Award-Winning IT Services Backed by 25 Years of Experience – (604) 513-9428

Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Tip of the Week: Phishing Attacks at Home

You would think that since millions of phishing attacks are ignored, set to spam, and actively mitigated each month, that there wouldn’t be such a desperate effort to educate people about the signs of phishing attacks, but the fact remains that it only takes one successful phishing attack to compromise an entire workstation, network, or computing infrastructure. 

Today, everyone that works for your company will need to be able to spot and report a phishing attack. Doing so can sometimes be extremely difficult if the spammer does his/her homework. Consider using and teaching these tips to keep your business from being a victim of a phishing attack.

Continue reading

Tip of the Week: Eight Ways to Optimize Remote Productivity

Set Some Boundaries

Establish a Workspace

One of the first things that you should do when adopting a remote work approach is to give yourself guidelines. It can be immensely helpful to establish a set place to do your work, and equip it appropriately with minimal distractions. As a general rule, it is best if this area is not in the bedroom, or any area in your living space that you typically spend your recreational time. This will help you to keep up your focus throughout the day.

Continue reading

Tip of the Week: Using Microsoft Word Templates

In actuality, you’ve used a template every time you’ve opened a Microsoft Word document… the Normal template. However, you may want to use a different template to meet your different needs. If that’s the case, you’ll need to adjust some settings as you create your document.

As you select New from the File tab, you will be presented with a few options. One of them will be Blank document, but you also have the opportunity to utilize a huge variety of other templates that can be found in the application and then downloaded. Once you have done so, select your chosen template and your new document will be generated with that template’s contents. These can include:

  • Boilerplate text
  • Styles
  • Images and logos
  • Table of contents
  • Sections that split the document into different parts, with appropriate numbering
  • Table and chart boilerplates

Of course, this isn’t a comprehensive list of your options. Feel free to explore the different templates and their options to see all that these documents can do.

Once you have a few templates downloaded, you can even edit them to better fit your needs. To do so, all you need to do is open the template you want to edit (File>Open>This PC>My Documents>Open) and make your desired changes. Once that’s done, just Save and Close.

Why Bother with Templates at All?

There are a few advantages to using templates that you should see significant benefits from, such as:

  1. Templates can be shared amongst your staff and unify your business’ style.
  2. Templates can be used to make forms much easier (and less expensive) to reproduce.
  3. Templates can reference your other applications to simplify additional tasks.
  4. Templates allow you to quickly reformat your documents if need be.

So, do you think you’ll do any investigating into templates in the future? Why or why not? Let us know in the comments, and let us know what other tips you would find helpful!

Continue reading

Tip of the Week: 5 Ways to Maximize Productivity, According to Experts

Two-Hour Solution

Roger Seip, author of Train Your Brain for Success, took a proactive and prepared look at productivity by developing his Two-Hour Solution. The idea is to take two hours to plan out a schedule to follow each week, based on how your plans and goals culminated the week before. Investing this time should allow you to make the most of your available time to accomplish what you want to accomplish.

The reason that this is different than simply going over your calendar each week is the fact that, if guided by the Two-Hour Solution, you’re figuring out how the time you’re spending contributes to your goals. “Green time” is time that helps you generate financial capital, while your “red time” is the time that you spend preparing for green time, without generating any profit. To account for the wrench in the works that would ordinarily throw off your schedule, you also include “flex time” to provide a buffer. What’s left is your “re-creation” time, where you recover from your productive endeavors by doing the things you want to do.

Prioritizing

Steven Covey is an educator and a businessman who came up with a philosophy to living a full life that can also apply to life in the office.

Consider your big priorities, your more flexible responsibilities, and your rote tasks in the workplace as large rocks, smaller stones, and sand, respectively. Your time is a bucket, ready to be filled with these items as you see fit.

Let’s say you decide to start with the “sand,” before trying to cram in the “rocks” and “stones.” Chances are pretty good that you won’t be able to accomplish very much at all, at least nothing of any circumstance. However, if you prioritize the more impactful rocks, then the stones, and fill in the rest of the space with your sand, your bucket—or workday—is then used as productively as possible, and anything you didn’t get to complete isn’t of consequence.

Two-Minute Rule

While there are countless variables that can potentially influence the amount of time a task will take to complete, you eventually get a feeling for the typical duration, right? So, some tasks can predictably take a significant amount of time, while others take almost no time at all to make it through. The idea of the Two-Minute Rule, thought up by productivity consultant David Allen, takes advantage of that difference. His strategy: if a task will take two minutes or less, do it.

If that seems too simple, it kind of is. The philosophy behind the Two-Minute Rule is to build up your motivation to tackle the larger responsibilities by successfully completing smaller tasks. Think about it—every task, regardless of how large it is, can be broken into smaller, more manageable chunks, chunks that can take mere minutes to complete. Once you’ve completed enough of these two-minute tasks, it only makes sense to see the greater responsibility through… and with the progress you’ve already made supporting you, completing it seems that much more feasable. 

The Blastoff Method

Entrepreneur and motivational speaker Mel Robbins devised this practice to help overcome the mental blocks that encourage us to procrastinate rather than doing things that are good for us. Robbins posits that, by hesitating, we put the brain into “protection” mode—by thinking about everything that needs to be done between point A and point B, your brain ultimately prevents you from doing what you need to do. However, if that hesitation can be avoided, your productivity (or, by Robbins’ original theory, your well-being) will see benefits.

Her solution is to close the gap that hesitation creates between your capability to do a task and your perception of that task. Her recommendation is to, quite literally, treat yourself like a rocket and count down to your action. Focus on counting down…5,4,3,2,1… and act immediately, before your thoughts get in the way.

Scientifically, by doing so, you are bypassing a behavioral process and resetting an established habit loop… allowing better, more productive habits to be created instead. Give it a try next time you encounter a task you want to avoid starting.

Create a Time Crunch

We’ll wrap up with another method that Roger Seip came up with. If you really feel you work better on a deadline, add a bit of a hurdle as you are scheduling your “green time” … give yourself less time than you think you’ll need. The pressure can help you to focus. Naturally, you need to avoid any flex time you have assigned for this to work.

What methods do you use to keep yourself focused and productive? Do any of these approaches sound like something you want to try? Let us know in the comments!

For the technology solutions that can also help you improve your practical productivity, talk to us! Give us a call at (604) 513-9428 to discuss your options.

Continue reading

Tip of the Week: Fixing a Slow Internet Connection

You Don’t Have Enough Bandwidth

When you purchase an Internet package, you get certain speeds. Today, these speeds are faster than ever, but if your business has too much going on, it can wreak havoc with your Internet speeds. There is a situation that happens when too much data is trying to pass through a network connection. This situation is called bottlenecking and it is potentially the reason your speeds are slow. Think about it, if you try to put several gigabytes through a connection that is only rated for a few megabits per second, it’s going to take some time to get all the data through. To check this, audit how many devices are at work. Most of the time you’ll be surprised how much data you are sending and receiving. We can help you with this audit before you make the call to upgrade your Internet package.

Outdated Equipment

Another potential issue is that your networking equipment may simply be old and not be able to use the dual bands that are often necessary to get the most out of your wireless network. If you have enough bandwidth, but your Internet is just slow, chances are upgrading the modem, switches, or routers would be a prudent move and will likely fix any problems you have. 

Misconfigured Equipment and Environmental Factors

Once you’ve made sure that the physical components of your network are working as intended, but your Internet connection isn’t improving, you probably need to reconfigure your software on your devices or move your hardware to avoid interference. Specifically, if your wireless network signal is having problems making it through obstructions, you will want to consider using the 2.4 GHz connection rather than the 5.0 GHz channel. The max speed you’ll see will decrease, but the 2.4 GHz connection makes its way through obstructions better. Unfortunately, however, the 2.4 GHz signal can be a victim of electronic interference more than the 5.0 GHz channel. 

If you need help with your business’ networking, don’t wait and lose more money. Contact the professionals at Coleman Technologies today at (604) 513-9428.

Continue reading

Tip of the Week: Four Fundamental Small Business Tech Tips

1. Adopt Technology Solutions

Regardless of your industry, who your business serves, or even where you operate, there are some universal changes that technology has brought to how the average small-to-medium-sized business functions. Methods of collaboration have shifted to digital formats, “coming to work” is no longer a prerequisite to working, and the filing cabinet has been rendered woefully obsolete by other, better options. Cloud solutions are a major contributor to this. I want you to take a moment and consider something: why were any of these changes made in the first place?

It is for the same reason that the assembly line process was adopted, or why we cook our food before eating it: it provides greater benefits than the old way. It is the same with business technology, and you will see this as a common theme throughout these tips. Don’t disqualify yourself from competing by removing your ability to do so.

2. Don’t Shortchange Email

Email is now the gold standard for business communications, for numerous reasons. While a small business might find it redundant to email an announcement, doing so can prove useful to their operations. For instance, let’s say Mary manages a small office with four or five employees. She could easily just announce an important message to the room, but what if James was at the dentist that day, or Rob had excused himself to the bathroom just before? What if Ellen had just connected for an important phone call?

Email provides an easy way for you to communicate with others in your workplace that ensures everyone gets the message, without disrupting operations too much.

3. Go Mobile

While we’re on the subject, let’s consider Ellen for a moment. In the past, making a phone call would tie her to her desk, so any distractions in the office would be an unavoidable issue. Nowadays, there are many ways that Ellen could hypothetically remove herself from the situation while still fulfilling her responsibilities. For instance, a Voice over Internet Protocol solution could allow her to make and take calls from anywhere she could establish a connection, so she could presumably find a quieter area to work without sacrificing her ability to do so.

Other solutions also offer some form of mobility, assuming they are backed up with enough security. For instance, if James was unable to get to the office after his dental appointment, he could still work on his assigned tasks from home with the right cloud-based solutions.  Again, this helps eliminate his reliance upon getting to the office in order to produce.

4. Don’t Underestimate the Cloud

We’ve already touched upon how the cloud has shifted businesses, primarily focusing on how useful it is for hosting and storing data. However, this isn’t the only thing the cloud can do. Cloud technology enables today’s businesses to make use of tools that would ordinarily be out of reach. Yes, its storage capabilities can help make data more accessible to team members who need it, but it can also assist you in preserving your data in case of some disaster, give you access to computing resources that you couldn’t procure yourself, and provide you flexible access to your business applications.

5. Improve Your Security

A small business’ size once protected it from cybercrime, but nowadays, all businesses are fair game. In order to remain secure against these attacks, the right defenses need to be put in place. Things like firewalls, spam blockers, antivirus, and assorted other solutions help to reduce these risks. Additionally, any employee could potentially let in a significant threat, so all need to be educated on how to spot them, and the proper procedures to dealing with them.

Coleman Technologies is here to assist you in implementing these modern IT essentials, as well as maintaining them for you through our remote monitoring and access capabilities. To learn more about how else we can help your growing business, give us a call at (604) 513-9428.

Continue reading

Tip of the Week: How to Avoid Phishing Scams

What Exactly Is Phishing?

The practice of phishing is not new. It has been used for much of the past decade. The strategy goes like this: hackers use deception to get a user to provide their own credentials, thus giving them unknowingly to the hacker. The hacker then accesses the account legitimately (as the user) and has free reign over the entire account. Sometimes they will go in and siphon data and sometimes they will hijack the entire account, but regardless of the hacker’s intentions a successful phishing attack is a successful transfer of power over an account. 

What’s worse is that you can get phished in multiple mediums. Email is the predominant channel where phishing attacks are carried out, but people can (and do) get phished over social media, instant message, or via text message. There are even phone-based or snail mail phishing attacks that direct users to go to a fake website where they would provide their credentials and/or personal information. 

There are even different forms of phishing based on their intended targets. The general strategy behind traditional phishing attacks is to send emails out to as many people as possible, hoping to snare unwitting recipients into their phishing nets. Today, with more personal information available about people, there is phishing that targets individual people. This is called a spear phishing attack. Then there are spear phishing attacks that are carried out against business and organizational leaders. These are called whaling attacks. The intended imagery aside, phishing attacks are getting more direct, more deceitful, and more serious. 

Spotting Phishing

For all of the bad news surrounding phishing attacks, there is some undeniably good news: with a critical eye, you can tell when you are being phished. You aren’t going to fall for these types of attacks if you know what to look for. Today, we’ve put together a short guide on how to determine if you are dealing with a phishing attack and how to proceed when you are.

Look for Warning Signs

There are a litany of warning signs that will help you spot a phishing attack. Most of them are pretty obvious, and some of the more subdued ones come with telltale signs. 

Does the message have spelling and grammar mistakes? 

Not many businesses will send out official correspondence with grammar and spelling mistakes. This should be the first sign that something is amiss. Most phishing messages come from supposedly-reputable organizations and while a spelling or grammar mistake does happen from time-to-time, several mistakes won’t happen.  

Does the message deal with curious circumstances? 

One of the biggest telltale signs that you are dealing with a phishing attack is the tone of the message that is received. Does the message reference immediate situations that need to be remedied? Does it mention money or illicit a sense of fear or anxiety? If it has these elements, it’s probably not legitimate. Think about it: most organizations that need you to act immediately will have specific ways of contacting you and that correspondence will make it clear that you are dealing with a legitimate organization.

Does this message have a trusted URL?

Most phishing attacks will redirect to a website that is set up by the hacker. You probably shouldn’t be clicking on any links sent to you in an email unless you are sure who sent the email. One way to determine whether or not a link is from a reputable source is to mouse over the link and see where the link goes. If you get an email from Amazon and the link goes to amazorn.com, you are staring at a phishing email.

Protecting Your Assets

There are a couple simple ways to ensure that you or a member of your staff doesn’t fall for phishing attacks:

  • Use technology. A spam blocking filter on your email will go a long way towards removing unnecessary and potentially-malicious emails from hitting employee inboxes in the first place.

  • Training. Make sure your employees are trained to spot and properly handle attempts that may come through. By starting with the end user, you’re taking away a lot of the power that phishing has.

At Coleman Technologies, we appreciate the importance of secure workplace practices. If you’d like to learn more about phishing, and how we can help stop it from hurting your business, reach out to us at (604) 513-9428.

Continue reading

Tip of the Week: Making Microsoft OneDrive Work for You

For context, it helps to know that Microsoft OneDrive is a cloud storage platform that just about any business could make use of, regardless of its size. After all, any size of business will have to remain organized.

Speaking of which, our first tip covers how OneDrive can make this organization super convenient for you.

OneDrive Files On-Demand

Files On-Demand gives your users the ability to effectively link their File Explorer to OneDrive, which enables them to work with files found in your OneDrive without downloading all of them to their device. Not only does this save real estate in the device’s storage, it allows work to continue offline through a simple proactive switch in a particular file’s settings.

Known Folder Move

OneDrive can also work as a simple backup option, although it certainly should not replace a comprehensive plan. Regardless, Known Folder Move allows users to have the contents of certain folders automatically synchronize with their OneDrive storage. This can be set up during the initial installation of OneDrive, or at any time you have need for it.

Integration with Microsoft Outlook

Consider what typically happens when you try to share some kind of Office document as an email attachment for someone to work on: you aren’t sending them access to your file, you’re simply sending them their own copy. OneDrive fixes that by enabling a user to share their files as though they were attachments, editing the permissions provided on the fly. As a result, the actual file is being collaborated on, really allowing work to be done.

What has been your experience using OneDrive? Share your impressions, as well as any other questions we can help with, in the comments!

Continue reading

Tip of the Week: Why Rebooting Can Fix so Many Problems

There are countless examples of IT turning to a reboot as a quick fix for technology issues in popular culture. Going back to August 4, 1999, Scott Adams’ syndicated comic strip Dilbert featured Dogbert working in tech support, interrupting a caller with the instruction to “Shut up and reboot.” The Channel 4 comedy, The IT Crowd, turned it into a catchphrase for one of its characters…

The joke has appeared in countless other places, including Supernatural, the long-running show that airs on The CW…

Even South Park used the concept as a joke, as Kyle effectively saves the world after the Internet stops by traveling to the “center of the Internet” and discovering that it is a giant router. I bet you can guess how Kyle fixes it:

As it turns out, this trope really is an example of art imitating life.

Why is Rebooting So Effective?

Well, let’s consider how much you actually do with your computer (or your mobile device, or your router, or your washing machine, or anything else that now has its own operating system) on a regular basis.

You start processes, you may install new programs, and that’s not even considering the massive amount of computing that goes on behind the scenes. A lot of these processes and activities will start things up in the background that are never really resolved, which means that your system resources are being used up. This usually has the biggest impact on your Random Access Memory, or RAM. Ultimately, your solutions aren’t able to work effectively any longer, and you see the effects.

However, rebooting inherently ends all of these processes, as they all require power in order to work. As a result, once the computer starts back up again, these processes are no longer running and impacting your system’s resources.

As a result, you have a better-working computer, and the IT stereotype is proven correct.

Keep in mind: if an issue seems to come back and persist despite a reboot (or multiple reboots) you likely have a bigger problem at hand. If this is the case, you can always lean on the professionals at Coleman Technologies to assist you with your technology.

Just don’t be surprised if we ask a particular question.

Subscribe to our blog for more great tips, IT tricks, and best practices!

Continue reading

Tip of the Week: How to Restore Your Android Apps and Settings

Even if you aren’t planning on replacing your phone soon, it may make sense to pay attention here, as this process will also make it easier to restore your data to a new phone if needed. Either way, this process is much easier if you make some proactive preparations on your current phone.

Enabling the Native Android Backup Capabilities 

The first step is to make sure that your current phone has the backup service running. It can be found in your Settings, under System. Tap the Backup option, and check to see that the option to Back up to Google Drive is selected. If it isn’t, do so.

Now you have a copy of your current phone’s configuration to restore from, which you can do from the initial configuration of your new device. If you were using the Google Now or Pixel Launcher, even your backgrounds, icons, and folder structure is saved.

During setup, hit the Let’s Go button that appears at the welcome screen. Tap Copy your data, and connect to Wi-Fi.

Now, you’ll be presented with your restoration options. Since we just went over how to save a backup in the cloud, let go with the option to use A backup from the cloud. You’ll be prompted to sign into your Google account, and to agree to Google’s Terms of Service.

From the list of backup options, select the correct one. You can easily hit Restore to recover all of your previous device’s settings and data, and can select which apps to reinstall via Apps.

As your data is pulled over, you will be guided through the rest of the setup process.

Voila! Your new phone is now equipped with your selected tools and settings, ready for you to jump right back in. For more handy tips, make sure you subscribe to our blog!

Continue reading

Tip of the Week: Working with PDF Files

Rotate the Document

It is very easy to accidentally scan a document into your computer so that it doesn’t appear upright on your display. A program like Adobe Acrobat Pro offers an in-menu option that allows you to do just that - in Document, find Rotate Pages. This option will allow you to select the pages that need to be rotated, and how to rotate them. Other programs may feature a toolbar button that allows you to rotate each page.

Fixing your pages, despite taking a few moments of time, is certainly a worthwhile thing to do, as it makes the document easier to read, promoting accuracy and convenience.

Password Protecting the Document

As long as the person or people who need to see a particular PDF have the proper password, protecting the document in question with a password is a generally good idea - especially if it contains “for your eyes only” information. To make these files as secure as possible, make sure that the passwords are distributed through secure means.

In Word, you can save your files as a PDF using the “Save as” function, simply selecting the PDF option as you do so. You will also see a button offering More options, which brings up a second dialogue box where you can find “encrypt document with a password” in that box’s Options button. By selecting encrypt document with a password, you will have the option to provide a password (and confirm it). At that point, anyone opening the PDF will need to enter that password to view it.

Merging PDF Files

It isn’t uncommon for different parts of the same document to be saved as different PDF files, or for multiple copies to be saved with different information filled in. It is usually better to have all of this information consolidated, to make reviewing it much easier. While many free and paid software titles can allow you to do this, you should reach out to us before you select one, as we can help you make the right choice for your needs - you probably don’t want the program’s watermark on your finished document, or find yourself needing to merge more documents than a free program will allow.

If you’ve already acquired Adobe Acrobat, merging your files is fairly simple. After opening the program, access the Tools menu and select Combine files. Doing so will give you the ability to Add Files… and once you have selected all of the files that should create your new PDF, click Combine. Once they are combined, clicking Save as will allow you to store it where it belongs.

Signing a PDF

Many times, a contract that needs to be signed will arrive as a PDF. While many resort to printing these documents out to sign them, there is an easier way - signing them electronically.

This time, the free Adobe Reader software can get the job done, but you should still check with your IT resource before using it.

If Adobe Reader is approved and installed by IT, you can easily sign PDFs electronically. By opening the PDF file with Reader, you have access to a Fill & Sign button. Click it, then Sign and Add signature. You’ll then have access to three options:

  • Type - you simply type your name into the field, and an electronic signature is rendered (which will not look like yours).
  • Draw - you use your mouse to draw out your signature.
  • Image - you use a scanned image of your actual signature that is then saved for future use.

Once you’ve positioned your signature where it should be, click apply and make sure you save your revised PDF.

Always remember to check with your IT team before you download any software! For more IT tips and other useful pieces, make sure you subscribe to our blog!

Continue reading

Tip of the Week: 3 Signs of a Phishing Attempt

1. There’s an Unexpected Attachment or Link

It’s one thing to get an unexpected email from someone, it’s completely another thing entirely to get an email from someone that includes an unexpected attachment or link. Neither of these is a good thing. Attachments can easily contain hidden malware files, and links can be disguised with very little effort.

Don’t believe me? Try visiting google.com. Go ahead!

Not exactly what you were expecting, eh? Keep in mind that you can double-check links by hovering your cursor over them, and if you weren’t anticipating an attachment, don’t click it unless you have confirmed its legitimacy through some other means.

2. The Sender’s Email Seems Off

It isn’t uncommon for scammers to disguise a fraudulent email address by making it look at lot like a legitimate one would. For instance, let’s say that you normally worked with a business vendor, hypothetically named “Super Business Supplies.” A scammer might send you an email from “sales (at) superbusinessupplies.com.” Looks pretty okay, until you notice that there’s one fewer ‘s’ than there should be. Scammers can get downright devious with these replacements, replacing “Amazon” with “Arnazon” and other blink-and-you’ll-miss-it tricks.

In short, read carefully.

3. There are Other Questionable Elements

While that may be a very vague tip, it is only because there is such a wide variety of warning signs that an email is actually a phishing attempt. For instance:

  • Spelling and grammar errors. Look at it this way: would you anticipate a company like Microsoft, or Google, or the likes of such to send you an email riddled with mistakes? Of course not, so if you receive an email that purports to be from a company of high repute, but features these kinds of errors, red flags should be going up.

  • Time-sensitivity. One of a scammer’s go-to tools is to put their target off-balance, especially by pressuring them into immediate action. If you receive an email that offers you a great deal by acting right now, or threatens to shut down your account unless you act right now, the first thing you should do is pick up the phone and call up the organization or individual that sent the email.

  • Requests for personal information. Similarly to any messages that rely on cultivating a sense of urgency, you need to look at any emails that request personally identifiable information, access or financial credentials - really, any data that you and your company rely on - with a critical eye. This is another case where calling to confirm is probably your best bet.

Email can be an extremely helpful business tool, but it can also be an equally useful tool for cybercriminals looking to victimize your business. Coleman Technologies can help you secure it, with best practices and practical solutions to lock it down. To learn more, reach out to us at (604) 513-9428.

Continue reading

Tip of the Week: Tips to Help Manage Your IT Inventory Better

First, let’s delve into what ITAM actually covers.

Understanding ITAM

Consider all of the internal resources that your business uses, with the exception of your living, breathing employees. Everything that’s left can be considered an asset. ITAM narrows this down further into specifically the assets that pertain to your comprehensive IT infrastructure. This includes:

  • Hardware (like workstations, servers, printers, etc.)
  • Software (antivirus, productivity titles, etc.)
  • Any Peripherals (Keyboards, computer mice, other devices)

With these assets identified, ITAM assists you in tracking their purpose, how they interact, and other crucial details. This means, as you’ve likely realized, ITAM covers a considerable breadth of your resources, which makes it important that you keep it organized.

How ITAM Helps

A well-organized ITAM can help you save time and hassle by streamlining your processes, simply by keeping the data you need in a manageable and accessible record. As a result, you can make a variety of processes easier through improved data. This data can also help inform you of potential issues, or of the minimum requirements you have to meet to implement change.

Making the Most of ITAM

As promised, here are a few ways that you can optimize your use of IT asset management practices.

  • Make it a proactive process. Managing your technology assets needs to be something that you start before you are required to do so, and that isn’t abandoned after reaching a certain milestone. This will help keep you prepared for a wider range of circumstances.

  • Leverage automation. While Excel used to be an invaluable tool for asset management purposes, there are better options now that don’t require you to contend with spreadsheets that extend into the thousands of rows. Not only are automated solutions easier to manage, they come with a valuable set of added features to make your work life that much easier.

  • Track your assets. This one especially applies to your software. There is often a difference between what an agreement says can be deployed, and what can be deployed practically. Keeping your agreements and receipts helps you pass audits by proving compliance.

Coleman Technologies can assist you with your IT assets. To learn more, reach out to us at (604) 513-9428.

Continue reading

Tip of the Week: Helpful Outlook Tips

Consolidate Your Email with the Clean Up Tool

Businesses will often use email to communicate between groups of people, which is a really useful practice for keeping people apprised and in-the-know of what’s going on. However, these messages can quickly become repetitive, incoherent messes--especially in chains made up of larger groups--as participants reply to them, duplicating the thread within itself. Outlook includes a utility known as the Clean Up tool to fix these problems in your email conversations, and even in entire email folders.

By finding the Clean Up icon in the ribbon at the top of your Outlook window, you can access a drop-down menu. This menu offers to Clean Up Conversation, Clean Up Folder, or Clean Up Folder & Subfolders. Once you’ve confirmed your choice, you can access Clean Up settings, which allow you more granular control over how the tool sorts through your existing conversations.

Schedule Out a Message with Future Delivery

Sometimes you’ll have an opportune moment to send an email, but it isn’t the right time for this email to be received. For instance, if you want to share something with your employees to keep in mind throughout the next day, it doesn’t make sense to distribute it at the end of the day before for it to be forgotten. Outlook allows you to use your opportunity to your full advantage with Future Delivery.

Once you’ve written an email, click on Options, and then Delay Delivery. This opens a Properties box for that specific message, including Delivery Options that include a checkbox labeled “Do not deliver before.” Selecting this option and specifying a time and date will prevent your recipient from receiving your message before that point. Once you’re satisfied, close the Properties box and send the message just like any other.

Taking Advantage of Shortcuts

Keyboard shortcuts are used to simplify access to commonly-used functions in many computer programs and applications, and Outlook is no exception. For instance, Outlook features shortcuts for a wide range of its functionality - covering the basics (like composing a new message by pressing Ctrl+Shift+M), organizational tools (like moving a message with Ctrl+Shift+V) or annotating your messages (like adding flags to important ones with Ctrl+Shift+G).

This is really just the start of Outlook’s capabilities to help your operations. Subscribe to our blog to find out whenever we post other tips or IT blogs.

Continue reading

Tip of the Week: How to Control File Sharing in OneDrive

In OneDrive, a user can share a singular file or folder pretty easily. All they have to do is log in, right-click on the file/folder, and click Share.

Sharing this way allows a user to share their content with one of their contacts, send it to an email address, or copy a shareable link and send it along through an instant message or, again, and email. Doing so gives the recipient access to make edits to it by default, but the sender can restrict them to read-only access if desired.

However, you probably don’t want to micromanage your entire team to make sure they are sharing files and folders with people actually authorized to receive them. Fortunately, by using the global settings of OneDrive, you can take control past the file/folder basis to control how a user can share documents.

Controlling a User’s File Sharing in OneDrive

Assuming that you have administrative access over your OneDrive account, sign in by visiting https://admin.microsoft.com/ before proceeding with the following steps:

  •  Look for Admin centers on the left side of your display. Click SharePoint.
  • You should then be directed to the new SharePoint admin center. If you are brought to the old one, you can go to the new on by clicking on Open it now.
  • Again, on the left side of the screen, find Policies and click on Sharing.

Doing so means that you have edited the global settings, applying your changes to all accounts. To manage settings on a case-by-case basis, access Users, Active Users, and select the individual who you are attempting to manage. You should find a OneDrive tab, with adjustable Sharing options.

With privacy and security being so critical for contemporary businesses, you need to make sure you are doing everything you can to maintain control of your company’s information. Our security experts can help - reach out to us at (604) 513-9428 to get started.

Continue reading

Tip of the Week: Project Management Software

There are a lot of tools used to manage projects. Regardless of what platform your company uses, there are some simple, common sense practices your team can use to enhance its project management proficiency. Here are five:

Tip #1: Hash Out Details Before You Start

Sometimes getting a project off the ground is harder than actually completing it. Depending on the number of stakeholders involved, many projects may find it difficult to get off the ground. Ensuring that the project is viable, has the support it needs to come to fruition, and has the resources in place to be most efficiently implemented are important before a minute of work is done on the project.

You will want to identify what workers will be responsible for what work, while also doing your best to come up with a timeline for the project that will not waste resources.

Tip #2: Choose One Project Manager

Today, there are a lot of collaborative interfaces out there that make managing a project much, much easier. As a result, sometimes a project won’t have a single project lead, it will be carried out with a team approach. You may get through a project or two like this before it becomes painfully evident that there needs to be someone to run point on the project.

The role of project leader will cultivate positive team dynamics and act as a mentor to the rest of the team. Also, you just need one throat to choke when things aren’t done on time.

Tip #3: Define Specific Milestones

For any project, there will be benchmarks it will have to be met. As a project begins, defining the metrics that will have to be met will give any project team a good idea what the expectations are at the end of each phase of a project. By frequently checking in on the status of deliverables, the project manager can ensure that all elements of the product are aligned with what customers will invest in.

Tip #4: Manage Risk

Managing risk is important in any business endeavor. There will be times when, in the course of the phases of a project, where one will go horribly wrong and will put the entire project’s success at risk. One of the best ways to identify and manage risk is by keeping the lines of communication open. Most project management software provides options to communicate, whether they be integrated through an existing system, or if they are localized as a part of the software.

Tip #5: Evaluation

Through success (or failure), lessons can be learned from any project. By reviewing and scrutinizing every aspect of the project, you will get some fuel on how to improve your project management moving forward. Identifying what went right, what went wrong, and how they make up the final result. One way to ensure that a project was a complete success is to determine its return on investment (ROI). Often, project managers will provide a planned ROI to stakeholders at the beginning. By comparing the two after the end of the project, you can establish whether it had the value you were planning for.

At Coleman Technologies, our technicians thrive on project management. Whether it is running cable, building, testing, and deploying hardware, or simple proactive maintenance, we have an answer for all of your business’ computer problems. Call us at (604) 513-9428 to learn more.

Continue reading

Tip of the Week: Best Patch Management Practices

Create Procedures for Both Routine and Emergency Patches

Many patches are released on a predictable schedule, so as to make it easier to keep up on patches - after all, if you know that a patch is going to be released on a certain date, you can set aside time to apply that patch. There are also emergency patches that are released when a vulnerability is discovered and remediated.

As you might imagine, both are important to maintain - one, to keep your business as free as possible from vulnerabilities, and second (and perhaps more obviously), to keep your business secure in the face of an impending threat. That’s why you need to make sure you have set processes in place to ensure that all patches are tested and applied. While it may not always be a pressing security issue, it is better to be prepared for anything that the vendor is concerned about.

At Coleman Technologies, we always build out and update our procedure, and test updates before they are applied to prevent downtime and other issues. It’s all about working smarter, not harder.

Have a Controlled, but Realistic, Environment for Testing Purposes

Let me ask you a hypothetical question: someone comes up to you on the street and offers you a pill that would make you immune to the common cold, but with no peer reviews by any medical board or the FDA. So, do you take it?

I would hope you would say no, simply because you have no idea of the effectiveness of the pill without it having been tested. Patches are the same way. Without any testing, you simply don’t know how well the patch will work, or if it will interfere with another process. Before you apply any patches to your primary infrastructure, you need to have made these evaluations in a reasonable approximation of it. An effective means of doing so is to spin up a virtualized environment and stress-test the patch there, before actually applying it - just make sure you give your tests enough time to produce trustworthy results.

Keep Track of When Patches Are Released

Depending on the hardware and software you use, patches are going to be released on a different schedule. This is because different manufacturers and vendors manage their schedules differently. Just look at Microsoft and their famous Patch Tuesday (typically the second and sometimes the fourth Tuesday of each month). In order to properly keep your patches up-to-date, you need to know when to expect them.

For assistance with your business’ patch management, you can always turn to Coleman Technologies. Give our professionals a call at (604) 513-9428.

Continue reading

Tip of the Week: How to Get the Most from Your IT Budget

Leverage Automation

Answer me this: would you rather pay your staff to accomplish their responsibilities, or pay the same amount to have them work just as hard but only accomplish half as much?

That’s what I thought.

Automated solutions and processes can make your business far more efficient than it would be otherwise, simply because it makes it so your staff doesn’t have to take care of rote responsibilities and can instead focus on capital-generating endeavors. As a result, you can streamline how your dollars are spent, making more for a relatively small investment.

Ditch the Landline

Let’s face facts… all technology follows the same trajectory: it starts as an invention, is innovated upon, becomes the established norm, and is eventually phased out by the next invention. Alexander Graham Bell’s patent for the telephone is almost 150 years old - suggesting that it is high time for the next innovation to step into the fold.

In a large way, it already has, with Voice over Internet Protocol. VoIP leverages your business’ Internet connection to place calls, meaning you no longer have to pay the telephone company for service. Furthermore, it is far easier (and cheaper) to expand a VoIP solution, making it an even better option for a growing business.

Invest Wisely

When selecting a solution, there’s a lot to be said about seeking out a bargain. However, you need to lean more towards frugality, and less towards being miserly. A solution that you may have gotten for a considerable discount, but ultimately costs you three times its worth in maintenance and repairs can barely be called a solution at all. Furthermore, cheaper devices are often cheaper because the manufacturers skimped on key aspects, like performance, security, and durability. The same can often be said of emerging technologies - it is better to be late jumping on the bandwagon than it is to be in the front row when the whole thing crashes.

Coleman Technologies is here to guide you as you outfit your business with the technology solutions it needs for success. Give us a call at (604) 513-9428 to talk to our seasoned professionals.

Continue reading

Tip of the Week: Adding More Utility to the Windows Taskbar

Using the Taskbar to Highlight Folders

If you’re like most users today, a large amount of the work you are responsible for only requires you to access certain areas of the company’s storage, which can quickly make navigating there a frustrating inconvenience. Fortunately, there is a Taskbar feature that can streamline this process considerably.

You can add direct links to folders (and their contents) to the Taskbar.

Here’s how it’s done:

  • Right-click any unused space in the Taskbar to open a menu of options
  • Hover over Toolbars and select New toolbar…
  • Find your desired folder in the directory that appears, select it, and click Select Folder

That folder should now appear in your Taskbar, with a list of its contents quickly and easily accessible to you.

Using the Taskbar to Quickly Access Websites

If your responsibilities more frequently require you to be on the Internet, you might find it useful to have a quick-access URL field in your Taskbar, enabling you to skip the step where you have to open a browser before beginning to navigate to a site.

  • Again, access your Taskbar options by right-clicking in any unused space
  • Again, hover over Toolbars, this time selecting Address

A URL field will have appeared in your Taskbar. Typing a URL into it and pressing Enter will open that website in your default browser.

Would you like to learn more about what the Taskbar can do? Let us know in the comments!

Continue reading

Tip of the Week: Simple Windows 10 Tips

Shake to Minimize

Sometimes when you are working in any Windows platform, you will have too many windows open and you just want everything out of your face except the thing you are currently viewing. Well in Windows 10 there is a cool little feature you can use to make that happen very quickly. Just take your mouse (or your finger if you have a touchscreen) and click-and-hold the title bar of the app you are working in and shake it back and forth. This will minimize all other open applications. To get them back, simply repeat the action.

Choose Folders on Start Menu

The start menu is extremely useful in Windows 10, but sometimes it can get cluttered. To choose which folders you want to see on your Start Menu go to Settings > Personalization > Start then click on the “Choose which folders appear on Start” link at the bottom of the screen. From there you can toggle the folders you want to see in your Start menu. 

Find the Original Control Panel

The settings options in Windows 10 are far and away easier to use, but if you are one of those people that likes working with tools they know, the old Control Panel is still available in Windows 10 as it is still the go-to option for customizing advanced options. The easiest way to access the control panel is by clicking on the Cortana icon on the taskbar and typing in “control panel”. It will give you immediate access to all user settings. 

Selectively Sync Folders with OneDrive

One of the best parts of using Windows 10 is the integration with OneDrive cloud storage. Windows 10’s OneDrive integration provides users a lot of flexibility. To sync folders with data stored in OneDrive, make sure OneDrive is running and right-click on the OneDrive icon in the notification area. Select Settings and then navigate to the Account tab. Under the Account tab you will see the option to “Choose folders”. Click on choose folders and you will see a list of the folders you have in OneDrive, select the ones that you would like access to through Windows 10 and select OK. Now you have access to this data through your File Explorer in Windows 10.

Customize Your Application Notifications

Having too many notifications is one of the most frustrating parts of modern technology. To keep from being bogged down with too many notifications, you can customize which notifications you see in Windows 10. To do so, click on Start > Settings > System > Notifications & action. Once there all you have to do is scroll down and select the notifications you want on, and which ones would be better served not notifying you.

Windows 10 has hundreds of options for any user to customize their experience. Check back next week when we provide some more advanced tips on how to best experience the OS.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you didn’t know Windows can save a list of the text and images you copy, I feel for you—you’ve missed out on a simple trick that could’ve saved you a lot of time. But don’t worry, it’s easy to set up, and I’ll show you how.

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image