deliver, compared to the alternative.

Cloud Services

Brennan’s business gathers and stores a substantial amount of data, as most businesses do. His business relies heavily on this data, as he runs an organization which depends on client contacts. To store all of this data, Brennan decides to do some research and build his own server. He understands the basics, and begins work. Not only does this take up a large amount of space, it also requires an absurd amount of power to operate. This makes the office unbearably hot. Furthermore, Brennan hooks up connections incorrectly causing equipment failure. This is not covered under warranty, and the initial cost of setting up a server is astronomical. 

On the other side of the town, Dale works in the music industry. His business decides to go with managed services. Dale is quickly connected with a trustworthy, dependable cloud service. He is then able to store all of his data and applications in the space provided by this service. It only costs a minimal monthly fee in comparison to the initial cost a server build would require. 

Backup and Disaster Recovery

Let’s assume both Brennan and Dale are given the same set of circumstances. A flood causes both businesses to be completely under water. How differently will these two business owners handle this disaster?

Brennan, panic stricken, attempts to grab whatever equipment he can salvage. His business relies entirely on the information stored within his computers. He is only able to get a small number of computers operating again, and since all of his data was in-house, nearly all of it is destroyed. Brennan’s business is in some truly dire straits. 

Dale immediately begins his backup and disaster recovery plan. His plan has been tested recently, so he is confident that his entire business can operate off-site. All of his data is stored in the cloud, which means it is all accessible anywhere there is internet. Dale’s cloud service also goes the additional mile of storing his data in an additional place. This ensures that there truly is a backup, and the same disaster that causes a backup plan to be utilized does not destroy the backup data. 

Data Warehousing

The process of combining seeming less unrelated data into a singular platform is data warehousing. This process helps businesses fuel their analytics as well as their business intelligence platforms. These platforms are turning into some of the most important tools a business owner can utilize, as they provide immense value by providing decision makers a thorough knowledge base.

This processing requires a bit of computing power. In fact, it requires more computing power than Brennan’s entire home-made system is able to muster up. Since Dale utilizes managed services, he has no issues accomplishing his goals. His provider’s flexibility ensures he is able to adjust his infrastructure as needed. 

Managed IT Value - Up Next 

In the next part of our series, we will be discussing how a managed service provider can assist with IT procurement. Coleman Technologies is always available to answer any questions you may have, so give us a call at (604) 513-9428 today!

Continue reading

There’s Value in Outsourcing Your IT, Part III

What is Consulting?

Like we’ve established, it isn’t uncommon for people to recruit an expert or a professional with the capability to assist them with a task that the person cannot do. There are many reasons that people do so: they may not have the skill to safely work on whatever process is required of them, they may lack the technical know-how to complete it. Sometimes, it is simply to ensure that something is done the right way.

Whatever the reason may be, bringing in an expert (often referred to as a consultant), is a great way to help reinforce your chances of a positive outcome.

What You Should Expect When Working with Consultants

First and foremost, the consultants you work with need to have a better grasp on their area of expertise than you do, and should be motivated to give you the value that you are looking for in a provider. Coleman Technologies qualifies as a consultant for managed services, working with businesses to ensure their information technology solutions are optimized.

As such, we are committed to using the experience and expertise that we have built up to deliver the solutions and services that our clients need to be successful. After all, the success of a managed service provider is dependent on the success of its clients, providing the motivation to deliver services that deliver the positive outcomes these businesses are looking for.

There are a variety of services we offer to help accomplish this shared goal through our consultation. If the technology you use could stand to see an upgrade, following through with us allows the decision makers we work with to take the data on their past and present IT strategies. As a result, we can make the best decisions for them that will help to cement their business’ future.

Here are some of the consulting services that we offer:

Virtual CIO

One of the biggest concerns that businesses come to us with regarding their technology is (predictably) the cost associated with their IT implementations. There are a few reasons that that they’ll do so… some are looking to upgrade, others will want to scale their technology to match their business’ growth without outpacing their budget. Whatever the reason, there is one fundamental motivation why they do so:

In essence, these companies want to make sure that their investment will provide them with the value they require (or really, demand) of it.

Working with you as your Virtual CIO, we can oversee your complete IT strategy. Our seasoned professionals will evaluate your current technology, identify which products and services will serve your needs best without breaking the bank, and work with you to strategize your approach to your IT from top to bottom. As a result, you aren’t saddled with the responsibilities to research and come to decisions - duties that you probably have neither the time nor the practical experience to take on.

Business Process Management

One of the major benefits of any business technology is the positive effect it has on efficiency. When working to streamline your processes, your in-house resources may not have the perspective to see the big picture and come up with an efficient and effective plan. An outside resource, like a managed service provider, has that needed perspective. Pair that with the experience they have in optimizing business resources, and you have a winning combination.

By working with a partner who is committed to equipping you with the processes and tools from start to finish, you can shift your productivity/waste ratio in the right direction - and the better your productivity, the higher your revenue.

Vendor Management

How much time has your business sunk, in total, into working with your vendors? How much has that cost the business? You need to keep in mind that vendors are - in most cases - effectively salesmen. Not to say this is a bad thing, but it does mean that the majority of vendors will prioritize making a sale over ensuring you get what will serve you best. However, with Coleman Technologies, you will no longer need to deal with vendors … we’ll do it for you. Anything you need, you’ll be able to call us and get it, simplifying and streamlining your procurement.

Find Out How Else We Can Help

By working with a managed service provider, a company has a simpler means of handling their crucial technology. Whenever they need a problem solved, they simply lean on their provider to see to what’s needed… whether that’s support, resource management, or a representative to speak to vendors. Coleman Technologies can be that for your business.

To learn more about our consulting services, reach out to us at (604) 513-9428 - and don’t forget to check back here on Wednesday for part four of this series!

Continue reading

There’s Value in Outsourcing Your IT, Part II

MSP Support

The Managed Service Provider (MSP) provide an experience unlike traditional service providers’ methodology. Let’s take a look at two scenarios:

Tom is emailing his boss in regard to a company project when all of a sudden his software closes. Tom tries to re-open his email, resulting in well, no result. Tom, frustrated at his email software, spam clicks the application which causes his entire computer to freeze. He has to ask his neighbor to contact their IT department for him. Unfortunately, they are out for lunch which results in a massive amount of downtime for not only Tom but for the business itself. 

Jerry, who works for a business on the other side of town, is working on a project when he too is experiencing technical difficulties. Jerry has been working on a new business logo in his graphic design software. While opening his file, he is prompted with a message informing him that his software license is not valid. Jerry wastes no time in creating a ticket with his managed service provider. Within minutes, a technician remotes into Jerry’s computer, reconciling the issue at hand. Jerry is up and working in a timely manner. 

Time is money, so why not save yourself time with managed services

Onsite Support Services

Managed service providers leverage remote support simply because of how efficient it is. It doesn’t make sense for a technician to come all the way out to your business to resolve an issue that could have been resolved at their own office. However, when a situation occurs where a technician is actually required to be present, managed service providers have trained staff ready to be dispatched. 

When something goes wrong, IT support needs to be present. It isn’t cost effective to have IT support present when your infrastructure is operating as it should.

Keep Business Moving Forward

Time is a business’ most scarce resource, so why waste any of it? Every moment is valuable, so you can’t afford to sit idle waiting for IT to return back from lunch or wait for them to have a free moment. To ensure you get the most out of every second, Coleman Technologies offers managed services which can greatly benefit your business.

This is far from the end when discussing the benefits of managed services. Return back to our blog page to read part three of this series. If you would like to discuss additional support options offered with managed IT services, give us a call at (604) 513-9428.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

Business technology can sometimes seem like a hedonic treadmill: you maintain a baseline level of operation with your IT, but it will inevitably fail, leaving you in the tough situation of having to replace it. Today, we want to help you get ahead of...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image