BNMC Blog

Clarifying a Few IT Stereotypes

Clarifying a Few IT Stereotypes

We’ve long accepted that, as an IT provider, there are a lot of stereotypes about what we can do and how we do it. Yet, just because we’ve accepted it, doesn’t mean we aren’t going to do anything about it. That’s why we wanted to use this blog post to clear up a few misconceptions about the nature of IT services.

Misconception 1: Our vocabulary is limited to “Did you turn it off and on again?”
Yes, yes, ha ha. This one has become the go-to punchline for almost any joke having to do with IT. However, consider what humorist Leo Rosten said:

“Humor is the affectionate communication of insight.”

In other words, jokes tend to poke fun at a larger truth - in this case, IT resources have gained the reputation of asking this question so often because they do ask it quite often. This is because it actually is an effective way to resolve many issues. Reboots have proven their value countless times over, so when we ask you if you’ve already tried doing that, we’re actually taking a lot of explanations for your issue out of consideration. This allows us to more efficiently troubleshoot the actual problem - and if you hadn’t yet tried a simple restart, it might do the trick.

Misconception 2: IT is actually, like, super easy to manage.
With computers being remarkably more user-friendly than they once were, it also isn’t all that uncommon for many users to assume that everything that IT does, they could probably do for themselves.

Technically, in a lot of cases, yes… but it would probably be a mistake.

In IT, while a process might be simple in and of itself, there’s a good chance that there are a lot of other considerations to take into account. For instance, let’s look at the process of setting up a new workstation. It’s a pretty plug-in-and-play process, right? Right - except that there’s data transfer, continuity, and security to also consider. On top of that, there’s also the process of getting the new PC ready for use. If done incorrectly, there are a vast amount of ways that your business can be left vulnerable. This is why it is so crucial to entrust these processes to someone who is very familiar with them.

Misconception 3: An IT resource is really just a professional Googler.
It isn’t uncommon to see an IT professional consulting Google, and sure, it might be unsettling for an end user to see it happening. However, it might help to put things into perspective.

IT is one of the fastest-evolving fields in the world, so even the most credentialed and qualified tech might not be completely up-to-date. Therefore, to prevent their actions from causing a bigger problem, a good IT resource will turn to other resources to confirm that they are taking the right course of action. In fact, this makes it actually preferable to bring in a Google-happy tech. It just shows you that the tech is committed to doing their job correctly.

At BNMC, we’re proud that our technicians know their stuff as well as they do - and know their limits enough to seek out the right answers to your issue. So, next time you experience a problem with your technology solutions, turn your system off and on again, and (if that doesn’t work) give us a call at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, March 23 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Business Computing Malware Hackers Productivity User Tips Google Network Security Tech Term Business Software Microsoft Computer Internet Communication Mobile Devices IT Services Hosted Solutions Efficiency Ransomware Smartphone Data Small Business IT Support Hardware Android Managed IT Services Saving Money Business Continuity Cloud Computing Data Recovery Innovation Backup Data Management Data Backup Microsoft Office Windows 10 Windows Browser Internet of Things Managed IT Services Workplace Tips Outsourced IT App Vulnerability Cybersecurity Passwords Productivity Server Business Management Windows 10 Users Word Upgrade communications Disaster Recovery Remote Monitoring Encryption Mobile Device Artificial Intelligence Gmail Chrome Facebook Phishing Office 365 Tip of the week Managed Service Social Media Website BYOD Applications Analytics Employer-Employee Relationship Information VoIP Smartphones Network Money Managed Service Provider Infrastructure IT Support Government Google Drive Employee-Employer Relationship Content Filtering Risk Management Bandwidth Miscellaneous Antivirus Office Tips Apple Router Display Paperless Office Access Control Big Data IT Management Company Culture Save Money Hacker Data storage Robot Settings Automation Virtual Reality YouTube Maintenance HIPAA Two-factor Authentication SaaS Administration Document Management Mouse Avoiding Downtime Mobile Security Scam Holiday Computers Wireless Retail Alert Education Networking Storage Business Intelligence Laptop The Internet of Things Printing VPN Monitors Data Security Vendor Management Downtime Business Technology Server Management Chromebook Virtual Private Network Touchscreen Data loss Quick Tips Unified Threat Management Gadgets Managing Stress Telephone Systems Outlook End of Support Tablet Spam Computing Operating System WiFi desktop Development LiFi Firewall Hosted Solution Managed Services Address Permissions Best Practice Smart Office Current Events Screen Reader Charging Device Patch Management Writing Managed IT Service Spyware Licensing Dongle User Error Wi-Fi Uninterrupted Power Supply Wires Scary Stories IBM Assessment Migration Customer Relationship Management File Sharing Cryptocurrency Solar Running Cable LED Computer Care Specifications Virtualization Apps Smart Tech Buisness Laptops Google Docs Work PowerPoint Heating/Cooling Dark Data Multi-Factor Security Update IT solutions Solid State Drive Going Green Mobility Identity Theft Break Fix Cooperation Service Level Agreement Virtual Desktop Time Management Printer Hacks Voice over Internet Protocol Sports Training Black Friday Corporate Profile Google Wallet Hotspot Internet Exlporer Politics Bitcoin Compliance Co-Managed IT Search Connectivity Software as a Service Automobile Emergency Business Growth IT Technicians Optimization Onboarding Servers Customer Service G Suite Google Calendar Hard Disk Drive Print Toner Office Dark Web Samsung Legal Staff Leominster Slack Network Management Dell Password Modem FinTech Cyber Monday Unified Communications WannaCry Drones Language Value Messaging Cabling Tech Support Windows 8 Regulations Content IoT Entertainment Google Maps Mirgation Recycling Cybercrime Digital Signage Legislation Shortcuts Social Engineering Microsoft Excel Deep Learning Augmented Reality K-12 Schools Monitoring SharePoint Mobile Device Management Cookies Marketing MSP Managed IT Smart Technology Computing Infrastructure Professional Services Techology Websites Social Networking Streaming Star Wars iOS How To Lenovo Alt Codes Chatbots eWaste Troubleshooting Statistics Security Cameras Mail Merge Safety Digital Payment Blockchain Bring Your Own Device Wearable Technology Network upgrade Spying Downloads Nanotechnology Human Error Shortcut Distributed Denial of Service Remote Computing Digital Budget Alerts USB Analysis VoIP Unified Threat Management Disaster Social Motherboard Cables Halloween Fraud Cost Management Scalability Firefox Collaboration Superfish Typing Humor Identity Continuity Bluetooth Network Congestion Comparison Information Technology CCTV Processors Webcam Machine Learning BDR Unsupported Software Regulation Error Point of Sale Computer Repair Ben McDonald shares Relocation Windows 7 Travel Mobile Data How To Work/Life Balance Recovery Supercomputer CrashOverride Health Private Cloud Staffing Black Market Motion Sickness Administrator Law Enforcement Taxes IT Budget Notifications Web Server Electronic Medical Records what was your? GPS Twitter Physical Security Upgrades Gadget IT Consultant Emoji Crowdsourcing Cameras Mobile Computing Tracking Meetings Personal Information Botnet 3D Printing Printers Cleaning Cortana

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3