Network ServicesWeb DevelopmentMobile AppsSoftware Development

TeamViewer QuickSupport
Home About Us Clients/Testimonials Certifications Blog Newsletters Upload/Download Chat

Connecting Technology and Physical Therapy to Improve Patient Well-Being

February 9, 2017

Often, the way in which clinicians provide rehabilitation instructions to patients does not produce optimal results.  In 2015, Dr. Jason Gray of Gray Chiropractic set out to find a way to improve patient well-being and clinical service by introducing new technology into corrective exercise practices.

In 2016, Dr. Gray released the My Rehab Connection solution as a platform for clinicians to effectively communicate exercise plans to their patients. Practitioners can hand-select exercises from an extensive library and deliver routines in a mobile application.

The patient has free, unlimited access to all plans which have step-by-step instructions along with a visual image of each step and a full demonstrational video.  This allows patients to feel that they are properly performing the exercises throughout the duration of the plan.

 Key Features

  • Clinic may upload their logo as well as edit their address, phone number, email, hours, and social media links (Yelp, Google+, Facebook, Twitter, LinkedIn, YouTube). If using an online appointment scheduling service, a link and icon can take their patients directly to it.
  • As of January 2017, there are nearly 500 pre-configured exercises which are easily sorted, filtered, and searched.  New content is added by Dr. Gray weekly.
  • Exercises may be customized for each patient (sets, reps, weight).
  • Clinics may copy pre-built exercises and save/edit a copy in their personal exercise library.  Photos, videos and instructions may be modified if desired.
  • Clinics may develop an unlimited amount of original content (including their own photos and videos).
  • Exercises commonly prescribed together may be combined into exercise groups for easy searching and assignment.
  • Patients can choose to save 1 – 2 MB videos locally (to save bandwidth or for offline/limited coverage use) or stream them to reduce storage requirements (ideal when connected to WiFi).
  • Free 30-day trial; subscriptions start at $9/month per clinic (no per-patient cost).


Take it for a spin now!

We’d love for you to take a look at the app from a Gray Chiropractic patient perspective.  Simply send an email to and you will immediately receive demo account credentials and direct links to download the app from Google Play or Apple’s App Store.

Video Overview

Dr. Gray produced a quick video overview of the app and portal. His website ( is full of screenshots and tutorials that demonstrate the use of the portal and on how the patient plans are managed.

Dr. Gray on building a solution with CDS

“I reached out to Copeland Data Systems for help on a home exercise software/app project we wanted to develop. From start to finish Tim and his group did an amazing job helping us think through the mechanics of the project and walking us through the technical side of things. They were an absolute pleasure to work with and delivered a great finished product that was exactly what we wanted. They continue to provide the support we need moving forward. Thanks guys!”
     — Jason Gray BHK, DC, MSc

What’s under the hood?

This was sizable project that required careful planning and technical design before before the development stages.  Many unique technologies were brought together for this project, including third party web-based video conversion and PayPal’s recurring payments to manage subscriptions.  If you are interested in some of the technical aspects of this project, give us a few minutes and we will be happy to tell you all about it (we actually live for this kind of geeky stuff).  Call 716.692.7773 or email to learn more.

Does Microsoft ever call people directly to hop on their PC remotely?

January 23, 2017

We get this support call all the time. Someone contacts us and explains that a representative from Microsoft called them and worked to remove a virus on their PC. Our response is always the same – bring your PC in to us to have it wiped and reinstalled, as this was a scam and you’ve been hacked.

This tactic does not only target the elderly, home users or the computer illiterate. Yes, Microsoft scammers have called our support techs as well. Here are three REAL LIFE interactions with CDS techs that made us chuckle and hopefully helps you remember that these are ALWAYS scams and Microsoft will NEVER call you to remotely connect to your PC.

Experience 1 – Microsoft Headquarters

“Microsoft” Tech: “Hello, this is XXX from Microsoft”
CDS Tech: “Hello”
“Microsoft” Tech: You have a virus and we would like to help you remove.”
CDS Tech: “Oh my, I am so glad you called.  What do we need to do?”
“Microsoft” Tech: “Calm down sir, everything will be fine.  I just need you to follow some simple steps.”
CDS Tech: “Thank you so much.  Wow, Microsoft.  Where is their headquarters?”
“Microsoft” Tech: typing….typing….typing
CDS Tech: “Um, sir?  Are you Googling “where is Microsoft’s Headquarters?”

Experience 2 – What do you see on your computer?

“Microsoft” Tech:  “Hello, this is XXX from Microsoft, you have a virus and we need access to your PC to clean it.”
CDS Tech: “Thank you so much for reaching out.  Let me know what you need me to do.”
“Microsoft” Tech: “I just need you to follow some simple steps.  Please go to start, run and type in the following command.”
CDS Tech: “OK, go ahead.”
“Microsoft” Tech: “type in C-M-D and then hit Enter.”
CDS Tech: “Ok.  All set.”
“Microsoft” Tech: “Great.  So what does your screen say now?”
CDS Tech: “Hmmm, this is weird.  It says that what you are doing is illegal?  Is my computer supposed to say that?”
“Microsoft” Tech: (while laughing) “Yes sir, what we are doing is illegal.”

Experience 3 – Please provide me your ID

“Microsoft” Tech:  “Hello, this is XXX from Microsoft, we have to hop on your PC real quick to install a patch.”
CDS Tech:  “Sounds good.  what information do you need?”
“Microsoft” Tech:  “Thank you.  First we will need some identification to ensure we are talking to the right person for security purposes.”
CDS Tech:  “Absolutely.  When you say identification, do you need our company Microsoft Certified Partner ID or do you need my Microsoft Certified Professional ID?”
“Microsoft” Tech:  “I must have the wrong person then.”

While we never encourage you to continue a conversation with someone trying to scam you, we knew what was going on and put the scammer on speaker to share the fun with the team.  Just remember, Microsoft will never call you to hop on your PC for any reason!

“Gooligan” Infecting 30,000 Android Devices Daily

December 2, 2016

A new day brings a new strain of malware, this one targeting Google accounts on Android devices.  Since it’s discovery in August 2016, more than 2 million devices have already been git by “Gooligan” and infections continue to grow at 30,000 per day.

You can check to see if your Google account has been compromised at the URL below:

How can I prevent viruses on my Android device?

Several good (and free) anti-virus products like Malwarebytes exist for Android devices and it’s a good idea to have one installed that can scan new installs and do periodic system scans.  Additionally, avoid installing apps from 3rd party app stores or direct downloads from websites.  Always purchase/install apps from Google Play.

For more information on Gooligan, you can visit

We’re always here for your virus- and and security-related questions.


How can I protect my Credit Card Data and Identity During the Holidays?

November 28, 2016

3d rendering of a credit cards

This time of year is peak season for credit card and identity thieves and with more and more consumers (94%) stating they will be taking advantage of online shopping this Cyber Monday, it is safe to say there will be plenty of opportunities for theft this holiday season.

How to protect yourself

No matter how cautious you are, there is always a risk that your confidential information will end up in the wrong hands.  There are some simple tips to reduce the likely-hood that this happens:

  • Always verify the shopping site is secured.  This is a very critical yet easy step to help protect your information.  Always ensure the start of the web address is “https” and not “http” before entering in any information.  All the major retailers should have this but do not assume all online stores do.
  • Keep a close eye on bank and credit card accounts.  Log into your online accounts regularly throughout the season to ensure all transactions are legitimate. You can also go one step further and subscribe to a credit monitoring service that can track new accounts and send text message alerts.
  • Utilize security features built in to your accounts.  Many credit card providers have tools that help protect against fraudulent charges.  You can set spending limits or put other thresholds in place and get notified via text if they are exceeded.
  • Ensure email promotions are legitimate. It is pretty certain that you have seen an increase in deals and promotions in your inbox.  Try to always go to the website directly instead of clicking on the links in the email to avoid being redirected to a false website.
  • Hold off on shopping if on a public WiFi connection.  Try to keep your shopping and other online activities to a minimum when on a public WiFi connection.

Most importantly during this holiday season, keep a pulse on all accounts for all members in the household and be cautious when cashing in on all the holiday deals. Remember, if it is too good to be true, it probably is a scam.

January 2017 Deadline for Securing your Website with HTTPS

November 17, 2016

Almost all websites accepting credit cards now have proper certificates in place to serve the site securely via HTTPS, which shows the “lock” icon in your browser address bar. If you don’t see the lock icon in your browser, never provide any sensitive information.

Google has been pushing stricter security standards over the past year or so and we’ve upgraded all of our customers’ certificates to use stronger keys to avoid Google’s security warnings.  But farther-reaching changes lie ahead for HTTP requirements…

What is HTTPS and why do I need it?

Secure sites start with “https://” rather than “http://” and protect your transmissions by encrypting data with a pair of public and private keys.  Your browser uses the certificate’s public key to encrypt data transmitted and decrypt data received from the server.  The web server, on the other hand, uses the private key to decrypt data received and encrypt data sent to the browser.  Since the Internet is a huge network of servers and Internet Service Providers (ISPs), your request never goes directly from Point A to Point B, but is routed between dozens of points in-between.  These intermediary points lack the public key to decrypt data, so your transmission remains private.

How is Google changing their security warnings in January 2017?

Starting with Chrome 56 (to be released Jan 2017), Google will warn users when a site is not secure if the page is asking for credit card information or passwords.  This will affect things like company intranet sites (rep portals, employee-only pages, etc.) if no certificate is installed.


Eventually, all non-HTTPS sites will display the warning seen below as the push toward a more secure web continues.


It’s never too early to secure your website and HTTPS should not be ignored just because it’s not yet a hard requirement.  Depending on the number of websites you run, it may be more cost-effective to purchase a 5-domain SAN (Subject Alternative Name) certificate or a “wildcard” certificate that can be used across unlimited servers and sites within your domain (,,,, etc.).

We’d be happy to discuss this requirement with you and help you choose the best certificate to secure your online presence.

Email Phishing: How to Recognize Suspicious Emails

November 2, 2016

Fraud Alert

By now, mostly everyone has heard of “phishing,” or the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. It is basically how criminals get you to provide them with information.

The most common method is to “spoof” an email which appears to be from a trusted sender but is actually from a hidden sender.  People creating these emails are highly skilled and go to great lengths to construct an email that entices you to “click” or respond.

Sometimes these emails appear to come from within your organization (“spear phishing”) and can even have an almost identical email signature (logo, colors, and contact info).

Examples of this are:

  • Emails that appear to come from support, a copier, or the accounting department
  • Emails that come from a CEO or CFO for a wire transfer
  • Emails that have PDF or Word documents attached that look like invoices or purchase orders

What can we do to protect ourselves

Here are some ways to identify some of these fraudulent emails:

  1. Never trust that a link will always take you to that website
    For every link in an email (whether using a web browser, Outlook, or other email app), if you hover your mouse over the link, it will show you what the real destination web address is.  If this does not match up with the link or takes you to a fake place, do not click!
  2. Create a secure method for processing wire transfers
    If your organization utilizes wire transfers, make sure there is a company-approved process for using this method.  You can add a step where the processor requires a verification code that only your company knows and if the code is not provided, no transfer is issued.
  3. Double-check attachments before opening
    Most importantly, ensure that you have running and up-to-date antivirus software on your devices and that you keep up to date on their subscriptions. If there are attachments sent to your email that you have any hesitation on, always call or text the sender to ensure they are legitimate.  Always err on the side of caution.
  4. Lock down what email servers are able to send email from your domain
    Ok, so we couldn’t do a blog article about phishing without getting a little nerdy. Work with your email provider to set up proper SPF records.  These are records that tell the Internet what email servers are allowed to send emails on behalf of your domain name.  On the recipient side, ensure your email servers are configured to check that the email was sent from an approved email server.

Copeland Data has over 35 years of experience helping our clients secure email safety, and we might have a solution that’s right for your business. For more information about how to keep your inbox safe or to translate any of this blog article that you may not understand, please contact us and we will do our best to help.

National American Beer Day

October 27, 2016

Beer Can Flag

© 2014 Lindsey Prowse

Someone along the way decided to make October 27th “National American Beer Day” and Tim Belczak is not complaining. He takes the pursuit of homebrewing and beer knowledge to a whole new level. While he enjoys styles from all around the world, American beers are among his favorite.

“Many people think of ‘American Beer’ as limited to Budweiser or Miller Lite because that’s what they see in the media.  There are many flavorful styles with an American origin,” says Tim.

He suggests exploring working though the following uniquely American styles with some great local examples:

  • American Light Lager: Miller – Miller Light*
  • American Lager: New York Beer Project – Lockport Lager
  • Cream Ale: Community Beer Works – Amazing Larry
  • American Wheat Beer: Bell’s Brewery – Oberon Ale*
  • Blonde Ale: Pearl Street – Lighthouse Golden Ale
  • American Pale Ale: Gene McCarthy’s (Old First Ward) – This is Not a Pale Ale
  • American Amber Ale: 12 Gates – Bleeding Heart Red Rye
  • California Common: Anchor Brewing Company – Anchor Steam Beer*
  • American Brown: Community Beer Works- The Whale
  • American Porter: 42 North – Asylum Robust Porter
  • American Stout: Thin Man – Black Francis
  • Imperial Stout: Southern Tier – Choklat
  • American IPA: Flying Bison – Buffalo IPA
  • Double IPA: Big Ditch – Deep Cut
  • American Strong Ale: Southern Tier – Gemini
  • American Barleywine: Sierra Nevada – Bigfoot Barleywine Style Ale*
  • Wheatwine: Smuttynose – Smuttynose Wheat Wine*
  • American Wild Ale: look for local small batch sours

* Not from a local brewery, but can be found locally

He started down the rabbit hole of homebrewing in 2006 when he bought a Mr. Beer kit on a deal-of-the-day site. The beer turned out OK, but he quickly wanted to do more with recipe creation and soon upgraded his equipment to handle the standard 5-gallon “extract” batches most homebrewers make with malted sugar, hops, yeast and some specialty grains. A later upgrade to his equipment and process allowed him to start making “all-grain” batches by “mashing” starches in barley and other grains, converting them to fermentable sugars. All-grain brewers use the same ingredients from the same suppliers as breweries use, so the same (or sometimes better) quality can be attained.  The only difference is in the scaled down batch size and equipment; the process remains the same.

2016 Ohio State Fair Best of Show, Columbus OH

2016 Ohio State Fair Best of Show, Columbus OH

Wishing to contribute to the homebrewing community, he became a BJCP Judge (Beer Judge Certification Program) and judges competitions both locally and out-of-state. He helps with judge training and administers a annual tasting exam in Buffalo for prospective new judges.  He also volunteers his time to grade exam sets from other exam sites a few times a year (a requirement to attain Grand Master rank within the BJCP).

He runs the Erie County Fair Homebrew competition each year and is on the committee for The Western New York Homebrew Competition (Amber Waves of Grain), which has exceeded 600 entries in recent years.

He is a past president of the Niagara Association of Homebrewers and a homebrew instructor at The KegWorks Store in Tonawanda.  Check their schedule if you’d like to attend an upcoming class and lean how beer can be made at home.

How is Cloud Computing Evolving?

October 24, 2016

cloudsCloud Computing continues to be a widely discussed topic. What we’ve seen over the past decade has laid a solid foundation for what’s to come, and there are some exciting things on the horizon.

How is Cloud Computing used today?

We all use cloud computing on a daily bases, whether we’re conscious of it or not. Our email and document storage are driven by services like Office 365 and Dropbox.  We immerse ourselves in content-rich social media sites like Facebook and Instagram. We back up our devices (hopefully) with services like iBackup, Mozy or Carbonite.

What is the future of Cloud Computing?

The IoT (Internet of Things) is transforming supply chains across markets.  Security and scalabilty are the top priority for growing markets with special attention to customer and transaction data. Global collaboration in the workplace will continue to drive the development of cloud-based tools, and mobile workplaces will have lower barriers to entry with new SaaS (Software as a Service) and IaaS (Infrastructure as a Service) solutions coming to market.

To read more, please see the article on Four Cloud Industry Trends That Will Shape the Future

Customer Spotlight: Habberfield Hassler LLP

October 20, 2016

Habberfield Hassler

Habberfield Hassler LLP provides clients with a non-traditional, personal approach to defending claims.  The focus on client relationships allows them to commit to timely reporting ensuring successful claim strategies can be employed in a cost effective manner, thus allowing their experienced attorneys to truly “roll up their sleeves” to fight for each client.  With a focus on New York State Workers’ Compensation and Insurance Defense, Habberfield Hassler LLP is a unique firm with a new vision that deserves attention.

Like most organizations in their early stages, time and resources had to be focused on their operations and services.  There was an immediate need for IT services that supported their mobile workforce without being cost prohibitive.  Habberfield connected with Copeland Data Systems to support their team and ensure their systems are up and operational.

“Our business relies heavily on impeccable IT functionality,” adds Melissa Habberfield, Partner at the firm.  “Copeland Data has ensured that everyone in our offices stay up and running on a consistent basis.”

Just as the staff at HH, LLP provides personalized attention to their clients, CDS was “attentive, professional and paid a great deal of attention to the details, which helped meet our IT needs and most importantly, solve our immediate IT problems.”

Communication is a key component of IT support and while a small firm, taking the time to explain IT offerings in a non-technical way has allowed HH, LLP to focus on growing their practice. “Even though we are a small business, they treat us like a number one customer.  We especially love how they explain things so we ‘non-IT folks’ can understand!”

Our relationship with Habberfield Hassler LLP confirms (through their quality and approach to clients) that our philosophy, business model, and attention to customer relationship building is at the forefront of our success.   We want to thank Melissa B. Habberfield for the kind words above, and we look forward to the evolution of their IT solutions as they continue to grow throughout the New York State region.

Habberfield Hassler LLP  (Main Office)
13 Mohawk Street Suite 200
Buffalo, NY 14203
Telephone (716) 249-6900
Fax  (716) 249-6910

Habberfield Hassler LLP  (Syracuse Office)
6520 South Bay Road
Cicero, NY 13039
Telephone (315) 288-6474
Fax  (716) 249-6910

Welcome to our Blog

October 18, 2016

The Information Technology industry evolves at a fast pace. In order to provide relevant information in a more timely manner we are implementing a blog to cover the latest topics and trends.

We will continue to send a quarterly newsletter as we have done since 1995, which will be a round-up of the most important topics we cover.

New blog posts will be promoted on social media (Facebook, Twitter and LinkedIn) as they are published. Please choose your preferred method and follow the latest industry developments.

LinkedIn facebook twitter

Recent Posts