fbpx

Are You Having A Technology Emergency?

Coleman Technologies Blog

Coleman Technologies has been serving the Langley area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

CAPTCHA and Its Many Challenges

CAPTCHA and Its Many Challenges

We’re all familiar to some degree with the security measure known as CAPTCHA. You know the one—you usually see it when filling out forms or logging into sites online, where you have to prove that you’re a human being by identifying which of a variety of images fit a certain description. You may have noticed that these tests have gotten far more difficult over time. This is because, predictably, computers are getting better at beating them.

0 Comments
Continue reading

What You Need to Know to Stay Ahead of Hackers in 2020

What You Need to Know to Stay Ahead of Hackers in 2020

Let’s face it, it is nearly impossible for the modern business to stay ahead of every cyberthreat. It is just too much to proactively ward against. Today’s best practices will try to keep your network from being breached and your data from being stolen, but they may just allow you to understand how your network was breached and how your data was stolen. Unfortunately, cybersecurity is not foolproof, but let’s look at a few strategies you can use to improve your chances of holding onto your data and keeping unwanted actors out of your network. 

0 Comments
Continue reading

A Long Look at Compliance Concerns

A Long Look at Compliance Concerns

Regulations are put in place for a reason: the data you keep is sensitive. Within certain environments, it is extremely important to know how to navigate so as not to mistakenly expose information that has no business being shared. This month, we thought it would be a good time to talk about how to navigate these highly-regulated environments to ensure success and security. 

0 Comments
Continue reading

Simple Tasks to Improve Cybersecurity

Simple Tasks to Improve Cybersecurity

Many businesses need their employees to do the same thing day-in and day-out. With that type of repetitiveness, situations pop up where some crucial stuff is overlooked. Employees that are distracted with their own productivity are susceptible to making mistakes that could have dire consequences for your business. This month we thought we would give you a few pointers on how to communicate the importance of vigilance to your dedicated employees.

0 Comments
Continue reading

Are Developers Going to Eliminate the Password?

Are Developers Going to Eliminate the Password?

A lot is made about data breaches and hackers, but I think you’d be surprised to find out that over 80 percent of cyberattacks are the result of stolen authentication credentials. This has led many security-minded IT administrators to try and find a better way than the old username & password strategy that we’ve all been using for as long as there have been user accounts. One organization that is actively making waves trying to replace the username/password combo is Microsoft. They are at the forefront of the move to passwordless authentication.

0 Comments
Continue reading

Include Your Staff in Your Security Strategies

Include Your Staff in Your Security Strategies

When it comes to cybersecurity, your employees are simultaneously your biggest benefit and your most glaring weakness. This can be outlined in the telling of one story that emerged from automaker Tesla. Let’s take a look at the particulars.

0 Comments
Continue reading

Evaluating the Security of Your Chrome Extensions

Evaluating the Security of Your Chrome Extensions

Google Chrome is currently used by 69 percent of global desktop Internet users, as of July of 2020. With such a large amount of people using Chrome, its security becomes even more important… which makes it all the worse that many people are unaware of the permissions that some of its extensions claim.

0 Comments
Continue reading

You Need to Be Asking These 4 Questions to Maximize Security

You Need to Be Asking These 4 Questions to Maximize Security

Today’s business has to prioritize its data security. There are endless examples of businesses that haven’t done enough. Some aren’t around anymore. To help you build a strategy, we’ve put together four questions that need to be asked to give you a chance to outwit and overcome the endless threats your company could run into online.

0 Comments
Continue reading

Artificial Intelligence Will Be Assisting Cybercriminals

Artificial Intelligence Will Be Assisting Cybercriminals

To effectively manage the risk that your business is under due to cybercriminals and their activities, it is important to acknowledge what attacks your business may soon have to deal with. Due to the increased accessibility of artificial intelligence and related processes, we predict that cybercrimes will likely use AI to their advantage in the very near future.

0 Comments
Continue reading

Windows 7 Should Be Long Gone

Windows 7 Should Be Long Gone

Windows 7 was the most popular operating system Microsoft ever created. It’s so popular that months after the software giant officially retired their record-breaking OS, some businesses continue to use it. Today, we will take a look at why some businesses haven’t moved off of Windows 7, and what effect it could have on their company.

0 Comments
Continue reading

Cybersecurity Needs to Shift for Businesses to Survive

Cybersecurity Needs to Shift for Businesses to Survive

With some motivation from the ongoing COVID-19 pandemic, many businesses are adjusting their approach to cybersecurity. Typically, businesses would take a more measured approach in their day-to-day security improvements, while swiftly acting if there was any kind of clear and present danger. While this proved effective, the current situation has now shifted priorities over to maintaining resilience. Let’s examine some of these shifts, and how an advantage can be gained through a consistent cybersecurity strategy.

0 Comments
Continue reading

What’s the Best Way to Secure Your Mobile Device?

What’s the Best Way to Secure Your Mobile Device?

Smartphones now come with a variety of ways that users can elect to unlock their device, from biometrics to tactile patterns to good, relatively old-fashioned personal identification numbers. Of course, not all these authentication measures secure your phone equally well. Let’s consider some of these measures to determine which one is best for your device’s security.

0 Comments
Continue reading

Are Macs Inherently More Secure than PCs?

Are Macs Inherently More Secure than PCs?

It has long been assumed that computer viruses are a Windows operating system exclusive, that Macs are immune from these issues. Let’s examine the validity of these assumptions, and how much you need to be invested in your technology’s protections.

0 Comments
Continue reading

Four Cybersecurity Tools Your Business Needs

Four Cybersecurity Tools Your Business Needs

In 2020, conducting business has been hard enough to have to constantly worry that your business is going to be the victim of a cyberattack. Unfortunately, it is an issue that isn’t going away, and can be a truly devastating experience. 

0 Comments
Continue reading

Are You Practicing Good Password Hygiene?

Are You Practicing Good Password Hygiene?

Passwords are not a modern invention by any stretch, but as we have dealt with them for so long, there are a lot of bad habits that many people have adopted. That’s why we felt that it was appropriate for us to call out some of these habits and discuss some better options for you to adopt.

0 Comments
Continue reading

Have You Kept Up with Your Security Audits? You Need To, Especially Now!

Have You Kept Up with Your Security Audits? You Need To, Especially Now!

When a business undergoes a security audit, its IT security is evaluated to make sure that it has the proper protections in place to protect against the various threats that could strike. Now more than ever, it is important for any organization to be confident in their preparedness. Let’s discuss the importance of assessing your own organization’s security with audits, and how this benefits you.

0 Comments
Continue reading

Why You Need to Keep an Eye on Your Data

Why You Need to Keep an Eye on Your Data

When a company operates primarily via the Internet, there seems to be an inherent trust that their audience naturally has. There’s little-to-no doubt that all promises will be kept and that all data shared with them will be fully secured, but is this confidence appropriately placed? While we can’t speak to the promises these companies make, we can weigh in on some common data security practices.

0 Comments
Continue reading

Don’t Let Scammers Scare You with COVID-19

Don’t Let Scammers Scare You with COVID-19

The COVID-19 pandemic has resulted in a great number of people working from home. While this is good for the public health, it may unfortunately lead your employees toward a laxer view of cybersecurity. Cybercriminals are sure to take advantage of this if you aren’t careful, so it is important to be particularly aware of your cybersecurity right now.

0 Comments
Continue reading

Is Your Business Being Attacked From the Inside?

Is Your Business Being Attacked From the Inside?

With cyberthreats the way that they are, a lot of industry professionals go on and on about the importance of deploying technologies designed to reduce the potential threats that a business has to confront. This technology isn’t cheap and while they absolutely do help you protect your technology and data; today’s hackers know that. Unfortunately for small business owners, that shift has left your staff on the front lines of cybersecurity; a place they really shouldn’t be. Let’s discuss cybersecurity from an employer’s perspective.

0 Comments
Continue reading

Best Practices that Often Get Lost

Best Practices that Often Get Lost

Security is unfortunately a major part of any business, and if there isn’t a diligent approach to the implementation of it, you can be left with huge holes in your network. Today, we thought we would discuss some of the best practices you can take to make sure that your organization’s security is in the best possible position to protect your digital resources. 

0 Comments
Continue reading
TOP