Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Tax Season Cybersecurity for White Rock BC Businesses: That CRA Email Isn't From the CRA

coleman-technologies-blog-tax-cybersecurity

Right now, across British Columbia, businesses are pulling together T4s, financial statements, and sensitive payroll data. Cybercriminals know this, and they’re counting on it. Tax season cybersecurity for White Rock BC businesses has never been more critical, especially when the Canadian Anti-Fraud Centre reports that only 5% to 10% of all fraud and cybercrime incidents in Canada are ever reported. The other 90% to 95%? Those victims stay silent, making the problem look far smaller than it actually is.

Continue reading

Efficiency is Often the Silent Enemy of Security

Efficiency is Often the Silent Enemy of Security

In every office, there is a hero. They are the ones who clear their inbox before they leave, manage five Slack threads simultaneously, and pride themselves on a five-minute response time. We value these people because they make things happen. Unfortunately, that same high-speed, can-do attitude is exactly what hackers are looking for.

Continue reading

How to Not Tank Your Cognitive ROI

How to Not Tank Your Cognitive ROI

Have you ever reached for your phone to check a quick notification, only to look up forty minutes later feeling drained, agitated, and behind on your schedule? For a business owner, this is more than just a bad habit, it’s a thief. While you are busy protecting your revenue and managing your team, these habits serve as an invisible tax on your focus. 

Continue reading

Why Percussive Maintenance is Killing Your Technology

Why Percussive Maintenance is Killing Your Technology

We’ve all been there: the Wi-Fi drops during a high-stakes meeting, or the TV remote ignores your commands for the tenth time. In a moment of pure frustration, you give the device a love tap, and—as if by magic—it starts working again.

Whether you call it percussive maintenance or just asserting dominance, that physical jab feels like a victory. While that slap might provide a temporary fix, you’re actually playing a high-stakes game of planned obsolescence.

Continue reading

Are Your Team Members Too Afraid to Do Their Jobs?

Are Your Team Members Too Afraid to Do Their Jobs?

We’ve all been there. You’re flying through your inbox, trying to reach inbox zero before a meeting, and you click a link in a shipping notification. The page doesn't load quite right. You stare blankly and your anxiety spikes.

That moment happens a lot and it is a fork in the road for your company’s security. In many organizations, that employee’s next thought isn’t: “I should report this,” it is: “If I tell anyone, I’m going to get fired.”

Continue reading

Who's Pulling the Strings? Understanding and Fighting the Digital Algorithm

Who's Pulling the Strings? Understanding and Fighting the Digital Algorithm

You've heard the grumbling, seen the memes, and probably even felt it yourself: that vague, all-powerful entity known as the algorithm. It's blamed for everything from political polarization to your inexplicable obsession with people eating military rations. What exactly is it, and what digital giants are pulling its strings?

Continue reading

Don’t Fall for These BYOD Dangers

Don’t Fall for These BYOD Dangers

Bring Your Own Device (BYOD) is a solution that has grown more popular over the past decade or so, primarily because more employees already own devices capable of running work-related applications. The employee gets to use a device they already know and love, while the employer saves money from the cost of equipping that employee. That said, the security risks associated with BYOD can undermine an ill-prepared implementation and open the door to potential legal action.

Continue reading

How to Make Sure Updates and Patches Don’t Create More Problems

How to Make Sure Updates and Patches Don’t Create More Problems

If you want your devices to keep running smoothly, including utility and security, you need to ensure they are updated. Updates sometimes cause problems beyond what they solve, however. What looks like a routine patch or update could impact your important applications, and if you’re not careful, you could potentially cause a downtime scenario simply by being proactive with your updates.

Continue reading

The 3-Legged Stool That Is Business IT Security

The 3-Legged Stool That Is Business IT Security

In a lot of ways, your business’ IT is just like a chair; you want it to feel stable, steady, and secure, not unbalanced and unsteady. In particular, a reliable security strategy depends on three legs: your people, your processes, and your technology. Let’s look at how you can use this “stool” approach to IT security to improve your company’s resiliency to potential threats.

Continue reading

Most of Cloud Security Boils Down to the Provider (But Not All)

Most of Cloud Security Boils Down to the Provider (But Not All)

We often publish articles about the cloud and how it’s impacting the world of business, but one thing you can never get away from is how important security is to this mission. Regardless of the use, the cloud is only helpful if it’s secure, and it can actively hold your business back if you neglect this important aspect of its operations.

Continue reading

This Is Why You Can’t Rely on Local Backups

This Is Why You Can’t Rely on Local Backups

A backup is mandatory for any business, but not all backups are the same. You’ll want to be prepared for more than just a simple server crash; you’ll need geographical redundancy that can protect your business even in the face of disasters that destroy your servers or physical location. Yes, local backups are helpful, but you’ll need the power of geographical redundancy to overcome the most horrific disasters that could strike your business.

Continue reading

Growth By Acquisition Can Be Smart, but Watch Out for IT Traps

Growth By Acquisition Can Be Smart, but Watch Out for IT Traps

Acquiring a competitor can be a rewarding and profitable move, but it's crucial to inspect their technology to avoid any unwelcome surprises. A thorough IT audit helps you understand what you're getting and prevents a valuable investment from becoming a money pit. Let’s take a look at some of the things you need to assess before agreeing to take on growth through an acquisition.

Continue reading

What to Do in the First 60 Minutes of a Cyberattack

What to Do in the First 60 Minutes of a Cyberattack

Cyberattacks are not to be underestimated. The damage that they can do—even in the first hours—is considerable. This means you need to have a strategy to respond to these incidents, conveniently called an incident response plan.

This procedure should be both tested and documented, preparing you to withstand any cyberattack with minimal damage or disruption. As you might expect, the first hour or so will be a crucial period during this process. Let’s go over what you need to do.

Continue reading

Don’t Listen to These Tech Myths

Don’t Listen to These Tech Myths

Reliable IT advice is hard to come by, especially for cybersecurity. Whether it's uninformed coworkers or fake online influencers with their guides and platforms, most advice you find these days is bound to be outdated, incorrect, or both. You don’t want to base your business’ security around security myths, so we’re here to bust them today and offer you some guidance you can trust.

Continue reading

Three Simple IT Habits That Will Immediately Improve Your Workday

Three Simple IT Habits That Will Immediately Improve Your Workday

Take it from us: technology, for all its benefits, can be frustrating.

That being said, it can bring a lot of value to your business when implemented and maintained properly. 

Let’s talk about some quick habits you can deploy to make your workday much easier when working with business technology.

Continue reading

3 Common Causes of Data Breaches (And How to Avoid Them)

3 Common Causes of Data Breaches (And How to Avoid Them)

Data breaches are no joke, and they can be so severe that businesses have a hard time bouncing back. Despite the danger, you can somewhat predict when you are at risk of a data breach, and certain actions can be taken to keep them from being fatal (or prevent them entirely). Today, we want to examine three of the common ways data breaches happen and what you can do about them.

Continue reading

The Next Time You Get Frustrated with IT, Remember This

The Next Time You Get Frustrated with IT, Remember This

It’s easy to let issues with your technology cause productivity to crash and burn, especially when you’re in the thick of a major project or a complex task. Frustration is all too common in the office, especially where technology is concerned, but it doesn’t have to ruin your day or kill your productivity. Today, we want to discuss how maintaining your composure is the best way to address these issues.

Continue reading

The 5 Key Components of a Successful Security Strategy

The 5 Key Components of a Successful Security Strategy

Your business’ security infrastructure does a lot of heavy lifting, primarily due to today’s increasingly sophisticated cybersecurity threats. Companies want to know that their security measures work. To help you make sure you’re doing all you can to protect your infrastructure, we’ve put together five important components for any successful cybersecurity solution strategy.

Continue reading

Tip of the Week: How to Use Presenter View for Presentations

Tip of the Week: How to Use Presenter View for Presentations

If you’re worried about presentation anxiety, or if you’ve ever experienced dry mouth, sweaty palms, or a sudden loss for words while on the spot, then you’ll be happy to know about some of the options available in modern presentation tools. One in particular, Presenter View, comes to mind, and it’s a great way to kick presentation anxiety to the curb. We’ll go over how to use Presenter View in Microsoft PowerPoint and Google Slides.

Continue reading

The Real Talk About Data Backup

The Real Talk About Data Backup

We need to talk about something that is as exciting as watching water boil, but it might just save your entire business one day: backing up your data.

I know, I know. You're busy doing your thing, closing deals, and you’re busy. The last thing on your mind is where your files are outside of your server. The truth is, it’s not very interesting, but it sure is important.

Continue reading

About Coleman Technologies

Coleman Technologies is a managed IT and cybersecurity partner for growing businesses that can’t afford downtime, breaches, or guesswork. For over 25 years, we’ve helped organizations across British Columbia run stable, secure, and scalable technology environments—backed by 24/7 support, enterprise-grade security, and clear accountability. We don’t just fix IT problems. We take ownership of them.

get a free quote

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

20178 96 Ave C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am–5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image