Award-Winning IT Services Backed by 25 Years of Experience – (604) 513-9428

Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

There’s Value in Outsourcing Your IT, Part V

Businesses Depend on IT

There are a lot of different pieces of technology that go into a business, and like a puzzle they all need to fit together and work. So where do all of these puzzle pieces come from? Let’s examine different types of technology.

Servers and Networking

Here are two scenarios, and the different methods businesses use to handle them:

Walter’s business is growing extremely quickly, but his servers are the same ones he’s been using for years. He realizes he is running low on storage space, and his increasing staff puts pressure on him to upgrade his server. Walter manages to cobb something together, hoping it will suffice for the time being. When Walter attempts to merge his servers into one slightly larger server, he misconfigured a few components resulting in downtime for his entire staff. Not only has he wasted his own time, but now he is experiencing the most expensive segment of downtime he has ever experienced. 

Jesse, on the other side of town, also is experiencing extraordinary growth. Jesse however, makes a simple phone call to his managed service provider. He is connected to a professional, who advises Jesse on server options that will sufficiently support his growing business. His managed service provider not only points him in the right direction, but also comes on site to install this new technology. Jesse knows he isn’t a tech know-it-all, so he leaves deployment of servers to the professionals. His business is ready for increased data storage that same week he decided it was time to expand. 

Workstations

Your business’ employees are only capable of what their technology can handle. When it comes time to upgrade or add additional workstations, there are a few options one can take. Let’s see how our two business owners handle these situations.

Walter, who is an impulse spur of the moment shopper, sees what he believes is a fantastic deal on eBay. He decides that these second-hand computers will be able to handle all of his employee’s programs without issue. However, upon arrival Walter notices that his computers are missing a few components. It turns out that the eBay listing was actually for five home-made computers that the builder was never able to get to operate properly, rather than complete working PCs. Overlooking the description just set him back a large amount of money, and the computer repair shop charges nearly as much as a brand new PC would have. 

Jesse, has a few empty desks he would like to fill with capable computers as well as a few new employees. He reaches out to his managed service provider to discuss which computer might fit the needs of his business. The professionals are able to use their connections to get Jesse a fantastic deal, and most importantly, the purchase of the computers comes with free installation.

Software as a Service

What good would a computer be without the necessary software? Businesses should be utilizing the latest and greatest software. There are a few different approaches a business owner can take to procure the necessary software to boost productivity within the office.

Walter knows that software can be expensive, so he decides to torrent a few versions hoping that he doesn’t get caught. Unfortunately, however, Walter is exposed as a fraud and his business is the center of attention for all things media. His business suffers massively, and he wishes he had spent a fortune on the software instead. 

Jesse too knows how expensive software can be. Unlike Walter, he once again leans on his managed service provider. They offer what is known as software-as-a-service. This service gives you all the latest and greatest software, for a low monthly cost. It’s like renting a tool, as opposed to buying it outright. Not only does this tool come with free installation as well as support, but it doesn’t set Jesse back a large sum of money. He is able to give his employees all of the programs they need to proficiently do their jobs. 

Which Experience Sounds More Enjoyable?

If you had a choice to be Jesse or Walter, which would you choose? Managed services truly offer support for all of your business needs. If you would like to learn more, reach out to our professionals by calling Coleman Technologies at (604) 513-9428 today!

Continue reading

There’s Value in Outsourcing Your IT, Part IV

As we have done throughout this series, we will compare the experience that a managed service provider is able to deliver, compared to the alternative.

Cloud Services

Brennan’s business gathers and stores a substantial amount of data, as most businesses do. His business relies heavily on this data, as he runs an organization which depends on client contacts. To store all of this data, Brennan decides to do some research and build his own server. He understands the basics, and begins work. Not only does this take up a large amount of space, it also requires an absurd amount of power to operate. This makes the office unbearably hot. Furthermore, Brennan hooks up connections incorrectly causing equipment failure. This is not covered under warranty, and the initial cost of setting up a server is astronomical. 

On the other side of the town, Dale works in the music industry. His business decides to go with managed services. Dale is quickly connected with a trustworthy, dependable cloud service. He is then able to store all of his data and applications in the space provided by this service. It only costs a minimal monthly fee in comparison to the initial cost a server build would require. 

Backup and Disaster Recovery

Let’s assume both Brennan and Dale are given the same set of circumstances. A flood causes both businesses to be completely under water. How differently will these two business owners handle this disaster?

Brennan, panic stricken, attempts to grab whatever equipment he can salvage. His business relies entirely on the information stored within his computers. He is only able to get a small number of computers operating again, and since all of his data was in-house, nearly all of it is destroyed. Brennan’s business is in some truly dire straits. 

Dale immediately begins his backup and disaster recovery plan. His plan has been tested recently, so he is confident that his entire business can operate off-site. All of his data is stored in the cloud, which means it is all accessible anywhere there is internet. Dale’s cloud service also goes the additional mile of storing his data in an additional place. This ensures that there truly is a backup, and the same disaster that causes a backup plan to be utilized does not destroy the backup data. 

Data Warehousing

The process of combining seeming less unrelated data into a singular platform is data warehousing. This process helps businesses fuel their analytics as well as their business intelligence platforms. These platforms are turning into some of the most important tools a business owner can utilize, as they provide immense value by providing decision makers a thorough knowledge base.

This processing requires a bit of computing power. In fact, it requires more computing power than Brennan’s entire home-made system is able to muster up. Since Dale utilizes managed services, he has no issues accomplishing his goals. His provider’s flexibility ensures he is able to adjust his infrastructure as needed. 

Managed IT Value - Up Next 

In the next part of our series, we will be discussing how a managed service provider can assist with IT procurement. Coleman Technologies is always available to answer any questions you may have, so give us a call at (604) 513-9428 today!

Continue reading

There’s Value in Outsourcing Your IT, Part III

What is Consulting?

Like we’ve established, it isn’t uncommon for people to recruit an expert or a professional with the capability to assist them with a task that the person cannot do. There are many reasons that people do so: they may not have the skill to safely work on whatever process is required of them, they may lack the technical know-how to complete it. Sometimes, it is simply to ensure that something is done the right way.

Whatever the reason may be, bringing in an expert (often referred to as a consultant), is a great way to help reinforce your chances of a positive outcome.

What You Should Expect When Working with Consultants

First and foremost, the consultants you work with need to have a better grasp on their area of expertise than you do, and should be motivated to give you the value that you are looking for in a provider. Coleman Technologies qualifies as a consultant for managed services, working with businesses to ensure their information technology solutions are optimized.

As such, we are committed to using the experience and expertise that we have built up to deliver the solutions and services that our clients need to be successful. After all, the success of a managed service provider is dependent on the success of its clients, providing the motivation to deliver services that deliver the positive outcomes these businesses are looking for.

There are a variety of services we offer to help accomplish this shared goal through our consultation. If the technology you use could stand to see an upgrade, following through with us allows the decision makers we work with to take the data on their past and present IT strategies. As a result, we can make the best decisions for them that will help to cement their business’ future.

Here are some of the consulting services that we offer:

Virtual CIO

One of the biggest concerns that businesses come to us with regarding their technology is (predictably) the cost associated with their IT implementations. There are a few reasons that that they’ll do so… some are looking to upgrade, others will want to scale their technology to match their business’ growth without outpacing their budget. Whatever the reason, there is one fundamental motivation why they do so:

In essence, these companies want to make sure that their investment will provide them with the value they require (or really, demand) of it.

Working with you as your Virtual CIO, we can oversee your complete IT strategy. Our seasoned professionals will evaluate your current technology, identify which products and services will serve your needs best without breaking the bank, and work with you to strategize your approach to your IT from top to bottom. As a result, you aren’t saddled with the responsibilities to research and come to decisions - duties that you probably have neither the time nor the practical experience to take on.

Business Process Management

One of the major benefits of any business technology is the positive effect it has on efficiency. When working to streamline your processes, your in-house resources may not have the perspective to see the big picture and come up with an efficient and effective plan. An outside resource, like a managed service provider, has that needed perspective. Pair that with the experience they have in optimizing business resources, and you have a winning combination.

By working with a partner who is committed to equipping you with the processes and tools from start to finish, you can shift your productivity/waste ratio in the right direction - and the better your productivity, the higher your revenue.

Vendor Management

How much time has your business sunk, in total, into working with your vendors? How much has that cost the business? You need to keep in mind that vendors are - in most cases - effectively salesmen. Not to say this is a bad thing, but it does mean that the majority of vendors will prioritize making a sale over ensuring you get what will serve you best. However, with Coleman Technologies, you will no longer need to deal with vendors … we’ll do it for you. Anything you need, you’ll be able to call us and get it, simplifying and streamlining your procurement.

Find Out How Else We Can Help

By working with a managed service provider, a company has a simpler means of handling their crucial technology. Whenever they need a problem solved, they simply lean on their provider to see to what’s needed… whether that’s support, resource management, or a representative to speak to vendors. Coleman Technologies can be that for your business.

To learn more about our consulting services, reach out to us at (604) 513-9428 - and don’t forget to check back here on Wednesday for part four of this series!

Continue reading

There’s Value in Outsourcing Your IT, Part II

MSP Support

The Managed Service Provider (MSP) provide an experience unlike traditional service providers’ methodology. Let’s take a look at two scenarios:

Tom is emailing his boss in regard to a company project when all of a sudden his software closes. Tom tries to re-open his email, resulting in well, no result. Tom, frustrated at his email software, spam clicks the application which causes his entire computer to freeze. He has to ask his neighbor to contact their IT department for him. Unfortunately, they are out for lunch which results in a massive amount of downtime for not only Tom but for the business itself. 

Jerry, who works for a business on the other side of town, is working on a project when he too is experiencing technical difficulties. Jerry has been working on a new business logo in his graphic design software. While opening his file, he is prompted with a message informing him that his software license is not valid. Jerry wastes no time in creating a ticket with his managed service provider. Within minutes, a technician remotes into Jerry’s computer, reconciling the issue at hand. Jerry is up and working in a timely manner. 

Time is money, so why not save yourself time with managed services

Onsite Support Services

Managed service providers leverage remote support simply because of how efficient it is. It doesn’t make sense for a technician to come all the way out to your business to resolve an issue that could have been resolved at their own office. However, when a situation occurs where a technician is actually required to be present, managed service providers have trained staff ready to be dispatched. 

When something goes wrong, IT support needs to be present. It isn’t cost effective to have IT support present when your infrastructure is operating as it should.

Keep Business Moving Forward

Time is a business’ most scarce resource, so why waste any of it? Every moment is valuable, so you can’t afford to sit idle waiting for IT to return back from lunch or wait for them to have a free moment. To ensure you get the most out of every second, Coleman Technologies offers managed services which can greatly benefit your business.

This is far from the end when discussing the benefits of managed services. Return back to our blog page to read part three of this series. If you would like to discuss additional support options offered with managed IT services, give us a call at (604) 513-9428.

Continue reading

There’s Value in Outsourcing Your IT, Part I

A Proactive Approach 

Which scenario which would you prefer to be in:

You take your car to a shop for a tune up. A technician calls to inform you that your engine has hardly any oil in it due to a leak. However, he replaces a gasket and tops your oil off. The simple fix has cost just $80. 

OR

You notice your car is leaving dark black stains in your driveway, but after a quick google search determine that your car is probably fine, and the money you could be spending on a tune up could be better spent on an iPhone. Once all the oil is gone, your motor has completely seized due to the lack of lubrication, and you have to use your brand new iPhone to call a repair shop. The new motor will set you back $3,000. 

Your answer to the question should be obvious, but how can you take the same proactive approach with IT? The strategy most businesses choose is one that has proven its worth -- managed IT services

What are Managed IT Services? 

Managed IT services monitor systems through the use of remote monitoring. This strategy is extremely beneficial as an IT staff does not need to be on-site at all times. By using state-of-the-art tools, managed IT providers are able to monitor your business' network and hardware, ensuring they are operating correctly. If it is not working correctly, a technician is typically able to resolve the issue remotely. This, of course, means you might not even be aware of a potential issue--and most of the time--it will be resolved before you know it. 

Having a fix-it-when-it-breaks attitude has no place in any business. The value that managed IT services delivers cannot be matched. The only comparable proactive solution is having an on-site IT staff working around the clock. How much do you think that would cost you?

Imagine paying staff to sit around waiting for something to break. Now imagine paying the non-IT staff to sit around, while your IT staff tries to resolve the issue. The biggest cost a business faces with malfunctioning hardware is typically the downtime that results from it. 

Avoid Expensive Downtime

Coleman Technologies provides simple yet effective means which act before little issues turn into operational catastrophes. One solution we offer is a comprehensive patch management service. Not updating software leaves your business susceptible to data breaches. A data breach could put not only all of your data at risk, it could jeopardize your entire business. 

To learn how easily you can adopt proactive measures into your business, give us a call at (604) 513-9428. Be sure to check for part two of this series on Friday.

Continue reading

Find your next great career opportunity



Coleman Technologies inc. is a rapidly growing Managed IT Service Provider serving small to medium-sized businesses in the Fraser Valley and Vancouver. We are currently seeking a highly qualified, motivated person to join our team as a full-time helpdesk support technician. If you would enjoy working for a company that values its employees and is committed to exceptional client care, then we would like to talk to you.

Apply online at https://www.indeedjobs.com/coleman-technologies-inc/jobs/246f526cf79d54b8be7e
Continue reading

Taking a Long Look at Microsoft 365

What is Microsoft 365?

Microsoft 365 is a bundle containing Office 365, the Enterprise version of Windows 10, along with Microsoft’s Enterprise Mobility + Security. Microsoft 365 is comprised of all of these solutions, meaning your business will benefit from all of the features that come with these solutions, with just one package. So, what does this package include exactly?

Here are all of these solutions you could or should be taking advantage of with Microsoft 365:

Here at Coleman Technologies we understand this list is extensive. However, it is worth viewing as there could be solutions your business could benefit from. Coleman Technologies has the technicians needed to help you procure, implement, and manage the right solutions for you. Reach out to us at (604) 513-9428 to learn more.

Continue reading

We Celebrate National Cybersecurity Awareness Month

Any data you collect, you must protect. You might not think your business is big enough (or noteworthy enough) to be targeted by hackers, but the truth is, those are the reasons you are a target. It is estimated that by 2020, more than 24 billion devices will be connected to the Internet, so it is imperative that you follow simple, yet crucial, steps to ensure your data and information are kept safe.

Here are some variables you--and the other people on your network--need to be aware of. 

Phishing

Phishing attacks are some of the most prevalent attacks being made in 2019. Basically, users will send you an email that seems to be from a user the recipient might know. If a user interacts with that email by clicking on a link or downloading an attachment, the phishing scam is a success. A successful phishing scam is a huge problem for your business. 

You will want to train your staff on how to spot and avoid phishing attacks. Phishing attacks have been developed to be subtle and admittedly easy to miss. There are, however, several tell-tale signs that an email is legitimate. Hackers know that the weakest link in any business or organization is the employees. Do your employees know how to recognize an out of place email? It is crucial that you take the time to train your employees the art of phishing identification. 

Secure Passwords

Passwords are the standard in which most people use to keep files secure and to authenticate access to devices, platforms, programs, etc. Understanding what makes a strong password can go a long way toward securing your IT resources. Some best practices include:

  • Creating strong, unique passphrases
  • Changing passwords frequently
  • Using Upper and Lowercase letters, numbers, and symbols

Multi-factor Authentication 

Multi-factor authentication, often rolled out as two-factor authentication, puts an additional step between you, and potential threats to your network or data. You use a password to unlock a 2FA/MFA platform that requires you to get a randomly-generated code from a third-party device to gain access. Since you need a third-party device/account to open the application, account, or device protected by 2FA/MFA, that account is more than twice as secure. 

Applications and Software Updates

In order to say ahead of security attacks, the software you use cannot have vulnerabilities. As a result, patching and updating software is essential to comprehensive security. If you are going to remain secure you will want to be sure to stay up-to-date on your updates. 

How Do I Know If My Systems are Safe?

So, you want to know if you are safe from a cyberattack? To put it lightly: nobody is. By associating security preparedness with cybersecurity and routinely taking proactive, preventative measures to enhance your security position, you reduce the chance that your organization will have to suffer from downtime, data loss, and reputation damage that a data breach would bring your company.

If you would like more tips; or, if you would like to talk to one of our experts about network security, call us today at (604) 513-9428.

Continue reading

The Major Value of Backup and Disaster Recovery

You may be one of those small or medium-sized business owners that believe that anything labeled “enterprise” is overkill for your business. This may be true in some other cases, but when you start talking about data backup solutions, enterprise is a good thing. To protect your data--and effectively your business--you need a solution that will handle all the data you need to backup while keeping that data available for restore at the drop of a hat. If you don’t have this, any situation that could separate you from your data could seriously negatively affect your business’ ability to deal with adverse situations.  

The Problems That Are Solved With BDR

The main problem the BDR immediately solves is the one that is caused when your business depends on its data. If that data somehow gets altered, corrupted, or destroyed, having copies of it will keep your business in the game. A BDR can also keep lengthy periods of downtime to a minimum. Some of the options the modern BDR presents include:

  • Frequent data backup (as low as every 15 minutes) 
  • Onsite and offsite copies of data 
  • Fast restoration to reduce downtime
  • Archiving and other server-level functions
  • Bare-metal restores for drive-to-drive data migration

With our experienced staff behind your BDR, you get the strong continuity, efficient restore speed, offsite cloud storage, and the ease of implementation that allows for backups to start almost immediately. To learn how our BDR can help you protect your business reach out today at (604) 513-9428.

Continue reading

Technologies that Fuel a Remote Workforce

#1: Communication and Collaboration Solutions

Let’s face facts… you’re going to have to be able to work with your remote workers in order to accomplish what needs to be done, so you need to make sure you have a solution that maintains open lines of communication between you and your staff. All of the solutions that a business should use to enable communications while in-house should also be leveraged by a remote workforce, including email, chat platforms, video conferencing, and Voice over Internet Protocol.

On top of that, your line of business apps and the everyday software your staff needs should be available to remote workers. A prime example of a necessary solution for your remote employees is a file sharing platform that allows your team to work side-by-side on documents and data… whether or not they’re actually side-by-side.

#2: Project Management Tools

Time management is one of the biggest challenges inherent in remote work, so giving your staff direction through project management software can help your remote workers stay on task, while keeping the team as a whole apprised of progress towards a shared goal. In this way, project management solutions can help your team more efficiently reach their objectives - while keeping all members more accountable for what they need to accomplish.

This can be a considerable benefit, especially if an employee is going from a structured office environment to the more laissez-faire arrangement that remote work provides. Looming deadlines, combined with a fluid schedule, have been known to increase work-related stress. A reliable project management solution can return some of the structure to a remote worker’s day, giving them the purpose, they need to accomplish their goals.

#3: Cybersecurity

Any of the benefits of remote work are rendered moot if this remote work leads to a breach or some other security incident. This means that your remote workforce needs to be equipped with the same cybersecurity measures that you should have protecting your business’ on-premise infrastructure.

As a result, you will want to be sure that you’re having your remote workers utilize multi-factor authentication measures, and that their solutions are equipped with fully up-to-date security software. In order to connect back to your business’ network resource, they should also be leveraging virtual private networks to fully ensure your business’ data remains secure while in transit.

In many ways, a password management system would also be classified as a cybersecurity need - especially where remote workers (and thereby, remote access) are involved. 

#4: Time-Tracking Software

Finally, you need to make sure that your remote employees are spending their time effectively, as well as that you are properly reimbursing them for their time. There are many tools to help track how time is being spent while in the office, and these tools work equally as well for remote workers.

Whether you need to track how long a task took for billing and invoicing purposes, you’re trying to optimize your workflows, or you are simply ensuring that your team is being efficient and productive, understanding how time is spent during the workday is crucial. Implementing time-tracking software for remote workers can simplify payroll, allowing you to focus on other pressing business matters.

Coleman Technologies can help you out, by introducing the solutions that will make your remote working strategy far simpler. To learn more about what we can accomplish for you, reach out to us at (604) 513-9428.

Continue reading

The Several Ways You Can Enhance Your Business’ Mobility

Operational Mobility

For decades, a business was synonymous with the physical address where its offices/storefront/plant were. Your workers come to your business to access workplace resources and do their work at the business. For many businesses this is the way that you still do things (and there is nothing wrong with doing it this way), but there are several options today that were not available in the past that push operations outside the confines of your place of business. 

Today, businesses are working at higher speeds thanks in large part to mobility. For example. instead of having to call in an order, customers utilize web interfaces and mobile apps to order the goods and services they need. This allows companies to automate large parts of their customer service and product ordering processes, cutting payroll costs, inefficiencies, and mistakes. 

Additionally, operational mobility allows companies to track nearly everything. This includes the efficiency and effectiveness of the jobs being undertaken, the procurement of resources, and the billing cycle. The tools that allow companies to accomplish this are traditionally powered by preconfigured automated tools, or these days, the Internet of Things. The cost shift, coupled with the cost savings, can be passed onto the consumer/vendor, who in turn will be more apt to utilize and refer your product.

Staff Mobility

Staff mobility can mean one of two things, but they are both important. Staff mobility describes the ability for people to work where they are, or outside the organization. With tools such as cloud computing and Virtual Private Networks, it is now possible for any worker that needs access to centralized resources while they are outside of the workplace to have complete and unimpeded access to those resources, without complicating or compromising security.

The other meaning of mobility is the process of managing people and their roles in the company. With the implementation of strategic tools like management software, businesses can determine the variables they prioritize into key performance indicators (KPIs). Using these metrics, management decisions are more often based on merit. Putting better people in situations where they can thrive makes your business better. 

If you’d like to talk to one of our IT professionals about increased mobility, call us today at (604) 513-9428.

Continue reading

Essential Network Security Best Practices

Leverage Authentication Measures

One of the first steps to securing your network against threats is to create strong authentication procedures. Most of the devices with permission to access your network will already have an authentication system in place, based on a password. If the passwords used are strong enough, this can actually mitigate most threats - but you still have to worry about the ones that this doesn’t discourage. Leveraging something called multi-factor, or two-factor, authentication can help minimize the chance of something slipping past your security.

Two-factor authentication works in a relatively straightforward way. As with most login systems, a username and password are entered - but instead of being granted access, the user is asked for another credential. This is usually a randomly-generated code that a specialized authentication app will generate. Mobile devices are popular to use with 2FA, as their convenient nature makes them more likely to be available when needed. In order for a user to leverage their mobile device, the 2FA system administrator has to authorize it.

Tip: Make sure that you don’t let your password best practices slip, even if leveraging 2FA. Your passwords still need to be sufficiently complex. If you are one of those who find remembering different passwords difficult, consider using a password management system in conjunction with your 2FA. 

Protecting Your Business’ Computing Environment

Whether you use a Local Area Network or a Wide Area Network, the security practices that you need to deploy are fairly predictable. Once you’ve seen to your authentication needs, you need to combine three approaches to security into one all-encompassing strategy: your software-based security, your physical security measures, and your security awareness and best practice training.

Software-Based Security

There are many examples of how software can help keep your business’ network secure. From firewalls to content filtering to antivirus to spam detection, each of these tools protect your business data from a different kind of threat. You may even want to consider adding encryption to your email solution to make it a lot less likely that the contents of your messages will be intercepted.

Tip: If you aren’t sure which solutions are the right ones to implement, think about how your data moves about your business. The more insight you have into how your data operates, the more effectively you will be able to plan its protections.

Physical Security Measures

Somewhat ironically, we seem to have become so focused on our digital security that it can sometimes seem like we forget that there are very real reasons to protect our physical locations and infrastructure, as well. Consider the damage a bitter ex-employee could do in moments, should they manage to get into your server room. It has become fashionable to leverage biometric authorization measures to protect your server room - and there’s a lot to be said about a good, old-fashioned surveillance system, complete with alarms and cameras (as well as some updates to make this system considerably less old-fashioned).

Tip: Bring in a consulting professional to help you determine your physical security needs. Not only does this save you time by eliminating work you would otherwise have to do for yourself, it ensures that your system will be designed by an experienced professional that knows what will work best in different situations.

Security Awareness and Best Practice Training

Would you be surprised to hear that your employees are likely your biggest vulnerability? Of all of the pieces that make up your network security, the people who use your technology are the leading cause of security issues. With the number of ways that your business could be attacked, your staff needs to be educated on how to identify them and avoid them.

Tip: Both businesses and individuals have experienced difficulties with phishing and it adversely affecting them, so it makes sense to begin your training there. Not only is it a common issue, it is conceptually very simple to grasp, so it is a good starting point before moving on to increasingly complex concerns. The more your staff knows about how they can resist attacks, the more likely they’ll be able to do so if the needs arises.

Remote Solutions Via the Cloud

Modern organizations need to contend with potential threats to their network infrastructures, as businesses always have in some form. The difference is that issues can now come in on the mobile devices owned by their staff, and company resources can be routinely accessed from outside the business’ area network.

This has helped contribute greatly to the growth of cloud computing technologies - although the relative cost savings don’t hurt either. Using the cloud, your staff can access their work data and applications from a remote location, while the resources stored in the cloud are kept secure by the platform’s baked-in security and privacy.

Mobile devices have also been a disruptor to business-as-usual, which means that businesses need to plan on leveraging them if they don’t want them becoming a distraction. Designing a Bring Your Own Device policy and enforcing it through mobile device management solutions is an effective and secure way of reaching a compromise and minimizing the time wasted by mobile devices in the workplace.

Tip: Remember that cloud services are inherently scalable, so you don’t need to worry about overreaching your capabilities. However, you also don’t want to waste capital that doesn’t need to be spent. Auditing your resources is an effective way to identify and eliminate redundant costs leeching from your budget.

Network security can be complicated, but it is an absolutely crucial element to your technology strategy if you want to have any success. Coleman Technologies can help take care of the technical side of things for you, and help teach better habits to your staff. To learn more, keep reading our tips, and reach out to us at (604) 513-9428.

Continue reading

How IT Services Fit In the Modern Office

Almost every industry has some form of office setup. Manufacturers, retail, and service delivery all need their offices to handle the procedural aspects of the business. Some people work from a home office that’s just a laptop computer, while others have multiple floors of a high-rise dedicated to office workers. It’s not an overstatement to say that the office is where a majority of western workers work. The office is where productivity happens. 

This is all made possible through the use of technology. The modern office features all types of technology. From servers to workstations to networking equipment, peripherals, security and signage, and much, much more. With the deployment of all this technology, there needs to be some coordination with the way it is integrated, and with the way a company’s human resources utilize it. 

This is especially true now that:

  1. Margins are lower due to rising costs.
  2. Data is fueling organizational decision making.
  3. Threats to data security continue to rise.

In these three variables, you can find a lot about how organizations are utilizing IT. 

Shrinking Margins

Things cost more today, that can’t be denied. For the business, this creates some tough situations. One way that a business can keep these shrinking profit margins from ruining their business is by leveraging customized IT solutions designed to transfer cost. Some examples of these technologies include:

  • Cloud computing - Small business use of cloud computing is up substantially and for good reason. With the cloud, your business can get infrastructure, utilities, and storage through service providers. This means that you only pay for the computing your organization needs, with a built-in benefit of being able to access the data, applications, and virtualized hardware anywhere you have an Internet connection. The scalability provides financial and operational flexibility. 
  • Remote Monitoring and Management - As a core part of our managed IT services platform, remote monitoring and management provides several ways that your business can save money. Firstly, you transfer your costs. Hiring an internal IT staff is extraordinarily expensive. With managed IT services, you outsource your management to the managed service provider. This shift provides thorough around-the-clock monitoring and regular maintenance of your entire network and infrastructure. Another way it saves money is by being proactive. Since the managed services provider is constantly managing and maintaining your network and infrastructure, you will experience fewer critical errors and much less downtime, saving thousands of dollars over the course of your agreement. 

Influential Data

Every action your business makes and every interaction it has with vendors, customers, and prospects can be tracked. This data can be used to help businesses see what works and which of those actions are more cost effective for the business to implement as process. In order to integrate this kind of analysis for your business, you first need to understand what data you need to use in order to get the information and what technologies you may need to make your data analytics efforts work effectively. 

  • Data Warehousing - Chances are, the way your company’s IT network is currently structured won’t provide you with the type of full-business analysis needed to analyze data properly. If you have parts of your functional business’ data that isn’t included in your analysis tools it severely limits the effectiveness of your results. In order to get the results that represent your entire business, you will need to set up a repository for your data that allows for comprehensive analysis. A data warehouse structures data in a way where each process is represented, yet structured in a way that makes business analytics and business intelligence programs possible and effective. 
  • Microsoft Office 365 - If you go through the effort to ensure that all the data you need to completely analyze your business is in one space, you will want to ensure that your data analysis tools will do the job. There are several business analysis tools on the market, but one that you should consider is Microsoft Excel. Excel actually has a lot of good decision-making tools that can be used to analyze your data effectively. Excel is obviously a part of the Microsoft Office 365 cloud-hosted productivity suite, a title Coleman Technologies is proud to offer. 

Security Threats

The threats that the modern business has to deal with from outside their computing network puts strain on the users inside their computer network. An organization’s IT administrator typically sets the tone by developing a plan for the business to maintain data and network security, but those efforts can be undermined at any time if the business’ staff isn’t trained in how to confront situations that are coming from outside the network designed to undermine the security platforms that have been deployed. Here are two tools that Coleman Technologies can offer to help you thwart threats:

  • Patch Management - Every business utilizes a fair amount of software. If that software isn’t patched regularly, it may not have the most updated features, or it may have vulnerabilities that puts your whole computing network in jeopardy. Coleman Technologies has a patch management service that ensures that all of your business' software is updated regularly.
  • Cybersecurity Training - These days, the encryption used in many of your network security tools is so strong that hackers have absolutely no chance to get into your network...unless someone lets them in. In a response to the huge uptick in social engineering attacks aimed at getting individuals to provide unauthorized access, companies are now starting to provide cybersecurity awareness training to their staff. The more people who are aware of the threats and the methods in which hackers are now attempting to gain access to credentials, the more secure your business’ network is. 

The modern office has a lot of places that technology potentially fits. If your business can use any of these solutions to improve the look of your bottom line, call Coleman Technologies today at (604) 513-9428.  

Continue reading

Your Technology’s Batteries, Then and Now

Mobile Phones and Their Batteries 

Cellular phones have been around on the open market for about 35 years. In the 1980s and 90s, these devices were bulky and had considerable heft, as did the nickel-cadmium (NiCD) batteries that powered them. These batteries couldn’t power these phones for very long at all, and had a relatively short lifespan (especially if charged when they still had some juice in them).

This didn’t stop the demand, however, and so improved batteries were manufactured using nickel-metal hydride (NiMH). This material was lighter, charged back up more efficiently, and while they still had a severely stunted lifespan by today’s standards, they degraded more slowly that NiCD batteries. This technology hit the market in the late 1990s, leading to considerable growth in the cellular phone market.

Smartphone Batteries

This growth eventually led to the introduction of the smartphone, making the NiMH batteries an ineffective option - there just needed to be more power in order to run what effectively boiled down to a computer in your pocket. As a result, lithium-ion batteries were developed. These batteries lasted longer, charged more quickly, and didn’t degrade over time. The one drawback to these batteries is the increased price, which helps to explain the sudden increase in the cost of a phone in recent years.

Even more recently, the lithium-poly ion (Li-Poly) battery was developed, offering about 40 percent more power than NiMH batteries. Unfortunately, the cost of production has prohibited them from being used in anything other than flagship devices.

Batteries of the Future

As our technology continues to advance, so must the batteries that power it. Lithium-ion batteries are already being improved by up to three times performance, the graphite they once contained being replaced with silicon. This is far from the most intriguing example of tomorrow’s tech we’re apt to see in our batteries, too:

  • Charging your device with a Wi-Fi signal - What if your Wi-Fi connection could help to charge your phone? Researchers are essentially trying to accomplish as much. By using a rectenna (an ultra-thin and flexible radio wave antenna), the idea is that AC power could be found in Wi-Fi signals and other electromagnetic waves, and harvested. This power could then be converted to DC to supplement a device’s power supply.
  • Literally charging your device by yourself - The human body relies on electricity to function - as in, any and all of its functions. In order to communicate, your cells generate a charge. The reason that lightning strikes are so dangerous to your business’ infrastructure is the same reason they are so dangerous to people - the circuitry is fried. However, research into improvements to triboelectric nanogenerators (TENG technology) implies that we may someday be capable of harvesting the energy produced by the human body and amplifying it, giving us an on-hand (or on-shoulder, or on-foot…) power supply.
  • Lithium-ion batteries will be solid state - The use of solid electrodes and electrolytes to create a battery isn’t a new idea - some devices, like pacemakers, wearables, and RFID sensors, actually already use them. However, due to cost prohibitions, they haven’t yet been incorporated into smartphones… emphasis on “yet.”
  • Batteries will be biological - Proteins are made up of chains of amino acids. Less complicated chains are known as peptides. Scientists have discovered that incorporating peptides into batteries can help improve them further, making them more stable. An Israeli startup, StoreDot, has also used peptides to develop a device capable of charging a smartphone in 60 seconds.
  • Sodium-ion, instead of lithium-ion, will be used - Lithium is abundantly rare, which is why newer devices cost so much - it’s the batteries. Sodium, on the other hand, is just plain abundant, which would make these batteries cheaper to produce, leading to more affordable end-products. 
  • Liquid flow batteries take over - Liquid flow batteries have been shown to be a cost-effective means of increasing power storage in everything from our personal devices to our municipal infrastructures. While there is considerable work yet to be done, these batteries could appear in the near future.

For now, it is probably best to understand the batteries we have around today, and how to best handle them.

Modern Battery Myths and Best Practices

  • Myth: Always let your batteries drain to zero before recharging.
    As mentioned above, this was once necessary, but the batteries we use now no longer have the vulnerabilities that NiCD and NiMH did.
  • Myth: One way to ruin your batteries is overcharging them.
    Again, this isn’t so much a myth as it is a best practice that no longer applies. Modern devices have failsafe defenses built into them to prevent overcharging. However, you still need to be concerned about heat build-up. Make sure your device has some breathing room. 
  • Best Practice: Don’t throw batteries away.
    Many of the materials that go into batteries are hazardous, and have no place in a landfill as a result. Instead, recycle them! We might be able to help with that, depending on what you have to dispose of. Call us at (604) 513-9428 to talk more about that.
  • Best Practice: Check your settings to see what uses the most power.
    If you have a device that just doesn’t seem to hold a charge, you probably have some options to go about fixing it. Reducing the brightness of the screen, adjusting how long the screen stays on, and other tweaks can help extend the life. Some of your applications may be a contributing factor as well.

An increasingly mobile world will require the power to be available to support it. We can help support your business’ mobility in other ways, keeping it secure and reliable. To learn more, call (604) 513-9428 today.

Continue reading

Your Business Could Benefit from Blockchain

Blockchain technology has virtually changed the internet. The action of creating and distributing digital information, but not allowing the information to be copied or altered, has created a backbone to this new type of network.

What Is Blockchain?

When looking at the word blockchain, it’s clear to see that it is derived from two words: block and chain.

Simply put, a block records recent transactions that have not been started in any prior blocks. This avoids duplicates or falsely initiated transactions. This block has the unique characteristic that it cannot be deleted, and it cannot be altered.

A chain is a sequence of items of the same type, forming a line. Blockchain technology has created an indestructible chain of blocks. Without being “chained” together, it would just be unorganized, unreadable, scattered information. Because of the methodical, organized and unalterable record keeping - it’s ideal for numerous applications.

Where Blockchain is Headed

Blockchains are where digital relationships are being not only formed but secured. Here are just some of the implementations where this technology has been, or could be used for in the future:

Payment processing and money transfers - The first thing that it could be used for is what it’s already being used for. Payment processing and money transfers. After all, this is what the technology was developed for, but what other forms can this take?

Retail loyalty reward programs - We’ve all been asked if we have a rewards card. Blockchain could soon revolutionize rewards programs by replacing standard points with tokens. All transactions at a certain store or company would result in earning tokens, which would be stored in a blockchain. The characteristics of blockchain would stop individuals from fraudulently earning reward points, which is common amongst paper and card-based loyalty programs.

Digital Voting - Have you ever heard rumors or accusations that someone fraudulently won a vote? With the implementation of blockchain, this would be an issue of the past. Blockchain cannot be altered or destroyed. This means if there was some sort of fraudulent activity, it could easily be detected. This brings us to our next use of blockchain.

Audit Trailing - Blockchain can be implemented anywhere an audit trail is required.

There are endless possibilities where this technology can be implemented. Medical recordkeeping, tax regulation and compliance, immutable data backup, even real estate or auto title transfers. Blockchain truly is revolutionizing operations across the globe.

At Coleman Technologies, we are eager to see where this technology will take us in the near future. How do you think blockchain technology will be used? Leave a comment below.

Continue reading

Tip of the Week: Project Management Software

There are a lot of tools used to manage projects. Regardless of what platform your company uses, there are some simple, common sense practices your team can use to enhance its project management proficiency. Here are five:

Tip #1: Hash Out Details Before You Start

Sometimes getting a project off the ground is harder than actually completing it. Depending on the number of stakeholders involved, many projects may find it difficult to get off the ground. Ensuring that the project is viable, has the support it needs to come to fruition, and has the resources in place to be most efficiently implemented are important before a minute of work is done on the project.

You will want to identify what workers will be responsible for what work, while also doing your best to come up with a timeline for the project that will not waste resources.

Tip #2: Choose One Project Manager

Today, there are a lot of collaborative interfaces out there that make managing a project much, much easier. As a result, sometimes a project won’t have a single project lead, it will be carried out with a team approach. You may get through a project or two like this before it becomes painfully evident that there needs to be someone to run point on the project.

The role of project leader will cultivate positive team dynamics and act as a mentor to the rest of the team. Also, you just need one throat to choke when things aren’t done on time.

Tip #3: Define Specific Milestones

For any project, there will be benchmarks it will have to be met. As a project begins, defining the metrics that will have to be met will give any project team a good idea what the expectations are at the end of each phase of a project. By frequently checking in on the status of deliverables, the project manager can ensure that all elements of the product are aligned with what customers will invest in.

Tip #4: Manage Risk

Managing risk is important in any business endeavor. There will be times when, in the course of the phases of a project, where one will go horribly wrong and will put the entire project’s success at risk. One of the best ways to identify and manage risk is by keeping the lines of communication open. Most project management software provides options to communicate, whether they be integrated through an existing system, or if they are localized as a part of the software.

Tip #5: Evaluation

Through success (or failure), lessons can be learned from any project. By reviewing and scrutinizing every aspect of the project, you will get some fuel on how to improve your project management moving forward. Identifying what went right, what went wrong, and how they make up the final result. One way to ensure that a project was a complete success is to determine its return on investment (ROI). Often, project managers will provide a planned ROI to stakeholders at the beginning. By comparing the two after the end of the project, you can establish whether it had the value you were planning for.

At Coleman Technologies, our technicians thrive on project management. Whether it is running cable, building, testing, and deploying hardware, or simple proactive maintenance, we have an answer for all of your business’ computer problems. Call us at (604) 513-9428 to learn more.

Continue reading

Are You Looking to Buy a New Server?

Business Servers

When you are looking for servers, there is a pretty good chance that you need to centralize application delivery, file storage, or some other core function of your business. A server is a high-powered computer that runs specialized software that is used to support the multiple users that your business has on staff. Some of the multi-user applications that servers are used for include email, some type of messaging, print servers designed to manage company-wide print jobs, and customer relationship management (CRM). If your business already uses one or multiple servers, you need to establish whether you need to upgrade and migrate; or, if you’ve outgrown your hardware and need to set up a new server, and where to host it.

Cloud vs. Onsite

If you are looking to set up your first server, you have an interesting decision to make. Do you set up your new server at your place of business, or do you host it with an established cloud provider? Traditionally, companies would be better served to host their hardware locally, but with cloud services from some of the most reputable companies in the world now available with built-in support and anywhere-anytime access, it stands to reason that looking at how each is priced out is a prudent move by any decision maker. 

With the purchase of a server, a company takes on the costs of the hardware, which are often substantial, they then deploy software and have to pay to have that hardware managed. If the hardware costs aren’t enough, the maintenance costs can be multiple times that. When you add in utility costs, you are looking at a large capital cost with a smaller operational outlay.  With cloud computing, however, you can get a reasonably secure server that can be accessed from any place users have access to a high-speed Internet connection. This provides accessibility that many other servers don’t have, while paying per month rather than up front. The costs don’t add up quite as fast (the capital outlay is virtually zero), but the operational costs spike, often exceeding what you would pay for a server over time. 

Let’s make a list of some pros and cons:

Onsite Server 

Pros:

  • Gives you complete control over organizational data.
  • Gives you the ability to alter storage types and amount at any time.
  • Performing onsite backup is much easier.
  • Restoration from onsite backup is much faster.

Cons:

  • Upfront costs of hardware.
  • Exorbitant costs of continued maintenance.
  • Utility costs.
  • Upfront and recurring costs of physical security.
  • Your hardware is only marginally utilized.

Hosted Server

Pros: 

  • Eliminate capital costs of buying and maintaining hardware. 
  • Mitigate server-based utility costs.
  • Cloud server is scalable.
  • Data and application redundancy built in.

Cons:

  • The need for stable and reliable bandwidth rises.
  • Costs of bandwidth rise.
  • Security can become an issue.
  • Lose physical control over the management of the servers.

It all comes down to system control. If you want (or need to have) control over your hardware in order to meet federal, state, or industry regulations, hosting your servers onsite is suggested. If you don’t have these regulations to meet, there’s no reason hosting your servers in a public cloud interface can’t be a viable alternative for your company. 

One option that many businesses are using today is the establishment of a private cloud server. A private cloud server is hosted either onsite or in its own dedicated cloud space, and delivers a business a lot of the pros listed above, albeit at substantial cost. The establishment of the private cloud allows companies that need to have control over the management of their organizations data and applications to have it, while providing the ability for users to access the data and applications outside of the confines of its physical network. 

Regardless of what kind of server you are looking for the experts at Coleman Technologies can help. Find out more about your server options by calling us today at (604) 513-9428.

Continue reading

The Next Phase of the Internet of Things

With global spending on IoT research and integration reaching $745 billion in 2019, the IoT is primed to be one of the largest single industries in the world in the future. Individuals, businesses, and governments are looking at the IoT for solutions to their problems. After all, the more information people have, the better decisions can be made. From the outset, it was said that this technology will transform the way we interact with machines and the way they will interact with each other, and only a few short years into a worldwide implementation, that mantra has proven to be true. Let’s look at where the IoT is growing most.

Industry

The huge annual jumps in IoT spending is largely driven by manufacturers, transportation, and utilities. Industrial IoT solutions provide companies and municipalities, alike, the link between their cloud-based software systems and their analysts, salesmen, and decision makers. This relationship is tenuous, however, and is closely monitored as a result. If a huge IoT strategy breaks even once, confidence in the platform is destroyed, leaving it an unreliable solution, regardless of the strengths of the technology. 

Manufacturers and process managers that utilize IoT solutions absolutely need their systems to be as reliable as possible. That means security, which is the number one improvement that the next phase of IoT has to make. For years, IoT was only somewhat trustworthy because of the lack of integrated security many IoT devices were manufactured with. Today, with security an absolute must for the major undertakings it is being used for, security has improved, but only slightly. A dedication to creating IoT devices that have hardware and software systems that are secure and reliable will dictate just the ceiling of IoT effectiveness.

The Smart City

One of the most intriguing places the IoT has been utilized thus far is in the integration of automated utility systems inside what has been termed, “the smart city”. The smart city uses what are known as low power IoT connections. These devices deliver low bandwidth and power saving features that are perfectly suited to asset monitoring. They can be implemented for a variety of uses, including: 

  • Sensors built into city roadways to sense things like the subsistence of traffic congestion and wear and tear of roadways.
  • Sensors built into bridges to sense degradation and the effect of seismic forces caused by geographical and traffic-based events.
  • Sensors built into buildings to measure wind force, foundation subsistence, or seismic activity.
  • Sensors in the interior of buildings to control foot-traffic, lighting, heating and air, and other systems humans rely on. 
  • Sensors on the street or on entryways that will provide facial recognition and reporting.

Unlike IoT-connected consumer goods, every IoT device deployed in a smart city would have a purpose that is beyond convenience. Every device would be placed to achieve a goal, improve the usability, longevity, and management of infrastructure, boosting resident safety and improving their access to services, cutting costs and limiting energy use, improving communications, and more.

One thing is for sure, the next phase of IoT implementation is going to challenge conventional thinking and deliver solutions that only a short time ago, were only imaginary. At Coleman Technologies we find technology fascinating. For more great technology information about innovative new tech, return to our blog regularly. 

Continue reading

Tip of the Week: Cloud Decisions for the SMB

Countless Options

The cloud provides a myriad of options for any-sized business. In the cloud, you can host applications, communications, storage, and even full-platform infrastructure. With so many options available, your business can get the computing power and tools it needs, when needed. 

User Tip: When trying to determine which cloud platforms are right for you, you may find the cost/benefit analysis won’t give you the definitive answer you are looking for. Your best bet is to prioritize which information systems would work best hosted onsite and which one brings the most value hosted in the cloud. The best decision for your business’ bottom line may not be the best decision. 

Productivity Improves

One of the most important aspects of cloud computing is the possibility that it provides a modern business. With all of the options the cloud presents, a business can pick and choose how to leverage them to produce increased productivity. Of course, the computing platform itself isn’t going to produce more, but with the data and application accessibility and the collaborative options the cloud provides a business, they are able to get more done, faster.

User Tip: Cloud computing may provide the ability for your team to collaborate better, but it isn’t going to produce anything on its own. One tip to ensure for efficient collaboration and enhanced teamwork using cloud interfaces is to assign one person to manage the files and data inside your cloud solution so that everyone knows who to go to if they need answers. Running a project is a lot like running a basketball team, one person has to run point.

Monetary Benefits

Implementing cloud computing can absolutely help save a business money off the bat. A shift to the cloud works to eliminate huge capital costs. Say you need a server. If you bought, powered, and supported the hardware yourself, you are looking at a bill that’s likely in the five-to-six-figure range. If you choose a cloud, you can fire up a new server for a monthly fee that gives you a lot of the same computing power your business commands, without the waste of computing resources and the upfront expense you would see by running your own hardware.

User Tip: The cloud may help you transfer cost, but if you jump in with both feet it can get pricey quick. That’s why it is important to migrate your processes, data, and infrastructure to the cloud in small, incremental steps. It keeps operational costs down and keeps your IT administrator sane. 

At Coleman Technologies, we understand the value of cloud computing, but we also recognize that the cloud isn’t right for every situation. If you would like to meet with our knowledgeable consultants about a shift to the cloud, call us at (604) 513-9428 today.

Continue reading

Biggest Data Breaches Since May

May

May 2, 2019 - Citrix

Conferencing and digital workplace software company, Citrix, revealed that hackers gained access to the company’s network between October 2018 and March 2019. Data stolen included Social Security numbers, financial information, and data of current and former employees.

May 3, 2019 - AMC Networks

1.6 million users of AMC Network’s Sundance Now and Shudder streaming services had their data left exposed through a database that was left unsecured. Names, email addresses, subscription details were compromised. 

May 9, 2019 - Freedom Mobile

Freedom Mobile, a Canadian mobile provider had an estimated 1.5 million customers’ personal and financial information left exposed on a third-party server. The types of data left exposed included names, email addresses, mailing addresses, dates of birth, and credit card information.

May 13, 2019 - Indiana Pacers

The legal team behind the National Basketball Association’s Indiana Pacers was the victim of a major phishing attack. Employee and customer names, addresses, dates of birth, Social Security numbers, passport numbers, driver’s license numbers, medical insurance information, card numbers, digital signatures and login information. No number of affected individuals has been given by the team.

May 14, 2019 - WhatsApp

WhatsApp has experienced a security flaw that provided access to an Israeli government surveillance agency, NSO Group. NSO Group had limited access to the microphone, camera, and WhatsApp message text of the app’s 1.5 billion users. 

May 20, 2019 - Instagram

Facebook-owned Instagram, fell victim to a data breach that exposed more than 49 million Instagram influencers, celebrities, and brands’ Instagram information when an Indian-based social media marketing company left it exposed. 

May 24, 2019 - Canva

The 139 million users of Canva, a cloud-based graphic design tool, had their names, usernames, and email addresses exposed when hackers infiltrated their server. 

May 24, 2019 - First American Financial Corporation

First American Financial Corp., a leading title insurer for the U.S. real estate market, had 885 million customers’ Social Security numbers, bank account numbers, mortgage and tax records, wire transaction receipts, and driver’s license images compromised for all customers as far as back as 2003.

Other May breaches: Inmediata Health Group, Uniqlo, Wyzant, Flipboard, Checkers (the fast food chain).

June

June 3, 2019 - Quest Diagnostics

Almost 12 million patient records have been compromised when hackers took control of the payments page of AMCA, a major payment vendor for Quest Diagnostics. Data such as financial account data, Social Security numbers, and health information (ePHI) were left exposed.

June 4, 2019 - LabCorp

In the same hack, LabCorp announced that 7.7 million of its customers were impacted. 

June 6, 2019 - Opko Health

In the same attack, Opko Health had 422.600 customer and patient records compromised. 

June 10, 2019 - Emuparadise

The gaming website Emuparadise had their users’ IP addresses, usernames, and passwords exposed in a data breach. 

June 11, 2019 - Evite

More than 100 million users of the Evite event planning app have had their information put up for sale on the dark web. Information that was stolen included names, email addresses, IP addresses, and cleartext passwords. Some even had their dates of birth, phone number, or postal address exposed.

June 11, 2019 - Total Registration

Kentucky-based Total Registration, a facilitator of scholastic test registrations had their entire service compromised. Victims, who were mainly students who had registered for PSAT and Advanced Placement tests, had their names, dates of birth, grade level, gender, and Social Security number exposed. 

June 12, 2019 - Evernote

A security vulnerability in Evernote’s Web Clipper Chrome extension gave hackers access to the online data of over 4.5 million users. Exposed data includes authentication, financial, all private communications, and more.

June 20, 2019 - Desjardins

Over 2.7 million individuals and 173,000 businesses had their data stolen by a single Desjardins employee. Canada’s largest credit union, the hack resulted in the exposure of names, dates of birth, social insurance numbers, addresses, phone numbers, and email addresses of customers

Other June breaches: Oregon Department of Human Services, U.S. Customs and Border Protection, EatStreet, Dominion National

July

July 17, 2019 - Clinical Pathology Laboratories

Due to the AMCA breach that affected Quest Diagnostics, Opko Health, and Labcorp, Clinical Pathology Laboratories had 2.2 million patients’ personal and medical information exposed with an additional 34,500 patients’ credit card or banking information breached. 

July 18, 2019 - Sprint 

A still unknown number of Sprint customer accounts were hacked through Samsung.com’s “add a line” website. Some exposed information included names, billing addresses, phone numbers, device types, device IDs, monthly recurring charges, account numbers, and more. 

Other July breaches: Maryland Department of Labor, Los Angeles County Department of Health Service, Essentia Health, Fieldwork Software, Los Angeles Personnel Department

August

August 5, 2019 - Poshmark 

The online marketplace, Poshmark, has announced that they’ve been hacked. Usernames and email addresses of an unreported amount of clients have been exposed in the breach. Poshmark has nearly 50 million users.

August 5, 2019 - Stock X

The online fashion-trading platform had its over 6.8 million user accounts exposed. Data that was out there included customer names, email addresses, usernames and passwords, shipping addresses, and purchase histories. 

August 9, 2019 - CafePress

A data breach at CafePress, a custom t-shirt and merchandise company, exposed the names, email addresses, physical addresses, phone numbers, and passwords of over 23.2 million customers. 

August 15, 2019 - Choice Hotels

Hackers left over 700,000 guest records exposed in a coordinated extortion attempt on the Choice Hotel chain. Stolen information included names, addresses, and phone numbers. 

August 16, 2019 - Biostar 2

VPNMentor and independent security researchers uncovered a data breach containing over a million individuals’ facial recognition information as well as the unencrypted passwords and usernames of 27.8 million individuals exposed from Biostar 2, a biometric security platform. 

August 27, 2019 - Hostinger

Hostinger, a web hosting company sent out an email to their 14 million clients who had their information hacked through an API server. As a result, first names, usernames, email addresses, IP addresses and hashed passwords were exposed.

Other August breaches: Presbyterian Healthcare Services, State Farm, MoviePass

Before your business has its network breached, data stolen, and reputation irreparably harmed, call the security professionals at Coleman Technologies to do a full security assessment. We can help you keep your data and reputation intact. Call us today at (604) 513-9428 to learn more. 

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you didn’t know Windows can save a list of the text and images you copy, I feel for you—you’ve missed out on a simple trick that could’ve saved you a lot of time. But don’t worry, it’s easy to set up, and I’ll show you how.

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image