Reconsidering a Classic Christmas Story

Reconsidering a Classic Christmas Story

Around this time each year, there’s a tradition of people telling stories that have been passed down for years. We wanted to participate this year, so we’ve decided to reimagine a true holiday classic: Die Hard.

Let’s consider how the action may have played out differently if the movie’s events were to take place today…

John stepped out of the party, pulling out the pack of nicotine gum his doctor had recommended. Popping in a piece, he started chewing and loosened his tie for a moment. Things were going much better with Holly, better than he had dared imagine they would. The party was fun, and the night had gone off without a hitch so far. John smiled. Things seemed to be looking up.

Holly stepped out into the styled hallway of Nakatomi Plaza next to him, glasses in hand.

“Having fun?” She smiled at him, handing him a fresh drink.

“Yeah, I actually am. Takagi seems really nice. I just had to get away from that Ellis guy for a second. He’s got some nerve, doesn’t he?”

“He does. I’m glad his days here are numbered… the cleaning crews found another stash of his.”

“Hmm… he must have missed some.” John joked.  

Holly’s eyes lit up. “Want to hear something really crazy? I was just talking to our head of IT… apparently, there was a big cyberattack today!”

“Oh yeah?” John was intrigued.

“Yeah.” Holly sipped her cocktail. “Apparently, some hacking group calling themselves the Theo Collective tried shutting down Nakatomi Corp this morning. They sent an email to one of the sales reps that looked like it came from a prospective client. It had an attachment that wound up locking the team out of an important drive. They got a message and everything, saying that if they didn’t pay up, all of the files would be deleted.”

John nodded. “Yeah, I heard about that from one of the guys in cyber. Something called ransomware, right?”

“That was it. Anyways, it was bad news, because the data also had the credentials to get into the company’s finances. Between you and me, that meant they had access to well over a billion dollars.”

“Over a billion?” John couldn’t help but react to that number.

“Yeah! This virus, HANS.grub3r, had completely shut us down this morning. Full red alert.”

“So, what did you do?”

Holly took another sip.

“Well, according to Carole, they’ve been working with this external company to help manage their IT… a company called BNMC. BNMC is a managed IT provider that assists us with our systems. They help us make sure that everything is up-to-date and secure, stuff like that.”

John nodded.

“So, how did that help?”

“Carole said that BNMC has been keeping a backup of our systems. I didn’t know this, but there’s actually a copy of our entire IT infrastructure stored in the cloud, automatically updated with any changes made. So, whenever I make a new document or spreadsheet, a copy of all my work is stored elsewhere in 15 minutes. Pretty cool, huh?”

John nodded, and Holly continued:

“When HANS.grub3r got into our system, BNMC was ready. All they had to do to help us was completely reset everything and then take the copy stored in our backup and restore the data from there. We were even able to work from the backup while they did so. All in all, we lost maybe a half an hour… nothing compared to what could have happened.”

Holly paused to take another sip while John looked on, impressed.

“Basically, thanks to this backup, you guys could just delete everything and it’s ‘Happy trails, HANS?’”

“Yep,” said Holly, looking pleased. “So, thanks to BNMC, Christmas—and let’s face it, the entire company—is saved.”

“Well then, yippee ki yay.” He held out his arm, offering it to his wife. “Shall we?”

Smiling, Holly took his arm, and they rejoined the party.


While this version of events would be downright boring compared to the original story, it is important to remember that—ideally—your business’ security should be a boring topic. That’s why BNMC really does offer the services that we “provided” to the fictitious Nakatomi Corporation. Make sure that you resolve to give us a call at 978-482-2020 to find out more in 2021.

Meanwhile, many holiday wishes from our entire team to you and yours.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 23 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Network Security Microsoft Software Hackers Efficiency Business Workplace Tips Hosted Solutions Data Hardware Computer Google Malware IT Services Communication IT Support Small Business Mobile Devices Android Mobile Device Internet Smartphone Cloud Computing Tech Term Phishing Ransomware Backup Managed IT Services Data Recovery Smartphones Innovation Users Outsourced IT Windows VoIP Saving Money Network Cybersecurity Upgrade Miscellaneous Information Passwords Quick Tips Browser Windows 10 Facebook Social Media Data Backup Microsoft Office communications Disaster Recovery Server Office 365 Business Continuity Business Management Productivity Internet of Things Managed Service Managed IT Services COVID-19 Data Management Apps Windows 10 Word Artificial Intelligence Gmail Gadgets Save Money App Remote Work Vulnerability Remote Monitoring Analytics Collaboration Chrome Money Managed Service Provider WiFi Conferencing Government Router Remote Workers Infrastructure Mobile Office Encryption Display Settings Employer-Employee Relationship IT Support Spam Tip of the week Paperless Office Information Technology Virtual Reality Google Drive Applications Website Networking Holiday BYOD Access Control VPN Company Culture Big Data Business Technology Document Management Virtual Private Network Hacker Data storage Wireless Development Robot Operating System Automation End of Support HIPAA Employee-Employer Relationship BDR Avoiding Downtime YouTube Antivirus Content Filtering Risk Management Bandwidth Unified Threat Management Wi-Fi Office Tips Apple Computers Education Storage IT Management Data Security Maintenance Firewall Server Management Password MSP Touchscreen Vendor Augmented Reality Managing Stress Downtime Managed IT Cybercrime Solid State Drive Marketing Vendor Management Tablet Monitors How To Identity Theft iOS Chromebook Computing Training Outlook Hard Disk Drive Bring Your Own Device IT LiFi Two-factor Authentication Social Network Social Hosted Solution Managed Services Humor Managed IT Service Administration Customer Relationship Management Scam Mobile Security Best Practice Remote Computing Mouse OneNote Data loss SaaS Break Fix Compliance Business Intelligence Going Green Search Telephone Systems Data Breach desktop Windows 7 Virtualization Laptop Software as a Service Retail Alert Regulations Printing The Internet of Things Content Battery Huawei Politics IoT Legal Legislation Asset Management Messaging Mirgation Recycling Digital Signage Peripheral Data Warehouse Work/Life Balance Cookies Unified Communications Drones SharePoint Spyware Entertainment K-12 Education Customer Service K-12 Schools Windows 8 Microsoft Excel Uninterrupted Power Supply Office Samsung Social Networking Techology Computer Care IBM Shortcuts user treats Mobile Management Health Private Cloud Computing Infrastructure Professional Services Smart Technology File Sharing Monitoring Shadow IT Solid State Drives Streaming Files Processor Tech Support Star Wars Deep Learning Statistics Memes Employee-Employer Relationships Chatbots eWaste Mobile Device Management Lenovo Troubleshooting Management Business Analysis Nanotechnology Downloads Instant Messaging Hybrid Cloud Wearable Technology Network upgrade Mail Merge Blockchain Spying Gamification National Security Social Engineering Motherboard Cables VoIP Unified Threat Management Corporate Profile Security Cameras Shopping Profiles Alerts USB Alt Codes Shortcut Distributed Denial of Service Superfish G Suite Human Error RMM Memory Websites Fraud Cost Management Bluetooth Comparison Automobile Analysis Students Twitter Identity Continuity Firefox Halloween Policy Virus Screen Reader Charging Budget Scalability Smart Office Address Permissions Dell Updates Safety Wires User Error WannaCry Employees Utility Computing Licensing Dongle Typing Patch Management Cabling Solar Current Events Device Banking Reducing Cost Assessment Specifications Google Maps Holidays Mixed Reality Scary Stories LED Procedure Threats Smart Tech Heating/Cooling Multi-Factor Security Distribution Migration Consulting Network Congestion Work Running Cable PowerPoint Voice over Internet Protocol Time Management Printer Laptops Gig Economy Cooperation Service Level Agreement Cryptocurrency IT solutions Buisness Mobility Reviews Batteries Hotspot Internet Exlporer Google Docs Black Friday Payment Card Writing Sports Co-Managed IT PCI DSS Connectivity Servers Google Calendar Digital Payment Virtual Desktop Logistics IT Technicians Optimization Hacks Emergency Onboarding GDPR Modem FinTech Network Management Google Wallet Digital FBI Managed Services Provider Dark Data Update Staff Leominster Bitcoin Dark Web Meetings Disaster Print Toner Remote Myths Language Value Business Growth Cyber Monday Slack Inventory Hard Disk Drives CCTV Mobile Data How To Recovery Webcam Error Black Market Law Enforcement Point of Sale Ben McDonald shares Notifications Electronic Medical Records Travel Mobile Computing Physical Security Printers Upgrades Gadget Supercomputer CrashOverride Emoji Crowdsourcing Staffing Motion Sickness Taxes Personal Information Botnet Administrator Web Server what was your? 3D Printing Regulation IT Budget Cortana GPS Processors IT Consultant Machine Learning Cameras Financial Unsupported Software Tracking Cleaning Computer Repair Relocation

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3