Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

IT Playbook

Get a copy of our FREE IT Playbook

Make Educated Decisions on Your Technology Best Practices and IT Strategies

When you opened a business, that business was your specialty - not IT concerns. That’s why we’ve developed the IT Playbook, a guide to aid you in shaping the choices you make as you select the technology that powers your business.

The IT Playbook will help you make educated decisions on:

  • Which IT model makes the most sense for your organization.
  • How to align your data backup solution with your Business Continuity Plan.
  • What IT security practices should your company have in place.
  • Determine if and how the cloud would work for your business.
  • Choosing the IT solutions that best fit your company.

With advice and practical solutions for businesses of all sizes, the IT Playbook can serve as your guide to optimizing the technology your business uses to increase productivity, profits, and preparedness.

Fill out the form to download a copy of the IT Playbook, and give yourself the answers to many of the IT questions you may have, as well as strategies to improve your technological prowess.

Continue reading

Download Business Continuity Plan Cheat Sheet

Thank you for your interest in "7 Things Your Company Needs to Know for Your Business Continuity Plan" Cheat Sheet

Download

Continue reading

Download Microsoft Risk Assessment Plan

Thank you for your interest in our Microsoft Risk Assessment And Migration Plan.

Looking to speak someone directly? Call us now at: (604) 513-9428.

Continue reading

Thank You - Aspirin

Thank you for getting in touch!

We appreciate you contacting us about the $497 “Get-To-Know-Us” FREE Gift. One of our colleagues will get back to you shortly.

Have a great day!

Continue reading

Is Your Current Computer Guy Causing You To Need One Of These?

Is Your Current Computer Guy Causing You To
Need One Of These?

Bayer aspirin

  • Does he take forever to call you back and respond to your requests?
  • Are you paying him good money to keep things working, but are STILL having constant problems, slowness and other recurring issues?
  • Are you worried he’s not backing up and securing your network?
  • Does your head hurt from having to deal with the hassles?

Are you sick and tired of constant IT, phone and computer problems interrupting your day, frustrating you and your team? Do you feel stuck with an absent-minded computer guy who isn’t delivering the SERVICE you want, but you don’t know who else you can trust to do a good job without overcharging you?

If so, I have the solution that will make IT-related issues one headache you NEVER have to deal with again.

My name is Darren Coleman, owner and CEO of Coleman Technologies and author of the book Easy Prey: how to protect your business form Data Breach, Cybercrime & Employee Fraud. We specialize in delivering proactive IT support and services to businesses like yours with friendly, knowledgeable techs who will put you at ease and resolve your IT problems quickly and efficiently. Chances are you’ve never heard of me or my company before, but when you finish reading this letter, you’ll be glad you finally have.

Why can I make such a bold statement?

Because almost every small business CEO I talk to will confess that their current computer support person – whether it’s a friend who’s good with computers or a “professional” IT company – is NOT completely delivering the level of service they want. Therefore, they are forced to deal with ongoing technical issues and worry that their network is NOT secure from hackers, ransomware, extended downtime, and a range of data-erasing disasters. Clearly this is unacceptable!

Isn’t It Time To Finally Get Rid Of This Headache?

Although the notion of providing reliable, affordable, full-service computer support isn’t an amazing concept, it still surprises me how many computer technicians don’t get it right. Therefore, I understand if you’re skeptical about our claims. My guess is that you’ve been disappointed, even burned, by other IT guys in the past. That’s why I’d like to extend the following offer to you…

A $497 “Get-To-Know-Us” FREE Gift…

As a prospective client, I’d like to offer you a free, no-obligation, no-sales-pressure IT Systems Assessment where I’ll send one of my senior technicians to your office to conduct an audit of your network’s security and overall health.

When done, we’ll give you a report of findings that will not only reveal if your data and computer network really are properly backed up and secured, but also if there is anything you need to do now to prevent a major network outage, data loss, hacker attack or other expensive, data-erasing disaster. Plus, we can almost always show you how to save a little (or a LOT) on hardware and software by switching to more efficient cloud-computing solutions.

After all, it never hurts to get a competitive bid from a qualified third party – and this assessment is totally, completely free without obligation.

The Assessment only takes [60 minutes] to conduct, but when it’s done, you’ll know for sure if your company’s data is secured and, in the event of a disaster, exactly how fast you could be back up and running again (if at all). I will be following up in the next couple of days to make sure you received this letter, and to see if you would like to schedule this free IT Systems Assessment. If not, please just let us know!

Awaiting your response,

Darren Coleman
CEO, Coleman Technologies Inc.
Author, Easy Prey: how to protect your business form Data Breach, Cybercrime & Employee Fraud

P.S. Why risk it? Our free IT Systems Assessment comes with zero strings attached, no expectations and no obligations on your part. If nothing else, it will be a good third-party validation of how well your systems are currently performing.

How Does Your Current IT Guy Stack Up?

Take this quiz to find out!

How can you tell if you are receiving poor or substandard service? How do you know if your IT company or computer guy is doing everything possible to secure your network and prevent expensive disasters? If your technician does NOT score a “yes” on every point, you could be paying for substandard support and jeopardizing your data and network’s security!

  • Do they answer their phone LIVE and respond to emergencies promptly (within X minutes)?
  • Are they easy to reach and highly responsive (responding same day) when you need them for non-emergencies?
  • Do they proactively monitor, patch and update your computer network’s critical security settings daily? Weekly? At all? How do you know for sure?
  • Do they offer proof that they are backing up ALL your data, laptops and devices?
  • Do they meet with you regularly (at least once a quarter) to report what they’ve been doing, review projects and offer new ways to improve your network’s performance instead of waiting until you have a problem to make recommendations?
  • Do they provide detailed invoices that clearly explain what you are paying for?
  • Do they explain what they are doing and answer your questions in terms that you can understand, NOT in “geek speak”?
  • Have they proactively discussed cybersecurity with you, and made recommendations for better protecting your network from ransomware?
  • Have they provided you complete network documentation, or do they hold the “keys to the kingdom” refusing to give you admin passwords?
  • Do they offer any guarantees on their services?
  • Do they arrive on time and dress professionally?
  • Do you look forward to seeing them, working with them, or do you cringe every time you have to make that call?

 

Continue reading

Microsoft Risk Assessment

Free Microsoft Risk Assessment And Migration Plan Shows You The Easiest, Most Budget-Friendly Way To Upgrade Your Windows 7 And Windows Server 2008 Machines

As a local Microsoft Partner, my company has committed to helping businesses in the Fraser Valey  area by offering a Microsoft Risk Assessment and Migration Plan for free.

At no cost, we’ll come to your office and conduct our proprietary 27-Point Risk Assessment — a process that’s taken us over 5 years to perfect — to not only determine what specific computers and servers will be affected by this announcement, but also to assess other security, backup and efficiency factors that could be costing you in productivity and hard dollars.

After performing this Assessment for hundreds of companies like yours, we're confident that we will not only be able to expose a number of security risks and issues that you weren’t aware of, but also find ways to make your business FAR more efficient and productive. We’ll also put together a customized Migration Plan and show you how to painlessly upgrade your old Windows Server 2008 and Windows 7 machines while simultaneously:

RIP windows
  • Eliminating the need for you to spend a small fortune on new hardware and software.
    We’ve developed a unique, little-known way for businesses like yours to get a completely new, upgraded network with full help-desk support and services for a very affordable, flat monthly payment. This plan has been extremely popular with our small business clients because it gives them everything they need without the huge hit to cash flow.
  • Giving you instant disaster recovery and the peace of mind that comes with it. You’ll never lose data or be down more than a few hours due to a server crash, hardware failure, employee mistake, fire or other data-erasing disaster. Depending on the type of backup you’re using now, we might even be able to drastically reduce or eliminate that monthly expense altogether.
  • Lowering your IT support and maintenance costs. We can typically save our clients between $500 and $5,000 while giving you and your employees the freedom and flexibility to work from anywhere, anytime, on any device, thanks to new cloud solutions we have available.

If nothing else, you’ll gain a 3rd-party review of your computer network’s security for FREE.

To claim your Free Risk Assessment and Migration Plan, simply complete the form on this page.

Continue reading

Business Continuity Plan Cheat Sheet

7 Things Your Company Needs to Know for Your Business Continuity Plan

(To survive the WORST Disasters)

As we've grown our business and work with other local businesses, we've seen a greater need for disaster planning and business continuity

We've put together a very simple list of 7 things your company needs to consider when putting together your Business Continuity Plan.

We encourage you to use this guide as a cheat sheet, so that your business can be prepared for virtually any kind of disaster!

cheat sheet mockup

Continue reading

Five Benefits of Moving to the Cloud - Whitepaper

FREE Whitepaper: Five Benefits of Moving to the Cloud

Find out how cloud computing is helping small businesses get more while spending less.

Cloud computing has been disrupting the IT of small and medium-sized businesses. It’s crucial for business owners to understand what the cloud is and how it can affect the way you do business.

Who this whitepaper is for:

Business owners and executives looking to learn more about cloud computing, whether you need to understand how it can benefit your business or you aren’t sure where to start when it comes to implementing cloud solutions for your organization.

What you’ll learn:

  • Exactly what the cloud means for SMBs.
  • The three primary cloud service models.
  • The four cloud deployment models.
  • A breakdown of the top 5 most prominent benefits of the cloud.

We also encourage you to reach out to us directly for additional information specific to your business. We’re always happy to discuss the future of your business with you.

Continue reading

Do You Know Enough About These Threats to Prevent Them?

cybersecurityIt is only too often that businesses, big and small, are targeted by a cyberattack and face unpleasant consequences as a result - and these consequences often lead to them having to close their doors for good. In order to keep your own business afloat, it is not enough to know that there are threats out there. You need to know what these threats look like, what they do, and most crucially, how to stop them.

Below are some of today’s most common threats to your cybersecurity.

Viruses

Quite possibly the best known of any cyberthreat, “virus” is a term describing a malicious program designed to replicate itself by altering the code of existing programs or files and inserting itself into them. Not all viruses will have the same impact on a system. Some will actively attack your computer, deleting files, while others just eat up its memory and cause frequent crashes.

One of your best defenses against a virus is to faithfully maintain the antivirus software that should be installed on each device.

Ransomware

Essentially, once your computer has been infected with this malware variant, your entire system is encrypted. The ransomware then displays a note informing the victim of what happened and instructions on how to pay the ransom through cryptocurrency, often with a deadline to do so before their files are deleted.

While these attacks have gotten trickier over time, your best bet is to avoid clicking unexpected attachments in your emails, especially those from an source you’ve never had contact with previously, and to maintain a discrete backup of your system (just in case).

Spyware

Spyware is another malware variant that has caused no small amount of trouble to many businesses, primarily in terms of data theft. This threat effectively allows a cybercriminal to monitor a system remotely, tracking keystrokes and viewing screens, as well as just generally being a nuisance. If your settings start changing themselves or you start getting pop-ups on your desktop, your computer is most likely infected.

Exercising caution about the things you click online and keeping your system updated and patched will help to keep your system free of peeping eyes.

Phishing

Phishing is the cyberthreat equivalent of the “got something on your shirt” trick, just with much worse consequences. Cybercriminals will pose as someone else, often someone you trust, to see if you will share confidential information, like login credentials. Once someone “takes the bait,” the hacker has what they need. The infamous Nigerian Prince scam is a rudimentary version of this, but there are much more convincing examples out there as well.

A bit of critical thinking will help to keep your business safe from these efforts, along with confirming any messages received through an alternative form of communication before trying to open any attachments.

With these threats (and many, many more) just waiting for the chance to infiltrate your systems, you can’t afford to be lax in your security in planning or in its execution. However, it may be challenging to determine just what it is that your business needs. That’s why Coleman Technologies is here.

How We Can Help

Not only can we review your current technology infrastructure to determine where its weak points and other vulnerabilities are, we can also supply you with the solutions to resolve them. We can also help train you and your staff on how you all can help prevent issues by recognizing their warning signs.

To learn more or to schedule a time for your consultation, reach out to us at (604) 513-9428.

Continue reading

credit card payments

This email address is being protected from spambots. You need JavaScript enabled to view it.


Continue reading

This domain name is parked free until you are ready to start building your website.

COLEMAN TECHNOLOGIES is the best place to maximize value for all your domain names. We work with ICANN accredited affiliates, and offer an unequalled service set for your domains which include many FREE OF CHARGE services with each domain name registration.

We accept Visa, MasterCard, American Express, and Discover credit cards. All Domain Name pricing in US Dollars.

Click here for Domain Name Help Topics.

Continue reading

Tip of the Week: Company Culture Can Be a Huge Business Strength

Your company’s culture is its identity - the impression that your company leaves when someone makes contact. As such, there are assorted reasons that it pays to create an engaging and inclusive company culture.

Draws in Talent

Let me ask you this: would you rather work someplace that had a reputation of nurturing incoming talent and ensuring that this talent had the resources and access that they needed to succeed in their position, or someplace notorious for leaving new employees to fend for themselves, providing minimal direction when direction is necessary to successfully complete a task? My money is on the first option.

One of the biggest benefits to creating a positive culture in the workplace is that more people will want to make it their place of work. This gives you a wider pool of talent from which to select the best candidates, creating a stronger business.

Of course, attracting this talent is one thing, having it stick around is quite another.

Retains Talent and Reduces Turnover

As long as your company culture matches its reputation, the individuals who accept your offer of employment are less likely to leave, barring any personal circumstances that force them to. This is important, as the sudden loss of an employee can have assorted impacts on your business. These impacts can include dropped processes, missed opportunities, and the costs associated with finding, hiring, and onboarding someone to replace the lost employee.

Of course, you don’t have to worry so much about these impacts if your employees aren’t motivated to leave. This is where having a positive company culture is so valuable - you can better avoid the significant costs of losing an employee, continuing to benefit from their skills in the workplace. Research conducted by Gallup indicated that only 37 percent of employees engaged with their work were actively seeking new employment opportunities, compared to a staggering (albeit understandable) 73 percent of those who had disengaged from their work.

Columbia University conducted research as well, and their results followed in the same vein. According to their results, organizations with strong company cultures saw turnover rates of 13.9 percent. 13.9 percent, compared to the 48.4 percent turnover rates at companies with poor company culture.

Boosts Productivity

A happy employee is a productive employee, which translates to direct benefits for your business if your employees remain satisfied. The right company culture can motivate your employees significantly.  The same Gallup research referenced above demonstrated that engaged employees saw productivity boosts of 21 percent. Another study, by IBM-owned Kenexa, suggested that organizations with an engaged workforce were able to bring in twice the income as an organization without these levels of engagement.

Reduces Employee Burnout

There are many reasons that an employee can experience some level of burnout, whether their schedules are overpacked or their hours are simply too long to be sustainable. However, a negative company culture is often overlooked as the root cause of an employee becoming disengaged with their work.

While employee burnout may seem like more of the employee’s problem at first consideration, there are some very real consequences that a business will need to deal with. For instance, employee burnout has been linked to an estimated 49 percent increase in workplace accidents, and a 60 percent increase in errors.

Stressed out employees are a liability to your company, but helping them to reduce that stress with a better company culture can turn these liabilities into true assets.

Better Attendance

Speaking of assets, your employees aren’t going to be very good ones if they are never in the office. A Harvard Business Review study reported an increase in employee absenteeism of 37 percent among disengaged employees. Naturally, if your employees aren’t completing their responsibilities due to this absenteeism, it is going to have an impact on both your business’ success and internal morale.

However, a more positive company culture encourages your employees to report to work, and as discussed above, leads to improved productivity while they’re there.

Is Company Culture Really So Important?

Based on the outcomes discussed above, it is pretty clear that the better your company culture is, the more effectively your business will be able to operate. So, how can you improve yours?

One way is to give your team the tools they need to complete their tasks more easily than they could with outdated and insufficient IT solutions - and the efficiency boost that new IT solutions will bring can free up some time to develop your company culture even more. Coleman Technologies can help to make sure that you are using the tools that are best suited for your company’s (and by extension, your employees’) needs. Give us a call at (604) 513-9428 to learn more.

Continue reading

Cloud Services Can Help You Build a Better Business

Uses for the Cloud

No matter what your business needs, there is likely a cloud solution for it. Hosted VoIP and email are great communication tools. Infrastructure and Platform as a Service solutions empower organizations to leverage more flexible computing power. Software as a Service and hosted storage are available for all of your organization’s needs.

In the end, you can get just as much done with cloud infrastructure as you can with onsite hardware.

The cloud allows for functionality and redundancy, no matter what the industry is or the kind of workforce it contains. These services can be utilized as needed and deployed quickly.

The Drawbacks

Cloud computing isn’t perfect. Businesses can create a private cloud system that can create large costs for their bottom line while also maintaining the control, management, and accessibility… but again, a lot of thought needs to be invested into this kind of solution. Environments that are hosted outside of a service provider can be difficult to control, since your organization doesn’t have control over the hardware it’s hosted on.

A major drawback of cloud computing can actually be the cost. Since the IT infrastructure used to run the solutions is managed by the service provider, the price is adjusted accordingly. If your business needs a certain number of cloud licenses, you could see the cost of your solution rise. Plus, if you don’t cancel accounts when employees leave, you could be paying more for services that aren’t being utilized.

Furthermore, imagine if your organization has teams assembled that need to use three or four cloud-based applications to complete a project. Think about all of the money that’s spent just providing access to the appropriate software solutions. If it’s not properly managed, your return on investment could be put in jeopardy.

Coleman Technologies can help you keep track of your cloud-based resources, whether you’re just hitting the cloud environment, or you have an established presence in the cloud. To learn more about how we can help you manage cloud applications, reach out to us at (604) 513-9428.

Continue reading

Taking an Exploratory Stab at Spear Phishing

What Makes Spear Phishing Different?

As a rule, spear phishing is a much more precise and personalized process. To keep to the “fishing” analogy, a generalized phishing campaign casts a wide net, trying to snare as many victims as possible with their scam. Utilizing vague and generic language, the ‘typical’ phishing attack is made to appear to come from a large organization, informing the user of some need for the user to take action, resulting in the hacker gaining access to the user’s information. This methodology makes the typical phishing attack fairly effective against many people, while simultaneously easier to spot if one knows the warning signs.

By comparison, spear phishing is far more precise. Instead of trying to find value in the quantity of targets snared in a trap, spear phishing takes the opposite tack. Using a highly targeted approach, spear phishing attacks are directed toward a specific individual within an organization.

This specified approach means that the generic messages that many phishing attempts leverage simply won’t be enough to fool the intended target. Instead, the hacker has to play investigator, seeking out as much information as they can about their intended target. Where do they work? What is their position in the company? Who do they frequently communicate with? Once the hacker has collected enough information to create a convincing message, they will typically spoof an email to their target. This email will usually contain some reference to a known contact or some in-progress project to make it more convincing and will request that the recipient download a file via a provided link.

However, while the link will direct to what appears to be a Google Drive or Dropbox login page, it is just another layer to the deception. Entering credentials into this page will give them right to the hacker for their use, breaching the user’s security and putting the entire business at risk in one fell swoop.

What Methods Do Spear Phishers Use?

Due to how spear phishing works, the messages sent by hackers need to be as convincing as possible. Combining extensive research with some practical psychology, a hacker has more ammunition to power their attacks.

As mentioned above, spear phishing is far less generic than the average phishing attempt. By referencing specific people, things, and events that mean something to the target, or appearing to come from an internal authority (a manager, perhaps, or even the CEO), the hacker can create a message that is less likely to be questioned. If the hacker writes their messages without any spelling or grammatical errors, as many spear phishers do, it only becomes more convincing.

These hackers are so reliant upon their target being fooled; many will purchase domains that strongly resemble an official one. For instance, let’s say you owned the domain website-dot-com. If a hacker decided to pose as you to launch a spear phishing attack, they might purchase the domain vvebsite-dot-com. Without close inspection, the switch may not be noticed - especially if the hacker creates a good enough lookalike website.

Am I A Target?

Of course, the research that a hacker has to do to successfully pull off a spear phishing attack is extensive - not only do they have to identify their target, they also have to figure out the best way to scam this target. Generally speaking, a hacker seeking to leverage spear phishing will focus their efforts on anyone in an organization who could potentially access the information that the hacker wants but isn’t high up enough in the organization to question an assignment from above.

Or, in more certain terms, a business’ end users.

In order to minimize the chances that a spear phishing attack will be successful against your company, you need to make sure that everyone subscribes to a few best practices. For example:

  • Pay attention to the finer details of an email. Is the message actually from This email address is being protected from spambots. You need JavaScript enabled to view it., or does the email address actually read This email address is being protected from spambots. You need JavaScript enabled to view it.? Did Christine/Kristine include any attachments? As these can be used to spread malware via email, you should avoid clicking on them unless you are certain the message is legitimate.

  • Is the message written to sound overly urgent? Many phishing messages, especially spear phishing messages, will try to push an action by making it seem as though inaction will lead to a critical issue. Another warning sign to look out for: any deviation from standard operating procedures. Don’t be afraid to question a sudden switch from Google Drive to Dropbox - it may just be the question that stops a spear phishing attack.

  • Speaking of questioning things, don’t hesitate to make sure that any messages you suspect may be spear phishing aren’t actually legitimate through some other means of communication. A quick phone call to the alleged sender will be well worth avoiding a data breach.

While spear phishing is a considerable threat to your business, it is far from the only thing you need to worry about. Coleman Technologies can help your business secure its IT solutions and optimize them for your use. To learn more, subscribe to our blog, and give us a call at (604) 513-9428.

Continue reading

Keep Your IT Running Smoothly 24/7

Businesses usually have either an in-house IT department that can handle everyday maintenance and support, or they forego updates and support for only when operations cannot continue as they had previously been. While it might seem like a solid strategy, not paying for something that’s not needed until it is needed, the fact of the matter is that reaction-based IT maintenance and management is both risky and expensive. Furthermore, some companies rely on untrained employees to make sure maintenance and management occur as needed, but this is also a dangerous practice, as there is too much potential to botch necessary maintenance and ruin more than a little bit of infrastructure.

Events like hardware failures, hacking attacks, and software crashes are infinitely more common with organizations that take advantage of break-fix IT management. Furthermore, the facade of saving money is overshadowed by the crippling budgetary concerns that stem from downtime.

Even businesses that have an in-house IT department don’t have the luxury of providing organizations with IT support. They might be too busy implementing new solutions to bother answering questions. On the other hand, perhaps they are too weighed down by answering daily queries to worry about innovating and implementing new solutions at all.

Long story short, a help desk solution is designed to help your organization fill in the gaps that are left in the absence of a qualified IT technician. It can be used to supplement your current IT resources or act as a fully outsourced IT department that can perform all the roles traditionally allocated to this position. To learn more about how you can take advantage of a help desk solution, reach out to us at (604) 513-9428.

Continue reading

Knowing, and Planning For, Your Organization’s Compliance Burden

Today’s world is driven by data. As a result, information systems have to be secured. That really is the bottom line. Business is all about relationships and without proper security protocols in place, there are some very serious situations that could completely decimate the relationships you’ve worked so hard to forge. While today’s hackers have a lot of different ways to breach an organization’s network, data breaches that occur as a result of lax security are unforgivable from a customer standpoint. Some organizations can spend more on security than others, but it with the landscape as it is today, it has to be a priority, no matter your IT budget.

Here are some of the regulations all business owners and IT administrators should know:

  • GDPR: The European Union’s General Data Protection Regulation is as comprehensive a data protection law as there is. Its aim is to protect the citizens of EU-member countries from data breaches. The GDPR applies to every organization that processes personal information of people residing in the EU.
  • GPG13: Known as the Good Practice Guide 13, it is the U.K.’s general data protection regulation for organizations that do business in the U.K.
  • HIPAA: The Health Insurance Portability and Accountability Act puts several guidelines on how patients’ data is shared and disseminated by insurers and health maintenance organizations.
  • SOx - The Sarbanes-Oxley Act requires corporate records to be kept for seven years to ensure that there is transparency in the accounting. For IT this means being able to have access to data to run reports when called upon.
  • PCI-DSS - Payment Card Index Data Security Standard are regulations enacted to try and reduce fraud by protecting an individual’s credit card information.

That’s just a few of the regulations business owners and IT administrators have to be cognizant of. For business owners there are several more, like the federal and state tax codes, and the adherence to the Affordable Care Act. All these regulations seem pretty straightforward and necessary until you begin to roll them out for your business. Then they just get expensive. In the first-ever Small Business Regulations Survey conducted by the National Small Business Association, the numbers reported, although not comprehensive by any means, weren’t pretty. To put it frankly, the cost to the small businesses that reported, would sink as many or more new businesses.

“The average small-business owner is spending at least $12,000 every year dealing with regulations,” NSBA President Todd McCracken said, “This has real-world implications: more than half of small businesses have held off on hiring a new employee due to regulatory burdens.” The report goes on to state that the average regulatory costs to start a new business venture add up to a whopping $83,019. These figures don’t take in to account the dozens of man hours each year spent on these very complex problems. It should be stated that the NSBA has been a long-standing advocate of reducing regulations on small businesses.

Regulators are paid to be skeptical, but overall they are put in place for a purpose, as oversight to ensure sustained adherence to data protection laws. How much can they demand from a small business? The question begs for analysis, as to listen to entrepreneurs talk about them regulations are unnecessary, but as stated before, these regulations aren’t just implemented willy-nilly. They have empirical evidence of immoral or unethical wrongdoing attached to them. Moreover, it becomes clear that the financial pain these entrepreneurs are in is indefinite, which means that it is highly debatable. The truth is that each scenario needs to be seen in perspective in order to understand just how much certain regulations are costing a business.

One thing is certain: that the average small business pays more for their regulatory compliance programs than larger businesses in the same market do. That disparity is a main point of contention for many small business owners, as it directly affects a company's ability to compete. Some studies have seen organizations that have less than 20 employees charged nearly 60 percent more than slightly larger businesses. Getting into which regulations are onerous and which are necessary would take an examination of each one in detail, so it’s worth it to repeat that these regulations were bred out of situations where individuals were hurt, making them an important part of the oversight process.

To Comply or Not To Comply? That Is the Question
Small business owners who have been reprimanded or fined as a result of a lack of regulatory awareness have a tendency to get the message, but if an organization is notoriously noncompliant and has slipped past regulators, there is a tendency for them to stay the course; and, that course is filled with nothing good. Many european and multinational corporations are expecting to invest $1 million toward their GDPR compliance. Obviously this figure, despite being higher per user, will be substantially lower for small and mid-sized businesses. The cost, however, remains significant, and while an organization could probably get around it for a bit, when it hits, it could just sink the whole business.

According to Infosecurity Magazine, the average cost of compliance with GDPR is costing enterprises and average of $5.5 million, which comes in about a third of the estimate cost of noncompliance, $14.82 million. That’s a lot of cheddar. It stands to reason that if you are going to spend upwards of 10 percent of your yearly IT budget on ensuring your organization is compliant, that you meet the criteria under the regulation. The best way to do that is by finding affordable solutions that won’t take as big of a chunk out of your operational budget every year.

More than the capital, a business that doesn’t adhere to simple IT regulations probably isn’t adhering to other regulations. Would you want to do business with someone that you know won’t do what’s asked of them to protect YOUR data? Unreputable businesses that are looking to gain an edge by not meeting regulations will pay later for not spending now, end of story.

Compliance and Your Business
Finally, we get to your business. How are you going to plan for your compliance burden? The best way is to educate yourself on what exactly your business needs to plan for by looking at the regulatory mandates, sure, but more often seeking out organizations who have already insulated themself from the risks associated from noncompliance. This is where a managed IT service provider (MSP) can be a godsend. Since we take security compliance extremely seriously, and deal with multiple businesses that represent several vertical markets, we have the perspective that can provide a clear strategy on how to avoid problems staying compliant.

Moreover, MSPs like Coleman Technologies use extremely sophisticated monitoring, management, and reporting software to reduce risk and put our clients in the best position to prepare for any audits or assessments that need to be completed by regulators. Since the regulatory landscape is constantly changing, our IT professionals are in a unique position to serve as both IT administrator and regulatory consultant.

If you are searching for a way to control your compliance situation, look no further than the IT professionals at Coleman Technologies. We can deploy our strategies made up from tried and true industry best practices to virtually eliminate any risk your organization would have as a result of compliance concerns. Call us at (604) 513-9428 today to get started.

 

Continue reading

Tip of the Week: Proactive Maintenance Keeps Tech Running Smoothly

The Word is Proactive

When something bad happens, you might look back to see what you could have done to prevent the issue from happening in the first place. The word to remember here is “proactive.” Being proactive requires risk assessment, which demands that you analyze the greatest possible threat to your continued existence and prepare for it. In the event that your business’ IT is unable to function as intended, your business would stop functioning. All it takes is a single component failing to leave your employees unable to do their jobs. This is why you need to be as proactive as possible--to ensure that you have plans in place for when your systems inevitably fail.

Proactive IT Maintenance

For the past decade, proactive IT maintenance has been making strides in the office environment. When one of the most important parts of running a business--your IT infrastructure--no longer works as intended, you lose out on profits and shell out for repairs more often. Furthermore, downtime can be a major cost that your business suffers from due to technology malfunctions. If you can keep your hardware operating properly, your network safe from threats, and your business productive, you can eliminate potential problems before they have time to escalate into the expensive kind.

Coleman Technologies’s proactive IT services provide your business with monitoring and management software. With our expert technicians behind these tools, you can rest easy knowing that we are monitoring each and every critical component of your technology for any telling inefficiencies. This gives you the opportunity to address them before downtime occurs.

Patch Management

Security troubles such as software vulnerabilities can also lead to problems for your business. If you can’t rely on your software tools to get the job done without issue, then you’re doing yourself a disservice. Furthermore, you will need the latest threat definitions and software patches to keep your solutions secure from threats that could derail productivity. A major part of our proactive maintenance platform is deploying patches as they are released, eliminating the chances of known vulnerabilities affecting operations.

For more information on how your organization can be more proactive with its IT maintenance, give Coleman Technologies a call at (604) 513-9428.

Continue reading

A Look at Business Computing Costs: Cloud vs. On Premise

For this experiment, we’re going to assume that we are starting from scratch. The optimism and cautious excitement that goes into starting a new business endeavor is palpable. Let's assume for our purposes that you’ve determined that you need to support the following applications:

  • Email
  • Voice over Internet Protocol
  • Line of business applications
  • Productivity applications
  • HR and operations software
  • Storage (enough to support above)
  • File sharing
  • Backup

It’s not hard to ascertain the surface costs of implementing these technologies, but when trying to figure out the total cost of ownership, it may be a little more difficult. Objective comparison of the two platforms has to begin at their core needs. On one hand, In-house computing comes with several, including power, maintenance, management, and redundancy (and the management and maintenance of that platform), while cloud computing may need enhanced bandwidth and redundancy to work for a business. These costs have to be figured in when trying to plan your next steps.

Then there is the question of who is going to use your data, and what kind of protections need to be put in place as a result of that qualification. What compliance regulations does your organization have to meet? How many users does the network and infrastructure have to support? What software do you need to run? There are literally dozens of questions you have to ask before making any definitive decisions about what kind of hardware you are going to need, let alone what kind of hardware solutions you plan on using.

Once you’ve ironed out the particulars, you will then have to make the big choice. Do you want to buy physical hardware, cloud-based hardware, or some combination of both? Let’s analyze all three options:

In-House Computing

The first thing you have to be cognizant of is that once you decide that your organization needs in-house server infrastructure, you have to know that it is going to cost you a pretty penny. In order to support a full-scale communications solution, all the applications your business uses to do business, email, and backup you are looking at a seriously hefty price tag. Not only are you looking at a few thousand dollars per server, costs that are incurred in configuring the servers, warranties, and maintenance to that server could push the cost into untenable territory, especially if there isn’t a good deal of upfront capital available.

Beyond all that there are HVAC and security costs that need to addressed the first time around. The biggest expense, by far, is the cost of management. If you outsource your IT services management to a company like Coleman Technologies, you may be able to mitigate some of the recurring costs and get expert management, but ultimately the facts point to on-premise hardware rollouts costing a substantial amount more than utilizing cloud, especially with today’s IaaS costs.

Implementing an in-house server room does provide you with some pretty stark benefits, however. They include complete management over the systems within, the resulting comprehensive data security, and access to data without an Internet connection. It also front-loads the costs associated with the environment, so if the big capital expenses don’t cut into your operational budget considerations, you will be paying less per month. The infrastructure costs (which are fixed costs) and the management and maintenance of it, and operational costs (that are very often variable), all have to be taken into consideration, as does your organization’s regulatory compliance needs.

Cloud Computing

For the start-up that doesn’t have any overreaching data compliance issues, utilizing cloud computing is a no-brainer. Not only are there limited set up costs, there are so many different service-based computing plans that it is now possible to strictly use the cloud for all of your organization's central computing.

For the established company, it may be a little more difficult, so before we go “all hail the cloud!” on you, we have to admit that there are plenty of considerations you have to make if you were to go ahead with a completely virtualized computing infrastructure for your business. Here are a few:

  • Migration Time and Cost: Getting started with cloud computing may not come with the enormous capital costs that an inhouse server would, but there is cost, especially if you are migrating data. For an established business to move from physical servers to cloud infrastructure there is a substantial investment. It takes a lot of bandwidth and time to move all if an organization’s data over, and in doing so, you will likely incur a fair amount of cost.
  • Dependability and What Uptime Really Means: Cloud providers like to measure their effectiveness in uptime; and, in doing so, don’t properly represent what customers want from their cloud provider. Businesses need ubiquitous access to data and applications stored on a cloud construct, and sometimes that can be a problem. The VM running the server may be up, but if there isn’t access to critical information and applications, a business deals with their own downtime, which is a major problem.
  • Problems Estimating Costs: The cloud’s cost to a business seems simple enough, but a lot of business owners do a poor job of estimating the true cost of the service. With cloud computing pricing costing businesses so many cents-per-service-unit, they often fail to multiply this cost over months and years. By moving the least utilized applications over first, a company can save more money than just moving it all over at once.
  • Trusting Your Architect: Well before cloud implementation, a company would have a cloud architect make them a map (of sorts) so that decision makers can see how the data flows. A problem arises when you’ve trusted the plan and mid-implementation, the migration team wants to change everything. To avoid a complete cloud migration failure, your best bet is to consult with the architect to make certain that everything goes to plan.
  • Cloud security: For companies that migrate over to the cloud, they will have to know beforehand that all of the solutions they had deployed to protect their systems from threats are probably not going to be deployed by the cloud provider. As a result, it may initially feel as if the cloud construct is lacking security. Hiring a third-party to test your security will go a long way toward alleviating (or reaffirming) the concerns you may have about your cloud’s security.

As costs go, it’s pretty evident after considering all the factors, that deploying new infrastructure is always going to be costly. An organization can save money by moving to the cloud as long as the migration is done properly and meets all the file sharing, data security, and deployment needs that an organization has. In fact, most organizations have some sort of cloud project on the books for this very reason. The benefits outweigh the detriments for a lot of what companies do.

The Hybrid Approach

Nowadays, the Hybrid Cloud approach is becoming more popular. As data regulations increase and legacy software is still mightily functional, the best option is often to deploy both a cloud platform and keep an on premise server. Essentially, finding ways for the two to work in unison is called a hybrid cloud. While this seems like a match for nearly every business, it comes with a great deal of design and implementation headaches, and can cause significant cost overruns.

In order to design and deploy an effective hybrid cloud, you first have to know what the potential pitfalls can be. Two include:

  • Utilization uncertainty: When moving part of an organization’s data and infrastructure to the cloud, there should be a baseline of utilization that is acceptable. If you overplanned for cloud utilization, you could be looking a pretty hefty bill in the face for computing resources your organization will never use.
  • Development costs: The two computing constructs often won’t “play nice” and as a result you may be looking at substantial development costs during the integration. These costs are variable and are difficult to plan for, so like everything else IT, plan to spend more than you will and you won’t be left disappointed.

To solve the challenges that come with significant hybrid cloud costs, many organizations will abandon the idea, but really it’s about simplifying the whole process. New strategies, practices, and products are being formed that will simplify the hybrid cloud process, while allowing an organization to get the most out of their IT infrastructure. It won’t be long before there will be hybrid cloud services that will marry the two ends into one secure and dynamic IT infrastructure. Until then, however, controlling your computing costs, no matter the platform, will take careful consideration and thoughtful planning.

At Coleman Technologies, we have years of experience designing, implementing, managing, and supporting powerful IT infrastructures for businesses of all sizes. To learn more about cloud computing, including hybrid cloud implementations, reach out to us today.

Continue reading

Disasters Have Many Different Faces

Downtime is Crushing

Any time your organization isn’t operating under normal circumstances (i.e. any time it’s simply not functioning, or functioning at a loss) can be considered downtime. This takes multiple forms, including employees unable to access critical software or data, the office being shut down due to a power outage, or even technology problems that result in devices not working as intended. Whatever the reason--and data loss disasters are a big one--you can bet that downtime has a considerable impact on both your wallet and your organization’s long-term sustainability.

Data Loss is Challenging

What a lot of businesses might not understand about data loss is that it equates to lost progress, or work that needs to be done over again. Think about it this way; your organization has to collect all the data again, assuming that there is no way to actually restore it. This is why so many businesses have a data backup and disaster recovery solution, as retracing your steps can be costly, time-consuming, and, quite frankly, a waste of time that could have been avoided with the proper foresight.

Considerable Fines for Security Risks

In many cases, a data disaster can involve a security breach, where personally identifiable information or sensitive corporate data can be stolen or exposed to danger. When this happens, certain industries that are supposed to adhere to various security thresholds may be subject to fines based on the specific types of data affected. It’s needless to say that this kind of disregard for security compliance can lead to crippling fines and legal repercussions.

In all of the above cases, having a data backup and disaster recovery solution from Coleman Technologies can offset the challenges and difficulties of operating at a loss. To learn more about the solutions we offer, reach out to us at (604) 513-9428.

Continue reading

Is Data a Commodity? Maybe Not, but It Is an Asset

Today, many of the largest and most lucrative companies in the world, Google, Apple, AT&T, Amazon, Verizon, Facebook and Microsoft are all, more than manufacturers of computer-based goods and services, data brokers. These data brokers create services that they then sell to advertisers that allow them to target you based on the information these companies have of you, which can accurately tell how and what to sell you.

Since nearly everyone has a near-ubiquitously-connected experience there is a lot of data collected, bought, and sold every year and it’s big business. Facebook, a company whose main revenue stream is from selling advertising, made a net profit of nearly $16 billion in 2017. This tells us that if you have people’s data, you have people’s hopes, fears, and dreams, which means you can pretty easily get someone to pay you for access to that information.

For small businesses it’s much less lucrative. In fact, all the data your organization needs to keep, is probably necessary to simply do business, not to sell to advertisers. Facebook voluntarily gets a lot of personal information from every one of their users, as where the typical small business often has to strategize to just get a name and a phone number. The information that is sensitive (mostly customer information that you collect) has a lot of value to the people looking to steal it. So while you aren’t making billions of dollars selling consumer profiles, it is still a mightily important part of doing business, and needs to be secured.

Is Data a Commodity?
Technically speaking, it isn’t. Since a commodity’s value is based namely on its scarcity and the amount of capital that needs to be put up to create it, in both resources and labor, the data that is being purchased isn’t really a commodity. In lieu of the dissolution of the U.S. Net Neutrality laws, this has created the argument in the U.S. that since now it’s up to the telecommunication companies how they want to manage (or more accurately bill) data consumption, that they would throttle and tier service, something that isn’t possible with a true commodity, where there are laws prohibiting those types of practices.

On the other hand, Internet access is something that a majority of the commerce requires, and delivering data is in itself an expensive endeavor (infrastructure spending, development, utility costs, etc.) so telecoms, who are seeing their would-be profits syphoned by over-the-top content providers, and publicly demonized as a result of a very public lobbying effort to gain control of the ability to implement some sort of prioritization strategy, have to find a strategy to sustain their ability to get a workable return on their investments.

Securing Your Organization’s Data
Regardless of what your view of data is, it’s an important resource for your organization, and as mentioned above, it needs to be secured. For one of your company’s most important resources, data can be lost relatively easily, so there needs to be a concerted effort to keep your network and infrastructure free from the threats that could put your data at risk. At Coleman Technologies, that’s what we do. We ensure organizations like yours get the professional IT expertise you need to work efficiently, effectively, and securely in what is the most turbulent time in computing history. With the litany of threats your business faces everyday, you need experts that have your back. We offer:

  • Backup and disaster recovery: With a comprehensive backup and disaster recovery system in place, all of your organization’s data is safe, redundant, and able to be restored on demand.
  • Proactive monitoring and management: By keeping a dedicated eye on your network and infrastructure, our technicians can be proactive.
  • Patch management: By keeping all of your organization’s software up to date with the latest threat definitions, you can ensure that your software isn’t going to be a problem.
  • Access control and threat detection: By having full control over who can access what, and a complete view of the entire network, we can keep people who aren’t supposed to see certain information from accessing it.
  • Training: Most times, your own staff is responsible for data breaches and malware. We can train you all on what to look for to ensure that you are doing your best to keep your network and infrastructure free from threats.
  • Around the clock support: If three out of every four businesses deal with phishing emails, and over 95 percent of all phishing emails deliver ransomware, chances are that if a mistake were to be made, you will need immediate IT support. Our support and help desk can remediate a lot of your security issues to keep downtime to a minimum.

With data such a major part of doing business today, ensuring you have the right solutions and support in place to be confident that any situation you face will be managed before it becomes a problem is in itself a benefit. Call Coleman Technologies at (604) 513-9428 for more information.

 

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

Business technology can sometimes seem like a hedonic treadmill: you maintain a baseline level of operation with your IT, but it will inevitably fail, leaving you in the tough situation of having to replace it. Today, we want to help you get ahead of...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image