Network ServicesWeb DevelopmentMobile AppsSoftware Development

TeamViewer QuickSupport
Home About Us Clients/Testimonials Certifications Blog Newsletters Upload/Download Chat

Copeland News - October, 2014


Welcome to the Fall edition of Copeland News.

The latest technology headlines remain to be centered on the security (or lack thereof) of our most valued digital possessions like credit cards and social security numbers.

Security must not be taken lightly. We must remain on high guard to protect our assets from fraud.

That being said, if you come across anything that you would like to discuss, never hesitate to drop us a note.  We are here to help and serve you in any way we can!

Thank you,


In this issue of Copeland News

Sign up for CDS News

CDS Monitor

In order to remain competitive in today's market, it is critical that businesses be proactive with their technology infrastructure and reduce system down time.  With this in mind, many businesses are taking a Managed Services approach to their systems.  Our CDS Monitor service has the ability to quickly identify potential issues with a server or application on your network and collect the necessary information to ensure your equipment operates at optimal performance.

Examples of what information we monitor include:

  1. SpringServers:
    1. CPU and memory utilization
    2. Available disk space
    3. Critical hardware (disk drives, temperature, motherboards, etc.)
    4. Exchange Server (email)
    5. Database performance
    6. Windows Updates tracking
  2. Internet Connectivity:
    1. Internet availability
    2. Connectivity between remote offices
  3. PC Workstations:
    1. CPU and memory utilization
    2. Available disk space
    3. Windows updates tracking

CDS Monitor runs in the background, keeping an eye on your critical systems.  If an issue arises (hard drive failure or server crash), notifications are automatically generated to our team for timely resolution.

Please contact us for more information regarding CDS Monitor and how this valuable service can be used to keep your systems at high availability.

Windows 10

Windows 10Microsoft has been working on a major upgrade to Windows 8 which will be called Windows 10.

Many of the nuances from Windows 8 will be "peeled back" and Windows 10 should give a Windows 8 flavor without breaking the whole Windows 7 experience. Windows 7 was tremendously successful with business users, while Windows 8 fell short of expectations.

Windows 10 with touch devices

Windows 10 will see the return of the Start Menu, which users have always loved. Desktop enhancements will allow Metro and standard applications to run side-by-side. Many of the "hidden" functions of Windows 8 that were more conducive to the touch screen user are said to be removed, giving the desktop and business user a better experience.

Windows 10 will also support multiple desktops, making it easier for a user to toggle between business and home profiles.

The general consensus is that Windows 10 will be to Windows 8 what Windows 7 was to Vista. That being said, expectations are high for Windows 10, which will be available for purchase in the later part of 2015. We will provide more information on Windows 10 as it becomes available.

Did You Know?


Virus and malware activity continues to grow. Most infections today are initiated by one of your employees clicking a link or opening a familiar-looking attachment (like UPS notifications or purchase orders). Remind your users to not open any attachments or click any links they were not expecting to receive. Hackers are getting sneakier with their "bait" tactics.


Email reliability has seen better days, and heightened spam activity tends to hamper it. Realize that emails you send can easily get caught in the recipient's spam folder based on various triggers. Write emails that are precise but not "salesy". Limit the number of recipients in each message and do not overload the body of the email with links or images.


Confidentiality in business has always been important and standard email is far from secure. It is becoming a more common requirement for employees to send secured, encrypted emails when dealing with sensitive information. Voltage SecureMail fits the need precisely – it allows you as a sender to send secured content, making sure only the recipient has access to that content, and vice versa on its return path. Voltage is priced at a per user/per month rate, so you can choose who needs secure email at your organization.  We've set up a free 30-day test drive with no credit card required at


Take the time to review your password strategy. Strong passwords include at least one uppercase, at least one lowercase, at least one number, and at least one special character (@, !, &, etc.). Consider resetting passwords to "strong passwords" across your organization.


New regulations in various industries dictate the archiving of emails, so we have seen this as a growing requirement. In most other non-regulated businesses, email archiving is now being recognized as an "absolute legal need" as opposed to something "nice to have." For more information, please ask us about "CDS Archive," our email archiving solution.

Your comments are always appreciated...

Have a comment on anything in this issue of Copeland News, or maybe an idea for a future topic you would like us to cover? Please connect with us on Facebook and let us know your thoughts!