Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

A Brief Look at Project Management Tools

What is Project Management?

This may seem pretty self-explanatory, but project management is the planning and systematic organization of a project’s tasks. Unfortunately, anything that ends up going wrong in a project is immediately the result of bad project management. That’s why it is essential to have tools that allow for efficient and effective project management. 

Project managers typically oversee the creation, delegation, and completion of tasks that are coordinated in a way where the tasks result in a finished product. Therefore, a lot of what a project manager does “quarterbacking” a team of resources. Solid communications, time and resource management, and constant and diligent assessment are the staples of a successful project manager.

Parts of Solid Project Management

Every project is different, but there are some of the elements that the PM has to manage. 

  • Planning- It’s the PM’s job to plan out each task and assign it to the resources that are available for it. Being able to properly schedule resources is a core responsibility of the project manager mainly because most projects not only have multiple people that work on them, but also because tracking the time that the project takes is how organizations measure the profitability of the project.
  • Time tracking - Typically integrated with the scheduler to streamline operations, time tracking is essential to manage resource involvement and be able to properly assign tasks. 
  • Collaboration - Today, businesses have collaboration options that fuel efficient project work. It is the PM’s responsibility to ensure every resource not only has access to a collaboration tool, but also uses the tool provided to complete their tasks as efficiently and effectively as possible. 
  • Documentation - In order to have a complete and thorough assessment of any finished project, you’ll need to have complete and thorough documentation to go through. Many of today’s productivity options have integrated a great set of tools that help PMs analyze contributor value.
  • Assessment - At the end of a project, after the delivery of the product to the customer/client, a complete audit of the project will provide all the successes and failures that took place in the duration of the project, helping a business know what it needs to improve on and, ultimately, if their project is bringing a large enough return (or a return at all). 

With the success of an individual project tied to the management of the resources it takes to complete it, proper coordination, documentation, and assessment are especially important. 

Project Management Tools

Most of the actual tools needed to fuel your organization’s projects have now been integrated into one or two pieces of software. They provide PMs with all of the information they need to place resources, assign tasks, and oversee the whole project. A few of these tools include:

  • Gantt chart - A Gantt chart is a visual representation of the project. The Gantt chart is used to illustrate how a project will run. It makes recalculating the timeline of a chart and shuffling resources around to meet demand much easier. 
  • PERT chart - PERT stands for Program Evaluation, and Review Technique. It’s essentially a chart that shows where each task assigned in a project is connected to other tasks in a project. Also represented through what is called the Critical Path method, this allows project managers and their teams to get a clear representation of how all the tasks in a project end up creating the end product. 
  • Moscow analysis - An analytic technique that stands for: must, should, could, won’t it allows PMs to work with project stakeholders to create the scope of the project. Obviously there are things you must do in the scope of a project, those need to be planned for and scheduled first. Then the things that should be done, followed by things that could be done to improve value, and finally eliminate things that simply don’t need to be done. 
  • WBS chart - WBS stands for Work Breakdown Structure, and is a common tool to help people visualize the entire scope of a project. This provides a comprehensive list of individual tasks. 
  • The Cone of Uncertainty - This is a visual tool that shows the measures of uncertainty vs. time. As the project goes forward uncertainty decreases. As risk is mitigated and governance is solid, confidence will increase. By managing risks properly, any project’s cone of uncertainty will show static improvement, ultimately leading to a successful finale.  

There are several other tools that a project manager can use, and many of them are incorporated in today’s powerful collaboration software. Many Customer Relationship Management software titles provide project management tools. If yours doesn’t, you can get stand-alone project management tools for your email client that provides PMs a set of useful options.

What is happening more today, however is that PMs are beginning to use collaboration apps like Microsoft Teams and Slack that come with dozens of software integrations strategically designed to make project management--which is, of course, a traditionally messy endeavor--easier. These titles alone do a lot of good mitigating risks and fueling collaboration.

IT projects can often be difficult to implement, but the knowledgeable professionals at Coleman Technologies have a great track record of improving our client’s businesses through strategic project success. Call us today at (604) 513-9428 to see how we can help. 

Continue reading

You Are Most Definitely Using Cloud Computing

A Refresher on the Cloud

“The cloud” is a term that is used extremely loosely, effectively referring to any data that is stored on the Internet. So yes, online storage spaces like Google Drive, Microsoft 365, and Dropbox count as the cloud. Your website’s hosting service counts as the cloud. The social media sites you use, like Facebook and Twitter, qualify as the cloud in a way. Arguably, even online banking is a cloud-based service, as your information is stored on your bank’s online servers.

If you use a store’s photo printing services, or attach a file to an email, or ask your virtual assistant to wake you up early, you are utilizing a cloud service. Businesses around British Columbia use cloud technology to share documents, store data, and host apps and line of business software titles.

Any data you have stored online is data that you have in the cloud.

Is It Okay to Have So Much Data Online?

Truthfully? It all depends upon what data you are storing, and where it is being stored.

It is important to remember that - in essence - all the cloud is, is someone else’s computer that you can leverage. Storing data in the cloud is quite literally entrusting its security to someone else… something that has both benefits and drawbacks.

On the one hand, many businesses have onsite servers in which they keep their company data, which requires them to keep those servers secure. If something happens to this data (despite the network protections and backups that should be in place) it is on that business.

On the other hand, cloud services are typically provided by big-name companies who can feasibly afford to protect the data they have been entrusted with. Who would have more capital available to invest in cloud security… your business, or the likes of Google or Microsoft?

It should also be considered that these larger companies can provide much more value to the people who can successfully hack them. It isn’t unheard of, either… Yahoo, Dropbox, and Apple iCloud have all been breached at some level, and attacks are always happening.

So, Is the Cloud Safe? How Can I Protect My Data?

All this may make you feel as though your most secure option is to eschew the cloud as much as possible - but, depending on what you’re storing and how this data is protected, you may have other options. Here are a few practices to help you balance the potential risks and rewards.

Encrypt BEFORE Uploading

Encryption is a very popular buzzword among cloud solutions. Public cloud providers will throw terms like “256-bit encryption” around, making their services sound pretty great. However, your data will only be encrypted like this as it is being transferred. In storage, it is unencrypted, and is therefore vulnerable. If your data were to be encrypted independently of the cloud, on the other hand, it would be rendered effectively useless to someone who didn’t have the ability to unlock it.

Understand Your Compliance Requirements

Different industries maintain different standards for the security of your customer and client data, in addition to the data privacy laws that are on the books. The medical field has HIPAA, and many businesses need to abide by PCI DSS. In order for you to use a service provider’s cloud solution to store your data, you need to confirm that it is compliant to the requirements imposed upon your industry by such regulations.

Practice Password Hygiene

While this is important to consider when leveraging a cloud service, any of your online activity should abide by the same rules. If you don’t repeat passwords across accounts, you can effectively limit the number of accounts that can be breached through one action.

Be Discerning

Cloud storage and services is a growing industry, thanks to its low barriers to entry and huge potential profits. You need to make sure that you select a service that is fully protecting your data, not just the one that offers you the lowest price.

Coleman Technologies can help you with your cloud service needs, without sacrificing your security. To learn more, give us a call at (604) 513-9428.

Continue reading

Solid Training can Make All the Difference

On the surface there is nothing abnormal or wrong about this scenario. The problem, however, that dropping a new hire into the fray with a copy of the employee handbook and a day-and-a-half of software and sensitivity training may actually not be the best way to handle your human resources. This month we are going to talk about how creating a sustained training platform can actually have a marked effect on your business’ ability to stay secure and productive. 

Education vs. Experience

The first place we’ll start is with the hiring process. Many organizations prefer to hire people that have a college degree of some sort. While that may be prudent if you are hiring people for a specialized job, many entry-level job postings are now requiring college degrees, often to the organization’s detriment. Since college graduates are likely to command a higher salary--and they didn’t go to college (and often assume large amounts of debt) to work entry-level jobs--they typically get impatient with their professional growth and hop from job-to-job until they find something more to their liking. In fact, people who have graduated from college since 2010 have averaged four job changes in their first nine years. 

That’s not the only thing. You have people whose education doesn’t match up with the demands of the jobs. People that get their degree in a certain discipline and didn’t work a job relating to that discipline for years, are often further behind than people who have experience in the field. Then you have that person who applies, but majored in Latin in college. Most businesses would be better off filling the position from within than hiring someone from outside the company and lacks real-world experience in the job.

This is where training comes in. For the college graduate who has been exposed to different perspectives, disciplines, and rules than the people that work real-world jobs are exposed to the practical knowledge necessary to troubleshoot even basic problems in a business setting may be a little troublesome to start with. There’s a reason why your average mechanic, plumber, and electrician keep being able to raise their rates: they’re experienced and trained.

Types of Training

The first thing that should be mentioned is that dedicating a lot of time and resources to employee training can become expensive. This is likely why a lot of people don’t do much of it. There are five major types of training that most organizations offer, in varying degrees. They are:

Orientation

Every business has some form of orientation. This is a short run down of the expectations of an employee by management.  Orientation will show new hires all the relevant information about what it means to be an employee at the company. Some businesses go into detail about things like the company mission, values, corporate culture, leadership information, employee benefits, administrative procedures, and any other tasks that need to be completed before any actual training begins. 

Onboarding

Onboarding is different than orientation. When you are onboarding your employees, you train them in the specific duties their job entails. This could be training on software systems they need to be accustomed to using, or training on how your business wants them to complete specific tasks. The idea is to make new hires as effective as possible, as quickly as possible. Some jobs come with a half-a-day of onboarding, while others take over a year to complete. 

Mandatory

There are some things that workers need to know, regardless of the position they hold. Some mandatory training is dictated by Federal and State governments, while others are strictly industry-wide points of emphasis. Public sector jobs often are required to take occupational health and safety courses. This practice is becoming more and more prevalent in the private sector, as is sexual harassment training.

Operational Skills

Skills training is designed to improve an employee’s ability to do the work, or to fill in other positions in your company. There are soft skills training and technical skills training. Soft skills training is designed to improve an employee’s ability to interact with others; and, with the company. These skills include:

  • Presentation and communication
  • Problem solving
  • Conflict resolution
  • Time management
  • Collaboration
  • Emotional intelligence
  • Adaptability

Studies have shown that a dedication to soft skills training works to resolve the normative problems with high turnover and unsuccessful collaborative culture.

Technical skills training enhances the technical proficiency of an employee. Any time employees can get better at the technical aspects of their jobs, it improves the products and services the company they work for delivers. 

Security

Nowadays, with the circumstances that modern workers have to consider, security training is an absolute must. Not only does it improve employees’ ability to protect business assets, it ensures that they are aware of the potential problems that the modern business is exposed to. 

Physical security training is typically limited, but if it is a major part of a person’s role within your company to keep assets secure, they should be given the information needed to accomplish this task. 

What’s more likely is that each person will need to take part in cybersecurity training. Digital assets are routinely targeted by people inside and outside of your business, so knowing how to protect them is a major point of emphasis that decision makers have to consider. The average worker needs to know how to identify a phishing attack, the best practices of data transmission, and what are good and bad practices when interacting with cloud-based and other online-based resources.

At Coleman Technologies, we know just how important keeping malware and unwanted visitors out of your network is and can help you with your cybersecurity and network security training platforms. Our team of professional IT technicians, and our dedication to helping businesses keep hackers from negatively affecting business, can go a long way to help you establish the training platform you need to keep your business' digital assets secure. Call us today at (604) 513-9428 for more information.

Continue reading

Protecting Private Data Should Be a Priority

Personal Information

Before we get into the strategies of protection, let’s identify what constitutes personal information. It includes:

  • Full Name
  • Phone Number
  • Email address
  • Birthdate
  • Social security number
  • Passwords
  • Biometric data

If you consider how many times a business has asked you for this information, you will understand just how exposed your personal data is. You may not consider it a big deal until you are in the throes of a situation where your identity has been stolen. 

You Need to Maintain Control

Your personal information is exchanged in nearly every transaction you take part in online. In response to this, you need to understand what these organizations use this information for, and how exposure of your sensitive data diminishes your data privacy. Obviously, the goal is to keep this information out of the hands that will take advantage of it and bring detrimental situations to your doorstep.

Once you realize that you can’t trust companies with your personal information, you have started to understand the lay of the land. In Europe, the establishment of the General Data Protection Regulation (GDPR) brought the first major privacy protection law, and you are beginning to see more governments considering what to do in regard to data privacy. In many parts of the world, privacy has been nonexistent. Monitoring your information is a great way to turn that trend on its head.

As of now, people continuously distribute their information to organizations with the confidence that those organizations are going to keep that data safe. This hasn’t worked out that well for the individual, but that doesn’t seem to deter them from sharing this information anyway. 

Only 10 percent of people feel like they have control over their own data, but less than 25 percent of surveyed respondents believed companies are doing enough to protect it. What is strange is that 92 percent of respondents of the same survey said that they would like to have absolute control over their personal data, with 87 percent seeking the ability to remove personal data from the Internet if it negatively affects their reputation. 

Privacy Solutions

Just being diligent about who you give your data to simply isn’t enough to protect it; and with so few options available to do so, an individual’s best bet is to understand the threats they face. These include:

  • Vulnerabilities in applications - Data breaches are mostly caused by software that isn’t updated with up-to-date threat definitions. This problem can happen to any organization that isn’t diligently updating the software it uses.
  • Poorly trained workers/sabotage - You wouldn’t believe just how many massive data breaches are caused by the people that a business depends on the most. If your staff isn’t properly trained, or you have disgruntled employees that have access to sensitive information, those situations could end poorly for you. 
  • Lack of response - Even if you have all the security you need in place, breach is still a possibility. That’s why it is crucial to be prepared in the event of a breach that your organization has the tools and expertise to mitigate the situation before it becomes a problem. 
  • Refusal to dispose of data - Your organization may find the data it takes in useful for multiple reasons, but if you sever ties with customers, vendors, and staff, it is your responsibility to securely dispose of their personal information. A failure to do so in a timely fashion could lead to a negative situation. Get rid of the data you no longer need, especially if it contains sensitive information.
  • Collection of unnecessary data - If data is a form of currency, it stands to reason that it will be shared between companies. If you don’t need the data, however, why do you have it? Possessing data you don’t intend to use--or don’t need--can lead to losing track of it. 

People provide personal information all the time, and unfortunately, the organizations they are giving it to don’t understand how to protect it properly; or, worse yet, actively use it for their own monetary benefit. With the lack of effort by these organizations, individuals have no choice but to take a diligent approach to keep sensitive data away from hackers, and keep their identities secure. 

If you would like more information about data security, visit our blog at www.colemantechnologies.com today.

Continue reading

Hate your IT? It’s More Common Than You Think

Two years ago, a friend of mine had a swimming pool built behind his house. It had a real nice deck, a deep end, a slide for his kids, and a little sectioned-off shallow end that was heated with jets. Talk about a nice way to cool off after a long week! This pool was in constant use - his kids had pool parties, he hosted cookouts. This investment of his was bringing his family a lot of joy and happiness.

Fast forward to this summer. Apparently the ground had settled and shifted, causing a leak that not only slowly drains his pool, but has been washing out the dirt under the pool. Even worse, some of the excess water has found its way into his newly renovated basement. This is not an ideal situation.

Now the thing that used to bring my friend a lot of satisfaction is the bane of his existence. It’s a problem, and it’s causing stress and costing money.

Your business technology can work the same way. It’s designed to help you do more and keep track of more, but when things go bad, it can really be a disaster, especially if you’ve been relying on it. 

My friend now hates his pool. He regrets it. In all seriousness, I feel terrible for him. More than half of the summer went by before he was able to get the problem fixed. By the time it was fixed, the joy that his swimming pool once brought him was gone. After a particularly hot weekend, I asked him if he was glad that he got his pool fixed so he could enjoy it again. He just shrugged and said it barely crossed his mind.

I was thinking, this guy must be crazy! I would have spent the entire weekend in this swimming pool. Then I realized that I’ve seen this before. I’ve felt this.

It’s really easy to get disenchanted by something that once made you excited or brought you a lot of joy. Once it’s a burden, you can get burnt out by it.

For a lot of business owners, your technology is going to feel the same way. There’s a lot of good it can do for you, but once you’ve dealt with years of annoying issues, unexpected bills, and users reporting problems, it starts to really weigh you down.

I don’t want any of my clients to feel the same way about their business as my friend feels about his swimming pool. I want your technology to work for your business. I want it to help you make more money, not be an expense. If anyone feels burnt out or let down by their IT, please give me a call at (604) 513-9428 so I can help you love it again.

That’s all I wanted to say; there’s no pitch here, there’s no IT lesson. You don’t deserve to be constantly frustrated by your IT, and it doesn’t have to be that way.

Continue reading

About Coleman Technologies

Coleman Technologies has been serving the British Columbia area since 1999, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

Whether it's a personal challenge or a necessity, keeping productivity high is good for an individual’s career growth and overall self-worth. Unfortunately, staying on top of your game can be difficult. We thought we would give you three things to co...

Contact Us

20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Mon to Fri 7:00am to 5:00pm

[email protected]

(604) 513-9428

Coleman Technologies Awards & Memberships

Image
Image
Image