Blog

Coleman Technologies Blog

We can give your organization comprehensive IT services and 24/7/365 live support for a predictable monthly fee. Stop stressing about technology, and start focusing on growing your business.

3 Success Metrics for Your Business Technology

3 Success Metrics for Your Business Technology

Your business’ data holds incredible potential for helping you improve operations, but only when it is leveraged properly. To this end, you have to identify specific metrics that you are working toward and establish how these metrics are helping you make strides forward. IT offers plenty of metrics to help you make better decisions about operational efficiency.

0 Comments
Continue reading

How to Tell Your IT is Performing as Expected

How to Tell Your IT is Performing as Expected

One of the most important considerations that a business that relies on technology needs to make is how efficiently its technology works. Let’s discuss some ways to measure this benchmark and ensure that it is optimized to meet your business needs.

0 Comments
Continue reading

What Exactly is Personally Identifiable Information?

What Exactly is Personally Identifiable Information?

It’s incredibly important to keep your personally identifiable information secure, but what exactly constitutes PII? Today we offer a definition and suggestions or strategies to help you keep your PII safe.

0 Comments
Continue reading

Digital Data is Amazing, Part 2

Digital Data is Amazing, Part 2

Last time, we broke down how much data is stored in a typical book, and how much data every book in the Library of Congress contains. This time, let’s really show you what that data consists of, and some other really neat comparisons to put things into perspective. Buckle up!

0 Comments
Continue reading

Digital Data is Amazing, Part 1

Digital Data is Amazing, Part 1

Do you ever think about how incredible technology is? In a world where it’s easy to take advantage of technology and devices that were practically inconceivable just a few short decades ago, it’s really amazing to just look at how far we’ve come, and how something so small can fit so much information.

0 Comments
Continue reading

Understanding the Benefits of a CRM Solution

What is a CRM?

Short for Customer Relationship Management, your CRM is the tool that helps you track the relationships you have with the people you offer your services to, assisting you in developing these contacts into faithful clientele. As a bonus, these solutions generally come with integrations that give you access to even greater capabilities and resources.

0 Comments
Continue reading

Tip of the Week: Working with PDF Files

Rotate the Document

It is very easy to accidentally scan a document into your computer so that it doesn’t appear upright on your display. A program like Adobe Acrobat Pro offers an in-menu option that allows you to do just that - in Document, find Rotate Pages. This option will allow you to select the pages that need to be rotated, and how to rotate them. Other programs may feature a toolbar button that allows you to rotate each page.

Fixing your pages, despite taking a few moments of time, is certainly a worthwhile thing to do, as it makes the document easier to read, promoting accuracy and convenience.

Password Protecting the Document

As long as the person or people who need to see a particular PDF have the proper password, protecting the document in question with a password is a generally good idea - especially if it contains “for your eyes only” information. To make these files as secure as possible, make sure that the passwords are distributed through secure means.

In Word, you can save your files as a PDF using the “Save as” function, simply selecting the PDF option as you do so. You will also see a button offering More options, which brings up a second dialogue box where you can find “encrypt document with a password” in that box’s Options button. By selecting encrypt document with a password, you will have the option to provide a password (and confirm it). At that point, anyone opening the PDF will need to enter that password to view it.

Merging PDF Files

It isn’t uncommon for different parts of the same document to be saved as different PDF files, or for multiple copies to be saved with different information filled in. It is usually better to have all of this information consolidated, to make reviewing it much easier. While many free and paid software titles can allow you to do this, you should reach out to us before you select one, as we can help you make the right choice for your needs - you probably don’t want the program’s watermark on your finished document, or find yourself needing to merge more documents than a free program will allow.

If you’ve already acquired Adobe Acrobat, merging your files is fairly simple. After opening the program, access the Tools menu and select Combine files. Doing so will give you the ability to Add Files… and once you have selected all of the files that should create your new PDF, click Combine. Once they are combined, clicking Save as will allow you to store it where it belongs.

Signing a PDF

Many times, a contract that needs to be signed will arrive as a PDF. While many resort to printing these documents out to sign them, there is an easier way - signing them electronically.

This time, the free Adobe Reader software can get the job done, but you should still check with your IT resource before using it.

If Adobe Reader is approved and installed by IT, you can easily sign PDFs electronically. By opening the PDF file with Reader, you have access to a Fill & Sign button. Click it, then Sign and Add signature. You’ll then have access to three options:

  • Type - you simply type your name into the field, and an electronic signature is rendered (which will not look like yours).
  • Draw - you use your mouse to draw out your signature.
  • Image - you use a scanned image of your actual signature that is then saved for future use.

Once you’ve positioned your signature where it should be, click apply and make sure you save your revised PDF.

Always remember to check with your IT team before you download any software! For more IT tips and other useful pieces, make sure you subscribe to our blog!

0 Comments
Continue reading

Is Blockchain a Shield for Cybercrime?

How Blockchain Has Been Shown to Be Vulnerable

Let’s face it… blockchain technology is a human invention, which means that there are going to be some flaws.

Admittedly, the concept behind the blockchain makes this hard to believe: every transaction made through the blockchain, financial or data-based, is given a permanent, designated “block” in the chain. Before the transaction is completed, the rest of the network needs to approve this new block’s validity. The block is then added to the chain, where it cannot be altered and provides an unchangeable record of the transaction - to undo it, a new block would be created. It is only then that the transaction is completed.

While this method may seem foolproof, even “unhackable”, this just isn’t the case. In March of 2014, cybercriminals managed to steal $450,000,000 worth of Bitcoin through a transaction mutability vulnerability, and in June of 2016, cybercriminals managed to steal approximately $60,000,000 by leveraging a recursive calling vulnerability.

Additional Blockchain Vulnerabilities

Again, as a human creation, there are going to be some flaws in blockchain platforms. One investigation revealed that some blockchain and cryptocurrency platforms had over 40 vulnerabilities.

51% Vulnerabilities

Many of blockchain’s vulnerabilities have more to do with the nature of the platform as well. One such vulnerability is known as a 51% vulnerability, and is associated with mining cryptocurrencies. Let’s assume you are a cryptocurrency miner. If you manage to accumulate hashing power that exceeds more than half of what the blockchain contains, you could leverage a 51% attack to manipulate the blockchain to your own advantage.

Naturally, more popular blockchains, like Bitcoin, are far too expensive to be practical targets, but smaller coins are much more affordable to attack and can be lucrative for hackers. In 2018, 51% attacks were leveraged against less popular cryptocurrencies, netting the attackers approximately $20 million.

Security of Private Keys

Using a blockchain requires a user to have a private key. Naturally, if this key were to be stolen, those cybercriminals who stole it would be able to access and tamper with that user’s blockchain. What’s worse, because the blockchain is decentralized, these kinds of actions are difficult to track and even harder to undo.

Breach Examples

As you might imagine, most breaches involving a blockchain are in some way tied to an end user. In 2017, a fraudulent cryptocurrency wallet service was left up for months as the cybercriminal responsible allowed people to funnel their cryptocurrencies into it before stealing $4,000,000 - out of a reported total of $2 billion being stolen since 2017 began. In January 2018, it was disclosed that hackers stole private keys with malware, taking over $500,000,000 in NEM coins (a now-effectively-worthless cryptocurrency established by a nonprofit).

If hackers are able to steal from a purportedly “unhackable” technology, what’s to stop them from stealing from your business?

Cybersecurity solutions from Coleman Technologies, that’s what. We can set up the security solutions your business needs to protect its data, and monitor your systems to detect breaches preemptively, preventing a security issue from happening. To learn more about what we can do, reach out to us at (604) 513-9428.

0 Comments
Continue reading

Why Your Business Needs to Define Its Ethical Code

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!

0 Comments
Continue reading

Customer Login

News & Updates

When it comes to growth and advancement, small and medium-sized businesses (SMBs) in British Columbia have been effectively leveraging Coleman Technologies’ affordable enterprise-level IT practices and solutions since 1999. The proof: Coleman Technol...

Contact us

Learn more about what Coleman Technologies can do for your business.

Coleman Technologies Inc.
20178 96 Avenue, C400
Langley, British Columbia V1M 0B2

Operations Center
6600 Chase Oaks Blvd, Suite 100 Plano
TX 75023

 

2 year badge

Copyright Coleman Technologies. All Rights Reserved. Privacy Policy