Award-Winning IT Services Backed by 25 Years of Experience – (604) 513-9428

Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Are You Looking to Buy a New Server?

Business Servers

When you are looking for servers, there is a pretty good chance that you need to centralize application delivery, file storage, or some other core function of your business. A server is a high-powered computer that runs specialized software that is used to support the multiple users that your business has on staff. Some of the multi-user applications that servers are used for include email, some type of messaging, print servers designed to manage company-wide print jobs, and customer relationship management (CRM). If your business already uses one or multiple servers, you need to establish whether you need to upgrade and migrate; or, if you’ve outgrown your hardware and need to set up a new server, and where to host it.

Cloud vs. Onsite

If you are looking to set up your first server, you have an interesting decision to make. Do you set up your new server at your place of business, or do you host it with an established cloud provider? Traditionally, companies would be better served to host their hardware locally, but with cloud services from some of the most reputable companies in the world now available with built-in support and anywhere-anytime access, it stands to reason that looking at how each is priced out is a prudent move by any decision maker. 

With the purchase of a server, a company takes on the costs of the hardware, which are often substantial, they then deploy software and have to pay to have that hardware managed. If the hardware costs aren’t enough, the maintenance costs can be multiple times that. When you add in utility costs, you are looking at a large capital cost with a smaller operational outlay.  With cloud computing, however, you can get a reasonably secure server that can be accessed from any place users have access to a high-speed Internet connection. This provides accessibility that many other servers don’t have, while paying per month rather than up front. The costs don’t add up quite as fast (the capital outlay is virtually zero), but the operational costs spike, often exceeding what you would pay for a server over time. 

Let’s make a list of some pros and cons:

Onsite Server 

Pros:

  • Gives you complete control over organizational data.
  • Gives you the ability to alter storage types and amount at any time.
  • Performing onsite backup is much easier.
  • Restoration from onsite backup is much faster.

Cons:

  • Upfront costs of hardware.
  • Exorbitant costs of continued maintenance.
  • Utility costs.
  • Upfront and recurring costs of physical security.
  • Your hardware is only marginally utilized.

Hosted Server

Pros: 

  • Eliminate capital costs of buying and maintaining hardware. 
  • Mitigate server-based utility costs.
  • Cloud server is scalable.
  • Data and application redundancy built in.

Cons:

  • The need for stable and reliable bandwidth rises.
  • Costs of bandwidth rise.
  • Security can become an issue.
  • Lose physical control over the management of the servers.

It all comes down to system control. If you want (or need to have) control over your hardware in order to meet federal, state, or industry regulations, hosting your servers onsite is suggested. If you don’t have these regulations to meet, there’s no reason hosting your servers in a public cloud interface can’t be a viable alternative for your company. 

One option that many businesses are using today is the establishment of a private cloud server. A private cloud server is hosted either onsite or in its own dedicated cloud space, and delivers a business a lot of the pros listed above, albeit at substantial cost. The establishment of the private cloud allows companies that need to have control over the management of their organizations data and applications to have it, while providing the ability for users to access the data and applications outside of the confines of its physical network. 

Regardless of what kind of server you are looking for the experts at Coleman Technologies can help. Find out more about your server options by calling us today at (604) 513-9428.

Continue reading

The Next Phase of the Internet of Things

With global spending on IoT research and integration reaching $745 billion in 2019, the IoT is primed to be one of the largest single industries in the world in the future. Individuals, businesses, and governments are looking at the IoT for solutions to their problems. After all, the more information people have, the better decisions can be made. From the outset, it was said that this technology will transform the way we interact with machines and the way they will interact with each other, and only a few short years into a worldwide implementation, that mantra has proven to be true. Let’s look at where the IoT is growing most.

Industry

The huge annual jumps in IoT spending is largely driven by manufacturers, transportation, and utilities. Industrial IoT solutions provide companies and municipalities, alike, the link between their cloud-based software systems and their analysts, salesmen, and decision makers. This relationship is tenuous, however, and is closely monitored as a result. If a huge IoT strategy breaks even once, confidence in the platform is destroyed, leaving it an unreliable solution, regardless of the strengths of the technology. 

Manufacturers and process managers that utilize IoT solutions absolutely need their systems to be as reliable as possible. That means security, which is the number one improvement that the next phase of IoT has to make. For years, IoT was only somewhat trustworthy because of the lack of integrated security many IoT devices were manufactured with. Today, with security an absolute must for the major undertakings it is being used for, security has improved, but only slightly. A dedication to creating IoT devices that have hardware and software systems that are secure and reliable will dictate just the ceiling of IoT effectiveness.

The Smart City

One of the most intriguing places the IoT has been utilized thus far is in the integration of automated utility systems inside what has been termed, “the smart city”. The smart city uses what are known as low power IoT connections. These devices deliver low bandwidth and power saving features that are perfectly suited to asset monitoring. They can be implemented for a variety of uses, including: 

  • Sensors built into city roadways to sense things like the subsistence of traffic congestion and wear and tear of roadways.
  • Sensors built into bridges to sense degradation and the effect of seismic forces caused by geographical and traffic-based events.
  • Sensors built into buildings to measure wind force, foundation subsistence, or seismic activity.
  • Sensors in the interior of buildings to control foot-traffic, lighting, heating and air, and other systems humans rely on. 
  • Sensors on the street or on entryways that will provide facial recognition and reporting.

Unlike IoT-connected consumer goods, every IoT device deployed in a smart city would have a purpose that is beyond convenience. Every device would be placed to achieve a goal, improve the usability, longevity, and management of infrastructure, boosting resident safety and improving their access to services, cutting costs and limiting energy use, improving communications, and more.

One thing is for sure, the next phase of IoT implementation is going to challenge conventional thinking and deliver solutions that only a short time ago, were only imaginary. At Coleman Technologies we find technology fascinating. For more great technology information about innovative new tech, return to our blog regularly. 

Continue reading

Tip of the Week: Cloud Decisions for the SMB

Countless Options

The cloud provides a myriad of options for any-sized business. In the cloud, you can host applications, communications, storage, and even full-platform infrastructure. With so many options available, your business can get the computing power and tools it needs, when needed. 

User Tip: When trying to determine which cloud platforms are right for you, you may find the cost/benefit analysis won’t give you the definitive answer you are looking for. Your best bet is to prioritize which information systems would work best hosted onsite and which one brings the most value hosted in the cloud. The best decision for your business’ bottom line may not be the best decision. 

Productivity Improves

One of the most important aspects of cloud computing is the possibility that it provides a modern business. With all of the options the cloud presents, a business can pick and choose how to leverage them to produce increased productivity. Of course, the computing platform itself isn’t going to produce more, but with the data and application accessibility and the collaborative options the cloud provides a business, they are able to get more done, faster.

User Tip: Cloud computing may provide the ability for your team to collaborate better, but it isn’t going to produce anything on its own. One tip to ensure for efficient collaboration and enhanced teamwork using cloud interfaces is to assign one person to manage the files and data inside your cloud solution so that everyone knows who to go to if they need answers. Running a project is a lot like running a basketball team, one person has to run point.

Monetary Benefits

Implementing cloud computing can absolutely help save a business money off the bat. A shift to the cloud works to eliminate huge capital costs. Say you need a server. If you bought, powered, and supported the hardware yourself, you are looking at a bill that’s likely in the five-to-six-figure range. If you choose a cloud, you can fire up a new server for a monthly fee that gives you a lot of the same computing power your business commands, without the waste of computing resources and the upfront expense you would see by running your own hardware.

User Tip: The cloud may help you transfer cost, but if you jump in with both feet it can get pricey quick. That’s why it is important to migrate your processes, data, and infrastructure to the cloud in small, incremental steps. It keeps operational costs down and keeps your IT administrator sane. 

At Coleman Technologies, we understand the value of cloud computing, but we also recognize that the cloud isn’t right for every situation. If you would like to meet with our knowledgeable consultants about a shift to the cloud, call us at (604) 513-9428 today.

Continue reading

Biggest Data Breaches Since May

May

May 2, 2019 - Citrix

Conferencing and digital workplace software company, Citrix, revealed that hackers gained access to the company’s network between October 2018 and March 2019. Data stolen included Social Security numbers, financial information, and data of current and former employees.

May 3, 2019 - AMC Networks

1.6 million users of AMC Network’s Sundance Now and Shudder streaming services had their data left exposed through a database that was left unsecured. Names, email addresses, subscription details were compromised. 

May 9, 2019 - Freedom Mobile

Freedom Mobile, a Canadian mobile provider had an estimated 1.5 million customers’ personal and financial information left exposed on a third-party server. The types of data left exposed included names, email addresses, mailing addresses, dates of birth, and credit card information.

May 13, 2019 - Indiana Pacers

The legal team behind the National Basketball Association’s Indiana Pacers was the victim of a major phishing attack. Employee and customer names, addresses, dates of birth, Social Security numbers, passport numbers, driver’s license numbers, medical insurance information, card numbers, digital signatures and login information. No number of affected individuals has been given by the team.

May 14, 2019 - WhatsApp

WhatsApp has experienced a security flaw that provided access to an Israeli government surveillance agency, NSO Group. NSO Group had limited access to the microphone, camera, and WhatsApp message text of the app’s 1.5 billion users. 

May 20, 2019 - Instagram

Facebook-owned Instagram, fell victim to a data breach that exposed more than 49 million Instagram influencers, celebrities, and brands’ Instagram information when an Indian-based social media marketing company left it exposed. 

May 24, 2019 - Canva

The 139 million users of Canva, a cloud-based graphic design tool, had their names, usernames, and email addresses exposed when hackers infiltrated their server. 

May 24, 2019 - First American Financial Corporation

First American Financial Corp., a leading title insurer for the U.S. real estate market, had 885 million customers’ Social Security numbers, bank account numbers, mortgage and tax records, wire transaction receipts, and driver’s license images compromised for all customers as far as back as 2003.

Other May breaches: Inmediata Health Group, Uniqlo, Wyzant, Flipboard, Checkers (the fast food chain).

June

June 3, 2019 - Quest Diagnostics

Almost 12 million patient records have been compromised when hackers took control of the payments page of AMCA, a major payment vendor for Quest Diagnostics. Data such as financial account data, Social Security numbers, and health information (ePHI) were left exposed.

June 4, 2019 - LabCorp

In the same hack, LabCorp announced that 7.7 million of its customers were impacted. 

June 6, 2019 - Opko Health

In the same attack, Opko Health had 422.600 customer and patient records compromised. 

June 10, 2019 - Emuparadise

The gaming website Emuparadise had their users’ IP addresses, usernames, and passwords exposed in a data breach. 

June 11, 2019 - Evite

More than 100 million users of the Evite event planning app have had their information put up for sale on the dark web. Information that was stolen included names, email addresses, IP addresses, and cleartext passwords. Some even had their dates of birth, phone number, or postal address exposed.

June 11, 2019 - Total Registration

Kentucky-based Total Registration, a facilitator of scholastic test registrations had their entire service compromised. Victims, who were mainly students who had registered for PSAT and Advanced Placement tests, had their names, dates of birth, grade level, gender, and Social Security number exposed. 

June 12, 2019 - Evernote

A security vulnerability in Evernote’s Web Clipper Chrome extension gave hackers access to the online data of over 4.5 million users. Exposed data includes authentication, financial, all private communications, and more.

June 20, 2019 - Desjardins

Over 2.7 million individuals and 173,000 businesses had their data stolen by a single Desjardins employee. Canada’s largest credit union, the hack resulted in the exposure of names, dates of birth, social insurance numbers, addresses, phone numbers, and email addresses of customers

Other June breaches: Oregon Department of Human Services, U.S. Customs and Border Protection, EatStreet, Dominion National

July

July 17, 2019 - Clinical Pathology Laboratories

Due to the AMCA breach that affected Quest Diagnostics, Opko Health, and Labcorp, Clinical Pathology Laboratories had 2.2 million patients’ personal and medical information exposed with an additional 34,500 patients’ credit card or banking information breached. 

July 18, 2019 - Sprint 

A still unknown number of Sprint customer accounts were hacked through Samsung.com’s “add a line” website. Some exposed information included names, billing addresses, phone numbers, device types, device IDs, monthly recurring charges, account numbers, and more. 

Other July breaches: Maryland Department of Labor, Los Angeles County Department of Health Service, Essentia Health, Fieldwork Software, Los Angeles Personnel Department

August

August 5, 2019 - Poshmark 

The online marketplace, Poshmark, has announced that they’ve been hacked. Usernames and email addresses of an unreported amount of clients have been exposed in the breach. Poshmark has nearly 50 million users.

August 5, 2019 - Stock X

The online fashion-trading platform had its over 6.8 million user accounts exposed. Data that was out there included customer names, email addresses, usernames and passwords, shipping addresses, and purchase histories. 

August 9, 2019 - CafePress

A data breach at CafePress, a custom t-shirt and merchandise company, exposed the names, email addresses, physical addresses, phone numbers, and passwords of over 23.2 million customers. 

August 15, 2019 - Choice Hotels

Hackers left over 700,000 guest records exposed in a coordinated extortion attempt on the Choice Hotel chain. Stolen information included names, addresses, and phone numbers. 

August 16, 2019 - Biostar 2

VPNMentor and independent security researchers uncovered a data breach containing over a million individuals’ facial recognition information as well as the unencrypted passwords and usernames of 27.8 million individuals exposed from Biostar 2, a biometric security platform. 

August 27, 2019 - Hostinger

Hostinger, a web hosting company sent out an email to their 14 million clients who had their information hacked through an API server. As a result, first names, usernames, email addresses, IP addresses and hashed passwords were exposed.

Other August breaches: Presbyterian Healthcare Services, State Farm, MoviePass

Before your business has its network breached, data stolen, and reputation irreparably harmed, call the security professionals at Coleman Technologies to do a full security assessment. We can help you keep your data and reputation intact. Call us today at (604) 513-9428 to learn more. 

Continue reading

Warning Signs that Your Computer Needs Replacing

How to Tell How Old a Computer Is

When a computer starts to get too old, it can become a problem for productivity. In fact, to help avoid this, some even recommend replacing a work computer every four years… but how do you tell how old a work computer is in the first place?

This isn’t always as cut-and-dried as one would think it should be. Some computers and laptops will have a date right on the case, neat the serial number. If there is no date provided, a quick search for the serial number might give you an idea.

You can also check the components of your computer itself, using the System Information tool. In the Search Windows box, type in “sysinfo.’ From the results, access System Information and in the window that appears, you can find plenty of information to help you date the machine. For instance, if the BIOS of the device has never been upgraded, the date will likely tell you how old the machine is, more or less. Searching for other components can help you to confirm this estimate.

As a result, you can get a better idea of whether your computer’s issues are age-related, or if there’s something else creating problems.

Signs That Say It’s Time to Replace Your Computer

There are quite a few factors that can indicate when your computer is due to be retired. While these indicators can each be a sign that something else is going on with your machine, a combination of a few of them is a fairly reliable signal that you and your device will soon have to say goodbye:

  • The computer is huge. In the interest of space, many modern devices are built to be compact, taking up less space than their predecessors did. While this isn’t a hard and fast rule (powerhouse workstations often take up a lot of space out of necessity), a larger, basic-function workstation or laptop is generally an older one.

  • Startup and shutdown take forever. Again, there are a few different issues that could contribute to lengthy startup and shutdown times. Too many applications may be set to automatically run in the background, or your hard drive might be almost full. However, this is another common symptom of an aging device.

  • You’re encountering hardware and software limitations. If your attempts to upgrade your computer’s hardware and software - especially security software - are stymied by a lack of interoperability or support, it’s probably time to consider replacing it. This is even more so the case if your work-essential solutions can’t be upgraded any further or runs slowly, or loading your applications takes notably long and they can’t efficiently run simultaneously.

  • Your computer is loud. If the fans in your device (whether it’s a desktop or a laptop) run loud, it’s a sign that your computer either needs a good cleaning or needs a good replacing. If the issue persists after a thorough cleaning has taken place, that’s a sign that your hardware is working too hard, a sure sign of age-related issues.

If you feel that your hardware is due to be replaced, reach out to Coleman Technologies. We have the contacts to help you procure the equipment you need to remain productive and offer the support to keep this equipment going. Call us at (604) 513-9428.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

If you didn’t know Windows can save a list of the text and images you copy, I feel for you—you’ve missed out on a simple trick that could’ve saved you a lot of time. But don’t worry, it’s easy to set up, and I’ll show you how.

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

support@coleman.biz

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image