Award-Winning IT Services Backed by 25 Years of Experience – (604) 513-9428

Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Tip of the Week: Simplifying Your Email with Consolidation

One Account, Two Accounts, Three Accounts, Four…
Based on your work responsibilities and how your office is structured, it is quite possible that you need regular access to multiple email accounts. You could have one you use internally, one for communicating with clients, one to reach out to vendors, one to use to sign up for resources… you get the point. When all is said and done, that’s a lot of email messages.

However, you presumably have other work responsibilities beyond just checking your email, so switching between all of them just isn’t a practical option. Well, it just so happens that you won’t need to switch, as the email client you choose will be able to consolidate these multiple accounts for you. Before we get into how, we need to make sure that we’re speaking the same language here.

- An email account is the individual address used to send or receive a message. In your organization, you might have employee1@yourbusiness.com and employee2@yourbusiness.com. Likewise, each employee may have a different account for their different responsibilities - for instance, employee1vendor@yourbusiness.com and employee1internal@yourbusiness.com.

- An email client is the program that allows you to send and receive emails. Gmail and Microsoft Outlook are two perfect examples. If you have multiple clients stored on the same server, they can be used pretty much interchangeably, each client presenting all emails. An email client also has a few features that enable you to better keep track of multiple email accounts, provided you have set it up to do so.

Let’s go over your options now.

Multiple Inboxes
The people who developed the email clients that we use weren’t naive. They understood that a given user isn’t going to be tied down to a single email provider, and certainly not a single account. This is why email clients can support multiple inboxes, assuming they are configured correctly. Multiple inboxes allow a user to access a single client to manage multiple email accounts, streamlining the process greatly and enabling customized organization.

Multiple Email Personalities
On the other hand, some users don’t mind leveraging one inbox, but might still need to utilize more than one address in their correspondence. There is also a method that enables the use of a single, catch-all inbox, but enables the user to select which email address (in this case, known as personalities) their response is sent from.

To do so, you will first need to set up an email account that you do not give out, as it will serve as the catch-all address that all of your emails ultimately accumulate within. Once it has been set up, you need to set all of your other accounts to forward their contents to that mailbox - your internal IT resource should be able to help.

Once your messages are all being sent to the catch-all account, you will be able to respond to these emails from the address that they were originally sent to.

Setting Up Inboxes and Personalities
In order to accomplish either of these tasks for your client of choice, you will need to adjust a few settings.

Gmail
To add another account to your Gmail client, you’ll need to access your Settings, which means you have to click on the gear icon. Once you’re in your Settings, you should see a tab labeled Accounts and Import. Under that tab, there is a Check mail from other accounts section. Click on Add a mail account, and follow the instructions provided.

To add additional personalities to your Gmail account, you’ll need to again navigate to the Accounts and Import tab. There, you will find a section labeled Send Mail As, with the option to Add another email address. This will also allow you to choose your default email address.

Outlook
As it happens, there are too many different versions of Microsoft Outlook and too many variables to allow us to provide a walk-through. Fortunately, Microsoft does offer some documentation that instructs users how to manage their "connected accounts.” Of course, you can also call (604) 513-9428 for our assistance, as well.

Are there any solutions that you frequently use that you’d like some extra tips for? Tell us which ones in the comments section, and don’t forget to subscribe!

Continue reading

Tip of the Week: 3 Ways to Optimize Your Time

1. Prioritize

One of the biggest time sinks to be found in any business is the simple act of deciding what to work on next. We’ve all been there at some point: having finished one task, we suddenly reference our to-do list and encounter the same problem as a kid has in a candy store… too many options.

Taking a few moments at the start of every day to organize these tasks can greatly improve how you spend your time throughout the rest of the day, and can ultimately lead to far less waffling later on. With a set process laid out, you no longer have to make the decision over what to work on next - it has already been made.

To create this order, look at everything you have to work on and establish how urgent each task is compared to the others. Deadlines are a handy way to help establish this, or if someone else in your organization needs it before they can continue their work. Identifying these qualities and ordering your tasks accordingly from the start is a small time investment, especially when you consider the impact it can have on your productivity later on. Utilizing a communications and collaboration solution can help you establish the organizational priority of each of your tasks with the help of your team.

2. Habitually Limit the Time You Spend on Rote Tasks

There are always those tasks that pop up throughout the day that seem insignificant at the time. Take checking your email, for example… how long does it take to do that? However, checking email and a variety of other tasks can quickly grow from a momentary activity to an extended process.

After all, there’s always the chance that briefly responding to an email could pull you into an extended and time-consuming debate.

Furthermore, some of these tasks carry the expectation that you will immediately drop what you’re doing to take care of whatever’s needed. Emails are notorious for communicating this urgency, whether or not it was intended. Regardless, it puts pressure on the employee to switch their focus, which hurts productivity.

Instead, establish a practice of setting a concrete period out of your day where you will check and respond to your email, or whatever task it is that applies to your situation. Actually schedule this time into your day, using the business management solution that your company has in place to control schedules. Outside of that time, leave that task alone… if an email’s contents are truly that important, you’ll find out about them some other way before long.

3. Delegation and Outsourcing

We get it, business matters and activities tend to be kept close to the chest. After all, if you can’t trust yourself to do something right, who can you trust? Who else has the incentive you do, to do the best job possible?

Frankly? Someone you’ve hired to do a job.

Delegation can be difficult, of course, but only if you don’t trust those around you. However, there are plenty of resources out there, both inside your business and available through outsourcing, that could do exactly the job that needs ro be done. As a result, you can divert your focus to tasks that need it more, trusting the resource to produce.

You may have to put in a bit of time picking the best resources, especially when outsourcing, but the results will be well worth the time.

Coleman Technologies can help you put these practices into action, with the added effects of the solutions that can be implemented to make these practices easier. Give us a call at (604) 513-9428 to further discuss any of the solutions we’ve described here, and for more handy tips that could help you better leverage your time, subscribe to our blog!.

Continue reading

Tip of the Week: How to Speed Up a Slow Windows 10 Device

However, as with any changes you are considering to your computer, you should lean on your IT resource to determine if it’s okay to make these adjustments. Better yet, IT may want to make them for you. One way or another, make sure you get the all-okay before switching anything on a work device.

Cleansing of Bloatware
Whether you picked something up during your browsing or the device’s manufacturer installed it during production, your computer can easily collect programs known as bloatware or adware. These programs, while not always harmful per se, can easily eat up system resources for nothing. Ask your IT resource to seek out these programs and eliminate them for you. This alone may result in some considerable boosts to your computing speeds.

Adjust Power Settings
While it may sound like a good idea, the Power saver plan that comes baked-into Windows 10 can actually make your experience as a user more of a pain. This is because this setting cuts your device’s processes to minimum so that energy can be conserved. Furthermore, desktops are plugged in as a rule, leaving little reason to use Power saver anyways. To improve performance on your Windows 10 laptop, stick to the Balanced power option when unplugged, and switch to High when power is available.

Kill Windows Tips and Tricks
Yes, it’s ironic that we’re recommending that you disable Windows Tips and Tricks in a tip-based blog post, but there are a few compelling reasons to do so. Most pertinent to our current conversation, the fact that Windows is analyzing your usage with these capabilities enabled means that your device’s performance is going to suffer.

In order to disable these invasive bits of advice, click the Start button. Under your Settings, access System and from there, Notifications & actions. Under the Notifications section, you will find the option to Get tips, tricks, and suggestions as you use Windows.” Deactivate this option, and you won’t have anything more to worry about.

Finally, the Cliché: Restart Your Device
Yes, this suggestion has become a joke in and of itself, as the IT field’s go-to question. However, there’s a really good reason for this: restarting a device can often solve its issues. This is because it clears out the use of the computer’s resources, wiping unneeded memory usage and stopping equally unneeded background processes. Restarting your workstation effectively gives it a fresh slate, allowing it to run much better than it did when it was bogged down.

Let us know if there are any other tips you want us to share in the comments, and don’t forget to subscribe!

Continue reading

Tip of the Week: Improve Your Business’ Wi-Fi

We’re here to help your organization make better use of its wireless connection.

The Router
Your router will determine the general range of your wireless network, as well as its security. Depending on your business’ specific needs, a router can be a tricky investment. You have to consider several aspects, including how much range you need and what kind of options are available for it. Here are some of the variables you’ll need to consider:

  • It is within your budgetary constraints
  • It supports Internet speeds you pay for
  • The space your router needs to cover
  • The devices the router has to support
  • Ensure that any router you choose supports WPA2 encryption

Once you’ve determined which router you’re going with, you can set it up in a place that is most effective for your purposes. If you want your router to broadcast a signal through your entire office, you’ll need to test it out and see how the location works. Try to find a nice central location. If the router doesn’t work as intended in specific parts of the office, you might need to include a Wi-Fi repeater to get the range you’re looking for.

The Repeater
If your signal isn’t extending as far as you’d like, a repeater (or extender) can be used to extend the wireless signal to reach a larger area. This way, the signal will reach any area you need it to reach. A Wi-Fi repeater contains two wireless routers. One of them picks up the wireless signal coming off of your network’s central router, while the other picks up the signal and transmits it in much the same way as your network’s central router. Thankfully, the wireless repeater only needs to be in a location within the broadcasting range of the central router. Just plug it into an average outlet and you’re good to go.

Security
Security is another important part of your business’ wireless network that requires you to think about it during the setup phase. The router doesn’t necessarily have to be hard to set up, though. First, make sure you have WPA2 encryption turned on. Some models don’t default to this and instead use the ineffective Wireless Equivalent Privacy (WEP) encryption that can be broken through easily enough. With WPA2, you’ll be much more secure.

Next, you want to name your wireless network to something that can help you identify it, as well as assign a complex password to defend it. This ensures that only those who need the network for work will be logging onto it, and that they will know which network belongs to your organization if multiple are available. Once you’ve finished with this task, you want to enable the router’s firewall. Doing this provides an additional layer of protection against potential threats.

One more thing: be sure to change the admin’s password on the actual router, as most default passwords can simply be looked up online.

For more information on how to optimize the use you get out of your business’ wireless connection, reach out to us at (604) 513-9428.

Continue reading

Tip of the Week: Prepare for These Disaster Recovery Challenges?

1. Compliance Concerns
First, you need to be sure that your data is not only stored securely but is also sent back and forth to your backup solution properly. This is especially true if your industry is subject to any government mandates concerning how data must be handled, as the penalties for non-compliance can be just as severe as the influence of data loss would be.

Whether you manage your own solution or leverage a vendor to keep your data securely backed-up, the same severity applies. The size of your business has no influence, either, despite many smaller organizations having a difficult time keeping up with these regulations. These businesses are especially benefited by the availability of outsourced IT resources, as these providers are better prepared to see to these compliances and minimize any risk.

2. Costs and Scalability
It is also important to recognize your needs, including the costs that fulfilling those needs may incur (like how much a cloud provider charges for you to download your backed-up data). Before you select a particular cloud provider, make sure that you have considered all of these charges.

Furthermore, a backup solution that can only keep you safe from major disasters is one that overlooks a huge percentage of the actual issues you are apt to face. Sure, ransomware attacks and fires happen, but so do hard drive failures and other causes of small-scale data loss. Every strategy you enact needs to be documented properly, with useful information shared clearly, succinctly, and actionably.

3. Lack of Management or Testing
If your company is ever in the position that it needs to lean on a data backup, they’re going to need to lean on a leader to ensure that this process goes without a hitch. In many cases, this role would fall on your shoulders - but what if something goes down while you (or whoever is in charge of managing the recovery process) aren’t there?

This is why you need to keep a comprehensive, up-to-date plan prepared for just this occasion, a hard copy ready to be referenced on-site as well as one digitally stored in your backup files.

In addition to this preparation, you also need to make sure that the backups you’ve prepared actually work in the first place. A backup will do you no good if you can’t recover the data from it, after all. Make sure that, just as you would a fire drill, you practice utilizing the backup on occasion.

How Coleman Technologies Can Help
We have the expertise and capability to put together just this kind of strategy for you and your employees to leverage. That way, you can be confident that your disaster recovery won’t just be a new disaster to deal with. Reach out to us at (604) 513-9428 to learn more today.

Continue reading

Tip of the Week: Is a Laptop the Best Fit for Your Employees?

Reason 1: Mobility
Let’s begin with the most obvious reason laptops are a great option - you aren’t tied to a desk to do your work as you would be with a conventional desktop. Instead, you can just pick it up and take it with you, whether that’s to a meeting on the other side of the office or home for some remote work. I don’t know if you’ve ever seen someone haul an entire desktop workstation around, but if you have, you know that it just isn’t practical to do.

Potentially travelling with a laptop is also much easier. A desktop workstation would need to be carefully stowed in a vehicle, if not shipped to its destination. While it may seem like a hassle at the airport, stowing a laptop in a carry-on is a much more secure and convenient option when all is said and done.

In short, utilizing a laptop makes a lot more sense in an increasingly mobile world than does utilizing its far less mobile cousin, the desktop.

Reason 2: Concision
If the resources are there, one might make the argument that it makes more sense to utilize both a desktop and a laptop - one for the office, and one for home and travel.

Financial considerations aside, there are other issues with this strategy. The major one is the fact that it makes it that much more complicated to ensure that everything you need is where you need it to be, when you need it to be there. There is little that is more professionally frustrating than sitting down to work and realizing that the data you need is on your other device. Hopefully, you have the access to the other device at the time to make the necessary transfer.

While properly utilizing a cloud solution would be another way to approach this difficulty, why use two devices when one will suffice? That way, you can be sure that your employees always have access to the programs and data that they need to be productive.

Reason 3: Consistency
One of the most important considerations for any office technology configuration to take into account is how compatible the many devices it contains are with each other, and the solutions needed to accomplish each day’s tasks. If each employee has a different device, not only is this no longer guaranteed, you have no guarantee that each laptop will have the same shortcuts and features. For instance, if you want to encrypt the data on laptops and allow your staff to sign in with a thumbprint scanner, not all models are equipped with that. Different devices don’t tend to change how complicated it is to manage the devices, but it can vary the experience your users have and limit the policies you can set.

Standardizing your office’s devices becomes much easier when everyone has the same device, which inherently means that everyone has the same capabilities in the office. Of course, if someone needs their device to have more specialized capabilities, they should be the exception. However, for the run-of-the-mill tasks that many are responsible for, the average laptop should suit them just fine.

If you want more help in designing your technology infrastructure and setting it up for prolonged productivity, reach out to Coleman Technologies. One call to (604) 513-9428 is all it takes to start receiving the technology services that you need for success!

Continue reading

Tip of the Week: How to Replicate and Relocate Text Easily

Once you have your content selected, whether it’s text or an image, all you have to do is press two keys.

To cut a word or phrase from one place in your content, press Ctrl + X. To copy this content instead, keeping the original and duplicating it elsewhere, press Ctrl + C. Pasting your content is just as simple - with the place you want the content added selected, press Ctrl + V. This will insert your content where you want.

If you happen to be copy-pasting from a website to another document, it may not be a bad idea to paste it without bringing any formatting from the website over. Otherwise, it is apt to look funny on your documents. Pasting without formatting is almost as simple as regular pasting, you just add another keystroke in the middle: Ctrl + Shift + V.

Of course, any of the tasks can be accomplished with the mouse alone. Right clicking on a word, an image, or a group of selected text will bring up a menu that includes all of the above options. However, your cursor is generally more accurate than the mouse, so you may have to undo your efforts (Ctrl + Z) a few times before it’s right.

Real World Example:
Let’s say you want to send a webpage link to someone in an email or instant message. In your web browser, click the address bar (that’s the part with the ‘http://… “). That will highlight the URL. Hold down Ctrl and press C. Then go into your email or instant messenger, click where you want to paste the URL, and hold down Ctrl and press V.

Whichever you use, it’s bound to be more time-efficient than rewriting anything that needs to go in a different spot. Make sure you subscribe to our blog, so you can be alerted whenever we upload more content!

Continue reading

Tip of the Week: 4 Really Simple Tips for the Computer Novice

Tip #1: No Fear
Sometimes technology can be a tad bit intimidating, especially when people are expecting you to quickly grasp a concept with little-to-no experience. The best thing you can do is not be afraid of screwing up. After all, there aren’t many actions you can take with a computer that will break the machine, the applications you are using, or the file you are working on. If you don’t have much experience with the computer and you want to learn anything from this blog today, learn that Ctrl+Z will undo. Having a good understanding that Ctrl+Z will undo your last action in almost every application you are going to use should give you the confidence you need to stop worrying about possible failure.

Tip #2: Liberally Use Search Engines
For the computer novice, it can sometimes be intimidating to try to find applications and files within an operating system. No matter what problems you come across, keep in mind that the Internet is the world’s greatest troubleshooting guide, and you only need to know how to open your browser to get at it (on modern machines, you may not need even that). Once you have your browser open, simply type your search query in the address bar. It will return results. You may have to dig through the results, or alter your search perimeters slightly, but you will be able to find the answers to the problems you are having with the help of a search engine.

Tip #3: Learn Keyboard Shortcuts
This is typically for speed. If you can quickly learn a few basic shortcuts, you will enhance your ability to control your computer tenfold. Here are a few suggestions to get you started:

  • Ctrl+A - Select all
  • Ctrl+C - Copy selected content
  • Ctrl+X - Cut selected content`
  • Ctrl+Z - Undo (Seriously, this one is crucial.)
  • Ctrl+Y - Redo

There are many more depending on the application you are working in. Most applications will provide their shortcuts under their Help menu. Learning these will quickly make you a much more proficient user.

Tip #4: Find Your Comfort Zone
When Michael Jordan first picked up a basketball, he wasn’t a natural, so how can anyone expect to use something as complex as a computer proficiently right off the bat? If you are a new user, or just someone that isn’t proficient with a computer yet, stick to what you know. If you have a series of applications you feel some level of skillfulness with, stick to them. While our first tip suggests that you shouldn’t have fear, that mainly pertains to navigating your way around a computer, not the frustration a user can build when they continuously make mistakes. If you want to enjoy your time on the computer, stick to the applications you know, and you will have a good time.

We want everyone to remember that there was a time when we were all new to the computer; and, since computer skills are now an expectation of almost any career path (not to mention a major form of communication), learning your way around a computer will improve your standard of living. Do you have any other tips you could suggest to new users to keep them engaged and improving? Leave them in the comments section below.

Continue reading

Tip of the Week: Locating a Misplaced Smartphone

The Stakes Are High
A lost smartphone is something that needs to be taken seriously nowadays. Not only is it an expensive device to replace, its contents could be considered priceless. Anything you’ve accessed via that phone (potentially including your finances and social media) is then at risk. If this device was used for business purposes, your data could be at stake if your device was stolen - and, if you used it as a part of a two-factor authentication measure, there goes your access to your network.

Clearly, this wouldn’t be a good thing.

This is precisely why Android includes a feature to help you find a device, should it ever be lost.

Auto-Location
On your Android device, you need to work proactively and enable a few settings.

In your Settings, you should be able to find a Find My Device option. Make sure this is turned on. Your Location should be set to High accuracy. Finally, you will want to enable Google to Use Location History. While this will diminish your privacy from the eyes of Google, it will make your phone that much easier to find.

To locate your device, you’ll then need to access the same Google account that is used on the device in question from a web browser. Google is able to give you a general idea of where the device was last located on a map, and even what Wi-Fi networks it is connected to. The Find My Device application can do the same thing if you have access to a second device.

Find My Device also allows you to remotely lock your device and display a message to help anyone who might find it get it back to you. Once you’re in the vicinity of your device, you can also command your device to ring. This command will override the volume settings, increasing the chances of it being heard.

If you truly believe that your device has been stolen, there is also the nuclear option: remotely wiping the device via Find My Device.

Keep in mind, in order for these features to work, you absolutely have to enable them on your phone first. Otherwise, you’ll be out of luck if the device ever goes missing.

Act Fast
It is also important to remember that these features will only work as long as the phone is on. Sure, you could still check for its last known location in Find My Device, but there’s no guarantee that it will still be there.

Finally, if you truly believe that your device was stolen, contact the proper authorities and give them everything you know.

With any luck, you’ll be able to find your lost phone lickety-split. While you’re here, take a look at some of our other blogs, where you can find other handy tricks and useful information, courtesy of Coleman Technologies.

Continue reading

Tip of the Week: Using Templates in Evernote

What Are Templates?
Evernote’s templates are handy, pre-built structures for notes that provide users with a simpler means of organizing specific types of information. Instead of taking time struggling with your formatting each time you start a new note, you can apply one of the templates that Evernote offers on their website. Those with a subscription to Evernote Plus, Premium, or Business can even use formatting they’ve created in past notes to generate their own templates for repeated use.

Applying Templates in Evernote
Once you’ve acquired a few templates, either from the Evernote website’s collection or from a past note, applying one of your choosing is relatively simple.

  • In Evernote, start a new note.
  • In the body of the note, click Templates to view the ones you have saved.
  • From there, you can search for any templates you have, delete ones you no longer want or need, edit their names, and of course, apply them to notes.
  • If you want to edit a template, follow the same process, and once you’ve made the changes that you want, save it as a new template. Note: only those with Plus, Premium, or Business accounts are able to do this.
  • Plus, Premium, and Business users are also able to create their own templates this way.

So, what do you think? Is this a welcome change to Evernote? What other improvements would you like to see them make down the line? Let us know in the comments!

Continue reading

Tip of the Week: Three Pro Business Tips

Be Prepared to Lose Power
Electricity is perhaps the most important part of using technology in the workplace, as without it, the devices that empower your business’ operations just won’t function. In some cases, you might suddenly lose power, leading to data loss and other disaster scenarios that could strike your business down if you’re not prepared for them. With progress grinding to a halt, downtime will ensue, creating a considerable loss for your business.

Even if you’re not losing power, an excessive amount of it can create a surge, damaging the infrastructure itself and harming the individual components that make it up. It’s ultimately in your best interest to take measures against these events, as you made an investment that needs a substantial return. Surge protectors can be helpful to prevent excessive power from crippling these important machines, but in some cases, you’ll want a more powerful solution. An uninterruptible power supply, or UPS device, can help your servers, workstations, and other important technology shut down properly in the event of a power outage or surge, giving you the ability to minimize damage done.

Maintain a Steady Internet Connection
The Internet is an invaluable tool that can help your business succeed, and the Internet plays a larger role in its functionality than it ever has before. A lack of Internet ultimately becomes downtime for many organizations, as they depend on the Internet for various services and communications. More often than not, there’s nothing you can do about a lack of Internet if it comes from your service provider. To keep this kind of downtime from sinking operations, many businesses have implemented backup Internet connections, just in case they ever have to use it. This comes with a downside--you’ll have to maintain that connection--but it will likely be worth the investment if you ever need it.

Place Boundaries on Your Staff
Even the best employees are known to make mistakes from time-to-time. While you can trust them for the most part, nobody is perfect, nor should you expect them to be. Some might even try to implement their own solutions with the intention of making their jobs easier and more efficient. This is called shadow IT, and it can be dangerous. You have no way of knowing whether it’s putting your business at risk. You can implement measures to ensure that your employees aren’t downloading unauthorized applications through the use of administrator and user privileges. If you limit what your users can do with their machines, then you have less to worry about.

Coleman Technologies can help your business ensure managing IT doesn’t become a hassle. To learn more, reach out to us at (604) 513-9428.

Continue reading

Tip of the Week: Ways to Be Active and Proactive With Your Network Security

Applying Software Patches
It should be clear that software patches are designed to fix security problems and improve the functionality of the software, but some organizations simply don’t have time to implement them manually, or they simply don’t understand the purpose for them. Part of the problem is that sometimes the developers aren’t necessarily clear that patches are available, while other times those within your organization may not even know how to administer them. Regardless of the reason, there are usually problems on a network that will go unattended for extended periods of time.

Most hackers only want to take advantage of the issues they can detect. Thus, there could be countless threats out there designed to target countless unpatched vulnerabilities on your network that not even the hackers can know about. It makes sense for a hacker to use just one exploit to target a handful of vulnerabilities. Therefore, it’s important to make sure that all software that you use is updated and patched.

Additionally, your systems shouldn’t be running unused programs. The more software you have, the more ways hackers can take advantage of your organization’s network vulnerabilities. Moreover, you might even be wasting revenue on renewing software licenses that you don’t even need, so it’s best perform a network audit from time to time to get the worthless software off your infrastructure.

Dodging Social Engineering Attempts
Social engineering is broadly categorized as any method that takes advantage of unprepared users or those who are ignorant of solid network security practices. Examples include a phone call or email message claiming that the network has been breached by a foreign entity and that “tech support” needs to remote into the computer and resolve the issue. There are other, more subtle methods as well, such as targeted spear phishing attacks that go after specific users with personal information that convince them that the hacker is someone in authority.

These types of attacks vary in sophistication, but they can range anywhere from an employee receiving a message claiming that they’ve won a prize, to the intruder physically following your employees into the office and stealing sensitive data manually. In instances like these, a little bit of employee training can go a long way. Teach them to look for anything suspicious, and inform them that vigilance is incredibly important in the workplace.

These two security improvements barely scratch the surface of what your organization should be focusing on for network security. If you want to fully protect your business to the best of your ability, give us a call at (604) 513-9428.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you didn’t know Windows can save a list of the text and images you copy, I feel for you—you’ve missed out on a simple trick that could’ve saved you a lot of time. But don’t worry, it’s easy to set up, and I’ll show you how.

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image