Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

Pros and Cons of Leaning on a Wireless Network

The Wireless Connection

The Pros

There is one obvious benefit: No wires! Not having to run cable is a massive benefit, but the biggest benefit of this might just be the ability to connect devices to a wireless network inside your business. By giving your team access to network resources wirelessly, you’ll see better collaboration, improved productivity, and produce better products and services. 

Additionally, with a strong wireless network, you can promote some strategies that can work to improve your operational effectiveness. One of those strategies is a Bring Your Own Device (BYOD) strategy. Many of your employees bring their smartphones with them when they come to work. By enacting a BYOD strategy, your staff can take advantage of the devices they are most used to advance the goals of the company. 

The Cons

Even many wireless technologies aren’t actually wireless. Even the ones that are, need to be charged regularly, so while expanding your wireless network will provide the ability to compute inside the network’s perimeter, setting up a more collaborative workspace still comes with some drawbacks. Namely speed and security.

Wireless connections are more vulnerable than wired ones. It’s easier for unauthorized individuals to hijack the signal of a wireless connection and can provide a third-party that is looking to gain access, more of it to the critical information that is transmitted wirelessly. 

The Wired Connection

The Pros

When dealing with wired networks, IT admins have more control over what devices can connect to the network. This presents values several ways. First, there is more control over the security protocols on those devices, making contracting malware and other negative outcomes less likely. 

Wired connections also enhance an organization’s ability to keep their devices free from security threats. Controls have improved to the point where it is actually more difficult for attackers to break into a wired network.

Additionally, it may go without saying, but wired networks are overall faster than wireless networks. This speed boost is magnified if there are walls, floors, ceilings, or any other potential interference to seeing optimal speeds over Wi-Fi.

The Cons

The biggest setback to a wired Internet network is the act of wiring the network. Initial setup is a pain, as you need to hide cables and find ways to run cable as to not hinder the thoroughfares around your business. It is also a hindrance for maintenance if a cable fails or hardware has to be moved around due to business growth or restructuring. 

Another detriment to the business is that a wired connection doesn’t allow for the type of mobility many businesses are looking for nowadays. With a wireless connection meetings are faster, more to the point, and collaborative work can be fluid.

You have a business decision to make; and, while it may not be the most crucial one you will make, it can have an effect on how your business functions. For help networking your business, call the professionals at Coleman Technologies today at (604) 513-9428.

Continue reading

Vendors Can Cost You More Than You Realize

This is what is called vendor management, and it can go a long way toward saving you a lot of time and money. 

What is Vendor Management?

Think about how many vendors you use when it comes to your business’ IT. There’s a pretty good chance that there are quite a few. Hardware, software, services, and much more. As you get established with certain vendors, they become important to your business’ success, but aside from supplying you with their organization’s goods, they also take up a fair amount of time. 

That’s where the challenge lies.

Since you don’t have all the time in the world to keep your vendor representative on your speed dial, but you also need to focus on your business. At Coleman Technologies, we offer what we call a Vendor Management that serves as a go between you and your vendors, providing you the solutions that your business needs without having to spend all types of time being  bogged down talking to vendors. Vendor management helps to alleviate the issue significantly.

How Vendor Management Benefits Your Business’ Bottom Line

Now that we've told you what vendor management is, we can now tell you how it can significantly affect your organization’s bottom line. They include:

Better Use of Time

As we went over above, dealing with your vendors yourself can be a time-intensive process. However, by working with Coleman Technologies and allowing us to manage your vendors, all you have to focus on is your relationship with us. We will handle the vendor relationships, allowing you to focus on your business.

Benefits and Bargains

Since we have long-established relationships with all types of IT vendors, we are often able to procure technology quickly and effectively; saving you money on your technology investments. 

Simplicity

If we are to serve as your single point of contact, it keeps the situation simple. You don’t have to focus an ounce of energy setting up and managing your IT services and relationships. We do it all for you. 

Is a vendor management service seem like something you could really benefit from? If so, call Coleman Technologies at (604) 513-9428 to speak to one of our IT professionals about our managed IT services. 

Continue reading

Are You Properly Managing Your Cloud Services?

Most cloud vendors will propose that an organization’s IT is too expensive for what they would get out of it and that by using cloud services a business can cut down on its hardware and management costs. For the most part, this is true. Cloud services can bring flexibility and capital cost reduction, but it can also bring substantial waste if your cloud-based resources aren’t managed effectively. 

We don’t want to give the impression that cloud services aren’t useful, they undoubtedly are, but you may be surprised to learn how much money is wasted by small and medium-sized businesses in the cloud. By routinely playing for recurring web service accounts may not seem like a big deal on the surface, but it only takes a couple accounts per month to add up to hundreds and thousands of dollars a year. That’s just the tip of the iceberg.

Many organizations that use hosted environments for development or deploy virtual machines for application distribution may initially find cost savings by moving to the cloud, but over time, see those savings dilapidated as larger-than-needed VMs are left running and other computing platforms chew up resources that are billed per CPU hour or per gigabyte. 

So how do you go about creating a strategy that will give your staff the resources they need, while also not having to waste money on unused cloud resources? Here are a couple tips:

  • Track all online service licenses and correlate them with the number of employees that need that software to complete their jobs.
  • Have a system in place where employees can find solutions to help them, while providing you the ability to block this Shadow IT software if it poses any threat.
  • Clean up old volumes, snapshots, and machine images. 
  • When you turn on resources in non-production environments, make sure to set it to the minimum size requirements. 
  • Use the Reserved Instances option for any production resources and manage them closely. You could save up to 75 percent off your cloud investments. 

Use these five tips to control your cloud computing costs. Tracking your cloud services and eliminating any redundancies or unused resources will go a long way toward reducing your overall computing costs. For more information call Coleman Technologies today at (604) 513-9428.

Continue reading

Collaboration Drives Business Efficiency

It’s not a secret that departmental cooperation is increasingly central to the workflows of today. Businesses need to stay agile, which means more has to be done with less. As more people take on more responsibilities, there needs to be better communication, and ultimately trust, if a business’ goals are going to be met. This has businesses of all sizes looking for tools that will help their staff be more collaborative, more efficient, and meet those benchmarks that will allow for organizational growth. 

Obstacles to Collaboration

It seems ironic that a strategy that most businesses need to foster, is actually getting harder to achieve. Today’s workforce is different in many ways, but one of the most glaring weaknesses of the modern workforce is that their needs supersede that of the organization they work for. This is not wrong per say, but it can be a major problem for smaller organizations that need collaborative initiatives to fuel their products and services. With the gig economy growing rapidly, and the cost benefits of hiring contract and outsourced workers, it makes it harder than ever to get a staff of people on the same page. 

There are several more barriers to collaboration, including:

  • Differences in opinion
  • Lack of respect and/or trust
  • Internal competition
  • Lack of solid project management

When you are asking people to work with others for a common goal, personalities can get in the way. That’s not to say that there shouldn’t be some semblance of professionalism and workplace decorum, but the truth is that some people just don’t like working with other people. If you are running a small business petty squabbles are unacceptable and can really hurt your chances of success.

It is important that every member of a team knows exactly what is expected of them, but it’s the decision makers that need to understand who works well with who and what type of collaboration to use. There are three different types of positive workplace collaboration. They are:

  • Simple Collaboration - The most basic form of collaboration. This is your typical information and document sharing. If someone needs an answer, someone else provides it.

  • Document Collaboration - Document collaboration is a significant step because it means that people are actually working together on a single document towards a common goal. Giving multiple users the capability to work as though they were side-by-side without regard to the actual distance between them is not being integrated into many software platforms nowadays.

  • Structured Collaboration - This is the type of collaboration in which people need to work together to complete a predefined goal. If they aren’t able to work together, there will be no product or service. Essentially, anyone that has worked on a project with someone else has taken part in a structured collaboration. 

Collaboration and Technology

Most businesses use technology to bridge the gap between departments, teams, and employees. Technology is making it more possible than ever to collaborate, and many of a business’ technology investments are made with collaboration in mind. The idea is that if employees are expected to use centralized management software like a Customer Relationship Management tool or a document management and storage system like Microsoft SharePoint, that all the information and resources are then available from one place, making collaborative work more possible. 

Today, there is new software that simplifies the process. Software like Microsoft Teams and Slack are designed simply as an instant messaging-fueled forum that integrates with many of the major CRMs and other management solutions, creating a central hub to speed up communication and collaboration. These applications allow teams to be more agile and more productive. 

Collaboration is a huge part of doing business in the information age. If you want to learn more about how technology can fuel your business’ productivity, reach out to the IT experts at Coleman Technologies today at (604) 513-9428. 

Continue reading

Why You Need to Be Concerned about Both Phishing and Ransomware

First, it will help to briefly review how each attack works.

How Ransomware Works

Imagine if you tried to log into your computer, only to be presented with a message that your entire computer had been encrypted, and that (unless money is transferred to the perpetrator, often through cryptocurrency, within a period of time) the contents of your device will be wiped. This is precisely the experience of someone victimized by a ransomware attack.

How Phishing Works

Remember those old scams, where the target would receive an email from some nobility or long-lost relative that asked for a sizable loan or investment (all to be paid back with interest, of course)? These are phishing scams, known as such because the scammer responsible simply distributes a message and waits for someone to take the bait. As time has passed, these schemes have become much more effective - and harder to spot.

These Attacks Can Easily Cooperate 

Cybercriminals have taken to pairing these attacks together to help them take advantage of as many targets as possible. Let’s run through a fairly typical scenario that someone using both may subject you to, and how you can spot these kinds of joint efforts.

Let’s say you open your business email to find a message that appears to come from the Microsoft Support team - which, unnoticed by you, actually reads “Micrrosoft Support” in one or two places. According to the email, there’s a hugely serious security issue affecting systems across the board, which is why Microsoft is supposedly sending out these emails, with the necessary fix bundled in as an attachment.

Trouble is, this isn’t actually a fix to an issue - it’s actually an executable file that installs ransomware when you try to apply the “security fix” and creates a huge problem.

This is exactly why these two distinct attacks combine so well… by incorporating phishing strategies into the distribution of their ransomware, a cybercriminal has the ability to boost how successfully their ransomware can infect the users that are targeted.

How to Spot Phishing to Avoid Ransomware

There are assorted warning signs that a message is a phishing attempt that you should always keep an eye out for in order to protect your business. For example:

  • Details are off - In keeping with our above example, how likely do you think it is that “Micrrosoft” would send out an email in which they misspelled their own name? While this is admittedly happening less in phishing emails, the same goes for the small things that are easily overlooked. Was the email in question sent from “user at example.com”? Or, was it actually sent from “user at exarnple.com?” Tricks like this are common ways that cybercriminals will try to pull the wool over a user’s eyes.
  • There’s excessive urgency - To keep users from paying too much attention to the minutiae of the email - like the “off” details we just discussed - many cybercriminals will write their phishing messages to instill a sense of urgent panic. If an email starts to make you panic, collect yourself and look at it more objectively.
  • There’s a link or an attachment - As the preferred means of delivering a ransomware payload or other issue, attachments or links to websites present no small amount of risk, especially if they are received unexpectedly. If at all possible, avoid accessing these without reaching out to the sender to confirm their legitimacy through another method of communication.

There are many other steps you need to take to protect your business from these insidious threats - from keeping a comprehensive backup to user training to applying spam filtering to your email. Coleman Technologies can help you implement them - give us a call at (604) 513-9428 to get started.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

Whether it's a personal challenge or a necessity, keeping productivity high is good for an individual’s career growth and overall self-worth. Unfortunately, staying on top of your game can be difficult. We thought we would give you three things to co...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image