Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

How Faster Internet Speeds Can Improve Your Business




How Faster Internet Speeds Can Improve Your Business

The past several years have brought about dramatic increases in internet speeds, further fueling online activity and allowing businesses to innovate in all kinds of ways. Here are five of the best benefits that these increased Internet speeds have brought about for small and medium-sized businesses.

Increased Productivity and Collaboration

Slow Internet connections have historically prevented businesses from operating in ways that would improve productivity, such as communication, data transfer, and cloud-based tools. With faster Internet connections, employees can share large files and collaborate more efficiently. This gives companies a leg up on their competitors and allows remote teams to collaborate in-office or otherwise.

Better Customer Experiences

Anything that improves your company’s ability to interact with and respond to customer needs can help your business grow. Faster Internet speeds can reduce website load times and ensure that online transactions take place without a hitch. Often, the connection speed can make all the difference in making a sale or selling a product.

Advanced Technology Integration

Bandwidth is a vital resource for businesses hoping to use the latest technologies, like the Internet of Things and artificial intelligence (AI). Higher Internet speeds grant your organization access to more of this resource and allow for more efficient and streamlined operations.

Cloud Services and Remote Work

With cloud computing and remote work becoming a considerable force in today’s interconnected world, fast and stable Internet connections are more important than ever. High-speed Internet gives companies the ability to host cloud-based applications and services with minimal downside. This promotes remote work and minimizes latency. 

Lower Costs and Improved Security

With faster Internet speeds, your organization can take advantage of cost savings and greater security measures than before. Businesses will be able to fully use their Internet connections to their greatest potential through advanced cloud services, which are generally more budget-friendly and flexible enough to suit the needs of just about any organization. Furthermore, faster security updates through Internet connections means better security in general.

If you are concerned about your Internet connection, we can offer you opportunities to improve its speeds, quality, and stability. Contact us today at (604) 513-9428 to learn more.

Continue reading

What Search Engine is Truly the Best, Part 1




What Search Engine is Truly the Best, Part 1

Even if you lived under a rock, you’ve probably done a Google search or two. There are, in fact, other search engines, each with their own pros and cons. We’re going to compare some of the most popular search engines and talk about what makes them different.

Google is By Far the Most Popular Search Engine on the Planet

At the time of writing this, it’s calculated that every single second, a search is performed on Google 99,000 times. That adds up to 8.5 billion searches every day. It’s predicted that more than 92 percent of all internet searches are done on Google, but it’s possible that number is even higher.

Either way, people all over the world are more likely to say “I’ll just Google it” instead of “I’ll just search the web.”

You don’t hear anybody say “We’ll let me just Bing that,” and use Google’s closest search engine competitor, which handles about 3.5 percent of all searches, worldwide.

So what makes Google so special?

Accuracy.

Google is extremely good at giving you accurate results based on what you are looking for.

Google uses hundreds of different signals to determine what should and shouldn’t come up when you search for something, and it does it all within half a second or so, while sifting through over 30 trillion web pages to give you the best results possible.

Is it perfect? Of course not.

Can Google be tricked? Eh, sometimes. People are always trying to get their websites to rank for certain terms. This process is called Search Engine Optimization (SEO). This is a legitimate process for businesses trying to compete against their competitors on the search engines, but it can lead to bad, misleading, or undesirable results showing up on the search results page. That being said, Google is good about making it very difficult to manipulate your ranking without actually putting in a lot of hard work, so it’s less likely that inaccurate results will show up compared to the other search engines.

Still, Google tends to get you to the best result, and it gets you there the fastest.

Google Searches are Custom-Tailored to You
Here’s the other really cool thing about Google. Everyone’s search experience is a little bit unique to them. Google takes a lot of context into consideration, including your location, your past search history, the device you are on, and other information that Google knows about you, and provides curated results.

This means when you are traveling, as long as the device you are using knows its location and is letting Google know this info, you can search for a pizza place and get localized results. Google takes a ton of data points into consideration for every single query.

This isn’t always a good thing though.

Studies have been done in the past that show that Google’s search engine can sometimes contribute to a filter bubble. While this is much more common on social media platforms like Facebook and Twitter, the same can apply in some ways to Google searches.

Think of it like this. If you surround yourself with people who, for instance, truly believe that the moon is made out of cheese, you might start to see more and more information about the cheese moon than you did before. Your newfound cheese-moon friends will share news articles about how the moon is cheese. They will share memes and come up with silly nicknames for cheese-moon non-believers (like Non-Brie-lievers). They will get into fights on social media about whether the moon is more like Mozzarella or more like Gorgonzola. They will claim that all the non-brie-lievers are trying to shutter and bury any facts about how the moon is made out of cheese by sharing peer-reviewed articles from “fringe” agencies like NASA.

The point is, this creates sort of a bubble effect based on the way content algorithms work. If a platform like Facebook or Google knows that you’ll spend more time using them by keeping you happy with all the cheese-moon-affirmational content your heart desires, it’s going to be a little less accurate. If you spend a considerable amount of time seeking out results based on any particular filter bubble you are in, platforms like Google will likely curate some results that keep you trapped inside that filter bubble.

The trouble is that you won’t mind, your opinion about the cheese moon isn’t going to change, and everything you use online is helping you affirm this.

So yeah. Google is neat, and generally accurate, but it has been proven that sometimes it can go a little too far for some people. Over the last few years, Google has taken major steps to find a balance, which is actually the main reason Google doesn’t have the 98 percent market share it used to. Many folks have walked away from Google simply because it started to cater less to their fringe beliefs when it comes to hot button issues.

What are the Alternatives?

Now that the Big G is out of the way, in our next blog, we’re going to go over some of the alternatives. Be sure to stay tuned to our blog and social media.

Continue reading

What Search Engine is Truly the Best, Part 2




What Search Engine is Truly the Best, Part 2

Last time, we started our discussion on the best search engines by talking about the behemoth, Google. While Google is, by far, the most popular and commonly used, and arguably the most accurate search engine, it doesn’t mean it’s always the right search engine to use. Let’s talk about some other alternatives and see where they might fit in.

Microsoft Bing - Kind of the Same, but Different

Bing gets the silver medal for being the world’s second most popular general search engine. Even so, it only gets about 3.5 percent of the world’s internet searches. 

Bing is also the most similar to Google, at least as far as how it works under the hood. It’s focus is on providing accuracy and uses anonymous information from you and your search history to curate the results.

Whereas Google takes a very minimalistic approach to search, Bing usually has a visual treat for its users everyday. Each day, Bing decorates the background of its search page with a photograph with a little snippet of information about the photo. It might be some event happening somewhere in the world, a rare animal from a rainforest, a historical photo, a beautiful skyline, or literally anything else. No, it’s probably not what you were looking for, but it is kind of neat.

But on top of that, Bing also throws curated headlines, local weather, and sponsored posts right at you too. You’ll either love it, hate it, or have no feelings about it. Either way, the first impression you’ll have with Bing is that it’s busier, even before you do a search.

Something we didn’t mention last time when talking about Google—Google uses a mobile-first approach. That means sites that load well on mobile devices tend to get prioritized on Google. If your website is old and doesn’t scale properly for smartphones and tablets, you’ve probably noticed a drop in traffic over the last several years—this is why.

Bing doesn’t really care about this, but it also indexes a much smaller number of pages than Google, so the results are going to be pretty different. If you are looking for images or videos, Bing also has more options for filtering and displaying information, so it slightly outperforms Google there.

The user experience with Bing isn’t horrible, it’s just different. If you are used to using Google everyday, the transition to Bing will just feel a little strange, but it’s a decent alternative, and making the switch for a week or two is a fun experiment. We’d love to hear what you settle on.

Duck Duck Go - The Private Search Engine

Most popular search engines collect user data to curate search results. For instance, Google uses it to improve the results it gives you. Google also uses that data to help advertisers make informed decisions.

First and foremost, this data collection probably isn’t going to hurt you. It’s definitely a little weird to think about, but in the long run, it’s not necessarily tied to you as a human being. Let’s put it this way:

Let’s say, in the course of a week, three thousand people do a search for “soda,” two thousand people do a search for “pop” and a thousand people do a search for “coke.” Of those six thousand people, you are somewhere in there, looking for a soft drink. Google gathers this level of data to tell advertisers what words people use to look for certain types of products. Those advertisers can then make the decision on how they word their ads and what terms they pay money for. The data is, more or less, anonymous. Not every single company works this way (Facebook and Zoom have had data privacy scandals involving personally identifiable information), but that’s generally the gist of how this information gets used.

It’s not all sunshine and rainbows, however, and some people have just decided to take more steps to be as anonymous as possible online, and Duck Duck Go is a good search engine for those who don’t want Google to know what they are looking for.

Duck Duck Go will give you totally different results from Google and Bing, but it doesn’t use any information about you, anonymous or otherwise. It also does little to warn you when something is fraudulent. Don’t get us wrong, you can run into scams, malware, and other threats from Google results, but Duck Duck Go has fewer layers of protection. 

It also means the results aren’t going to be as localized. Looking for a nearby restaurant will only base your location on the location of your Internet Service Provider, so it might not be as accurate.

All that said, Duck Duck Go is a relatively safe option, and if you are uncomfortable with Google knowing what you search for and using that to curate your results, it’s a pretty solid solution.

An alternative to Duck Duck Go that follows a similar privacy philosophy is Qwant, a French search engine that doesn’t collect user data.

Which Search Engine Is Right For You?

It’s pretty unlikely that another search engine is going to topple the big G, but if you are more concerned about your online privacy, Duck Duck Go or Qwant are pretty good solutions. As with anything, you should always be mindful of what information you are giving up, and be careful what you click on. Even if the search engines themselves are safe, the websites they point to might not always be secure.

Continue reading

URL Manipulation and What to Do About It


The URL

Before we get into the manipulation of the URL, let’s define its parts. 

The first part of the URL is called the protocol, which tells the computing network which language is being used to communicate on said network. Most of the time, the URL will use the protocol “HTTP”. The HyperText Transfer Protocol makes it possible to exchange web pages. Other protocols that are used include File Transfer Protocol, News, and Mailto. 

The second part of the URL is the ID and password, which makes it possible to access secure servers on the network. This part is typically removed because the password will be visible and transfer unencrypted over the computer network.

The third part of the URL is the server name. It allows users to access information stored on specific servers whether through a domain or the IP address associated with the server. 

The fourth part of the URL is the port number. This number is associated with a service and tells the server what type of resources are being requested. The default port is port 80, which can be left off the URL as long as the information that is being requested is associated with port 80.

Finally, the fifth, and last, part of the URL is the path. The path gives direct access to the resources found tied to the IP (or domain).

Manipulating the URL

By manipulating parts of the URL, a hacker can gain access to web pages found on servers that they wouldn’t normally have access to. Most users will visit a website and then use the links provided by the website. This will get them to where they need to go without much problem, but it creates their own perimeters.

When a hacker wants to test the site for vulnerabilities, he’ll start by manually modifying the parameters to try different values. If the web designer hasn’t anticipated this behavior, a hacker could potentially obtain access to a typically-protected part of the website. This trial and error method, where a hacker tests directories and file extensions randomly to find important information can be automated, allowing hackers to get through whole websites in seconds. 

With this method they can try searching for directories that make it possible to control the site, scripts that reveal information about the site, or for hidden files. 

Directory traversal attacks, also known as path traversal attacks, are also popular. This is where the hacker will modify the tree structure path in a URL to force a server to access unauthorized parts of the website. On vulnerable servers, hackers will be able to move through directories simply.

What You Can Do?

Securing your server against URL attacks is important. You need to ensure that all of your software is updated with the latest threat definitions, and keeping a detailed configuration will keep users in their lanes, even those who know all the tricks. 

The IT experts at Coleman Technologies can help you keep your business’ IT infrastructure from working against you. Call us today at (604) 513-9428 for more information about how to maintain your organization’s network security.

Continue reading

Real Fake Controversies and How to Avoid Them




Real Fake Controversies and How to Avoid Them

All it takes is a couple minutes on social media to see all of the “outrage” over whatever is happening in the world at the moment. Before you know it, you’re invested in some issue that you’ve never heard of up until that moment, and you’re left wondering, “Why?” Today, we want to explore this phenomenon of how social media brings you to care so deeply about things that are rarely actually your problem (and why it can be so harmful).

Understanding Crisis Mode

Social media has the power to make anything feel like an immediate crisis; this thing is happening right now and it needs your attention right now.

It has the maddening ability to turn even a simple misunderstanding into a serious allegation or outrage, and part of the problem is that social media is designed around engagement. These platforms want to push content out to people who will read it, and they profit off of the views, whether they are in the name of public outrage or entertainment. Algorithms are biased toward posts that will garner strong reactions, and they will spread quickly as a result.

This is why one single post can have astounding consequences in such a short period of time.

Rapid Spread of Information

Information spreads quickly, even if the readers don’t take time to fact-check what they’ve just consumed.

As a result, misinformation can spread, especially if it looks convincing and it aligns with the reader’s personal beliefs. All it takes is one individual sharing something, and it’s a slippery slope that could lead to countless individuals getting fooled. Whether or not it’s a real controversy is irrelevant because the masses have engineered one for themselves.

Of course, by the time corrections or real information on the issue is brought to light, it’s too late, and the damage has been done.

Picking a Side

Tribalism is a problem on social media, particularly in today’s political climate.

Social media creates this sense of “us vs them” that is perpetuated by people with similar beliefs engaging with each other. People might feel pressured to pick a side, and if they don’t, they are complicit in the act. Ultimately, this leads to a dismissal of critical thinking and makes it easier for misinformation to spread.

In fact, some users will join in the outrage just to avoid the backlash rather than point out how some people are overreacting and risk their own reputations.

Profits > People

You knew money was going to make an appearance here.

Brands, influencers, and media outlets all benefit from the public’s outrage in some way or another. Attention is synonymous with profit, and these organizations are willing to look the other way if it means more eyes are on them. It’s like an influencer who starts drama explicitly to gain followers.

The news cycle doesn’t do themselves any favors, either, as the rush to report on breaking news stories might lead to misreporting before facts can be confirmed.

How to Avoid Falling for Faux Controversy

If you want to keep yourself from falling into this trap, here are some strategies to try:

  • Slow down - Before reacting to anything online, take a moment to check the source. 
  • Verify the reliability of the information - Could there be more to the story? If a post makes you feel instantly angry, there’s a good chance it was designed to do exactly that. 
  • Seek out different perspectives - Surely there isn’t one side to every story.
  • Ignore some stuff that doesn’t matter - Remember that just because something is trending doesn’t mean it’s important—or even true.

Social media only has power over you if you grant it, so do yourself a favor and inform yourself before you spread any misinformation or fall for hoaxes.

For more information on technology, social media, business, and the Internet, be sure to keep an eye on our blog.

Continue reading

VoIP is an Extremely Good Option for Business Communication




VoIP is an Extremely Good Option for Business Communication

Effective communication often operates behind the scenes, yet it serves as a vital cog in the smooth operational ability of business, lending support to a multitude of functions. Consequently, making judicious investments in the right tools can markedly elevate your business. In the contemporary landscape, one such indispensable tool is Voice over Internet Protocol (VoIP).

Let's delve into VoIP and explore why it has emerged as the preeminent choice for businesses seeking a robust and feature-rich communication platform. VoIP, in a nutshell, delivers more value for less.

VoIP is a telecommunication method that harnesses your internet connection, removing the necessity for a dedicated phone line to cater to your business' communication needs. This not only reduces ongoing telephone service expenses but also confers access to a host of supplementary features, some of which would typically come at an additional cost or might not be available at all. By leveraging the power of the internet, VoIP offers a broader spectrum of capabilities compared to conventional phone services.

Naturally, VoIP emerges as the optimal solution for modern businesses. Furthermore, it's adaptable for mobile use, with user-friendly mobile applications at your disposal.

If you believe that VoIP could be a valuable asset for your business, don't hesitate to reach out to us at (604) 513-9428.

Continue reading

CAPTCHA and Its Many Challenges


Let’s discuss what this signifies, and how this may shape how users authenticate themselves in the future.

Defining CAPTCHA

Short for Completely Automated Public Turing Test to tell Computers and Humans Apart, CAPTCHA has long been the standard tool used by Google to prevent automated spam from polluting the Internet by requiring (in theory) a human being to interact with content in some way before allowing access or a task to successfully be completed.

Back in the early 2000s, CAPTCHA was effective against spambots, being able to bamboozle them by simply requiring images of text to be identified.

The Growing Issues with CAPTCHA

However, once Google gained ownership of CAPTCHA and used it to help digitize Google Books, the text needed to be increasingly distorted to continue to fool optical character recognition. Adding to this was the fact that human beings solving these CAPTCHAs gave optical character recognition the information needed to improve its skills.

This is the downside to CAPTCHA that its creators foresaw from the beginning: at some point, machines would ultimately overtake human capabilities when it came to identifying these images. Furthermore, these tests also need to be universally applicable, working wherever someone is located despite any cultural biases and differences that a user might have.

Since then, CAPTCHA has been replaced by NoCAPTCHA ReCAPTCHA (the one where your user behavior is used to judge your humanity) in 94 percent of websites that use CAPTCHA. Further research and development is in progress to reinforce the security of these tools.

However, automated bots can already bypass CAPTCHA more effectively than most humans can. In fact, in 2014, a machine learning algorithm was made to compete with users to solve distorted text CAPTCHAs and managed to bypass the security measure 99.8 percent of the time, as compared to the humans’ 33 percent. There are also various CAPTCHA-solving programs and services available for use that can effectively access vast amounts of pages for little cost.

What is Being Done to Resecure CAPTCHA

There are many different approaches under consideration to improve the practical efficacy of CAPTCHA—making it simpler for human beings and more difficult for machines as originally intended. To accomplish this, a few different tactics have been explored, some more plausible than others:

  • Rather than identifying text or images, users would be asked to classify images of faces, based on expression, gender, and ethnicity (probably not the best option, in today’s contentious environment).
  • CAPTCHAs based on trivia and regionalized nursery rhymes, with these culturally based questions designed to overcome bots and overseas hackers alike.
  • Image identification that uses cartoons, hidden-image illusions, and other relatively subjective content to outfox automated CAPTCHA-cracking tools.
  • CAPTCHA tools that test users by having them perform basic game-like tasks, with instructions given in symbols or contextual hints.
  • Device cameras and augmented reality being used as a form of physical authentication.

Finally, a lot of consideration is being put to authentication measures that examine a user’s online behaviors and actions to determine whether there’s a real human being at the controls, or if a clever piece of software is trying to gain access—whether the mouse moves, for instance, or how precise it is as it does. Google itself is starting to examine traffic patterns to test “users” on a case-by-case basis.

There’s even a chance that these kinds of Turing tests will only be passable in the future by selecting an incorrect answer.

Regardless of how, it is only going to become more important to secure your accounts and the information they contain as time passes. Coleman Technologies is here to help you secure your business and its data. Learn more about how we can protect your business with the right IT solutions by calling (604) 513-9428 today.

Continue reading

Don’t Be So Quick to Scan Every QR Code You See




Don’t Be So Quick to Scan Every QR Code You See

There is no denying that Quick Response codes—better known as QR codes—are a handy little invention. Just a few years ago, many businesses heavily adopted these contactless communication tools, allowing customers with a smartphone to access menus, documents, and more with ease. Having said that, we unfortunately can’t deny that cybercriminals are taking advantage of how handy QR codes are, too.

Let’s talk about the rise in QR code fraud, as well as how you and your team can avoid it.

How Do QR Codes, and QR Code Fraud, Work?

First developed in 1994, a QR code is a two-dimensional version of a barcode, meant to adjust for the limitations of its predecessor. A traditional barcode is limited to 20 alphanumeric characters due to it only being able to be scanned horizontally. The QR code was then developed to hold exponentially more information in its combination of vertical and horizontal data as well as allow this data to be accessed at any angle.

While this makes the QR code a very appealing option for businesses, it also gives cybercriminals a relatively easy means of sharing malicious links and malware that has become largely trusted by people everywhere.

After all, if major brands are now displaying QR codes in their advertisements, they must be safe, right?

Unfortunately not. The utility offered by a QR code also applies to cybercriminals and scammers, who can use them to augment their attacks in numerous ways.

QR Codes Make Effective Phishing Tools

Phishing is one of the most unpleasant cyberthreats out there today, largely because it requires a user to be engaged and aware about their own cybersecurity at all times. It relies heavily on the target to not see it coming.

Now let me ask you this: would you hesitate to scan a QR code on a poster or a menu if prompted? If you’re like most people…probably not. It just isn’t how most people see a threat coming in.

This makes us vulnerable. This is why many of these threats have been spotted that pose as parking tickets, or as offers or loyalty programs attached to storefront doors.

Making this bad situation even worse, these attacks often don’t go into effect immediately. Instead, malware can be uploaded to the device that scans the malicious code where it will lie in wait until the opportune moment to strike arises. Many of these attacks will simply take notice if you use your device to access an account and record the credentials you use to access it, giving the attacker the keys to the castle.

Alternatively, some QR phishing tools will send users to a phishing website—one that poses as a legitimate one to fool the victim into handing their credentials over willingly. Some scams cover what were once legitimate codes with their own, diverting payments to their own accounts.

This Makes It Critical that You Protect Yourself

Whether you’re talking about your business or your personal life, QR code scams need to be avoided. Fortunately, there are a few somewhat familiar steps that you can follow to help ensure that you do so:

  • Just like with other forms of phishing, any suspicious QR codes should prompt you to separately reach out to the party that supposedly shared it to confirm its legitimacy.
  • Similarly, don’t hesitate to manually seek out what a QR code seems to offer.
  • Using the security tools at your disposal, like antivirus or scam alert applications, to mitigate the risks associated with these scams helps protect you from falling victim to these attacks.

Coleman Technologies is here to help protect your business from all types of threats, like this one and others. Give us a call at (604) 513-9428 to learn more about what we can do for you.

Continue reading

The State of the Internet in a Pandemic


A Look at the Numbers

Before the pandemic hit, it was believed that roughly 5.2 percent of Americans worked out of their home. That’s about 8 million people, and that number is fairly recent, from 2017. By the end of 2019, we can estimate it was maybe between 5.5 percent to 6 percent.

We can simplify this and say one out of every 20 American workers worked from home before the pandemic.

According to the Bureau of Labor Statistics, only a mere 29% of Americans can actually work from home. That takes into consideration jobs that simply require a person to be at the workplace, like many in the food industry, delivery, construction and many more.

At the time of writing this, I have yet to find solid statistics for the number of Americans working from home right now, but there is a general consensus that it’s somewhere around one in five to one in three. 

That falls right in line with what the Bureau of Labor Statistics shows, and we’re talking about the whole of the United States - things are going to feel different in different states and different areas.

How is the Internet Holding Up?

Back on topic, up to a third of all workers are now doing their jobs from home, plus kids of all ages are taking classes and doing their homework online, on top of the normal traffic that we see everyday. I’m talking about Netflix and other streaming services, online video games, YouTube and social media; all of these services are seeing a huge swing in traffic as more people are stuck at home.

Netflix’s usage, which is normally about 15% of all global Internet traffic, has hit all-time highs, and ISPs are seeing record-breaking amounts of Internet traffic all in all. Thankfully, many ISPs and mobile carriers have loosened or temporarily lifted data caps that would have otherwise caused massive expenses for users trying to work from home (Interestingly, these data caps were supposedly in place to ensure the service functions well. It turns out that in general, the service can still work as intended without them. Let’s hope service providers don’t revert back to the old ways after all this is over).

All that said, it’s not perfect for everyone. Rural users with limited access to broadband are still struggling, and in larger, more populated areas where the infrastructure might be a little older have been bumping into frustrating downtime. Still, all in all, a large part of our workforce is able to get things done effectively while maintaining quarantine, and that’s huge.

Cybersecurity is More Important Than Ever

Here’s the thing; being able to stay in business and keep your customers happy and your employees safe during this trying time is a big deal. That said, you can’t do all of that without also understanding the additional risks you might be opening up to. This isn’t meant to sound like doom and gloom - I want businesses to survive and strive. I want to hear success stories. I want business owners coming out of this with a new perspective on how they operate their business, trust their employees, and bolster their bottom line.

This could be a renaissance for the modern office, shifting the paradigm to normalize a remote workforce. Suddenly, you have fewer expenses, happier employees, and everyone can wear comfy pants more often. Or, maybe we’ll all decide we miss working together in the office so much and never look back. Either way, I digress...

Your business might not be able to see how this all turns out if you don’t secure all those new endpoints. Everyone who is working from home on a personal device just opened up a new weakness in your IT’s armor, especially if you aren’t providing the proper means of accessing company data and applications.

Ensuring that your users are able to work securely is going to be critical, because the last thing you need to deal with is additional downtime or data breaches.

Coleman Technologies can help review your needs and provide the right solutions to ensure your remote workforce can effectively do their jobs without risking your data. If you need help or advice, give us a call at (604) 513-9428 to get started.

Continue reading

How Internet Speeds Have Changed




How Internet Speeds Have Changed

The Internet is used for a great many things in business nowadays, but some may not realize just how much Internet speeds have changed over time. This week, we thought we would take a brief look at the evolution of Internet speeds and what today’s speeds allow businesses to do. 

Before we get started it’s important to understand how internet speeds are measured. The speeds are measured in megabits. 1,000 kilobits (technically 1,024 KB) is equivalent to 1 megabit and 1,000 megabits (technically 1,024 MB) is equivalent to 1 gigabit. 

Dial Up

It has only been about 25 years since Internet connections have become commonplace in the office and the home. When the Internet was first introduced to the mass market, the main way people would access the web was through their phones. If you were on the Internet in the 1990s, people would often have one telephone line for both home and their computer. As the now antiquated model of telephone long distance was in place, many people would have to pay huge phone bills because their Internet service provider was accessed through a long distance call (even if that call was to the next village over or in the same city). 

The typical modem around the year 2000 was 56 KB/s which means that when the modem is working optimally with an uninterrupted signal, a one megabyte file could be downloaded in about 20 seconds. Obviously, those speeds wouldn’t work in today’s mobile world where people are getting over 10 GB/s in some places. This connection made instant messaging possible, but any media—including all the media we take for granted today—would take days and weeks to transmit over a dial-up connection.

DSL

Around the turn of the century “high-speed” Internet became popular. Using cable connections, ISPs were able to transmit data much more effectively. This is because the bandwidth of a cable wire has substantially more data transmission capabilities than a telephone wire. Called a Digital Subscriber Line (DSL) connection, this is, to this day, the lion’s share of the connections that you will find available. A DSL connection delivers internet at speeds up to around 100 MB/s but it’s more known to sit in the 5 MB-to-20 MB range. 

In this range, users can do a lot of more complex tasks. Today’s cloud-hosted email services require these speeds as do music streaming services and solid website browsing. The widespread use of DSL around 2010 began to spur on application development that is a major part of today’s computing ecosystems. While video streaming is relatively new—and resource intensive—standard definition video (think early YouTube) is capable through a DSL connection.

Fiber Optic

Many of today’s high speed connections are run through fiber optic cables. Fiber optics uses light to transmit data, making it much faster than DSL connections. Most DSL cable systems would lose speed and performance the longer a signal would have to travel through wires. With fiber optics, however, Internet speeds and bandwidth grow exponentially. Today, there are fiber connections that are capable of tens of gigabits per second. 

With mobile computing growing in popularity every year, and more and more people relying on Wi-Fi signals to keep from going over mobile data caps, people now rely on these faster internet speeds. Fiber has created an environment of innovation that is driving the on demand computing resources that businesses and individuals rely on. This has made mobile computing more possible and has fueled the work-from-home revolution, online schooling, real-time data collection, telehealth, and communication and collaboration tools including video conferencing. 

If you want to quickly determine what your current internet speed is, you can use any number of speed test applications that are available. A good standard is https://www.speedtest.net/. These will give you an idea of what your current internet speed for downloads and uploads are. If you need help ascertaining what type of speeds you need for your business, you should contact the IT professionals at Coleman Technologies today at (604) 513-9428. 

There are further innovations in the works that will push Internet speeds faster and faster, with less latency. This type of technology can completely revolutionize the way we view the world. In this new digital landscape, expect to see more and more work to be done on this front in the near future.

Continue reading

These Link Checking Tools Might Save Your Bacon




These Link Checking Tools Might Save Your Bacon

We often talk about scams and cyberthreats, and lately our advice for dealing with a potential phishing threat is to simply avoid it altogether.

That is, when you get any kind of email or text message with a link you weren’t expecting, whether it’s from someone you know or from your bank, just don’t click it. Instead, log into the account in question the way you normally would, and verify the information there, or confirm with the sender through some other means to make sure what they are sending is valid. While this is still a good practice, sometimes you need to click on a link. Here are a few tools you can use to check if a link is safe, before you click.

Why Would a Link Be Dangerous?

First of all, why wouldn’t you want to trust a link that someone you trust sends you?

There are a lot of reasons. Even if it looks like a video message from your dear sweet Nana, or a virtual Christmas card from your youngest niece, there is a chance that the sender has been compromised and is trying to spoof their contacts. 

You want to know when it’s probably not a scam or a threat? When your dear sweet Nana or your niece calls you up on the phone and asks you to look at it.

That simple two-step confirmation makes all the difference in the world. Otherwise, you should consider the risks that maybe, just maybe, the sender was compromised and that the link you are being sent is malicious.

The same goes for the business end of things. 

Your coworker, business partner, vendor, or client might have no reason to do anything malevolent to you. If they fall for a trick themselves, though, a part of that trick might include spreading to all of their contacts.

A malicious link could contain malware that infects your computer, tries to steal your data or access your online accounts, and also spreads itself as quickly as possible to anyone in your contacts list. Not only will you be the victim, but your friends, family, and colleagues will be YOUR victim, and so-forth.

How to Safely Identify and Copy a Link

Before we get into the tools, let’s quickly run through what we mean by a link.

Basically, any text or graphic that is clickable and takes you to another page in your browser is a link. Sometimes, that link will be written out, with the https:// and the full URL. 

For example, if it is a link to PayPal, it might look something like this: https://www.paypal.com/us/smarthelp/PAYPAL_HELP_GUIDE/getting-started-with-paypal-icf29 

Links could also just be text that is clickable. So instead of writing out the URL, the link might be something like this: Get Started with PayPal

Now here’s the thing. If you’ve been paying attention, we’ve already proven to you just how easy it is to trick a user into thinking they are going to one website, and taking them somewhere totally different. Both of the links above don’t actually go to PayPal. We assure you that they are safe, but they are taking you to goofy fake mustache glasses on Amazon.

Sometimes, links are graphics, like buttons, icons, pictures, or virtually anything else. If you can click or tap it and have it take you somewhere, it’s a link, and any links can be spoofed very easily.

If you want to tell where a link is going to take you, you need to copy the actual link:

 On a Desktop or Laptop:
-Hover the mouse over the link.
-Right-click on the link.
-Select “Copy Link” or “Copy Link Address” or “Copy Hyperlink”

Now you have the link copied, and you can paste it into one of the following tools with CTRL+V (or right-click and select Paste)

On a Tablet or Smartphone:
-Be careful not to accidentally just tap the link to open it!
-Hold your finger over the link for a few seconds to pop up the context menu.
-Select “Copy Link” or “Copy link address” or “Copy Hyperlink”

Now that you have the link copied, you can paste it into one of the following tools by holding your finger down over the URL field within the tool and selecting Paste.

Safely Check a Link Before You Click it with These Tools

You can use the following tools to check the safety and legitimacy of a link. Keep in mind, this won’t protect you from one hundred percent of all scams, as these tools can only check for known threats. It’s also a good idea to use multiple tools to cross reference, in case some of the tools just haven’t been made aware of the link you received.

Use Norton Safe Web to Check a Link
Norton Safe Web is a free online tool that lets you paste a link to check to see if it’s safe.

It will give you a quick rating on the link. If the link is untested in Norton, it’s a good idea to try a few of the other tools. If Norton states the link is dangerous, it’s a pretty safe bet you should avoid it.

https://safeweb.norton.com/

Check the Link With PhishTank
The cleverly named PhishTank site will tell you if a link you received has been reported as a phishing scam. Phishing links tend to look pretty similar to legitimate web pages. For instance, a phishing link for PayPal might look almost exactly like the regular login page for PayPal. The problem is that it won’t log you into PayPal, but it will send your PayPal credentials to someone else.

https://www.phishtank.com/

Google’s Transparency Report Might Tell You If a Link is Unsafe
Google’s search engine works by crawling the Internet and indexing everything it finds. Sometimes, it might run across dangerous content such as malware or phishing risks. Google’s Transparency Report tool will tell you if a link you’ve been sent is found in their massive database of unsafe content.

https://transparencyreport.google.com/safe-browsing/search

Scan the Link with VirusTotal
Finally, there’s VirusTotal. This tool takes a little longer to give you an answer, but it can be a little more thorough than the others. This is a good last-ditch effort if you aren’t happy with the results from the other tools. 

https://www.virustotal.com/gui/home/url

It’s important to keep in mind that a phishing scam or malware attack could still sneak through these tools, especially if the URL was just generated and you are among the first people to get it. These tools are designed to spot known phishing attacks and malware that has already been reported. With that in mind, it’s still a good idea to err on the side of caution.

If you feel like you’ve received a suspicious email, text message, or other correspondence, and you would like us to take a look for you, don’t hesitate to reach out to us at (604) 513-9428.

Continue reading

Tip of the Week: Making Use of Chrome Actions


Introducing Chrome Actions

Chrome Actions take the familiar address bar of the Chrome Internet browser and add some extra utility to it. Rather than specifying a webpage or network location to visit in the address bar (known as the “omnibar” to very few of us), Chrome now accepts very basic commands as input, and will follow these commands when they are entered.


For instance, opening a window in Incognito mode is as easy as simply typing “incognito” into the address bar.

 


As of yet, there are a few Chrome Actions that have been implemented:

  • Clear Browsing Data - type ‘delete history’, ‘clear cache ‘ or ‘wipe cookies’
  • Manage Payment Methods - type ‘edit credit card’ or ‘update card info’
  • Open Incognito Window - type ‘launch incognito mode‘ or ‘incognito’
  • Manage Passwords - type ‘edit passwords’ or ‘update credentials’
  • Update Chrome - type ‘update browser’ or ‘update google chrome’
  • Translate Page - type ‘ translate this’ or ‘ translate this page’

Of course, they come with the promise of more being added in future updates.

Is This Something You See Yourself Using?

Leave your thoughts in the comments and tell us why or why not. For more information and assistance pertaining to your business’ IT, give us a call at (604) 513-9428.

Continue reading

Looking Back at ARPANET


DoD Advanced Research

During the Cold War there was a constant need for coded systems to transmit data quickly. In the mid-1960s, the U.S. Department of Defense created what they called the Advanced Research Projects Agency (ARPA), which worked on integrating new technologies that would help the United States achieve its foreign policy goals. One of the scientists that was commissioned was Joseph Lickliter, who had the idea of connecting computers at important research centers. It was a way for engineers and intellectuals to collaborate on DoD-funded projects. The network, called ARPANET, was launched in 1969.

At first, growth was slow. Small packets were sent over telephone lines, but along the way there were many innovations that set the tone for the shared computing constructs that we regularly use today. One such innovation was packet-switching. Packet-switching allows a computer to connect to several other computers at once by sending individual packets of information. In this way, computers were able to constantly send and receive information. With this method each computer on ARPANET would have (what amounts to) an address book that is constantly updated. 

As the network grew, however, this packet switching model, which was beneficial, was just too slow to facilitate an accurate account of addresses on the system. So in 1973, the engineers at ARPA decided that Stanford University (a founding member) would keep a master address book that was kept up to date by network administrators. This decongested the network significantly.

By 1977, ARPANET had over 100 computers connected to it; and, with the age of personal computing starting to rear its head, changes started to come fast. It was about this time that other computing networks began to pop up. As they first started to connect with each other there was no interoperability between them, but this problem was remedied early in the 1980s with the standardization of what is called Transmission Control Protocol/Internet Protocol (TCP/IP). This was the first time the world Internet was used. 

ARPA engineers realized pretty quickly that the connecting networks that were now using the same protocol set (TCP/IP) were too numerous and were going to be unmanageable. This is when the modern Domain Name System (DNS) was introduced. They separated all addresses by domains. The first level, or top-level, domains would dictate the type of organization that a packet was being sent to. Examples include .com and .edu. Today, there are over 1,000 top-level domains out there. 

A second-level domain provided the host where data packets would be delivered. Examples that you see today are amazon.com or cornell.edu. This system provided specific data packet routing, setting the stage for the modern-day Internet. 

The Internet

By the late 1980s the DoD decided that ARPANET was a success and shut it down. It was handed off to a private company called NSFNET in 1990. In 1992, the modern Internet Service Provider (ISP) was created as the U.S. Congress passed a law allowing commercial traffic on the newly formed Internet. 

Nowadays, the United Nations has proclaimed that Internet service is now a fundamental human right. This marvel of human ingenuity would not have been possible without ARPA and ARPANET. If you would like to see more articles about technology’s history, subscribe to the Coleman Technologies blog today.

Continue reading

Tip of the Week: Specifying Your Google Queries


Improving Your Google Queries

-

If you want to tell Google to omit certain potential results from your search, you can use the hyphen/subtraction mark to define what you don’t want considered.

For example, if you were in the market for improved seating for your workplace, you could search for computer chairs and eliminate any designed for gaming purposes by searching for computer chair -gaming.

()

Adding a parenthetical allows you to set a prerequisite for your search results. Basically, by including a term in parenthesis, you’re instructing Google to only return results for the rest of the search if they relate to that term.

So, if you were specifically looking for IT services around British Columbia, you could type in (IT services) British Columbia.

Of course, by being on our blog, you’ve pretty much skipped that step, already!

site:

Let’s say that you were looking for something that you were confident that you could find on a specific website. Perhaps you had even found it before but hadn’t been able to locate it again since. Adding the site tag into your Google search instructs Google to zero in on a particular website as it looks for your search term.

So, let’s say you wanted to know more about business continuity. To find that information, you could input business continuity site: www.colemantechnologies.com. Google will promptly deliver the links you’re looking for.

filetype:

Maybe you’re looking for a specific kind of file, like a JPEG or a PDF. Inputting your search terms and adding filetype:jpeg or filetype:pdf will only produce results that feature the designated file format.

intext:

Have you ever encountered one of those moments where you can remember an exact quote from somewhere, but you can’t remember where you read it to save your life? Google offers a feature that can work with that. Searching for intext:, followed by that particular phrase, will instruct Google to look at in-page text to find it.

Which of these Google tricks were new to you? Are there any that you see being particularly useful? Make sure you subscribe to our blog for more handy tips, and for any of your specific IT support and service needs, give Coleman Technologies a call at (604) 513-9428.

Continue reading

Tip of the Week: Bandwidth Questions


What is Bandwidth?
In its most basic form, bandwidth is how quickly you can download content from the Internet. Bandwidth is measured in megabits per second, or Mbps. The more bandwidth you have, the faster downloads will run. Some high-speed connections can be measured in Gigabits per second.

How Exactly Does Bandwidth Translate to Download Speed?
If you’re trying to calculate your projected download speed, keep in mind that there are eight bits for every byte. This means that if you’re trying to download eight megabytes of data on a one Mbps connection, it will take about one minute. A 512 megabyte file, on the other hand, would take just over a hour to download on the same connection.

Estimating Your Business’ Needs
In order to reach an appropriate estimate for your business’ bandwidth, you’ll need to use a little math. Take the estimated traffic that you expect each of your processes to take up, as well as the number of users that are engaged in this process. You’ll want to assume that this is during peak operations; otherwise you might not have enough during an important operational period. You can generally rely on the following speeds for bandwidth estimation:

  • 100Kbps and below: Low-end, single-line VoIP phones and e-fax machines. Some more basic computers have processes that use less than 100Kbps, but in the business world, you probably aren’t using them.
  • 100-500Kbps: More computers and laptops fall into this range, as they are more likely to be the ones streaming, downloading, emailing, and browsing than other less intensive devices.
  • 500Kbps-2.0Mbps: Cloud solutions and standard definition video conferencing take up about this much bandwidth. This is the general range for Enterprise Resource Planning solutions, Customer Relationship Management platforms, and Point of Sale devices.
  • 2.0Mbps and more: High-definition conferencing solutions, remote access, heavy cloud access, and other resource-intensive tasks fall under this category.

If you keep peak activities at the top of your mind, use them to add up what your staff will need to stay on task and ahead of schedule. For example, let’s say you have ten users, including yourself. You might be using 450Kbps for correspondence, while six of your employees are using a CRM solution at 2.0Mbps each. The last three are using high-definition video conferencing software for 2.5Mbps each. Add all this up and you can expect to use about 20Mbps at heaviest use, but you want to go a little beyond this to 25Mbps, just to be safe.

What are other tips that you might want us to share? Leave us a comment and let us know.

Continue reading

Tip of the Week: Fixing a Slow Internet Connection


You Don’t Have Enough Bandwidth

When you purchase an Internet package, you get certain speeds. Today, these speeds are faster than ever, but if your business has too much going on, it can wreak havoc with your Internet speeds. There is a situation that happens when too much data is trying to pass through a network connection. This situation is called bottlenecking and it is potentially the reason your speeds are slow. Think about it, if you try to put several gigabytes through a connection that is only rated for a few megabits per second, it’s going to take some time to get all the data through. To check this, audit how many devices are at work. Most of the time you’ll be surprised how much data you are sending and receiving. We can help you with this audit before you make the call to upgrade your Internet package.

Outdated Equipment

Another potential issue is that your networking equipment may simply be old and not be able to use the dual bands that are often necessary to get the most out of your wireless network. If you have enough bandwidth, but your Internet is just slow, chances are upgrading the modem, switches, or routers would be a prudent move and will likely fix any problems you have. 

Misconfigured Equipment and Environmental Factors

Once you’ve made sure that the physical components of your network are working as intended, but your Internet connection isn’t improving, you probably need to reconfigure your software on your devices or move your hardware to avoid interference. Specifically, if your wireless network signal is having problems making it through obstructions, you will want to consider using the 2.4 GHz connection rather than the 5.0 GHz channel. The max speed you’ll see will decrease, but the 2.4 GHz connection makes its way through obstructions better. Unfortunately, however, the 2.4 GHz signal can be a victim of electronic interference more than the 5.0 GHz channel. 

If you need help with your business’ networking, don’t wait and lose more money. Contact the professionals at Coleman Technologies today at (604) 513-9428.

Continue reading

What Does Internet Rights Advocacy Mean?


Initially, the advocacy of Internet Rights was just that: the right to have access to the Internet. While this isn’t a problem for as many people as it once was, some places still don’t have fair, affordable access to high-speed Internet service. Some nations, despite providing access, have Internet laws that subdue use due to an overlaying censorship. This issue, and the monetization of collected consumer data, are two of the hot-button issues today for Internet Rights advocates.

Lead Up

The Internet is a relatively new technology, especially in the manner it is being used by people today. As a result, there are different views on how these technologies are disseminated, who profits from them, and how non-controlling entities have their rights repressed. As a result, you’ll find from the early days of Internet rights advocacy, the largest voices were from organizations that found the equitable portion of the Internet either unnecessary or repressive to the rights of consumers.

Notice that the access to the Internet was not even on the roadmap. The nature of the early commercial Internet was such that it could be successfully described as libertarian. Through the end of the 1990s, as the first round of dot com investments started to tank, it became obvious that the technology would end up bigger than anyone had anticipated and needed regulation.

In the U.S. many fights have been undertaken in the subsequent 20 years. Many of which were pushed by Internet rights advocates. One of the most famous is:

Reno v. American Civil Liberties Union (1997)

In an attempt to clean up what some people considered indecent content on the Internet (pornography and the like); and more accurately, to keep kids away from this content, Congress passed the Communications Decency Act. The ALCU, which is a well-known civil rights advocate group, filed suit. The provision was eliminated by two federal judges before being heard in front of the Supreme Court, which upheld the lower courts’ rulings. This was a major blow against censorship; paving the way for free expression on the Internet.

While the ALCU isn’t exactly an Internet Rights Advocate, the landmark case ushered in a new world of free speech on the Internet; and, it sets the tone for Internet rights advocates to this day.

Personal Privacy

Today there are many organizations looking to protect people on the Internet. Sometimes their views overlap, sometimes they don’t. One of these groups, the Electronic Frontier Foundation (EFF), is a major player in the fight to keep speech (and content) free from censorship on the Internet, the fight against the surveillance state, and most notably, the ongoing fight for individual privacy.

Businesses of all kinds, as well as government agencies have grown to take significant liberties with people’s personal information. Organizations like the ALCU and the EEF work tirelessly to get the topic of personal data privacy in front of decision makers.

Have you ever wondered how you just had a conversation with your friend via some type of app about fingerless gloves and now your sidebar on every website is now filled with fingerless glove ads? Most users don’t fully understand that organizations that you interact with online keep a profile on you. All of your actions, any personal or financial information that you share, and more is stored in a file that is often packaged and sold off by those organizations to advertising firms.

These advocates, among the other issues they stand up for, are trying to push the issue of personal data privacy. The main point of contention is that companies profit off of the information people provide, and since this information is very clearly personal in nature, it is their belief that individuals are being taken advantage of. This debate has been ratcheted up significantly with the European Union’s General Data Protection Regulation (GDPR) that intends to protect individual information.

While it might be a matter of time before the U.S. gets a data privacy law in the same vein as the GDPR, Internet rights advocates will continue to act in the public’s favor on this issue, and many others.

Net Neutrality & Access to All

One of the biggest fights that Internet rights advocates are undertaking is against the companies that deliver the Internet itself: The Internet service providers (ISP). For those of you who don’t know, over the past several years the U.S. Government created mandates that forced ISPs to provide access to applications and content without favoring any, even if they are the ones that use the most bandwidth.

The theory is that the typical Internet user only does so much on the web. They typically access the same sites and use their Internet connection for the same things. This creates a situation where ISPs, using market adjustments would want to get more money per byte than if users used a variety of sites to do the same. With federal control, they were forced into charging a flat rate.

The net neutrality laws that were instituted in 2015 were repealed in 2017, as controlling bureaucrats argued that there were enough people without fair access to the Internet and the only way to persuade the ISPs to commit to investing in infrastructure that would curb this problem is by repealing the net neutrality laws. Needless to say, this caused quite a stir.

Internet rights advocates were quick to point out investment in Infrastructure is in these ISP’s best interest and giving them the ability to slow down Internet speeds as they see fit is not good for consumers. Unfortunately for most Americans, these ISPs are the companies you have to get your Internet service from if you want speeds that allow you to use it the way you want. Advocates are still trying to do what they can to educate people about the benefits of net neutrality and have set up websites with information and for people to give their support. Organizations like the aforementioned ACLU and EFF,  the American Library Association, and Fight for the Future, Demand Progress, and Free Press Action currently sponsor www.battleforthenet.com, a one-stop site for all things net neutrality.

Advocacy can go a long way toward giving a voice to people who may not think they have one. What Internet-related topics do you find to be problematic? Leave your thoughts in the comments and subscribe to our blog.

Continue reading

The Most Dangerous Things to Search for on Google




The Most Dangerous Things to Search for on Google

The Internet is pretty great. You can watch videos of cats being weird, and then watch the London Philharmonic Orchestra perform Stravinsky’s Rite of Spring. Then you can go on Reddit and learn how to replace the drywall in your bathroom. Just another typical Sunday afternoon with the Internet, right? 

Unfortunately, the Internet isn’t always perfect. It can be pretty dangerous, and we’d like to share some surprising terms that can lead to dangerous websites and malware if you search for them on Google.

Quick disclaimer: None of these topics are necessarily dangerous on their own, and there is bound to be a lot of great, wholesome and family-friendly content about each of these terms out there on the Internet. That being said, we’re going to explore how these terms ended up being so dangerous to show you why you, your family, and your coworkers should be careful online.

Threats Lurk Beyond Innocent Family-Friendly Topics

A lot of the things that kids really enjoy are often targeted. Cybercriminals know that a child might not be as well-versed in cybersecurity as an adult, so if they can spread malware to kids doing innocent searches for shows and movies, they will.

According to Home Security Heroes, an organization dedicated to helping families stay safe online, over half of the search results for terms like “The Boss Baby,” “Sonic the Hedgehog,” and “Pokémon” could lead to malware or other online threats.

Video game-related search terms like “Animal Crossing: New Horizons” carries a pretty strong risk of malware as well, with 46 percent of the results containing malware-infected domains. This is a cute game where players move onto an island and make friends with talking dogs, frogs, and other adorable animals and give each other gifts. The content of the game itself is extremely kid-friendly, but websites offering guides or illegal downloads of the game could be dangerous.

The Most Dangerous Celebrities to Search For

Several years ago, long before the pandemic, Emma Watson was one of the most dangerous celebrities to Google search, with a shocking number of websites having links to malware or other potential threats. 

Today, the prom king and queen of dangerous search results go to the fabulous Chris Hemsworth and Anne Hathaway—so the mighty Thor and 2012’s Catwoman for the comic book nerds out there. Interestingly enough, Chris Hemsworth and Anne Hathaway were set to star in a movie together back in 2013 called Robopocalypse, but it doesn’t seem to have come to fruition.

To no fault of their own, these two celebrities suffer from a similar affliction to the family-friendly movies above, but an estimated 75 percent of the search results for their names potentially contain harmful content or malware.

Other actors and actresses like Kaley Cuoco, Olivia Rodrigo, Neil Patrick Harris, Chris Pine, Chris Evans, Chris Pratt, and Zendaya also have a ton of risky search results.

But We Can’t Ignore the Queen

She’s always having her best year ever, and is loved and adored by fans of all ages. Yes, we’re talking about the infamous Taylor Swift. Tay-tay, or T-Swizzle, or Queen America herself might be one of the greatest musical icons of our time, but a whopping 79 percent of her search results are potentially dangerous.

That doesn’t mean you can’t search for her and find safe content, but it does mean that there are thousands of websites out there that are trying to trick users into reading up on the brightest star in the music industry, only to infect your computer with malware or steal your personal information.

If you are a little more old school, the Backstreet Boys are right behind her with 76% of their results being sketchy and potentially dangerous.

The Huntsman Spider

What’s bigger than your hand, has eight legs, and eats mice?

You don’t really want to know, but it’s the huntsman spider.

We’re not sure what percentage of websites about this horrific monstrosity have malware; in fact, Googling it is probably a lot safer for your computer than searching for Chris Pratt. Still, these spiders are huge and anyone without ironclad constitutions should probably avoid giving themselves nightmares and not go down that rabbit hole.

All Joking Aside, the Internet Can Be a Dangerous Place

There is a lot of great information and opportunities on the Internet, but there are plenty of people trying to take advantage of everyone else as well. In order to protect yourself, you need to have the proper security measures in place, including antivirus and anti-malware. Your organization needs to be monitoring your endpoints and security, and equip your network with firewalls and security policies that keep your employees and customers safe.

If you want help securing your business, give us a call at (604) 513-9428.

Continue reading

Your (Far From Comprehensive) Guide to Google’s Secrets and Easter Eggs




Your (Far From Comprehensive) Guide to Google’s Secrets and Easter Eggs

Since its domain was first registered on September 15, 1997, Google has exploded from a relatively simple search engine to the massive assortment of platforms and services that fall under the Alphabet umbrella. That being said, most people tend to think of very specific aspects of Google’s Search function… like the amusing Easter Eggs that the platform has become somewhat famous for.

Let’s explore some of the many, many jokes and entertaining features that Google has added to Search over the years. Who knows, you might find out about a new favorite.

Full Disclaimer: Google Has WAY Too Many Easter Eggs to Cover Here Comprehensively

Honestly, this shouldn’t come as much of a surprise. With these Easter eggs first being secreted into Google’s assorted offerings back in 2000, the sheer volume of these hidden features has grown to be truly significant. Plus, some of them are no longer active, being tied to a specific day or event—for example, the search for “2/22/22” made the phrase “Happy Twosday 2You!” appear on that day, but no longer. 

Others have been rendered inoperable with Google’s shift to an infinite scroll format, rather than pages, as the “Goooo…gle” indicator housed many of these Easter eggs as well.

Many, many of them, however, are still active, with more being added all the time… just do a quick search for “Barbie” for a practical example of how up-to-date these Easter eggs are kept. So, let’s explore some that are (as of this writing) still active.

A Tiny Sample of Google’s Easter Eggs

  • Searching for “dvd screensaver” will cause the Google logo in the top left corner to begin bouncing around the screen, changing colors as it goes, similarly to—you guessed it—the screensaver that DVD players would display after remaining idle for too long.
  • Searching for “text adventure” and then using the Ctrl+Shift+J shortcut to open the developers console will give you access to a Google-themed text-based adventure game, where you set out in search of the letters in the word “Google.” As a bonus Easter egg within an Easter egg, responding “no” to the introductory prompt “would you like to play a game” produces a reference to the 1983 movie WarGames.
  • Searching for “puppy/puppies/dog/canine” or “kitten/cat” will produce a button that, when clicked, will cause a paw belonging to the corresponding animal to swipe up and leave a paw print behind.
  • Searching for “define anagram” asks you if you meant to search for “nerd fame again,” which itself is an anagram of “define anagram.”
  • Searching for “pi” will produce the Google calculator with the pi symbol prominent. Clicking it will start a memory game that takes the player through the digits of pi.
  • Searching for “meteor shower” will darken the screen momentarily as three meteors pass by, shifting back to the way it was once they have passed.
  • Searching for “netwon/Isaac Newton” will produce a button with an apple tree on it, which causes an apple to fall down the screen when clicked, just as the legend goes about how the physicist conceptualized the theory of gravity.
  • Searching for “han/greedo shot first” will show the alternate result, posed as a “Did you mean” at the top of the screen. 
  • Searching for “the one ring” will ask if you meant “my precioussss,” in a nod to Gollum from The Lord of the Rings.
  • Searching for “world’s best boss” will ask “Did you mean Michael Scott” as a reference to Steve Carell’s character from The Office.
  • Searching for “breathing exercise” will pull up a functional breathing exercise that you can follow along with.
  • Searching for “pac-man/google pacman/play pacman” will pull up a functioning game of Pac-Man with a board designed around the Google logo. 
  • Searching for “the answer to the ultimate question of life the universe and everything" brings up the Google Calculator, presenting the answer “42.” This is a reference to the Douglas Adams novel The Hitchhiker’s Guide to the Galaxy, and has been around since the first Easter eggs were developed—even predating the calculator feature it now appears in. 

When We Said This Was a Tiny Sample, We Meant It

There are dozens more Easter eggs to have fun with, and we encourage you to seek them out and see what the developers at Google do in between major projects to keep themselves sharp. If you find a fun one, be sure to let us know when you call us to learn more about our managed services!

Continue reading

Colleges Have a Lot of Data to Protect


Birth of the Internet

The first Internet was born on college campuses. It was built by intellectuals, for academics, without the massive list of considerations that now accompany software development. It spread quickly, of course, and somewhere, pretty early on, it was decided that by being able to support commerce, the Internet could become one of the west’s greatest inventions.

This came to fruition in 1984 when the first catalogue was launched on the Internet. This was followed by the first e-store (at books.com) in 1992, and the first software to be sold online (Ipswitch IMail Server) in 1994. Amazon and eBay launched the following year and the Internet has never been the same.

By then, the academic uses for the Internet had multiplied, as well. By the time Amazon launched, many colleges and universities were offering students access to the Internet as an important part of their continuing education. Boy, was it ever.

Today, you’ll be hard pressed to find a classroom (outside of the poorest school districts in the country) where every classroom isn’t Internet-ready.

College Internet Needs and Cybersecurity

This stands true in university and college circles, as well. Campuses today are almost completely connected. You’ll be hard pressed to find a place on a modern campus that, as long as you have security credentials to do so, you can’t gain access to an Internet connection. In a lot of ways, it is the demand for access that makes network security a major pain point for the modern college. Firstly, having to protect computing networks from a continuously variable amount of mobile devices is difficult. Secondly, the same attacks that plague businesses, are also hindering IT administrator efforts at colleges.

Colleges themselves aren’t doing anyone any favors. According to a 2018 report, none of the top 10 computer science degrees in the United States require a cybersecurity course to graduate. Of the top 50 computer science programs listed by Business Insider only three require some type of cybersecurity course. Moreover, only one school out of 122 reviewed by Business Insider requires the completion of three or more cybersecurity courses, the University of Alabama. Regardless of the metric, it’s clear that learning cybersecurity is not a priority for any school.

Are There Cybersecurity Problems Specific to Colleges?

The short answer is no. That’s why it's so important to get people thinking about cybersecurity any way they can. No industry can afford to have the skills gap between people that hack and the people looking to stop them grow any wider. This is why, no matter what you do (or plan on doing) for a living it’s important to understand what your responsibilities are and how to get them into a place that can help your organization ward off these threats from outside (and sometimes inside) your network.

Many colleges have turned to companies like Cyber Degrees to help them not only educate the people utilizing the college’s networks to why cybersecurity awareness is important, but also help people understand that with the rise of cybercrime and hacking-induced malware, that cybersecurity has become a major growth industry with many facets. In 2015, the Bureau of Labor Statistics found there were more than 200,000 unfilled cybersecurity jobs in the U.S. With curriculums not prioritizing cybersecurity, and with threats growing rapidly, imagine how many are unfilled today. As demand rises for competent individuals to fill a multitude of jobs in the computer-security industry, colleges need to do a better job prioritizing cybersecurity training.

For the business looking into protecting itself, look no further than the cybersecurity professionals at Coleman Technologies. Our knowledgeable technicians work with today’s business technology day-in and day-out and know all the industry’s best practices on how to keep you and your staff working productively, while limiting your exposure to risk. Call us today at (604) 513-9428 to learn more.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

20178 96 Ave C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am–5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image