By accepting you will be accessing a service provided by a third-party external to

Clarifying a Few IT Stereotypes

Clarifying a Few IT Stereotypes

We’ve long accepted that, as an IT provider, there are a lot of stereotypes about what we can do and how we do it. Yet, just because we’ve accepted it, doesn’t mean we aren’t going to do anything about it. That’s why we wanted to use this blog post to clear up a few misconceptions about the nature of IT services.

Misconception 1: Our vocabulary is limited to “Did you turn it off and on again?”
Yes, yes, ha ha. This one has become the go-to punchline for almost any joke having to do with IT. However, consider what humorist Leo Rosten said:

“Humor is the affectionate communication of insight.”

In other words, jokes tend to poke fun at a larger truth - in this case, IT resources have gained the reputation of asking this question so often because they do ask it quite often. This is because it actually is an effective way to resolve many issues. Reboots have proven their value countless times over, so when we ask you if you’ve already tried doing that, we’re actually taking a lot of explanations for your issue out of consideration. This allows us to more efficiently troubleshoot the actual problem - and if you hadn’t yet tried a simple restart, it might do the trick.

Misconception 2: IT is actually, like, super easy to manage.
With computers being remarkably more user-friendly than they once were, it also isn’t all that uncommon for many users to assume that everything that IT does, they could probably do for themselves.

Technically, in a lot of cases, yes… but it would probably be a mistake.

In IT, while a process might be simple in and of itself, there’s a good chance that there are a lot of other considerations to take into account. For instance, let’s look at the process of setting up a new workstation. It’s a pretty plug-in-and-play process, right? Right - except that there’s data transfer, continuity, and security to also consider. On top of that, there’s also the process of getting the new PC ready for use. If done incorrectly, there are a vast amount of ways that your business can be left vulnerable. This is why it is so crucial to entrust these processes to someone who is very familiar with them.

Misconception 3: An IT resource is really just a professional Googler.
It isn’t uncommon to see an IT professional consulting Google, and sure, it might be unsettling for an end user to see it happening. However, it might help to put things into perspective.

IT is one of the fastest-evolving fields in the world, so even the most credentialed and qualified tech might not be completely up-to-date. Therefore, to prevent their actions from causing a bigger problem, a good IT resource will turn to other resources to confirm that they are taking the right course of action. In fact, this makes it actually preferable to bring in a Google-happy tech. It just shows you that the tech is committed to doing their job correctly.

At BNMC, we’re proud that our technicians know their stuff as well as they do - and know their limits enough to seek out the right answers to your issue. So, next time you experience a problem with your technology solutions, turn your system off and on again, and (if that doesn’t work) give us a call at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 07 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Network Security Microsoft Hackers Hosted Solutions Software Business Computer Malware Efficiency Google Data Communication Small Business IT Services Workplace Tips IT Support Mobile Devices Tech Term Cloud Computing Hardware Internet Managed IT Services Smartphone Data Recovery Mobile Device Android Backup Ransomware Innovation Outsourced IT Users Windows Upgrade Smartphones Information Saving Money Miscellaneous Facebook Data Backup Phishing Windows 10 Disaster Recovery Microsoft Office VoIP Cybersecurity communications Server Browser Business Management Business Continuity Office 365 Managed IT Services Productivity Network Social Media Windows 10 Data Management Passwords Internet of Things Word Gadgets Gmail Vulnerability Remote Monitoring App Managed Service Encryption Apps Chrome Managed Service Provider Mobile Office Artificial Intelligence Infrastructure Quick Tips Information Technology Government Applications Router BYOD Employer-Employee Relationship Tip of the week Remote Workers Analytics Settings Company Culture Networking Save Money Access Control VPN IT Support Money Virtual Reality Website BDR Employee-Employer Relationship Google Drive Bandwidth Content Filtering Computers Big Data Education Avoiding Downtime Apple Display Storage Antivirus Paperless Office Hacker Data storage Robot Unified Threat Management YouTube Automation IT Management Data Security Development Risk Management Spam WiFi Virtual Private Network Maintenance Office Tips Collaboration Firewall HIPAA Humor How To IT Hosted Solution Tablet Conferencing Social Network Document Management Laptop Administration Mobile Security Managed Services SaaS Best Practice The Internet of Things Wi-Fi Mouse Virtualization Solid State Drive Wireless Holiday Compliance Business Intelligence OneNote Going Green Two-factor Authentication Data Breach Retail Training Alert Remote Work Downtime Managed IT Service Windows 7 Hard Disk Drive Customer Relationship Management Scam Marketing Regulations Printing Software as a Service Password Break Fix Monitors MSP Vendor Management Search Augmented Reality Chromebook Managing Stress Data loss Telephone Systems End of Support desktop Outlook Business Technology Computing Server Management iOS Touchscreen Bring Your Own Device Operating System Remote Computing Social LiFi Managed IT Network Congestion Virtual Desktop Typing Lenovo Wires Virus Sports Statistics Licensing Dongle Scalability Mail Merge Blockchain Solar Updates Spyware Current Events Downloads Policy Assessment Utility Computing Uninterrupted Power Supply Work Mixed Reality Writing Computer Care IBM VoIP Unified Threat Management COVID-19 Smart Tech Device Reducing Cost File Sharing Shortcut Distributed Denial of Service Cryptocurrency Firefox Superfish Holidays Voice over Internet Protocol LED Threats Bluetooth Comparison Cooperation Service Level Agreement Migration Consulting Google Docs Address Permissions Distribution PowerPoint Identity Theft IT solutions Hotspot Procedure Internet Exlporer Laptops Dark Data Update IT Technicians Optimization Corporate Profile Cybercrime Hacks User Error Connectivity Mobility Batteries Patch Management G Suite Bitcoin Payment Card Modem FinTech Co-Managed IT Automobile Politics Google Wallet Specifications Staff Leominster Business Growth Logistics Onboarding GDPR Work/Life Balance Heating/Cooling Multi-Factor Security Language PCI DSS Value Managed Services Provider Customer Service Dell Mirgation Recycling Slack Hard Disk Drives Office Samsung WannaCry Time Management Printer IoT Print Toner Myths Health Cabling Private Cloud Legal Messaging Windows 8 Inventory Cookies Content Huawei Google Maps Tech Support Unified Communications Drones Black Friday K-12 Schools Emergency Asset Management Social Networking Digital Signage Data Warehouse Halloween Servers Google Calendar Computing Infrastructure Professional Services Entertainment Vendor Chatbots eWaste Monitoring Solid State Drives Social Engineering Mobile Device Management Network Management Peripheral Star Wars Shortcuts Mobile Management Deep Learning Dark Web Employee-Employer Relationships Twitter Shadow IT Nanotechnology Streaming Processor Websites Cyber Monday Wearable Technology Network upgrade Alt Codes Memes Motherboard Cables Troubleshooting Business Analysis Digital Payment Scary Stories Legislation Alerts USB Hybrid Cloud Microsoft Excel Identity Continuity Spying National Security Safety Digital Running Cable SharePoint Fraud Management Cost Management Security Cameras Profiles Disaster Analysis Students Techology Gamification Screen Reader Charging Human Error Memory Buisness Budget Smart Technology Smart Office CCTV Cortana Printers 3D Printing Webcam Processors Regulation Machine Learning Error Unsupported Software Point of Sale Ben McDonald shares Travel Computer Repair Relocation Financial Mobile Data How To Supercomputer CrashOverride Recovery Staffing Motion Sickness Taxes Black Market Administrator what was your? IT Budget Law Enforcement Web Server GPS Notifications Electronic Medical Records IT Consultant Physical Security Cameras Emoji Upgrades Gadget Tracking Crowdsourcing Mobile Computing Meetings Cleaning Personal Information Botnet

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3