Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Software Patching in the Cloud

With so much computing now done in cloud environments, it is important to address how this approach can benefit security, but still need to be secured.

How Patches Benefit from the Cloud

It isn’t a secret that any kind of software, from applications to entire operating systems, can have holes in it. These security flaws and issues could easily leave a business vulnerable to attack if they aren’t resolved. This is why software developers will issue patches, which are just corrections to these mistakes, for users to install. By applying the patch, the user is protecting themselves from threats that would otherwise exploit that vulnerability - but just on the system where the patch is installed.

Now, consider how many computers some companies use, and all of the different software titles that would be found on each.

Can you imagine going to each one and applying an update, each time a patch was released? Furthermore, you have to consider that more and more devices are mobile nowadays. This means that there is no guarantee that every device is present when someone goes on their patch application marathon. Factors like these frequently lead to incomplete patch deployments, and as a result, holes in organizational security.

However, by utilizing the cloud as you manage your organization’s patches, the device no longer has to be present in order to receive the patch. Instead, the cloud can be used to push it out to all of your devices, so once they connect to the Internet, the patch will be implemented. This means you can keep your employees using the solutions you want them to use, assisting both your productive operations and your security.

How the Cloud Benefits from Patches

However, it is important to take note that all the cloud is, is a computer located somewhere else (often owned by someone else). As a result, it can also be vulnerable to flaws and issues of their own - which is why you need to be sure that your cloud provider is properly maintaining the cloud solution with its own patches. This is especially the case if you are using an internal cloud solution.

Coleman Technologies can help you keep up on your updates, whether they involve the cloud or not. Reach out to us at (604) 513-9428 to learn more about our services.

0 Comments
Continue reading

There’s Value in Outsourcing Your IT, Part V

Businesses Depend on IT

There are a lot of different pieces of technology that go into a business, and like a puzzle they all need to fit together and work. So where do all of these puzzle pieces come from? Let’s examine different types of technology.

Servers and Networking

Here are two scenarios, and the different methods businesses use to handle them:

Walter’s business is growing extremely quickly, but his servers are the same ones he’s been using for years. He realizes he is running low on storage space, and his increasing staff puts pressure on him to upgrade his server. Walter manages to cobb something together, hoping it will suffice for the time being. When Walter attempts to merge his servers into one slightly larger server, he misconfigured a few components resulting in downtime for his entire staff. Not only has he wasted his own time, but now he is experiencing the most expensive segment of downtime he has ever experienced. 

Jesse, on the other side of town, also is experiencing extraordinary growth. Jesse however, makes a simple phone call to his managed service provider. He is connected to a professional, who advises Jesse on server options that will sufficiently support his growing business. His managed service provider not only points him in the right direction, but also comes on site to install this new technology. Jesse knows he isn’t a tech know-it-all, so he leaves deployment of servers to the professionals. His business is ready for increased data storage that same week he decided it was time to expand. 

Workstations

Your business’ employees are only capable of what their technology can handle. When it comes time to upgrade or add additional workstations, there are a few options one can take. Let’s see how our two business owners handle these situations.

Walter, who is an impulse spur of the moment shopper, sees what he believes is a fantastic deal on eBay. He decides that these second-hand computers will be able to handle all of his employee’s programs without issue. However, upon arrival Walter notices that his computers are missing a few components. It turns out that the eBay listing was actually for five home-made computers that the builder was never able to get to operate properly, rather than complete working PCs. Overlooking the description just set him back a large amount of money, and the computer repair shop charges nearly as much as a brand new PC would have. 

Jesse, has a few empty desks he would like to fill with capable computers as well as a few new employees. He reaches out to his managed service provider to discuss which computer might fit the needs of his business. The professionals are able to use their connections to get Jesse a fantastic deal, and most importantly, the purchase of the computers comes with free installation.

Software as a Service

What good would a computer be without the necessary software? Businesses should be utilizing the latest and greatest software. There are a few different approaches a business owner can take to procure the necessary software to boost productivity within the office.

Walter knows that software can be expensive, so he decides to torrent a few versions hoping that he doesn’t get caught. Unfortunately, however, Walter is exposed as a fraud and his business is the center of attention for all things media. His business suffers massively, and he wishes he had spent a fortune on the software instead. 

Jesse too knows how expensive software can be. Unlike Walter, he once again leans on his managed service provider. They offer what is known as software-as-a-service. This service gives you all the latest and greatest software, for a low monthly cost. It’s like renting a tool, as opposed to buying it outright. Not only does this tool come with free installation as well as support, but it doesn’t set Jesse back a large sum of money. He is able to give his employees all of the programs they need to proficiently do their jobs. 

Which Experience Sounds More Enjoyable?

If you had a choice to be Jesse or Walter, which would you choose? Managed services truly offer support for all of your business needs. If you would like to learn more, reach out to our professionals by calling Coleman Technologies at (604) 513-9428 today!

0 Comments
Continue reading

Tip of the Week: Best Patch Management Practices

Create Procedures for Both Routine and Emergency Patches

Many patches are released on a predictable schedule, so as to make it easier to keep up on patches - after all, if you know that a patch is going to be released on a certain date, you can set aside time to apply that patch. There are also emergency patches that are released when a vulnerability is discovered and remediated.

As you might imagine, both are important to maintain - one, to keep your business as free as possible from vulnerabilities, and second (and perhaps more obviously), to keep your business secure in the face of an impending threat. That’s why you need to make sure you have set processes in place to ensure that all patches are tested and applied. While it may not always be a pressing security issue, it is better to be prepared for anything that the vendor is concerned about.

At Coleman Technologies, we always build out and update our procedure, and test updates before they are applied to prevent downtime and other issues. It’s all about working smarter, not harder.

Have a Controlled, but Realistic, Environment for Testing Purposes

Let me ask you a hypothetical question: someone comes up to you on the street and offers you a pill that would make you immune to the common cold, but with no peer reviews by any medical board or the FDA. So, do you take it?

I would hope you would say no, simply because you have no idea of the effectiveness of the pill without it having been tested. Patches are the same way. Without any testing, you simply don’t know how well the patch will work, or if it will interfere with another process. Before you apply any patches to your primary infrastructure, you need to have made these evaluations in a reasonable approximation of it. An effective means of doing so is to spin up a virtualized environment and stress-test the patch there, before actually applying it - just make sure you give your tests enough time to produce trustworthy results.

Keep Track of When Patches Are Released

Depending on the hardware and software you use, patches are going to be released on a different schedule. This is because different manufacturers and vendors manage their schedules differently. Just look at Microsoft and their famous Patch Tuesday (typically the second and sometimes the fourth Tuesday of each month). In order to properly keep your patches up-to-date, you need to know when to expect them.

For assistance with your business’ patch management, you can always turn to Coleman Technologies. Give our professionals a call at (604) 513-9428.

0 Comments
Continue reading

Tip of the Week: Project Management Software

There are a lot of tools used to manage projects. Regardless of what platform your company uses, there are some simple, common sense practices your team can use to enhance its project management proficiency. Here are five:

Tip #1: Hash Out Details Before You Start

Sometimes getting a project off the ground is harder than actually completing it. Depending on the number of stakeholders involved, many projects may find it difficult to get off the ground. Ensuring that the project is viable, has the support it needs to come to fruition, and has the resources in place to be most efficiently implemented are important before a minute of work is done on the project.

You will want to identify what workers will be responsible for what work, while also doing your best to come up with a timeline for the project that will not waste resources.

Tip #2: Choose One Project Manager

Today, there are a lot of collaborative interfaces out there that make managing a project much, much easier. As a result, sometimes a project won’t have a single project lead, it will be carried out with a team approach. You may get through a project or two like this before it becomes painfully evident that there needs to be someone to run point on the project.

The role of project leader will cultivate positive team dynamics and act as a mentor to the rest of the team. Also, you just need one throat to choke when things aren’t done on time.

Tip #3: Define Specific Milestones

For any project, there will be benchmarks it will have to be met. As a project begins, defining the metrics that will have to be met will give any project team a good idea what the expectations are at the end of each phase of a project. By frequently checking in on the status of deliverables, the project manager can ensure that all elements of the product are aligned with what customers will invest in.

Tip #4: Manage Risk

Managing risk is important in any business endeavor. There will be times when, in the course of the phases of a project, where one will go horribly wrong and will put the entire project’s success at risk. One of the best ways to identify and manage risk is by keeping the lines of communication open. Most project management software provides options to communicate, whether they be integrated through an existing system, or if they are localized as a part of the software.

Tip #5: Evaluation

Through success (or failure), lessons can be learned from any project. By reviewing and scrutinizing every aspect of the project, you will get some fuel on how to improve your project management moving forward. Identifying what went right, what went wrong, and how they make up the final result. One way to ensure that a project was a complete success is to determine its return on investment (ROI). Often, project managers will provide a planned ROI to stakeholders at the beginning. By comparing the two after the end of the project, you can establish whether it had the value you were planning for.

At Coleman Technologies, our technicians thrive on project management. Whether it is running cable, building, testing, and deploying hardware, or simple proactive maintenance, we have an answer for all of your business’ computer problems. Call us at (604) 513-9428 to learn more.

0 Comments
Continue reading

Windows 7 and Windows Server 2008 R2 is Finally Losing Support

Support for these two titles ends on January 14, 2020. If your business has neglected to upgrade away from the technology after Microsoft ended mainstream support in 2015, time is finally running out in which to do so. It is important to have a strategy to move to a more up-to-date operating system. By not completing a full migration away from these titles your business will not have the protection it needs to keep your company’s data secure. Vulnerabilities will begin to present themselves pretty quickly and you will see your ability to maintain data security wane. Let’s take a look at these titles, and what needs to happen to successfully remain secure.

Windows 7

Windows 7 is one of Microsoft’s most popular operating systems of all time, and is still used by millions of people from all over the world. In fact, it wasn’t until last December that Windows 10, Micrsosoft’s latest OS, passed Windows 7 in number of users. The software giant has started a major ad campaign to inform people of how to upgrade away from Windows 7 as soon as possible.

The most obvious option is to upgrade your business’ workstations to Windows 10. Windows 10 is constantly supported, offers many features that Windows 7 is incapable of, and features a profile that isn’t significantly heavier so most systems that you have will run Windows 10 effectively.  If you are in a position where you need to move over a lot of workstations, our consultants can help you calculate the best route forward. 

Another option Microsoft provides is called Microsoft 365. This cloud-based service deliberately targets the millions of Windows 7 users as it doesn’t require huge capital costs to move to Windows 10. At Coleman Technologies, we can help you determine the pricing of a migration either to new onsite infrastructure or a hosted solution. Either way, your business will need to have upgraded before January 14, 2020.

Windows Server 2008 R2

In addition to Windows 7, in January 2020, Microsoft will be retiring the entire Windows Server 2008 R2 suite. If your business utilizes Windows Server 2008 R2 for data and application hosting, you will need to have a plan in place to upgrade prior to the end of support date. Just like Windows 7, Microsoft will stop delivering security patches to Windows Server 2008 R2, meaning that there is a very real possibility that your organization could go without security updates if you fail to upgrade.

Microsoft has since released two new versions of the Windows Server software, as well as implemented a cloud-based option in Azure. It might be able to help you save money with cloud-based server management, but you won’t know for sure if it’s the right call to make without talking to the IT professionals at Coleman Technologies. Call us today to find out more at (604) 513-9428.

0 Comments
Continue reading

Three Technology Trends We’ve Witnessed in 2019

Blockchain

Perhaps most famously associated with cryptocurrencies, there are various applications in business that blockchain can be of use in. Really, blockchain is of great use in any situation where a record of changes needs to be kept, as the blockchain creates a record of these changes each time a new block is added to the chain - hence the name.

Originally utilized primarily by the financial industries, the utility of the blockchain has expanded to be of considerable use to far more verticals, with no signs of slowing.

AI and Machine Learning

In the past few years, we’ve gone from fearing artificially intelligent machines like HAL 9000 to carrying around a relatively rudimentary version of the sentient computer in our pockets. While our current machines and devices are (thank goodness) far less capable than HAL, they are plenty capable of assisting business processes - largely thanks to machine learning.

Via AI, directed by machine learning, your solutions can carry out predetermined processes and make informed decisions based on the input they receive. As a result, your business can take care of some if its tasks automatically, leaving your team free to focus on other responsibilities.

AR and VR

While augmented reality and virtual reality have been largely associated with entertainment purposes, the business world has started to embrace them for numerous purposes, both in terms of their internal processes and their marketing efforts. Furthermore, with today’s youth being exposed to these kinds of interfaces, they will be more familiar with them when they reach working age (and will be able to use them more productively as a result).

Has your business begun to implement any of these technologies in its workflows - even the most basic varieties? Coleman Technologies can help you do more. Reach out to us at (604) 513-9428 to learn more!

0 Comments
Continue reading

Higher Education Using Technology to Manage Operations

The fact of the matter is that universities have a lot of industry-specific technology that goes into making a functional institution of higher education, and that’s without mentioning secure access to student records, maintaining the productivity suites in computer labs, and providing intuitive smart technology for better lectures. We know a guy who’s well-versed in the types of solutions utilized by institutions of higher education, and we think you might find what he has to say to be interesting.

Degree Progress Management
Each student that is matriculated into a degree program has to complete a set of requisite courses. These courses will vary drastically from program to program, but the fact remains that each student must complete these requirements if they hope to graduate with a degree. Some programs have electives (any course the student wants) or selectives (any course from a selected group of classes), which complicates the process of choosing classes and opens up the door for students to take courses that don’t necessarily fulfill their degree requirements.

To minimize the risk of this happening, real-time degree progress can be viewed through programs like DegreeWorks. This program can show students, faculty, and staff advisors how many credits and courses must be completed by a student, as well as which classes fulfill specific requirements. Students can even process “what if” reports, which can show them how their degree progress is affected by something like changing their major.

Student Retention
It’s not a stretch to say that some students enter higher education underprepared for the increased workload. Whether it’s because of students not knowing how to access the proper resources, needing educational supplements like tutors, or simply requiring a support system that the student doesn’t have at home or on-campus, student retention and persistence can be a challenge for many institutions.

In an effort to improve these statistics, student retention software can be used by faculty and staff to assign flags, create to-do lists, and make appointments with students who are in need of assistance or support. In this way, the support structure that many students need to succeed is both accessible and informative for them.

Online Learning
In today’s increasingly-connected world, online learning has become a viable alternative to traditional, or synchronous, learning. When we say “synchronous,” we mean the traditional lecture style of education, in which a student must be physically present in the classroom to participate in discussions. Asynchronous learning, which is significantly less structured and more of an “at your own pace” approach to education, has provided students with limited time and geographic resources an opportunity to learn at their own pace in a less structured environment.

Depending on the institution, the online learning application might be something like BlackBoard, Angel, or Brightspace, rebranded to suit the proprietary needs of the university. Either way, the end result is generally the same. Online learning uses a centralized environment for all of a student’s learning needs, providing access to message boards, learning modules, grade books, open educational resources, and so much more.

Again, we understand that not all of our readers have stakes in the education sector; we just wanted to share some interesting solutions that are used by professionals in this industry. Are there any other industries you want to learn more about? Let us know in the comments and be sure to subscribe for more great technology-related blogs.

0 Comments
Continue reading

Microsoft Launches Office 365 Advanced Threat Protection

Microsoft’s Dedication to Security

Microsoft has as good of a handle on the nature of cybersecurity as any other major software company. The sustainability of their business and the effectiveness of their products are dependent on it. If their security software didn’t work well, there is no way they could sustain their place as the world’s most important software company, right?

One problem they are running into is that their security is SO effective, that hackers had to shift the ways they tried to infiltrate networks and steal data. The establishment of phishing is a social engineering term for duping a victim into downloading software that’s only purpose is to gain access to their personal data, which leads to data and identity theft, and in the case of business computing, access to much more.

Businesses Have Trouble with Security

Today’s business has to deal with a lot of different security issues. First, they are responsible for having the technology protections connected to each part of their computing infrastructure. This can be as simple as having the router-supplied firewall and an antimalware program loaded on their server. It’s likely, however, that the average business will need more coverage over their network to secure it, and the data stored behind those security platforms.

Next, and maybe most crucially, it is the business’ responsibility to train its staff on what kind of issues to look out for. Today, most malware infections and other infiltrations are the result of a mistake made by a person that has credentials and access to data. If your organization doesn’t properly train your staff on how to eliminate these threats, there is a fair chance that your network will be inundated with some type of malware at some point.

Microsoft 365 Security and Compliance

Microsoft, acknowledging the need for an enterprise product that combines the power of their Windows 10 operating system, the productivity options presented from Office 365, and powerful security and compliance controls, has launched Microsoft Office 365. The cloud-based solution presents the core computing resources that any business could use in a product that is available right now from Coleman Technologies.

Our knowledgeable technicians can help you find the right security platform for any of your business’ computing needs. Call us today at (604) 513-9428.

0 Comments
Continue reading

Customer Login

News & Updates

When it comes to growth and advancement, small and medium-sized businesses (SMBs) in British Columbia have been effectively leveraging Coleman Technologies’ affordable enterprise-level IT practices and solutions since 1999. The proof: Coleman Technol...

Contact us

Learn more about what Coleman Technologies can do for your business.

Coleman Technologies Inc.
20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Operations Center
6600 Chase Oaks Blvd, Suite 100 Plano
TX 75023

 

2 year badge

Copyright Coleman Technologies. All Rights Reserved. Privacy Policy