BNMC Blog

Clarifying a Few IT Stereotypes

Clarifying a Few IT Stereotypes

We’ve long accepted that, as an IT provider, there are a lot of stereotypes about what we can do and how we do it. Yet, just because we’ve accepted it, doesn’t mean we aren’t going to do anything about it. That’s why we wanted to use this blog post to clear up a few misconceptions about the nature of IT services.

Misconception 1: Our vocabulary is limited to “Did you turn it off and on again?”
Yes, yes, ha ha. This one has become the go-to punchline for almost any joke having to do with IT. However, consider what humorist Leo Rosten said:

“Humor is the affectionate communication of insight.”

In other words, jokes tend to poke fun at a larger truth - in this case, IT resources have gained the reputation of asking this question so often because they do ask it quite often. This is because it actually is an effective way to resolve many issues. Reboots have proven their value countless times over, so when we ask you if you’ve already tried doing that, we’re actually taking a lot of explanations for your issue out of consideration. This allows us to more efficiently troubleshoot the actual problem - and if you hadn’t yet tried a simple restart, it might do the trick.

Misconception 2: IT is actually, like, super easy to manage.
With computers being remarkably more user-friendly than they once were, it also isn’t all that uncommon for many users to assume that everything that IT does, they could probably do for themselves.

Technically, in a lot of cases, yes… but it would probably be a mistake.

In IT, while a process might be simple in and of itself, there’s a good chance that there are a lot of other considerations to take into account. For instance, let’s look at the process of setting up a new workstation. It’s a pretty plug-in-and-play process, right? Right - except that there’s data transfer, continuity, and security to also consider. On top of that, there’s also the process of getting the new PC ready for use. If done incorrectly, there are a vast amount of ways that your business can be left vulnerable. This is why it is so crucial to entrust these processes to someone who is very familiar with them.

Misconception 3: An IT resource is really just a professional Googler.
It isn’t uncommon to see an IT professional consulting Google, and sure, it might be unsettling for an end user to see it happening. However, it might help to put things into perspective.

IT is one of the fastest-evolving fields in the world, so even the most credentialed and qualified tech might not be completely up-to-date. Therefore, to prevent their actions from causing a bigger problem, a good IT resource will turn to other resources to confirm that they are taking the right course of action. In fact, this makes it actually preferable to bring in a Google-happy tech. It just shows you that the tech is committed to doing their job correctly.

At BNMC, we’re proud that our technicians know their stuff as well as they do - and know their limits enough to seek out the right answers to your issue. So, next time you experience a problem with your technology solutions, turn your system off and on again, and (if that doesn’t work) give us a call at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, August 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Email Privacy Computer User Tips Microsoft Network Security Malware Software Hackers Google Productivity Hosted Solutions Business Tech Term Communication Hardware Data Ransomware Mobile Devices Internet Small Business IT Services Efficiency IT Support Smartphone Cloud Computing Data Recovery Workplace Tips Backup Android Saving Money Innovation Office 365 Managed IT Services Users Microsoft Office Business Continuity Windows Information Upgrade Mobile Device Social Media Managed IT Services Business Management Browser Windows 10 Windows 10 Data Backup Data Management Miscellaneous Internet of Things Facebook Server Cybersecurity Phishing communications Gmail App Word Outsourced IT Passwords Productivity Vulnerability Artificial Intelligence Network Disaster Recovery Encryption VoIP Smartphones Chrome Remote Monitoring Managed Service Provider Virtual Reality Gadgets Analytics Applications BYOD Infrastructure Website Money IT Support Managed Service Tip of the week Save Money Employer-Employee Relationship Apple VPN Education Access Control Storage IT Management Paperless Office Government Router YouTube Quick Tips Risk Management Hacker Data storage Unified Threat Management Company Culture Office Tips Employee-Employer Relationship Display Maintenance Antivirus Development Robot Big Data Google Drive Content Filtering Bandwidth Automation Settings Apps Hard Disk Drive Mobile Security Data Security Business Technology SaaS Printing Server Management Business Intelligence Virtual Private Network Touchscreen Holiday Computers Virtualization Tablet Data loss Telephone Systems Retail Alert desktop Outlook Augmented Reality Spam Computing Managing Stress Bring Your Own Device Operating System Laptop Collaboration Firewall WiFi Two-factor Authentication LiFi Vendor Management The Internet of Things OneNote Avoiding Downtime Monitors Document Management Scam Chromebook Hosted Solution Administration Downtime Solid State Drive Mouse Wireless Networking End of Support HIPAA Safety Wires Training Corporate Profile Google Docs Messaging Emergency Licensing Dongle IT solutions Going Green Content Huawei Servers Google Calendar Solar G Suite Entertainment Dark Web Assessment Automobile Hacks Digital Signage Data Warehouse Network Management Remote Computing Google Wallet Shortcuts Cyber Monday Smart Tech Bitcoin Monitoring Solid State Drives Network Congestion Work Dell Legislation Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Cooperation Service Level Agreement Halloween Cabling Streaming Processor Compliance Legal iOS Microsoft Excel Wi-Fi Hotspot Internet Exlporer Google Maps Password Troubleshooting Business Analysis SharePoint Writing Unified Communications Drones Security Cameras Managed IT Smart Technology Connectivity Windows 8 Spying National Security Techology IT Technicians Optimization Statistics Modem FinTech Analysis Students How To Lenovo Dark Data Update Staff Leominster Scary Stories Human Error Memory Regulations Deep Learning Scalability Mail Merge Blockchain Language Value Running Cable Mobile Device Management Virus Downloads Managed Services Shortcut Distributed Denial of Service Politics IoT Digital Payment Updates VoIP Unified Threat Management Mirgation Recycling Buisness Bluetooth Comparison Cookies MSP Virtual Desktop Digital Alt Codes Mixed Reality Firefox Superfish Customer Service K-12 Schools Sports Disaster Device Social Networking Migration Address Permissions Private Cloud Computing Infrastructure Professional Services LED Threats Office Samsung Budget Laptops Patch Management Managed IT Service Tech Support Star Wars Social PowerPoint User Error Chatbots eWaste Mobility Specifications Nanotechnology Spyware Typing Humor Data Breach Customer Relationship Management Wearable Technology Network upgrade Uninterrupted Power Supply Information Technology Motherboard Cables Computer Care IBM Best Practice Windows 7 Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Continuity Software as a Service Break Fix Websites Fraud Cost Management Cybercrime Onboarding GDPR Time Management Printer Identity Print Toner Search Black Friday Screen Reader Charging Identity Theft Cryptocurrency Slack Hard Disk Drives Marketing Smart Office Crowdsourcing BDR Travel Personal Information Botnet 3D Printing Regulation Supercomputer CrashOverride Cortana Staffing Motion Sickness Taxes Machine Learning Administrator Processors Unsupported Software IT Budget Web Server what was your? GPS IT Consultant Computer Repair Relocation Printers Mobile Data Cameras How To Work/Life Balance Tracking Recovery Meetings Cleaning Health Mobile Computing CCTV Black Market Law Enforcement Webcam Notifications Electronic Medical Records Financial Physical Security Error Twitter Upgrades Gadget Emoji Point of Sale Ben McDonald shares

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3