Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Tip of the Week: How to Customize Your Microsoft Word Tools

Customizing the Quick Access Toolbar

The Quick Access Toolbar can be found at the top left of the window, with default options like Save, Undo, and Redo. It’s pretty easy to spot, isn’t it? This is one of the reasons that adjusting it to your preferences can be so helpful.

Making these changes is fairly simple. Your first step is to access the Quick Access Toolbar’s options. Under File. select Options, and in the window that appears, click Quick Access Toolbar in the sidebar menu. It should look like this...

From here, you can see that the typical Save, Undo, and Redo options are in the Quick Access Toolbar - which is all well and good, but you can easily use keyboard shortcuts to accomplish the same things.

You might find a different assortment of tools more handy to keep in your Quick Access Toolbar. Altering them is simple enough from this menu, all you have to do is select the item and click the appropriate button, Add>> or <<Remove. The list on the left defaults to Popular Commands, but there are plenty of options to choose from, based on your needs. For now, we’ll stick to Popular Commands.

Let’s assume you use Word to put a lot of data into context, so you use a lot of lists and tables… and it needs to be spelled correctly. You can easily change your Quick Access Toolbar to meet these preferences.

Once you’ve done so, just click OK and your changes will be saved. You can always revert to the default settings by using the Reset option as well.

Customizing the Ribbon

The Ribbon in Word is where you find your options like Home, Insert, and the rest. Depending on your usage, you may not have much of a need for some of these options. Let’s assume that you don’t have any purpose for the Mailings tab, or the Draw tab, for that matter.

Again accessing File and Options, this time we’re looking for Customize Ribbon, which looks like this:

Just as we did with the Quick Access Toolbar above, you can adjust what is displayed in the Ribbon. Since we’ve established that - in this example - we have no purpose for either the Mailings or Draw tabs, we can uncheck them to remove them from the Ribbon display.

Customizing the Status Bar

At the very bottom of the window is the Status Bar, which can be altered to provide other valuable information based on what you have prioritized. Doing so is very simple: just right-click on the Status Bar, and select (or deselect) the options.

There you have it- three ways to customize Microsoft Word to better suit your purposes. For more technology tips, make sure you subscribe to our blog!

Continue reading

Is Your BYOD Strategy About to Backfire?

How Can BYOD Manifest Issues?

Unfortunately, for all its benefits, there is no shortage of drawbacks to BYOD - at least, if it is implemented without conscious deliberation and preparation. Here, we’ve listed a few such drawbacks:

Business and Personal Data Often Mix, but Shouldn’t

Do you really expect an employee to have a personal device that isn’t for personal use? If this device is used for work purposes as well, it can become very easy to combine this data and put some of it at risk. What if an employee who brought their own device in then left the company, the device in question full of your company’s sensitive data? Without some kind of policy in place to eliminate this risk, BYOD is simply too risky to allow.

Your Business Will Be Vulnerable to More Risks

Unfortunately, a poorly-strategized BYOD policy opens your business up to a variety of issues that could have severe and lasting ramifications.

This is mainly due to the many risks that mobile devices inherently have in terms of data leakage, malware infection, and other vulnerabilities. If your employees aren’t vigilant in keeping their devices updated and secured, your network will be subject to the same vulnerabilities. Malware infections can also be introduced via an employee not treating their device as carefully as they should be. If malware is installed on their device, it can easily be spread to your network - free to wreak havoc and steal data.

Your Infrastructure Will Likely Need Reworking

This one is admittedly less of an issue as it is an inconvenience. Simply put, adding an influx of devices and ensuring that your IT remains compliant to any policies can be a huge investment of time - and if not done correctly the first time, this investment will only grow.

How to Prevent These Issues Via Policies

As we briefly mentioned above, any BYOD initiative you introduce to your company needs to be controlled through a stringent use policy. This policy needs to clearly describe how an employee is to use their device during work hours, as well as the prerequisites that your employees need to abide by and agree to in order to use their own device. We recommend the following:

Mobile Device Management and Endpoint Protection

This technology helps to keep any company data isolated from any personal data on the device, which means that it allows you to control your data without intruding on an employee’s privacy. As a result, if a device is stolen, you can remotely remove any business data from it to ensure your data is protected.

Another precaution to enact is endpoint protection software. This software essentially performs a preemptive security scan of any device trying to access the network, identifying if a device has been infected. This means that your network isn’t introduced to whatever malware is present on the device, and the owner is then aware of their security issue as well.

Access Controls

The fact of the matter is that not every employee needs access to every byte of data you have. Therefore, it makes sense to implement role-based access controls. These controls can help keep an employee focused on the data they need for their work duties, and can help you identify where a breach occurred, should one happen. Some access controls can even prevent a device that isn’t up to date from connecting to the network at all. You should also investigate two-factor authentication measures that might assist you in limiting access to those who should have it.

Exit Strategies and Safeguards

Finally, you also have to consider what to do if something happens to one of the devices that has been used for BYOD purposes. First of all, you need to have your employees agree to have a lost device wiped remotely, applying the necessary solutions to each device used. Your employees also need to report a lost or stolen device immediately so these precautions can be put to use.

Finally, should an employee leave your business, you also need to make sure you have already secured the authorization to remove your company’s data from their device. You don’t want someone walking around with access to your data, whether their departure was amicable or not. Including this in your BYOD policy will ensure that anyone who leverages their mobile device is aware of your capability to remove your company data from their device, and will allow them to opt out of BYOD if it makes them uncomfortable.

With these policies backing up your Bring Your Own Device planning, you should be able to make use of a great productivity tool without sacrificing your data security. For assistance in putting BYOD into practice, reach out to Coleman Technologies at (604) 513-9428.

Continue reading

Smartphone Manufacturers Building Foldable Screen Devices

OLED Foldable Screens
Compared to the traditional light-emitting diode (LED) displays, OLED devices are a step in the right direction. LED technology works by emitting light from the electricity that circulates through it (a process called electroluminescence). The electrons in the semiconductor recombine with electron holes, releasing energy in the form of photons. The color of this light varies depending on how the photons cross the energy gap of the semiconductor.

OLED displays work through an electroluminescent anode that is made of an organic compound situated between two electrodes. The electrodes move and recombine, emitting light through the organic layer. OLED displays deeper black levels that aid in image contrast. These devices can be made much thinner and more flexible than your traditional LED devices.

Over the past five years, manufacturers have made considerable progress toward OLED displays. Some have utilized passive matrix designs or active matrix designs to great effect. The major difference between these two is that PMOLED has control over each line of pixels sequentially, whereas AMOLED displays have a transistor that accesses pixel function directly.

Bendable Displays
The organic compounds in the OLED anode allows for a much easier manipulation compared to other designs, as long as the transistor used to carry the energy is flexible, too. Once this was confirmed to work as intended, scientists had to find a substrate layer that could flex without breaking. This is why glass isn’t used in flexible screens. Some particularly flexible OLED displays contain a plastic substrate that gives them strength and flexibility required to become a foldable device.

Foldable Options
Motorola and Apple have rumored to be producing foldable smartphones in the near future, but there are others that are taking more immediate advantage of this technology. Here are a few of them.

Samsung Galaxy Fold
https://youtu.be/7r_UgNcJtzQ

In just a week, on April 26th, 2019, the Samsung Fold will become the first foldable smartphone to reach the U.S. This device can reach 5G speeds and sports an impressive foldable screen. The screen unfolded reaches 7.3 inches with a dynamic AMOLED display, while it reaches 4.6 inches folded with a super AMOLED display on the front of the phone. The innards are also quite impressive, featuring a 64-bit octa-core processor with 12 GB of RAM, 512 GB of internal storage, and a 4,380 mAh battery.

Huawei Mate X
https://www.youtube.com/watch?v=1_c2KGtZP64

Chinese manufacturer Huawei is providing a foldable smartphone in the form of the Huawei Mate X. The foldable display isn’t actually protected, but it is used in a way that differs considerably from the other options. With a foldable component that wraps around the device, the Mate X has a viewfinder that helps with taking pictures. This means that there is no need for a front-facing camera on this device. Other specs for this device include a Kirin 980 octa-core processor with 8 GB of RAM and 512 GB of onboard storage. This device also has a 4,500 mAh battery with a 55W fast charging standard. This product will be available in the near future, so keep an eye out for it if foldable screens are what you’re looking for in a device.

What do you think about OLED technology? What about foldable screens? Let us know in the comments.

Continue reading

Tip of the Week: How to Encourage a Good Team Dynamic

Method One: Clarify Roles

One of the first things that you should do is to ensure that everyone knows exactly what their role is with no misunderstandings. This will assist in establishing processes in which certain team members have a clear sense of what they are responsible for, and how that ties into the larger goal.

There are a few direct benefits that this transparency with your team can bring. First, you can give your team ample feedback into their performance and assign them new challenges and objectives to accomplish. Secondly, you can empower your team members to approach these objectives - all benefitting the same end goal - in their own way. By giving them this power over their own process, you encourage them to take ownership over their work and the end result.

I don’t know about you, but I’d rather produce something good if my name was going to be associated with it, if my contributions could be traced back to me.

Method Two: Praise the Team

One of the biggest obstacles to true teamwork is the ego. To avoid creating interpersonal tensions amongst your team through your praise, try praising the team as a unit. While giving one member of your team the spotlight can easily make the other members more jealous than anything else, focusing that spotlight on the team as a whole will help to improve the collaborative efforts of the team. You can always praise that team member in a one-on-one conversation.

There is one caveat to this: while you shouldn’t single out a team member in public, you should make sure that all work done within the team remains transparent. This visibility will help to discourage team members from slacking off and piggybacking on their coworkers, keeping everyone accountable for their share of the work.

Method Three: Encourage Staff Socialization

In order for your workforce to act as a team, they will need to see themselves as a team. This can be accomplished in a few ways.

The real key is to ensure that your staff is frequently spending time as a group.

In an operational sense, team meetings can be invaluable, so long as they also remain productive. Not only can these meetings provide your team with valuable facetime with one another, you can focus on your business’ strategy by analyzing your staff’s status reports side-by-side.

On the more casual side of things, there are a few ways that you can draw your employees closer together. Social activities can help to build camaraderie and friendly relationships. While it might seem corny, ice breakers can be a good way to get your team to open up to one another and, well, break the ice between coworkers. Otherwise, lunches or an after-work meetup for happy hour can help your team see each other as something other than just coworkers, but as friends. Even if nobody finds their “best friend forever”, your team will at least know each other better, allowing them to work together more effectively.

Method Four: Leverage Technology

Finally, if your team is going to act like a team, they’re going to need the tools that enable them to do so. This is what makes collaboration solutions so critical to the modern business. With the right solutions, your team can work cooperatively regardless of where they are, sharing and editing files together.

Of course, not every team member will need to see the same documents, based on their role, which is where the capability to assign network and file access permissions come into play. With these permissions, you can ensure that each team member can locate and access the files they need to be productive and contribute to the greater goals of the group.

Coleman Technologies can help you implement these technologies to support your other team-building endeavors - as well as the success of your business as a whole. To learn what else we have to offer, give us a call at (604) 513-9428.

Continue reading

Considerations for Your Business’ Collaboration

Hardware

Fortunately, the biggest hurdle to collaboration isn’t usually having the right solutions in the office, it’s primarily making sure that these solutions are being put to use properly.

Consider your Internet setup - is it strong enough to wirelessly provide your entire office with connectivity, or would you be benefitted by implementing additional access points? Do you have the hardware needed to communicate and share data with mobile employees, and most importantly, can you properly secure all of it? Speaking of mobility, you will also want to consider if you want to provide your staff with company-owned mobile devices instead of leveraging a Bring Your Own Device Policy. There are options out there to procure these devices for well below retail rates, as long as these devices are bought in bulk.

Software

Depending on your type of business, you may have more or less to do in order to promote collaboration in your organization. A brick-and-mortar establishment will likely have its resources centralized, which means that employees will need to have access to these resources in order to properly communicate with one another, sharing progress on their work. While a private cloud platform would serve this need quite well, these solutions are typically far too expensive for the average SMB to consider.

These SMBs do have other options. Cloud-hosted software allows a business to leverage just about any computing resources they need, whether its a productivity suite, a business management platform, or a communication tool. Adding to these benefits, these resources can be accessed wherever an Internet connection can be established thanks to an integrated access management system. This same system allows administrators to keep threats out of their network as well.

Policies

Finally, for there to be collaboration, there needs to be the policies in place that “encourage” (enforce) the stress-free sharing of pertinent data with team members. In other words, you need to know that you have a way for your employees to access the data they need to complete their tasks as the need arises.

Having these policies can be to your organization’s advantage. While some of your data needs to be kept on a “need-to-know” basis, giving your employees some guidance to navigate how other data should be shared can help you to keep your business’ data that much more secure. It also doesn’t hurt that digital communications are becoming more of the norm, so it only makes sense to give your employees an outlet to communicate in what is likely their preferred manner.

In short, businesses are communicating in new and exciting ways. Not only should you not want to be left behind, you can’t afford to be. For assistance in expanding your internal collaboration and business communications to fully embrace today’s capabilities, reach out to Coleman Technologies’s IT professionals at (604) 513-9428.

Continue reading

Higher Education Using Technology to Manage Operations

The fact of the matter is that universities have a lot of industry-specific technology that goes into making a functional institution of higher education, and that’s without mentioning secure access to student records, maintaining the productivity suites in computer labs, and providing intuitive smart technology for better lectures. We know a guy who’s well-versed in the types of solutions utilized by institutions of higher education, and we think you might find what he has to say to be interesting.

Degree Progress Management
Each student that is matriculated into a degree program has to complete a set of requisite courses. These courses will vary drastically from program to program, but the fact remains that each student must complete these requirements if they hope to graduate with a degree. Some programs have electives (any course the student wants) or selectives (any course from a selected group of classes), which complicates the process of choosing classes and opens up the door for students to take courses that don’t necessarily fulfill their degree requirements.

To minimize the risk of this happening, real-time degree progress can be viewed through programs like DegreeWorks. This program can show students, faculty, and staff advisors how many credits and courses must be completed by a student, as well as which classes fulfill specific requirements. Students can even process “what if” reports, which can show them how their degree progress is affected by something like changing their major.

Student Retention
It’s not a stretch to say that some students enter higher education underprepared for the increased workload. Whether it’s because of students not knowing how to access the proper resources, needing educational supplements like tutors, or simply requiring a support system that the student doesn’t have at home or on-campus, student retention and persistence can be a challenge for many institutions.

In an effort to improve these statistics, student retention software can be used by faculty and staff to assign flags, create to-do lists, and make appointments with students who are in need of assistance or support. In this way, the support structure that many students need to succeed is both accessible and informative for them.

Online Learning
In today’s increasingly-connected world, online learning has become a viable alternative to traditional, or synchronous, learning. When we say “synchronous,” we mean the traditional lecture style of education, in which a student must be physically present in the classroom to participate in discussions. Asynchronous learning, which is significantly less structured and more of an “at your own pace” approach to education, has provided students with limited time and geographic resources an opportunity to learn at their own pace in a less structured environment.

Depending on the institution, the online learning application might be something like BlackBoard, Angel, or Brightspace, rebranded to suit the proprietary needs of the university. Either way, the end result is generally the same. Online learning uses a centralized environment for all of a student’s learning needs, providing access to message boards, learning modules, grade books, open educational resources, and so much more.

Again, we understand that not all of our readers have stakes in the education sector; we just wanted to share some interesting solutions that are used by professionals in this industry. Are there any other industries you want to learn more about? Let us know in the comments and be sure to subscribe for more great technology-related blogs.

Continue reading

How to Use YouTube’s Full Capabilities for Your Business

Sure - if you want to limit how you can leverage it to your business’ advantage. Here, we’ve assembled a few features that you can use to make YouTube a better resource for your business.

First Up: YouTube’s Keyboard Shortcuts

Whether you’re using YouTube as a research tool or presenting your findings in a meeting, effectively using its built-in shortcuts can make your use of the website much more productive (and, let’s face it, more impressive).

If you’re doing research, jumping back to the beginning of a video will be super handy - and is possible, by pressing the 0 (zero) key. You can also use your arrow keys to fast forward or rewind the video in five-second increments (or ten-second increments, if you hold the Ctrl key at the same time).

If you’re using YouTube as a part of a presentation, you can quickly pause and resume the video by pressing either the spacebar, or the K key. If your audience can’t quite hear what you’re presenting, you can adjust the volume using the up and down arrow keys. The M key will mute the video, and unmute it when you’re ready to hear the video again.

Starting From a Specific Point in the Video

Speaking of using YouTube as a part of your presentation, you may not always want a video to start from the very beginning. YouTube gives you a few options to do so - the easiest being grabbing the altered link to your desired time directly from YouTube.

Let’s look at this video about phishing:

https://www.youtube.com/watch?v=jfnA7UmlZkE

There’s a lot of information in this video. What if you want to focus on one specific aspect, like how phishing can be spotted? This video doesn’t dive into this aspect until just about the one-minute mark. YouTube offers a function that eliminates the need of fast-forwarding to this point. Under the Share option, the menu that appears offers a Start at option. You can select the precise time that you want your video to start. The link that appears will begin your video at the moment you have selected (unless a pesky ad gets in the way):

https://youtu.be/jfnA7UmlZkE?t=63

Search Filters to Improve Your Results

If you’re having trouble finding the right content on YouTube, there are filters that you can whittle down your results by - making it more likely that you will find more videos that fit what you are looking for. You can seek out videos that were uploaded during a specific time frame, that fall within a certain duration, and seek out specific channels, playlists, and other media types - among other filters.

YouTube can be one of the greatest resources available today... as long as you can find and share the information you need. For more ways that technology can improve your business and its processes, subscribe to our blog!

Continue reading

United States Citizens Demand Data Privacy… How Will It Impact Your Business?

The GDPR (In a Nutshell)

Under the GDPR - which came into effect on May 25, 2018 - any companies that have collected data on a resident of the European Union are then responsible for protecting that data. Furthermore, the GDPR grants these residents a far higher level of access and control over the data that organizations possess.

How United States Citizens Have Reacted

According to a poll, data privacy has become a bigger priority for 73 percent of respondents, 64 percent stating that they felt the security of their data was worse than it has been in the past. 80 percent want the ability to learn who has purchased their data, while 83 percent want the ability to veto an organization’s ability to sell their data in the first place. 64 percent also stated that they want the ability to have this data deleted.

How the Government Has Reacted

Governing bodies at different levels have had different reactions to these demands. For instance, the state of California has already passed the Consumer Privacy Act (CCPA) - a piece of legislation that the House of Representatives' Consumer Protection and Commerce Subcommittee isn’t too fond of, as its position is that there needs to be a singular piece of legislation at the federal level to protect data. As of right now, data privacy is addressed in a combination of state laws and some proposed federal laws.

One of these proposed laws, the Data Care Act, spells out that (in addition to promptly alerting end users to security breaches) a service provider cannot legally share a user’s data without the receiving party also being beholden to the same confidentiality standards. Others include the Information Transparency and Personal Data Control Act, which requires transparency and personal control over data, the Consumer Data Protection Act, which could throw executives in prison for abusing data, and the American Data Dissemination Act, which sets a deadline for the government to enact privacy requirements upon businesses.

However, when the Consumer Protection and Commerce subcommittee met to discuss the prospect of a federal privacy law (which it was agreed was necessary), there weren’t any representatives for the average consumer - the ones whose data is really at stake. This reflects the hearings held last year by the Senate, also without consumer representation. Instead, technology companies were invited to participate during both sessions.

Small Business Concerns

That being said, there is very little support among the committee for any regulations that are at all similar to the GDPR. One reason for this: the fear that small businesses will not find themselves able to afford the added cost of compliance.

For instance, there are a variety of potential burdens that such a measure could potentially impose upon small and medium-sized businesses. These burdens include:

  • All-encompassing overhauls that would result in lost business
  • Business failure due to inadequate budgets to make the demanded changes
  • Impeded growth after regulations are put in place
  • Prerequisites becoming too great to start a business in the first place
  • Costs passed down to SMBs from larger companies for technology services

It is worth noting that if your organization does business with people from the EU, you are responsible to adopt the privacy rules of the GDPR.

What do you think? Are laws like these necessary, especially given the cost they could put on small businesses? Have you had any data privacy concerns in the past? Share your thoughts in the comments.

Continue reading

ISPs Have Finally Started Rolling Out 5G

To begin, we have to say that anyone that is talking about 5G as a selling point for any product or service in early 2019, you are looking at a marketing strategy. As the year goes on, however, we will be getting the first 5G networks and devices that can run on them. So, while it is true that some 5G wireless networks will be online in 2019, the lion’s share of networks will be using the same wireless platform that you’ve had for the past decade.

Fourth Generation

In December 2009, 4G wireless broadband networks went online for the first time, with the U.S. finally getting 4G LTE in June of 2010. Much like 5G will be for us, 4G was a revelation for mobile consumers of the time. At the time, 3G networks were doing 200 kilobits-to-five megabits per second and boosting to 4G’s 100 megabits-to-a-gigabit per second is a huge jump. It allowed for cloud computing and streaming media to be possible, and opened up a massive market for mobile applications, and devices that could handle these applications. The effect 4G had on society was massive.

Fifth Generation

Like the 4G networks before it, 5G networks will improve bandwidth speed, reduce latency, and provide a whole new layer of application support. It will effectively bring office Internet speeds to mobile devices. With speeds up to 100 gigabits per second, the 5G connection will be nearly 1,000 times faster than current 4G speeds. This will make any streaming communications seamless and give application developers a whole new construct to work in, improving mobile computing with each new innovation. To put this into perspective, with a solid 5G connection, you could, in theory, download a full movie in a few seconds

This gives people better network stability to ensure that business-critical mobile functions are reliable and has the speeds necessary to provide users the digital tools they need to be productive anywhere they are. The problem many organizations (and individuals) will have is that with this amazing upgrade, when your area gets 5G (Verizon has announced they are launching their 5G the second week in April in Minnesota and Chicago) you will have to get a phone that is capable of working with the new 5G networks. Thus far here is the list:

  • Samsung Galaxy s10 5G
  • LG v50 ThinQ
  • Huawei Mate X
  • ZTE Axon 10 Pro 5G
  • Unnamed OnePlus 5G Smartphone

That’s it. No Apple version. No Eurpoean version. In fact, of these phones, the Galaxy s10 5G is the only one that will be available in the United States at the time of Verizon’s 5G launch in April.

Also, Verizon is also making available a 5G mod for the Moto z3 for $50. The retail price comes in at a cool $349.99 if it isn’t purchased in the promotional period.

Users should also know that if they are lucky enough to get access to a 5G network, they will be forced to pay extra for access to it. The price currently is an additional $120 per year on Verizon, other Telecoms haven’t announced a true 5G pricing strategy, even though most of them have rolled out some products claiming to have 5G capabilities on handsets that only offer 4G LTE speeds. As we stated above, these are marketing ploys.

Do you plan on using 5G when it’s rolled out? Leave your thoughts in the comments section below. If you would like to know more information about the technology behind 5G subscribe to our blog today.

Continue reading

Tip of the Week: Bandwidth Questions

What is Bandwidth?
In its most basic form, bandwidth is how quickly you can download content from the Internet. Bandwidth is measured in megabits per second, or Mbps. The more bandwidth you have, the faster downloads will run. Some high-speed connections can be measured in Gigabits per second.

How Exactly Does Bandwidth Translate to Download Speed?
If you’re trying to calculate your projected download speed, keep in mind that there are eight bits for every byte. This means that if you’re trying to download eight megabytes of data on a one Mbps connection, it will take about one minute. A 512 megabyte file, on the other hand, would take just over a hour to download on the same connection.

Estimating Your Business’ Needs
In order to reach an appropriate estimate for your business’ bandwidth, you’ll need to use a little math. Take the estimated traffic that you expect each of your processes to take up, as well as the number of users that are engaged in this process. You’ll want to assume that this is during peak operations; otherwise you might not have enough during an important operational period. You can generally rely on the following speeds for bandwidth estimation:

  • 100Kbps and below: Low-end, single-line VoIP phones and e-fax machines. Some more basic computers have processes that use less than 100Kbps, but in the business world, you probably aren’t using them.
  • 100-500Kbps: More computers and laptops fall into this range, as they are more likely to be the ones streaming, downloading, emailing, and browsing than other less intensive devices.
  • 500Kbps-2.0Mbps: Cloud solutions and standard definition video conferencing take up about this much bandwidth. This is the general range for Enterprise Resource Planning solutions, Customer Relationship Management platforms, and Point of Sale devices.
  • 2.0Mbps and more: High-definition conferencing solutions, remote access, heavy cloud access, and other resource-intensive tasks fall under this category.

If you keep peak activities at the top of your mind, use them to add up what your staff will need to stay on task and ahead of schedule. For example, let’s say you have ten users, including yourself. You might be using 450Kbps for correspondence, while six of your employees are using a CRM solution at 2.0Mbps each. The last three are using high-definition video conferencing software for 2.5Mbps each. Add all this up and you can expect to use about 20Mbps at heaviest use, but you want to go a little beyond this to 25Mbps, just to be safe.

What are other tips that you might want us to share? Leave us a comment and let us know.

Continue reading

Colleges Have a Lot of Data to Protect

Birth of the Internet

The first Internet was born on college campuses. It was built by intellectuals, for academics, without the massive list of considerations that now accompany software development. It spread quickly, of course, and somewhere, pretty early on, it was decided that by being able to support commerce, the Internet could become one of the west’s greatest inventions.

This came to fruition in 1984 when the first catalogue was launched on the Internet. This was followed by the first e-store (at books.com) in 1992, and the first software to be sold online (Ipswitch IMail Server) in 1994. Amazon and eBay launched the following year and the Internet has never been the same.

By then, the academic uses for the Internet had multiplied, as well. By the time Amazon launched, many colleges and universities were offering students access to the Internet as an important part of their continuing education. Boy, was it ever.

Today, you’ll be hard pressed to find a classroom (outside of the poorest school districts in the country) where every classroom isn’t Internet-ready.

College Internet Needs and Cybersecurity

This stands true in university and college circles, as well. Campuses today are almost completely connected. You’ll be hard pressed to find a place on a modern campus that, as long as you have security credentials to do so, you can’t gain access to an Internet connection. In a lot of ways, it is the demand for access that makes network security a major pain point for the modern college. Firstly, having to protect computing networks from a continuously variable amount of mobile devices is difficult. Secondly, the same attacks that plague businesses, are also hindering IT administrator efforts at colleges.

Colleges themselves aren’t doing anyone any favors. According to a 2018 report, none of the top 10 computer science degrees in the United States require a cybersecurity course to graduate. Of the top 50 computer science programs listed by Business Insider only three require some type of cybersecurity course. Moreover, only one school out of 122 reviewed by Business Insider requires the completion of three or more cybersecurity courses, the University of Alabama. Regardless of the metric, it’s clear that learning cybersecurity is not a priority for any school.

Are There Cybersecurity Problems Specific to Colleges?

The short answer is no. That’s why it's so important to get people thinking about cybersecurity any way they can. No industry can afford to have the skills gap between people that hack and the people looking to stop them grow any wider. This is why, no matter what you do (or plan on doing) for a living it’s important to understand what your responsibilities are and how to get them into a place that can help your organization ward off these threats from outside (and sometimes inside) your network.

Many colleges have turned to companies like Cyber Degrees to help them not only educate the people utilizing the college’s networks to why cybersecurity awareness is important, but also help people understand that with the rise of cybercrime and hacking-induced malware, that cybersecurity has become a major growth industry with many facets. In 2015, the Bureau of Labor Statistics found there were more than 200,000 unfilled cybersecurity jobs in the U.S. With curriculums not prioritizing cybersecurity, and with threats growing rapidly, imagine how many are unfilled today. As demand rises for competent individuals to fill a multitude of jobs in the computer-security industry, colleges need to do a better job prioritizing cybersecurity training.

For the business looking into protecting itself, look no further than the cybersecurity professionals at Coleman Technologies. Our knowledgeable technicians work with today’s business technology day-in and day-out and know all the industry’s best practices on how to keep you and your staff working productively, while limiting your exposure to risk. Call us today at (604) 513-9428 to learn more.

Continue reading

Have You Provided Your Staff With Enough Training?

Why Your Employees Need Training
The most notable reason to provide training for your employees starts from their first day on the job, when they might need to be educated on how to use the solutions your organization depends on. This might be time-consuming, but it is critical if you want to save time in the long term. Training employees as soon as possible will mean you’re not leaving employees to figure it out for themselves.

Even more experienced employees will need training every now and then. The average employee will only retain about 40 percent of what is covered during their introduction to a topic, making education a critical part of maintaining operational productivity. Since technology is changing often, you should take some time to improve your training processes.

Training Options
There are many different ways to approach employee training, but one common factor among them all is pairing a new employee with an experienced one to teach them a thing or two about the process. On-the-job training is a practical way to make sure that instruction is taught by someone who knows what they are doing, and it can even help develop relationships between your workers.

On the other hand, when a new technology is introduced to the workplace, your entire staff might need to know how to use it. In cases like this, you can use webinars to help employees “self-teach” themselves on how to use it. Avoid holding all of this training in a single session, though, as it’s better to spread it out so as to avoid a situation where your employees are stuck in training for a week at a time. Some organizations have had success in splitting their teams up into internal groups to help employees learn as much as possible.

If Your Team Needs Help…
A help desk solution is a perfect way to supplement what your employees already know with what they need to know. You can provide your staff with access to trained technology professionals who can provide assistance when it’s needed. Coleman Technologies can help your business get started with technology training and support. To learn more, reach out to us at (604) 513-9428.

Continue reading

Tip of the Week: Adjusting Microsoft Word to Match Your Style

Before we get started, we want to make sure that you know to consult with your IT department or provider before you go to make any of these changes. That way, they will be able to undo any mistakes you or your employees might make during the following processes.

Customizing Word’s Rules to Meet Your Preferences

It’s likely that there are some things that you regularly type into Microsoft Word that it may not agree with. Your company’s name might not exactly jive with the grammatical rules that the rest of the language should subscribe to, for instance, or you may prefer to stylize certain terms or phrases differently. Word isn’t going to like this, and is going to try to let you know that a mistake has been made. Of course, it might also just change the word you typed to what it is “supposed” to be.

These corrections can be a pain to repeatedly make, and there’s always the chance that one will be missed. Fortunately, Word offers you the opportunity to “teach” it new rules via a fairly simple process.

To access these rules, select File, and from there, Options. A new window should pop up with a Proofing option in the list. That page looks like this:

Adjusting AutoCorrect

Here, you can alter a variety of proofing options, including your AutoCorrect Options. Clicking that button will present you with another window.

This window allows you to set your AutoCorrect rules, identify any exceptions you might want to make, and review how misspelled text can be automatically revised.

Establishing Grammar Rules

Returning to the Proofing List window, you also have other options that allow you to adjust Word’s corrections. For instance, clicking the Settings... button under When correcting spelling and grammar in Word provides another window. From here, you can control which grammar rules Word will flag or ignore in your copy.

Stop Worrying About Word Changing What You Write

By implementing these changes, you can prevent small annoyances from interrupting you as you work with Microsoft Word. This way, you can accomplish more without having to worry about dealing with automatic corrections again.

For more tips on how to best leverage your solutions to save you valuable time and money, subscribe to our blog!

Continue reading

ALERT: Over a Million Asus Laptops Could Have Been Hacked

Numbers are still coming in as far as how widespread this issue is. As of Monday, cybersecurity firm Kaspersky Lab said potentially thousands of Asus computers were infected, but on Tuesday that number has potentially broken a million.

How Could My Asus Laptop Get Hacked?

This type of attack is called a Supply-Chain Compromise and is one of the most frightening kinds of cybersecurity threats out there. Asus’s software update system was compromised by hackers, putting a backdoor into consumer devices. The scariest part is that this backdoor was distributed last year and it’s just being noticed now.

The good news is this has given Asus plenty of time to plug up the security holes on their end, but if you own an Asus device there is still a chance that it is infected with malware from the initial attack.

What Do I Do Now?

First and foremost, no matter what brand of computer or laptop you have, you need to make sure you have antivirus, and that antivirus needs to be licensed and kept up-to-date.

If you have an Asus device, Asus has released an update in the latest version of their Live Update Software. They’ve also patched their internal systems to help prevent similar attacks from happening in the future. You’ll want to make sure you have Live Update 3.6.9 installed.

Asus has also released a security diagnostic tool that will check your system to see if it has been affected. Click here to download the tool.

We HIGHLY encourage you to reach out to Coleman Technologies if you are running any Asus hardware. It’s better to be safe than sorry.

Continue reading

Getting to Know About Phishing Attacks Can Keep Your Business Safe

As a result of this increase in phishing attacks, endpoint security has grown much more focused, but the issue with phishing isn’t necessarily an issue with the strategies surrounding your technology--rather, it’s an issue relating to your organization’s users and their tendency for failure. Now, we know this sounds a little harsh, but it’s been proven time and again that employees need security training on how to handle credentials and other sensitive information. Let’s take a look at a couple different types of attacks you can be exposed to, and what you can do to keep your organization from becoming just another company that has suffered from a data breach.

Deceptive Phishing
Deceptive phishing is one of the most common types of phishing scams, and it aims to fool unsuspecting users into handing over sensitive information. This happens when the hacker sends a message to users that impersonates an actual person or company that the organization has some sort of relationship with. These hackers use deceptive phishing to convince users to hand over information like passwords, usernames, account numbers, etc. Since official credentials are being used to access these accounts, it doesn’t immediately become a security concern.

For the most part, these deceptive phishing messages are either ignored by the users, caught by filtering technology, or disregarded when they’re accessed. Unfortunately, the handful that actually do fool the end user are worth the hundreds-of-thousands that are sent to others. To keep your business from making this fatal mistake, you need to focus on increasing awareness of what makes phishing attacks so much different from your average legitimate email.

Some of the telltale signs of phishing messages include misspelled words, problems with sentence structure, and suspicious attachments or URLs. Always hover your mouse over a link before clicking on it to determine its location, and never download an attachment unless you know who’s sending it. Another thing to look out for is any financial institution or vendor demanding payment or access to your account--there are other, more official methods of outreach for methods such as these; and no bank or similar institution will ever, ever ask you for passwords.

Spear Phishing
Spear phishing attacks are targeted attempts against a specific user. For example, someone who sees a message from a coworker might let their guard down, but this doesn’t necessarily mean the message is safe. It just means that some hacker managed to find a way to mimic the sender in a way that is extremely convincing. Spear phishing attacks will often know the target’s name, title, company, work phone number, and much more--all to seem as authentic as possible so the user will click on a malicious attachment or URL.

Even social media isn’t safe from this trend. LinkedIn, for example, is one of the most common places where spear phishing is leveraged. It might be used for connecting with other business professionals, but it’s not hard for a hacker to imitate a business professional. We aren’t saying that you need to avoid social media like the plague, only that you should approach it with some sensible caution.

Pharming
That being said, more people are learning about these attacks by the day, meaning that some hackers have ceased these types of attacks for fear of their efforts being for naught. Instead, they turn to a practice called pharming, which is using an organization’s DNS server to change the IP address associated with the website name. This gives them a way to direct users to malicious websites to steal their legitimate credentials.

To prevent this from happening, it’s very important that you tell your staff to be sure they are entering their credentials into a secured site. The best way to make sure this happens is to look for the “https” in the hyperlink, as well as a padlock icon next to the address. It also never hurts to have an antivirus solution on each endpoint within your organization.

Coleman Technologies can help your business stay as secure as possible. To learn more, reach out to us at (604) 513-9428.

Continue reading

Biometric Authentication Becomes More Commonplace

What Are Biometrics?
Biometrics are a method of authentication that uses some sort of physical attribute or qualifier rather than a password or a key code. Some examples include fingerprints, voice patterns, typing rhythms, and so much more. They are easier to use than your typical passwords or key codes, and even better, they can be used in conjunction with traditional security measures and practices.

Let’s take a closer look at what some of these biometrics are, as well as the most practical way to implement them.

Biometric Types
There are two major categories for biometrics: physical identifiers and behavioral identifiers. Physical identifiers are by far the most common:

  • Signatures: Signatures are one of the unique ways you can identify an individual, and you’ve surely seen this biometric used at least once somewhere or another. Whether it’s a transaction or an agreement, a signature can do much to guarantee someone’s authenticity.
  • Fingerprints/Physiological Attributes: This particular biometric is often used to secure smartphones. Fingerprints can be used to determine the identity of the user, as well as various other physiological attributes, like palm scanning, retinal scanning, and facial recognition.
  • Voice: Voice-based authentication is common all over the place these days, whether it’s a personal user issuing commands to a virtual assistant or a business using voice authentication to navigate automated answering systems.
  • DNA: The technology to implement DNA sequencing into authentication is still a ways off, but it’s closer than you might think.

There are other behavioral identifiers that are used for biometric authentication. While these methods are still in development, here are a few examples of them:

  • Typing Patterns: People all write in different ways, and the same goes for typing. Therefore, this can be used to determine the authenticity of the user based on their keystrokes and the pressure applied to the keys.
  • Navigation and Engagement: In a similar fashion, the way that people navigate applications and systems can also determine identity. Mouse movements are quite showing, as well as how we hold devices.

Reliability (and Risks) of Biometrics
Biometrics are proving problematic to an extent, mostly because they can be inconsistent. Voices can vary depending on the user’s health or age, and faces can change based on a clean-shaven (or bearded) face, a haircut, or a pair of glasses. There are ways to work around this system, and with biometric authentication, there is much that needs to be taken into account.

Security is a Major Concern
This kind of data needs to be heavily protected, as it not only exposes sensitive information, but personal information as well. These kinds of credentials are also not easily changed, as they are heavily based on physical traits. For these reasons, biometrics may take some time to be adopted as the norm.

What are your thoughts on biometrics? Let us know in the comments.

Continue reading

Tip of the Week: 9.0 Pie Brings with It New Features

New Gestures
The latest version of Android OS contains a built-in new gesture navigation system, but it might not be turned on automatically. To turn this on, go to Settings > System > Gestures. Then you must tap on Swipe on Home Button and press the on-screen toggle switch. You will see the change propagate almost immediately--the three-icon setup will change to a singular pill-shaped icon.

Navigation isn’t much different from the other builds, either. Tap the pill icon to bring back the homescreen and long press it to bring up your Google Assistant. You can then swipe up twice or long-swipe from the home icon to bring up your app drawer.

Another change that needed to occur is that Android 9.0 Pie removes the dedicated button for recent applications. Users now need to singular short swipe up from the bottom of the screen to open up a carousel gallery that shows all recently opened apps. You can then navigate by swiping between apps or using the home icon to swipe fast-left or right to move through the apps more quickly. To clear the apps, swipe up on the specific app window. To clear all of the apps, just scroll all the way to the left and tap the Clear All button to exit out of all running applications.

Android 9.0 Pie actually tries to predict what you’re likely to need next. These commands are within the apps. If you find it useful, you can drag these suggestions, found at the top of your app drawer, onto the screen. You can then find the shortcuts offered by each app by long-pressing the specific application’s icon. This includes opening an application in split-screen mode, a considerable improvement from Android 8.0 Oreo.

Device Notes
One extremely useful feature for smartphone users is the ability to open your device using a fingerprint scanner, but an even better one is when you can use the scanner on devices that don’t feature an in-display fingerprint reader to keep your screen from turning off.

The alarm clock in Android 9.0 provides some additional functionality. When your notification panel is open (swipe down from the top), you only need to tap on the clock in the system tray to open your clock app and manage the alarms.

What do you think about Android 9.0? What are your favorite features? Let us know in the comments.

Continue reading

Three Ways to Be More Productive

1. Prioritization

One of the keys to productive work is to work smarter, not harder. By identifying what is most pressing to accomplish or otherwise needs to happen first, you can inherently increase your productivity.

Ignore Inspiration

For instance, one of the biggest causes of procrastination is taking in a project in its entirety. Seeing the entire scope of an undertaking can be intimidating, which often makes people feel as though they need to be “inspired” before they will be able to accomplish anything.

This is untrue, but can be a difficult impulse to resist. If you catch yourself falling back on this excuse, try focusing specifically on a certain aspect or piece of your greater responsibility. Once this portion is completed, you’ll most likely be motivated to continue. In essence, don’t wait to be inspired… inspire yourself through what you accomplish.

Leverage Prioritization Strategies

Another common cause of procrastination is indecision as to what aspect of a project to tackle first. Again, identifying the most important or pressing activity makes it much easier to make this decision, and there are a few ways that you can do so.

One way is to leverage something called the Eisenhower Matrix. It can be used to sort tasks based on their urgency and importance, advising you on how a task should be approached - if it should be done now, planned for, delegated to someone else, or eliminated. This tool can help you avoid spending time on activities that ultimately don’t matter as much as others, optimizing how you spend the time you have. The Pareto Principle, or the 80/20 Rule, is another means of spending your time more intelligently. By identifying the most important 20 percent of their tasks and minimizing the remaining 80 percent, many people use this principle to spend the most time on their most impactful activities.

Save Distractions for Later

We’ve all experienced that moment where, in the middle of one task, we suddenly have an idea for another. While this new task may be valuable or important, it can also hurt your operations by interrupting the one you’re engaged in at the moment… but again, this thought also needs to be addressed. Many people resolve this dilemma by creating a distraction list. Rather than suspending what they are working on, these people simply take a moment to jot down this idea for further consideration after their task is done. This means that they aren’t jumping between unfinished tasks each time a new idea pops up.

2. Preparation

Once you have your tasks organized properly, you need to ensure that you have properly made preparations to attend to them. Some of these preparations may sound counter-intuitive, but are no less crucial to your efforts.

Make Sure You’re in Order

If you aren’t ready to be productive, you aren’t going to be no matter what you try. Therefore, you need to be taking care of yourself, as well as your technology. You need to be healthy and rested to reach your potential, which means that self-care is a must. This also means that you should be strategic in how you approach your responsibilities. If you know that you tend to have a period of low energy in the late morning, it’s probably beneficial to avoid scheduling intensive tasks for that time. In addition, you need to be sure that you’re up-to-date on how things are done. The more knowledgeable you are, the more efficiently you’ll be able to make decisions, and the faster processes will move along.

Expect to Be Interrupted

The best-laid plans of mice and men often go awry, as they say. This means that you should anticipate other things to interfere with your established work schedule. What if another task pops up, or a task takes longer than anticipated? Taking these kinds of challenges into account will allow you to figure out a solution preemptively, or at least a plan that allows you to adjust and adapt.

Learn from Everything

We’ve all been taught the value of learning from our mistakes - examining situations in which things went wrong, identifying why, and avoiding those circumstances in the future. However, this is only half of what you should do to optimize your productivity. You also need to identify why your successes were successful.

Once you have completed a project or process, take some time to examine it. What about it worked well, and how could that be made better? Was every aspect necessary, or could some of it be eliminated or streamlined? Doing so will allow you to further optimize your procedure to be even more productive the next time.

3. Cheating!

In fairness, these strategies aren’t “cheating” so much as they are methods of working smarter. This way, you can make sure that your tasks are accomplished without expending more resources than they need - including your energy.

Subdivide Your Tasks

Remember the prioritization strategies we discussed above? This is a similar activity, in that you take a larger concept and divvy it up into each step that needs to be completed. Instead of putting them into a matrix or focusing on a specific set of them, the idea here is to simply make your tasks appear more achievable.

Let’s say you have to plan a work event. This alone is a significant responsibility, and can be overwhelming to approach as a whole - where to start? However, you can make your process much more comprehensible by going about it piece-by-piece, effectively expanding your task into a complete to-do list. While this does give you more tasks, they will be much easier to attain and progress with. So, instead of “Plan Party for Greg’s Retirement”, your list might include:

  • Buy decorations
  • Buy card
  • Buy ice cream cake
  • Hide cake in freezer
  • Have team sign card
  • Put up decorations
  • Take out cake
  • Send email to team to gather

More tasks, but much easier to follow nevertheless.

Leverage Shortcuts

There are a great many ways that your technology can offer an easier way of doing things. Naturally, keyboard shortcuts are one example of this, but so is automation. Let’s face it, any time you can save by having your technology handle something is time that you can then spend being productive elsewhere.

Eliminate Inefficiencies

How much time do you spend debating your options for truly inconsequential decisions during the day? Chances are, it’s more than you’d like to admit. The fact of the matter is that many of the choices that we are faced with aren’t all that impactful. Eliminating as many of these choices as possible will allow you to reserve your decision-making skills for the times that you really need them.

Email is another notorious source of lost productivity, simply because people don’t use it as efficiently as they could. It is too common for what should be a very brief and simple correspondence to take far longer than anticipated. Ironically, this is often because the people involved are trying to be brief.

Instead of cutting corners on your next email, invest a few minutes into including more specifics. Don’t just say you want to meet - identify the topics to be discussed. Don’t leave the time of the meeting open-ended, offer a few availabilities. While it takes longer to write, one email written this way will keep you from having to read, write, and send a few more.

Finding Your Groove

Clearly, there are many aspects to consider when you’re trying to be more productive, and some may be more effective for one person over another. A bit of experimentation will help you to land on the approach that works for you.

Coleman Technologies can help by providing the solutions that enable some of these methods. Reach out by calling (604) 513-9428 to learn more about these solutions.

Continue reading

Get More Out of Your Organization’s Meetings

Go in with a Plan
Have you ever had a meeting where you start with a general idea of what you want to discuss, then somehow wind up on a topic completely unrelated? This isn’t that out of the ordinary, and weekly meetings that are held for the sake of having a meeting could potentially result in these kinds of sessions, where substance is lacking, and focus is at an all-time low. If you have a strict agenda, then you’ll be more likely to cover important topics in a way that is conducive to everyone’s us of time.

Use Better Technology
If you find your meetings lacking in presentation, then you can use some technology to make it more interesting than just a couple of people sitting around a table. You can take advantage of media, slideshows, infographics, and so much more to provide context for the conversation you’re having. If meeting in the office doesn’t work out, you can even implement mobile technology and web conferencing software to keep your team connected from any location with an Internet connection.

Give Employees the Opportunity to Talk
People like to feel like they are involved in meetings, and if you give them the chance to express themselves in an environment that values their feedback, they will often thrive. Open up a portion of your meetings to give employees a chance to voice any concerns or thoughts they might have. You might find that the dialogue created from this could be valuable.

If your business could use some help with improving its meetings, Coleman Technologies can help. To learn more, reach out to us at (604) 513-9428.

Continue reading

Tip of the Week: How to Speed Up a Slow Windows 10 Device

However, as with any changes you are considering to your computer, you should lean on your IT resource to determine if it’s okay to make these adjustments. Better yet, IT may want to make them for you. One way or another, make sure you get the all-okay before switching anything on a work device.

Cleansing of Bloatware
Whether you picked something up during your browsing or the device’s manufacturer installed it during production, your computer can easily collect programs known as bloatware or adware. These programs, while not always harmful per se, can easily eat up system resources for nothing. Ask your IT resource to seek out these programs and eliminate them for you. This alone may result in some considerable boosts to your computing speeds.

Adjust Power Settings
While it may sound like a good idea, the Power saver plan that comes baked-into Windows 10 can actually make your experience as a user more of a pain. This is because this setting cuts your device’s processes to minimum so that energy can be conserved. Furthermore, desktops are plugged in as a rule, leaving little reason to use Power saver anyways. To improve performance on your Windows 10 laptop, stick to the Balanced power option when unplugged, and switch to High when power is available.

Kill Windows Tips and Tricks
Yes, it’s ironic that we’re recommending that you disable Windows Tips and Tricks in a tip-based blog post, but there are a few compelling reasons to do so. Most pertinent to our current conversation, the fact that Windows is analyzing your usage with these capabilities enabled means that your device’s performance is going to suffer.

In order to disable these invasive bits of advice, click the Start button. Under your Settings, access System and from there, Notifications & actions. Under the Notifications section, you will find the option to Get tips, tricks, and suggestions as you use Windows.” Deactivate this option, and you won’t have anything more to worry about.

Finally, the Cliché: Restart Your Device
Yes, this suggestion has become a joke in and of itself, as the IT field’s go-to question. However, there’s a really good reason for this: restarting a device can often solve its issues. This is because it clears out the use of the computer’s resources, wiping unneeded memory usage and stopping equally unneeded background processes. Restarting your workstation effectively gives it a fresh slate, allowing it to run much better than it did when it was bogged down.

Let us know if there are any other tips you want us to share in the comments, and don’t forget to subscribe!

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

Business technology can sometimes seem like a hedonic treadmill: you maintain a baseline level of operation with your IT, but it will inevitably fail, leaving you in the tough situation of having to replace it. Today, we want to help you get ahead of...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image