BNMC Blog

Clarifying a Few IT Stereotypes

Clarifying a Few IT Stereotypes

We’ve long accepted that, as an IT provider, there are a lot of stereotypes about what we can do and how we do it. Yet, just because we’ve accepted it, doesn’t mean we aren’t going to do anything about it. That’s why we wanted to use this blog post to clear up a few misconceptions about the nature of IT services.

Misconception 1: Our vocabulary is limited to “Did you turn it off and on again?”
Yes, yes, ha ha. This one has become the go-to punchline for almost any joke having to do with IT. However, consider what humorist Leo Rosten said:

“Humor is the affectionate communication of insight.”

In other words, jokes tend to poke fun at a larger truth - in this case, IT resources have gained the reputation of asking this question so often because they do ask it quite often. This is because it actually is an effective way to resolve many issues. Reboots have proven their value countless times over, so when we ask you if you’ve already tried doing that, we’re actually taking a lot of explanations for your issue out of consideration. This allows us to more efficiently troubleshoot the actual problem - and if you hadn’t yet tried a simple restart, it might do the trick.

Misconception 2: IT is actually, like, super easy to manage.
With computers being remarkably more user-friendly than they once were, it also isn’t all that uncommon for many users to assume that everything that IT does, they could probably do for themselves.

Technically, in a lot of cases, yes… but it would probably be a mistake.

In IT, while a process might be simple in and of itself, there’s a good chance that there are a lot of other considerations to take into account. For instance, let’s look at the process of setting up a new workstation. It’s a pretty plug-in-and-play process, right? Right - except that there’s data transfer, continuity, and security to also consider. On top of that, there’s also the process of getting the new PC ready for use. If done incorrectly, there are a vast amount of ways that your business can be left vulnerable. This is why it is so crucial to entrust these processes to someone who is very familiar with them.

Misconception 3: An IT resource is really just a professional Googler.
It isn’t uncommon to see an IT professional consulting Google, and sure, it might be unsettling for an end user to see it happening. However, it might help to put things into perspective.

IT is one of the fastest-evolving fields in the world, so even the most credentialed and qualified tech might not be completely up-to-date. Therefore, to prevent their actions from causing a bigger problem, a good IT resource will turn to other resources to confirm that they are taking the right course of action. In fact, this makes it actually preferable to bring in a Google-happy tech. It just shows you that the tech is committed to doing their job correctly.

At BNMC, we’re proud that our technicians know their stuff as well as they do - and know their limits enough to seek out the right answers to your issue. So, next time you experience a problem with your technology solutions, turn your system off and on again, and (if that doesn’t work) give us a call at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 18 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Email User Tips Privacy Computer Microsoft Network Security Malware Hackers Productivity Google Software Business Hosted Solutions Communication Hardware Data Tech Term Mobile Devices Internet Small Business IT Services Efficiency Ransomware IT Support Cloud Computing Smartphone Data Recovery Innovation Android Workplace Tips Backup Managed IT Services Windows Outsourced IT Upgrade Saving Money Managed IT Services Microsoft Office Smartphones Information Data Backup Users Miscellaneous Social Media Mobile Device Office 365 Business Continuity Windows 10 Browser Windows 10 Business Management Internet of Things Server Phishing Data Management Gmail Passwords Productivity Word Facebook Vulnerability Remote Monitoring Cybersecurity App communications Artificial Intelligence Disaster Recovery Infrastructure Network Encryption VoIP Chrome Gadgets BYOD Money IT Support Managed Service Tip of the week Managed Service Provider Save Money Apps Employer-Employee Relationship Virtual Reality Analytics VPN Applications Website Government Router Office Tips Quick Tips Unified Threat Management Hacker Data storage Big Data Company Culture Display Employee-Employer Relationship Maintenance Settings Antivirus Development Robot Google Drive Automation Content Filtering Bandwidth YouTube Access Control Apple Risk Management Education Paperless Office Storage IT Management Printing Server Management Business Technology SaaS Touchscreen Business Intelligence Virtual Private Network Computers Virtualization Laptop Holiday Tablet Data loss The Internet of Things Retail Alert Telephone Systems desktop Augmented Reality Spam Computing Downtime MSP Outlook WiFi Two-factor Authentication Managing Stress Bring Your Own Device Operating System Collaboration Firewall Avoiding Downtime Monitors LiFi Managed IT Service Vendor Management Social OneNote Hosted Solution Document Management Scam Chromebook Administration Solid State Drive Mouse Wireless HIPAA Search Networking End of Support Hard Disk Drive Mobile Security Data Security Service Level Agreement Cabling Streaming Processor Legislation Buisness Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Cooperation Troubleshooting Business Analysis SharePoint Writing Sports Compliance Legal iOS Microsoft Excel Wi-Fi Virtual Desktop Hotspot Internet Exlporer Google Maps Password IT Technicians Optimization Unified Communications Drones Security Cameras Profiles Managed IT Smart Technology Connectivity Windows 8 Spying National Security Techology Staff Leominster Human Error Memory Statistics Modem FinTech Analysis Students How To Lenovo Dark Data Update Mobile Device Management Virus Downloads Regulations Deep Learning Scalability Mail Merge Blockchain Language Value Unified Threat Management Mirgation Recycling Managed Services Utility Computing Shortcut Distributed Denial of Service Politics IoT Digital Payment Updates VoIP K-12 Schools Disaster Device Reducing Cost Bluetooth Comparison Cookies Digital Alt Codes Mixed Reality Firefox Superfish Customer Service Cybercrime LED Threats Office Samsung Marketing Social Networking Migration Address Permissions Private Cloud Computing Infrastructure Professional Services User Error Chatbots eWaste Budget Laptops Remote Workers Patch Management Tech Support Star Wars PowerPoint Wearable Technology Network upgrade Uninterrupted Power Supply Information Technology Mobility Batteries Specifications Nanotechnology Spyware Typing Humor Data Breach Customer Relationship Management Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Best Practice Windows 7 Alerts USB File Sharing GDPR Time Management Printer Halloween Identity Continuity Software as a Service Managed Services Provider Break Fix Websites Fraud Cost Management Onboarding Smart Office Print Toner Myths Black Friday Screen Reader Charging Identity Theft Cryptocurrency Slack Hard Disk Drives IT solutions Going Green Content Huawei Servers Google Calendar Safety BDR Wires Training Corporate Profile Google Docs Messaging Emergency Licensing Dongle Digital Signage Data Warehouse Network Management Remote Computing Scary Stories Solar G Suite Entertainment Dark Web Assessment Automobile Hacks Running Cable Work Dell Google Wallet Shortcuts Mobile Management Cyber Monday Smart Tech Bitcoin Monitoring Solid State Drives Network Congestion Motion Sickness Staffing Processors Taxes Machine Learning Administrator Web Server what was your? Unsupported Software IT Budget GPS Printers IT Consultant Computer Repair Relocation Cameras Mobile Data Meetings How To Work/Life Balance Tracking Recovery Mobile Computing Cleaning Health Black Market CCTV Webcam Law Enforcement Financial Notifications Electronic Medical Records Twitter Physical Security Error Point of Sale Ben McDonald shares Upgrades Gadget Emoji Travel Crowdsourcing Vendor Personal Information Botnet Cortana 3D Printing Regulation Supercomputer CrashOverride

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3