Coleman Technologies Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Slow Computer? Increase your memory to boost computer Speeds

There are several factors that contribute to the speed of a PC. Let's very briefly break these down:

CPU/Processor

The CPU handles all of calculations a computer performs. These days consumer-class CPUs handle billions and even trillions of instructions per second. While dated processors can greatly influence the actual speed of a computer, if your PC is fairly new (as in 1 or 2 years old, and possibly older for higher end builds) it's likely not bottlenecking your performance. Today, CPUs are equipped with two, four, or even more cores, which means the CPU can handle an more calculations exponentially and consume less electricity.

RAM/Memory

Random Access Memory is basically the short-term memory of your computer. While your computer is loading and running applications, they get stored in the RAM. The RAM is much faster than the hard drive, so your computer doesn't need to spin it's wheels looking for specific files and parts of applications. The more RAM you have, the more "stuff" that can be stored in it. The faster your RAM, the faster your computer can sift through the data that gets temporarily pushed into it. Once your RAM is full, your computer will depend on the hard drive to retrieve information, and that's where things get sluggish. Once you stop running a program, it will remove itself from the RAM to free up some space for everything else running.

Hard Drive

The hard drive is the storage device of a computer. For extremely high-end PCs, the hard drive is the bottleneck. Hard drives, when compared to RAM, are very slow to access and write information. Once your computer needs to rely on your hard drive heavily for RAM, things are going to start getting bogged down. While it's great that your PC can rely on your hard drive in this way for those times it needs some extra memory, it is likely this is the slowdown. Unfortunately, because hard drives are mechanical and have moving parts, there's limitations to how fast science can make them perform. There are costly solid-state drives, but as a performance-improving factor on a standard workstation, typically solid state drives aren't the cost-effective answer.

Of course, there are software factors as well. Malware and Spyware can bog down your system, and after a lot of use, temporary files can bog things down. Before upgrading hardware, you'll want to have a technician run a quick evaluation on your PC - it's possible a little cleanup can make all the difference in the world.

Otherwise, the next step is upgrading the RAM. RAM is usually relatively cheap, even to double or triple your existing RAM with faster, higher performance memory. Often the cost of the new RAM itself will be between $50 and $100, and more than likely less than that, and that's for a substantial increase, but it depends on your PC.

Is your computer running slow? Does it get bogged down by the time you have all of your day-to-day applications open? Contact us at (604) 513-9428 for a quick evaluation to see if a simple, cost-effective upgrade will help you perform your job more effectively.

Continue reading

How Safe is Your Email?

Spam Inundation

If you've been using email for a while either professionally or personally you have almost certainly gotten email from people you don't know. Most of these emails are blatantly unwanted while others can look 'almost' legit, as if a real person is trying to contact you. Often (and unfortunately) spammers can get your email address when you put it online or use it to register for accounts on sites on the internet. The good news is standard spam protection is getting better these days, and more advanced spam protection is cost effective for businesses that need the extra layer of protection. Spam can cause a lot of harm for a business network if it isn't kept under control - spam can bog down email servers and eat up network bandwidth and plus it drastically slows down employee productivity because they need to sift through it all just to find their real email. If you and your staff are getting more than a few spam emails a day, contact us at (604) 513-9428 and ask about our anti-spam solutions.

Don't Open Attachments from Unsolicited Emails

This has been a golden rule for general email usage for a very long time. If you received an email from a stranger and there is an attachment, don't touch it. If you receive an email from a contact and there is an attachment, but anything is suspicious, don't touch it. This goes the same for links - if the email was unexpected and just seems fishy, it is possible your contact's email may have been compromised. Use your judgment on this, but remember it isn't your contact trying to trick you, they are merely the victim of a similar hoax from one of their contacts. If you have any doubt, simply reply or pick up the phone and ask them about it before continuing.

Keep your Computer Safe

Be sure to keep antivirus definitions up to date, and run scans regularly. Running adware and spyware removal software at regular intervals is important too. Be sure your Windows Updates are up to date as well. For businesses, you'll want to invest in network protection to keep external threats from leaking in. Even for small British Columbia businesses, security and threat management is important to keep operations running smoothly and to prevent expensive downtime and data theft.

Don't Rely on Email for Storage

Everyone has done this at least once; you are working on a report or document on one computer and you email it to yourself in order to pull it up on another computer. That's fine as long as you mind your inbox capacity, but you shouldn't rely on email for storing files, not even as a reliable backup. Imagine having to painstakingly pick through all of your email to restore your most important files. It doesn't sound like a good idea now, does it? On top of that, email isn't any less prone to data corruption or loss than any typical storage solution, and unless the server hosting your email is backed up with a reliable solution, it could be here today and gone the next.

Encrypt Sensitive Data

If you send sensitive data to other recipients, you will want to consider email encryption. Some industries require this. Email encryption simply scrambles the message while it is being sent, and depending on what type of encryption, will descramble itself or allow your recipient to log in to a secure location to view the data. Although email encryption services vary, most of them are very cost effected especially when put beside the risks of sensitive data getting leaked and stolen. Give us a call at (604) 513-9428 to learn more about email encryption and what solution is right for your business needs.

Continue reading

5 Tips for Saving Money on your IT

Don't be Afraid to Replace

Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy workstations, and if things are tight you can even buy refurbished desktops to keep costs low.

Enforce Energy Efficiency

If you reduce the amount of energy your technology uses each day, your utility bill from the electric company will decrease as well. Switching to LCD monitors (if you are still using old CRT dinosaurs), and enforcing company-wide policies to turn off monitors or put workstations to sleep at night can make a big difference.

Stop Dealing with Vendors

You hired your employees to work, not sit on the phone with a PC manufacturer because your hard drive crashed. Businesses waste money by paying employees to go around in circles with vendor tech support all the time. IT firms like Coleman Technologies build relationships with vendors and are able to get things done faster. This means issues get resolved quickly and your employees don't need to deal with less-than-helpful support.

Stop Paying your Phone Bill

Yes, you heard us right. Cease paying your phone company by switching over to a VoIP solution instead. Small businesses save up to 80% on their telephone communication expenses, so the investment pays for itself quickly. Many VoIP systems allow your users to take their phone and use it anywhere, giving you increased flexibility and functionality.

Get Proactive Monitoring and Maintenance

Nearly all day-to-day IT issues can be completely prevented with just a little bit of maintenance. Coleman Technologies offers these services to our clients, reducing the amount of downtime they experience. Traditional computer support only fix computer issues when they arise. Coleman Technologies provides proactive monitoring and maintenance to ensure fewer issues plague your business.

Continue reading

Tip of the Week: Ways to Be Active and Proactive With Your Network Security

Applying Software Patches
It should be clear that software patches are designed to fix security problems and improve the functionality of the software, but some organizations simply don’t have time to implement them manually, or they simply don’t understand the purpose for them. Part of the problem is that sometimes the developers aren’t necessarily clear that patches are available, while other times those within your organization may not even know how to administer them. Regardless of the reason, there are usually problems on a network that will go unattended for extended periods of time.

Most hackers only want to take advantage of the issues they can detect. Thus, there could be countless threats out there designed to target countless unpatched vulnerabilities on your network that not even the hackers can know about. It makes sense for a hacker to use just one exploit to target a handful of vulnerabilities. Therefore, it’s important to make sure that all software that you use is updated and patched.

Additionally, your systems shouldn’t be running unused programs. The more software you have, the more ways hackers can take advantage of your organization’s network vulnerabilities. Moreover, you might even be wasting revenue on renewing software licenses that you don’t even need, so it’s best perform a network audit from time to time to get the worthless software off your infrastructure.

Dodging Social Engineering Attempts
Social engineering is broadly categorized as any method that takes advantage of unprepared users or those who are ignorant of solid network security practices. Examples include a phone call or email message claiming that the network has been breached by a foreign entity and that “tech support” needs to remote into the computer and resolve the issue. There are other, more subtle methods as well, such as targeted spear phishing attacks that go after specific users with personal information that convince them that the hacker is someone in authority.

These types of attacks vary in sophistication, but they can range anywhere from an employee receiving a message claiming that they’ve won a prize, to the intruder physically following your employees into the office and stealing sensitive data manually. In instances like these, a little bit of employee training can go a long way. Teach them to look for anything suspicious, and inform them that vigilance is incredibly important in the workplace.

These two security improvements barely scratch the surface of what your organization should be focusing on for network security. If you want to fully protect your business to the best of your ability, give us a call at (604) 513-9428.

Continue reading

Mobile Solutions

wireless cloud

Optimize your workplace for remote access.

Without being tethered to your desk, your organization can open up several opportunities to optimize operations and facilitate growth.

Mobility grows increasingly more important in today’s business world, and as such, innovators around the world are striving to integrate only the best mobile IT solutions into their corporate infrastructure.

wireless cloud

Without being tethered to your desk, your organization can open up several opportunities to optimize operations and facilitate growth.

Optimize your workplace for remote access.  Mobility grows increasingly more important in today’s business world, and as such, innovators around the world are striving to integrate only the best mobile IT solutions into their corporate infrastructure.

When we say “mobile solutions,” we’re talking about taking your business on the road without fear of being disconnected from your mission-critical applications and data infrastructure. Furthermore, we want to improve the security of your mobile network access. Coleman Technologies has several mobile solutions available for the small and medium-sized business, including:

  • Cloud Computing Solutions
  • Mobile Device Management Solutions
  • Secure Mobile Connections

Cloud Computing Solutions

Instant application and data access across platforms.

One of the biggest pain points of modern businesses is that they need to access specific information or applications while out of the office. This makes business trips frustrating, and it can hold your organization back from achieving its greatest potential accomplishments. Wouldn’t it be great if you had constant access to your business’ most important assets through a simple online interface?

With a cloud solution from Coleman Technologies, your users can take advantage of a simple interface where they can access any mission-critical information easily and securely through your online cloud. Users can view documents, use required applications, and even collaborate in real-time. Our cloud solutions are entirely scalable to meet the individual needs of your business, making them ideal for a company of any size.

Mobile Devices and BYOD Solutions

Optimize remote access with powerful mobile solutions.

Even if your business has access to data while out and about, this means nothing if your users don’t have devices that are capable of doing so. Many users are using their own personal smartphones, tablets, and laptops to get more work done while on the company’s network. This trend, called BYOD, is growing more popular, as it allows users to take advantage of familiar technology rather than learning a whole new device.

Unfortunately, mobile devices also bring into question several security issues that need to be addressed. With Coleman Technologies's mobile management solution, your organization can ensure that users’ personal devices aren’t leaking sensitive information through apps. You have complete control over the whitelisting and blacklisting of specific apps, meaning you can, in theory, optimize operations and productivity with your administrator privileges.

Virtual Private Networks

Securely access sensitive corporate data while on the go.

One of the biggest challenges of working remotely is doing so securely with no risk of compromisation from hackers or other malicious entities. Public Wi-Fi hotspots can widely be considered the cesspools of the Internet, where threats like viruses and malware are most likely to gather. That hotel Wi-Fi connection you’re paying for? It’s unwise to trust it without taking certain precautions.

The best fix for these kinds of situations is Coleman Technologies's Virtual Private Network (VPN) solution. Our VPN is designed as an extension of your business’ network that allows you to securely log in and access your information from any wireless access point. This helps you avoid putting your network’s data at risk while traveling.

Take Advantage of the Wireless Environment

Get started with wireless solutions today.

If your business’ mobile technology, or lack thereof, is holding it back from achieving maximum productivity, Coleman Technologies has a wireless solution designed specifically for your organization that can fix this issue. Give us a call at (604) 513-9428 today for a free IT consultation.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

Whether it's a personal challenge or a necessity, keeping productivity high is good for an individual’s career growth and overall self-worth. Unfortunately, staying on top of your game can be difficult. We thought we would give you three things to co...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image