fbpx

Are You Having A Technology Emergency?

Coleman Technologies Blog

Coleman Technologies has been serving the Langley area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Best Practices that Often Get Lost

Best Practices that Often Get Lost

Security is unfortunately a major part of any business, and if there isn’t a diligent approach to the implementation of it, you can be left with huge holes in your network. Today, we thought we would discuss some of the best practices you can take to make sure that your organization’s security is in the best possible position to protect your digital resources. 

0 Comments
Continue reading

Nine Tools Every Business Should Have Invested in Today

Nine Tools Every Business Should Have Invested in Today

Over time, technology has developed to make processes more efficient and more productive for businesses of any size, offering greater benefits to those that put them to use. Let’s go over three critical needs that businesses have, and three technologies that can serve each.

0 Comments
Continue reading

How to Safely Use Wireless Internet to Work from Home

How to Safely Use Wireless Internet to Work from Home

While remote work has gained an understandable boost in popularity, many business owners and technology specialists may still be concerned about how secure the Wi-Fi connections that workers are using in the home are. To waylay those fears, you need to be sure that your employees are using their networks as securely as they can.

0 Comments
Continue reading

Tip of the Week: Phishing Attacks at Home

Tip of the Week: Phishing Attacks at Home

Microsoft’s latest Security Intelligence Report cites phishing attacks as the most prevalent cyberthreat. With the COVID-19 outbreak pushing large numbers of workers to their own homes, it is almost assuredly still the case. As a result, it is extremely important that you and your staff understand how to spot potential phishing attacks and what to do when confronted with an attack. Today, we will provide you some tips on how to identify and remediate such attacks.

0 Comments
Continue reading

Hackers Double Down During Crisis

Hackers Double Down During Crisis

The COVID-19 pandemic has most of the world at home. It has completely disrupted everyday life and has businesses scrapping their normal strategies for work-at-home policies that will at least allow them to maintain some productivity. These strategies, while highly effective, carry with them additional risk. Today, we take a look at some of the risks associated with relying on remote workers.

0 Comments
Continue reading

Make Sure Your Use of the Cloud is Secure

Make Sure Your Use of the Cloud is Secure

The cloud is an undeniably useful technology to implement in your business’ processes, and is a very popular option as a foreseeable result. This does not mean, however, that the cloud isn’t subject to some risks. Let’s go over a few risks the cloud presents, and how you can mitigate them by selecting the right provider.

0 Comments
Continue reading

What You Need to Know to Manage a Remote Workforce

What You Need to Know to Manage a Remote Workforce

There are many reasons that your team may want (or need) to work from home, and there are many reasons to allow them to do so. A 2019 survey by OwlLabs indicated that 71 percent of remote workers are happy with their job (as compared to 55 percent of on-site workers); remote workers responded that they are 13   percent more likely than onsite workers to stay in their current job for five more years than onsite workers will; and when respondents claimed to be working longer than 40 hours per week, onsite workers were doing so out of necessity, while remote workers did so out of desire and enjoyment.

0 Comments
Continue reading

The Employee’s Guide to Working Remotely

The Employee’s Guide to Working Remotely

It’s not uncommon where a situation arises and you will find yourself working from home. To make this work, it is important that you keep a few additional issues in mind so that you can make the most of it. We have put together a few simple best practices that you should keep in mind as you operate remotely.

0 Comments
Continue reading

Privacy Issues Surrounding Biometric Security

Privacy Issues Surrounding Biometric Security

Humans are social creatures, and as social creatures we create systems that separate us by our differences. IT professionals are known as such because they are experts at understanding and working with computers and information systems, just as Olympic gymnasts are regarded for their ability to compete in gymnastic events. Our differences are our identifiers. In fact, humans put labels on things to better identify them using even the most miniscule differences. 

0 Comments
Continue reading

How Secure is Your Use of Cloud Solutions?

How Secure is Your Use of Cloud Solutions?

Cloud computing is generally accepted today as a good option for businesses. While we aren’t arguing that this isn’t the case, we wanted to make sure that your cloud use--actual or theoretical--was sufficiently secure. Many will neglect to consider how secure their use of cloud solutions is, which is something that we’d like to fix.

0 Comments
Continue reading

A Brief Review of Various Cybercrime Statistics

A Brief Review of Various Cybercrime Statistics

Each and every business should be prioritizing their cybersecurity, as hacking is as popular and ever and some of the worst malware in history is currently spreading. To really drive this point home, we’ve put together some telling cybercrime statistics that clearly demonstrate the damage that cybercrime can wreak.

0 Comments
Continue reading

Tip of the Week: How to Avoid Phishing Scams

Tip of the Week: How to Avoid Phishing Scams

For many businesses, email plays a crucial role in the dessemination of information. Whether it is simply interacting with clients or pushing directions to individuals, email is a simple and efficient way to communicate. One problem that organizations are running into is that individuals are being inundated with social engineering messages called phishing. This strategy is causing major operational problems for businesses, from malware to data breaches to extended downtime. For this week’s tip, we identify what exactly phishing is and how it is used to the detriment of many businesses and other organizations.

0 Comments
Continue reading

Why It’s Paramount to Keep Security in Mind

Why It’s Paramount to Keep Security in Mind

Over the last few years, there has been a meteoric rise in cybercrime, with nothing to indicate that rates will decrease anytime soon. Why would they? Bad actors and cybercriminals can make a pretty penny by attacking businesses, and they are only becoming more equipped and experienced in doing so. 

0 Comments
Continue reading

Five Steps to Better Basic Cybersecurity

Five Steps to Better Basic Cybersecurity

Cybersecurity needs to be one of any business’ primary considerations. More than it ever has been before, cybersecurity is one of the biggest day-to-day issues that a business needs to deal with; and, this need is only exacerbated by the shortage of cybersecurity talent and loyalty to outdated security strategies have put many businesses in an unenviable, and vulnerable, position.

0 Comments
Continue reading

Recent Data Breaches You Should Know

Recent Data Breaches You Should Know

Imagine for a second what would happen if your business’ data was exposed and stolen. You’d have a really difficult time going forward as your client-base dwindled and you opportunities for growth dried up. The amazing part is that some very successful companies have this type of thing happens all the time. Today, we will look at some of the largest data breaches since September 1.

0 Comments
Continue reading

Protect Smartphones Like Any Other Computer

Protect Smartphones Like Any Other Computer

We go into great depth on how to protect your desktop and laptop computers from malware and other malicious threats. In fact, one of the first steps you take anytime you are setting up a new computer is to install antivirus and other security programs. You do this because an unprotected device presents substantial risk. With the way people are using their smartphones today, it’s a solid practice to outfit your mobile device with the security software needed to maintain the security of your data.

0 Comments
Continue reading

Tip of the Week: 3 Signs of a Phishing Attempt

Tip of the Week: 3 Signs of a Phishing Attempt

Social engineering is a very important component of many modern cyberattacks, as the popularity of phishing scams goes to show. Protecting yourself from phishing scams will require you to be able to identify them. For today’s tip, we’ll go over a few warning signs that someone may be trying to phish you through your email.

0 Comments
Continue reading

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

0 Comments
Continue reading

Solid Training can Make All the Difference

Solid Training can Make All the Difference

When many businesses look to add to their roster, they typically have a series of qualifications they need each applicant to meet before they grant interviews. They make their selection, do their entrance training, and then expect that the new hire will settle in and be as productive as possible as soon as possible.

0 Comments
Continue reading

Protecting Private Data Should Be a Priority

Protecting Private Data Should Be a Priority

Data privacy is a huge issue right now, and with so many organizations possessing individual information, the issue isn’t going to be going away. Some of the biggest and most reputable organizations in business today have been breached in the past several years and it has put a new onus on individual data protection. Let's take a look at individual data privacy and what can be done to protect yourself online. 

0 Comments
Continue reading

Contact Us

Learn more about what Coleman Technologies can do for your business.

Call Us Today
Call us today
(604) 513-9428

#210, 6323 197th Street
Langley, British Columbia V2Y1K8

Latest Blog

Google Chrome is adding a cool feature over the next week or so (it may already have been released for you). The next feature is sure to make a big difference for some and will be non-descript for others. Let’s unpack colorful tabs in Googl...
TOP