Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Why You Need to Keep Track of Your IT Infrastructure

Why You Need to Keep Track of Your IT Infrastructure

When taking stock of your business assets, technology is particularly critical to pay attention to. Let’s discuss why this is and what you must do to manage it properly.

0 Comments
Continue reading

USB-C? Thunderbolt? What Ports Should My New Laptop Have?

USB-C? Thunderbolt? What Ports Should My New Laptop Have?

We’re at a weird point in the technology world (but honestly, when is it not at least a little convoluted?). Right now, modern technology has been slowly shifting between a few different technologies and consumers and businesses are stuck in the middle trying to figure out what to do and how to future-proof their hardware investments.

0 Comments
Continue reading

Necessary Networking Tools You Need to Know

Necessary Networking Tools You Need to Know

Every organization, whether it’s a farm with a stable full of horses or an office with a stable filled with people, depends on its access to the Internet. Most people take for granted their ability to connect whether it be with their smartphone via Wi-Fi or their workstation, which is typically hardwired. There is a whole infrastructure behind the near ubiquitous Internet access you enjoy. Today, we will go through some of the essential hardware needed. 

0 Comments
Continue reading

How to Implement an Effective BYOD Policy

How to Implement an Effective BYOD Policy

Let’s face it; running a business can be expensive, and taking any measures possible to mitigate those costs can have huge benefits for your bottom line. One way companies are minimizing costs is by implementing a Bring Your Own Device policy, or BYOD, to allow employees to use their own personal devices for work purposes. We’re here to help you do so without putting security at risk.

0 Comments
Continue reading

ALERT: Dangerous Zero-Day Threats Found in Recent Samsung Chipsets

ALERT: Dangerous Zero-Day Threats Found in Recent Samsung Chipsets

Google’s Project Zero team has discovered 18 zero-day vulnerabilities impacting the Samsung Exynos modems—four of which enable remote code execution. Let’s talk about what this issue does, and what needs to be done to minimize risk.

0 Comments
Continue reading

Are Magnets Really Bad for a Computer?

Are Magnets Really Bad for a Computer?

Magnets are often portrayed as the bane of technology’s existence, especially in media where data must be scrubbed from devices through the use of a magnet. How true is this representation of the relationship between magnets and technology? We’ll examine this in today’s blog article.

0 Comments
Continue reading

The Rubber Ducky Hacking Tool is Back

The Rubber Ducky Hacking Tool is Back

For millions of people, the rubber ducky is a benign reminder of childhood. Depending on when you were a child, the rendition of Sesame Street’s Ernie singing “Rubber Duckie, you’re the one,” is ingrained in your mind every time you hear the term. Unfortunately, the Rubber Ducky we are going to tell you about today has only fond recollection for people who are looking to breach networks they aren’t authorized to access or deliver malware payloads that are designed to cause havoc. 

0 Comments
Continue reading

Don’t Know Where to Start? Three Places to Spend Your IT Dollars

Don’t Know Where to Start? Three Places to Spend Your IT Dollars

For years, IT has been at the forefront of business administration, productivity, communications, and many other parts of an organization's efficient operations. For the growing business it can be rather difficult to know where to invest your capital so that you can get the best ROI or the most value out of your IT investments. Let’s take a look at how the growing business can use their earmarked capital to improve their business.

0 Comments
Continue reading

How to Determine the Costs Associated with Your Printing

How to Determine the Costs Associated with Your Printing

Sad to say, but for the foreseeable future, cost control is going to be the number one priority for almost every business. With the impacts of the COVID-19 pandemic still lingering, and revenue streams interrupted, many businesses are still being extremely cautious with their capital. One place where most businesses can cut back is on printing. Let’s discuss how to cut your organization’s printing costs. 

0 Comments
Continue reading

How to Help Keep Your Mobile Devices Kicking for Longer

How to Help Keep Your Mobile Devices Kicking for Longer

It’s a common enough frustration—just as you really need it, your mobile device’s battery is on its last legs. This is something that we all would like to avoid if we could. That’s why we wanted to take the time to share a few ways to prolong your device’s battery life just a bit longer.

0 Comments
Continue reading

Is it Time for a Technology Upgrade?

Is it Time for a Technology Upgrade?

We live in an era of upgrades. Consider how often people upgrade their smartphone. Do you give the same care and attention to your business’ technology? Oftentimes users ignore the signs that it is time for an upgrade even when they are crystal clear, just saying to themselves, “I’ll get by just fine.”’ This is not the mentality that will help you move beyond your current productivity. You need to be able to identify when older devices are holding you back and take steps toward replacing them with better, more powerful ones.

0 Comments
Continue reading

Should You Use Wired or Wireless Connections?

Why a Hardwired Connection?

Security

The fact is that a direct connection is inherently more secure than one that is broadcast over the airwaves, as these have the potential to be snagged in transit much more easily. Therefore, if security is paramount, a wired connection is the better option by default. That said, there are ways to secure your wireless connection, utilizing a VPN.

0 Comments
Continue reading

Owning Technology is Like Owning a Pet

You Need to Take Care of It

When adopting a dog, you need to be prepared to invest a lot of time and money into your new family member. You’ll need to get her up to date on shots, get her a license, and invest in plenty of toys so she doesn’t chew on your furniture.

Any piece of technology you invest in works the same way. You need to ensure that you are willing to spend money for the infrastructure, the software licenses, the time it takes to run updates, and more. Here are some examples:

0 Comments
Continue reading

Storing Data Is More Complex than You Know

How Do Hard Drives Store Data?

A traditional mechanical hard drive, also known as an HDD, holds your data on small magnetic platters. These platters are layered on top of each other, with a small mechanical arm that rests above them. Think about a record player, with the arm and needle over the record, except you have many, many records stacked on top of each other.

0 Comments
Continue reading

You’d Be Surprised How Insecure Some Healthcare Providers Are

What is BlueKeep?

BlueKeep is a malware strain that was first discovered in May 2019, and was patched in short order to prevent it from becoming another situation like EternalBlue. EternalBlue was the exploit that allowed WannaCry to have such a considerable impact, especially on healthcare providers in the UK. Despite this precedent, however, many hospitals neglected to apply the necessary patches--and that isn’t even the worst part.

The worst part is that the three systems that BlueKeep impacts (Windows 7, Windows Server 2008, and Windows Server 2008 R2) share one thing in common: they have all passed their end-of-life date, and therefore no longer receive security updates.

This makes this situation a two-fold disaster. Not only have patches been released to mitigate BlueKeep, the systems affected by BlueKeep should not be in use anyways.

Of course, it only gets worse, and paints an unfortunate portrait of medical IT. A reported 22 percent of BlueKeep-vulnerable devices are yet unpatched. Worse, 45 percent of connected medical devices remain vulnerable, making things like x-rays, anesthesia machines, and other care-driven technology a risk to use.

Are you concerned about your organization’s technology?

Lean on the IT experts at Coleman Technologies for assistance. We can help any organization ensure that their technology won’t put their operations or their patrons in harm’s way. Learn more about what we can do by calling us at (604) 513-9428.

0 Comments
Continue reading

Is there a Difference Between Restarting and Just Turning It Off?

What’s the Difference Between the Shut Down and Restart Processes?

Before Windows 8, there was no difference whatsoever (aside from the obvious fact that Restart would start the device back up). This changed, however, with the introduction of Windows 8, and a new feature: Fast Startup.

Shut Down

Still present in Windows 10, Fast Startup shortens what was once a much longer start process after a user had clicked Shut Down.

While all a user’s files and programs are still shut down, the heart of the operating system is just put into standby mode. Please note that it does power down everything, unlike hibernate and standby. This makes it much easier for Windows to reactivate. However, since not all processes are completely stopped, present issues won’t be affected. Your problem will still be there the next time the workstation is turned on.

Restart

On the other hand, restarting the device actually does put a stop to all processes and resumes operations with a fresh boot on the motherboard level. This is why restarting your computer seems to take so long as compared to manually turning it off and on again.

So, the difference is really in the granularity of the shutdown process. Counterintuitively, “shutting down” a computer leaves more components active than a restart does, which is why restart is the process recommended when troubleshooting an issue.

So, while we may recommend that you “turn your computer off and on again,” or “reboot,” what we really mean is “restart your computer.”

For more assistance in dealing with pesky technology issues, lean on the managed services that Coleman Technologies provides. Learn more about what we offer by calling (604) 513-9428.

0 Comments
Continue reading

There’s Value in Outsourcing Your IT, Part V

Businesses Depend on IT

There are a lot of different pieces of technology that go into a business, and like a puzzle they all need to fit together and work. So where do all of these puzzle pieces come from? Let’s examine different types of technology.

Servers and Networking

Here are two scenarios, and the different methods businesses use to handle them:

Walter’s business is growing extremely quickly, but his servers are the same ones he’s been using for years. He realizes he is running low on storage space, and his increasing staff puts pressure on him to upgrade his server. Walter manages to cobb something together, hoping it will suffice for the time being. When Walter attempts to merge his servers into one slightly larger server, he misconfigured a few components resulting in downtime for his entire staff. Not only has he wasted his own time, but now he is experiencing the most expensive segment of downtime he has ever experienced. 

Jesse, on the other side of town, also is experiencing extraordinary growth. Jesse however, makes a simple phone call to his managed service provider. He is connected to a professional, who advises Jesse on server options that will sufficiently support his growing business. His managed service provider not only points him in the right direction, but also comes on site to install this new technology. Jesse knows he isn’t a tech know-it-all, so he leaves deployment of servers to the professionals. His business is ready for increased data storage that same week he decided it was time to expand. 

Workstations

Your business’ employees are only capable of what their technology can handle. When it comes time to upgrade or add additional workstations, there are a few options one can take. Let’s see how our two business owners handle these situations.

Walter, who is an impulse spur of the moment shopper, sees what he believes is a fantastic deal on eBay. He decides that these second-hand computers will be able to handle all of his employee’s programs without issue. However, upon arrival Walter notices that his computers are missing a few components. It turns out that the eBay listing was actually for five home-made computers that the builder was never able to get to operate properly, rather than complete working PCs. Overlooking the description just set him back a large amount of money, and the computer repair shop charges nearly as much as a brand new PC would have. 

Jesse, has a few empty desks he would like to fill with capable computers as well as a few new employees. He reaches out to his managed service provider to discuss which computer might fit the needs of his business. The professionals are able to use their connections to get Jesse a fantastic deal, and most importantly, the purchase of the computers comes with free installation.

Software as a Service

What good would a computer be without the necessary software? Businesses should be utilizing the latest and greatest software. There are a few different approaches a business owner can take to procure the necessary software to boost productivity within the office.

Walter knows that software can be expensive, so he decides to torrent a few versions hoping that he doesn’t get caught. Unfortunately, however, Walter is exposed as a fraud and his business is the center of attention for all things media. His business suffers massively, and he wishes he had spent a fortune on the software instead. 

Jesse too knows how expensive software can be. Unlike Walter, he once again leans on his managed service provider. They offer what is known as software-as-a-service. This service gives you all the latest and greatest software, for a low monthly cost. It’s like renting a tool, as opposed to buying it outright. Not only does this tool come with free installation as well as support, but it doesn’t set Jesse back a large sum of money. He is able to give his employees all of the programs they need to proficiently do their jobs. 

Which Experience Sounds More Enjoyable?

If you had a choice to be Jesse or Walter, which would you choose? Managed services truly offer support for all of your business needs. If you would like to learn more, reach out to our professionals by calling Coleman Technologies at (604) 513-9428 today!

0 Comments
Continue reading

Warning Signs that Your Computer Needs Replacing

How to Tell How Old a Computer Is

When a computer starts to get too old, it can become a problem for productivity. In fact, to help avoid this, some even recommend replacing a work computer every four years… but how do you tell how old a work computer is in the first place?

This isn’t always as cut-and-dried as one would think it should be. Some computers and laptops will have a date right on the case, neat the serial number. If there is no date provided, a quick search for the serial number might give you an idea.

You can also check the components of your computer itself, using the System Information tool. In the Search Windows box, type in “sysinfo.’ From the results, access System Information and in the window that appears, you can find plenty of information to help you date the machine. For instance, if the BIOS of the device has never been upgraded, the date will likely tell you how old the machine is, more or less. Searching for other components can help you to confirm this estimate.

As a result, you can get a better idea of whether your computer’s issues are age-related, or if there’s something else creating problems.

Signs That Say It’s Time to Replace Your Computer

There are quite a few factors that can indicate when your computer is due to be retired. While these indicators can each be a sign that something else is going on with your machine, a combination of a few of them is a fairly reliable signal that you and your device will soon have to say goodbye:

  • The computer is huge. In the interest of space, many modern devices are built to be compact, taking up less space than their predecessors did. While this isn’t a hard and fast rule (powerhouse workstations often take up a lot of space out of necessity), a larger, basic-function workstation or laptop is generally an older one.

  • Startup and shutdown take forever. Again, there are a few different issues that could contribute to lengthy startup and shutdown times. Too many applications may be set to automatically run in the background, or your hard drive might be almost full. However, this is another common symptom of an aging device.

  • You’re encountering hardware and software limitations. If your attempts to upgrade your computer’s hardware and software - especially security software - are stymied by a lack of interoperability or support, it’s probably time to consider replacing it. This is even more so the case if your work-essential solutions can’t be upgraded any further or runs slowly, or loading your applications takes notably long and they can’t efficiently run simultaneously.

  • Your computer is loud. If the fans in your device (whether it’s a desktop or a laptop) run loud, it’s a sign that your computer either needs a good cleaning or needs a good replacing. If the issue persists after a thorough cleaning has taken place, that’s a sign that your hardware is working too hard, a sure sign of age-related issues.

If you feel that your hardware is due to be replaced, reach out to Coleman Technologies. We have the contacts to help you procure the equipment you need to remain productive and offer the support to keep this equipment going. Call us at (604) 513-9428.

0 Comments
Continue reading

What Does Your Business' IT Infrastructure Look Like?

What Does Your IT Infrastructure Look Like?

Your IT infrastructure consists of all the technology that enables your organization to store and utilize data that it has collected. This includes your network, your storage system, and any hardware and software solutions that are used to access it. Basically, an IT infrastructure is effectively your organization’s central nervous system, supporting operations through the transportation of data.

It’s clear that your IT infrastructure will play an important role in the way your business works. This means that you’ll need to invest time and energy into developing a proper strategy for your IT infrastructure to adhere to.

Determining Your IT Infrastructure Strategy

The same infrastructure won’t work for all businesses, so you’ll have to craft one. To create an optimized infrastructure strategy, consider the following best practices.

Simplification

Make no mistake--your infrastructure today hardly resembles what it looked like just a few short years ago (at least, it shouldn’t). Chances are that your IT infrastructure contains several different types of technology. This complicates the process of improving and updating it.

Be sure to consider the modern standardization of the software and integrations that are possible with your centralized IT platform, as this will maximize access to data and increase how much value you get from your solutions.

Flexibility

IT is always changing and adapting to trends, which means that you will want to build your IT infrastructure in such a way that it can take advantage of these changes. Ask yourself where your organization’s biggest speed constraints are, as well as how they can be rectified. If you can consolidate your existing infrastructure to limit the risks, how would this affect your business processes? These are all factors that must be taken into consideration.

Service-Focused

The biggest advantage that IT provides for your organization is that operations can’t happen without it. When planning out your infrastructure, be sure to consider the fact that your entire business will need to use it for access to services and tools required for each employee’s day-to-day responsibilities. Ask yourself what you can do to make sure your infrastructure can do what must be done both now and in the future.

Why You Should Consider a Managed IT Infrastructure

You might recall the process you used to create your network back when your business was just a fledgling pushing back against the world. Remember that feeling and use it to fuel the process of reexamining your current IT infrastructure. In fact, you may find it more reasonable to outsource this task to a managed service provider.

There are many benefits to doing this, but the biggest has to come from the time you’ll save from doing so. You have a lot on your plate as a business owner. Can you say with confidence that you have the time it takes to design, build, manage, and maintain an IT infrastructure? Of course not--there simply aren’t enough hours in the day. Instead, you hand this responsibility to professionals you trust to ensure that the process goes well.

Coleman Technologies wants to be the MSP you trust to make sure your infrastructure is working for your business and its goals. To learn more about the services we offer, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Biometric Authentication Becomes More Commonplace

What Are Biometrics?
Biometrics are a method of authentication that uses some sort of physical attribute or qualifier rather than a password or a key code. Some examples include fingerprints, voice patterns, typing rhythms, and so much more. They are easier to use than your typical passwords or key codes, and even better, they can be used in conjunction with traditional security measures and practices.

Let’s take a closer look at what some of these biometrics are, as well as the most practical way to implement them.

Biometric Types
There are two major categories for biometrics: physical identifiers and behavioral identifiers. Physical identifiers are by far the most common:

  • Signatures: Signatures are one of the unique ways you can identify an individual, and you’ve surely seen this biometric used at least once somewhere or another. Whether it’s a transaction or an agreement, a signature can do much to guarantee someone’s authenticity.
  • Fingerprints/Physiological Attributes: This particular biometric is often used to secure smartphones. Fingerprints can be used to determine the identity of the user, as well as various other physiological attributes, like palm scanning, retinal scanning, and facial recognition.
  • Voice: Voice-based authentication is common all over the place these days, whether it’s a personal user issuing commands to a virtual assistant or a business using voice authentication to navigate automated answering systems.
  • DNA: The technology to implement DNA sequencing into authentication is still a ways off, but it’s closer than you might think.

There are other behavioral identifiers that are used for biometric authentication. While these methods are still in development, here are a few examples of them:

  • Typing Patterns: People all write in different ways, and the same goes for typing. Therefore, this can be used to determine the authenticity of the user based on their keystrokes and the pressure applied to the keys.
  • Navigation and Engagement: In a similar fashion, the way that people navigate applications and systems can also determine identity. Mouse movements are quite showing, as well as how we hold devices.

Reliability (and Risks) of Biometrics
Biometrics are proving problematic to an extent, mostly because they can be inconsistent. Voices can vary depending on the user’s health or age, and faces can change based on a clean-shaven (or bearded) face, a haircut, or a pair of glasses. There are ways to work around this system, and with biometric authentication, there is much that needs to be taken into account.

Security is a Major Concern
This kind of data needs to be heavily protected, as it not only exposes sensitive information, but personal information as well. These kinds of credentials are also not easily changed, as they are heavily based on physical traits. For these reasons, biometrics may take some time to be adopted as the norm.

What are your thoughts on biometrics? Let us know in the comments.

0 Comments
Continue reading

Customer Login

News & Updates

When it comes to growth and advancement, small and medium-sized businesses (SMBs) in British Columbia have been effectively leveraging Coleman Technologies’ affordable enterprise-level IT practices and solutions since 1999. The proof: Coleman Technol...

Contact us

Learn more about what Coleman Technologies can do for your business.

Coleman Technologies Inc.
20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Operations Center
6600 Chase Oaks Blvd, Suite 100 Plano
TX 75023

 

2 year badge

Copyright Coleman Technologies. All Rights Reserved. Privacy Policy