Our Blog: Stuff we think you should know

Clarifying a Few IT Stereotypes

Clarifying a Few IT Stereotypes

We’ve long accepted that, as an IT provider, there are a lot of stereotypes about what we can do and how we do it. Yet, just because we’ve accepted it, doesn’t mean we aren’t going to do anything about it. That’s why we wanted to use this blog post to clear up a few misconceptions about the nature of IT services.

Misconception 1: Our vocabulary is limited to “Did you turn it off and on again?”
Yes, yes, ha ha. This one has become the go-to punchline for almost any joke having to do with IT. However, consider what humorist Leo Rosten said:

“Humor is the affectionate communication of insight.”

In other words, jokes tend to poke fun at a larger truth - in this case, IT resources have gained the reputation of asking this question so often because they do ask it quite often. This is because it actually is an effective way to resolve many issues. Reboots have proven their value countless times over, so when we ask you if you’ve already tried doing that, we’re actually taking a lot of explanations for your issue out of consideration. This allows us to more efficiently troubleshoot the actual problem - and if you hadn’t yet tried a simple restart, it might do the trick.

Misconception 2: IT is actually, like, super easy to manage.
With computers being remarkably more user-friendly than they once were, it also isn’t all that uncommon for many users to assume that everything that IT does, they could probably do for themselves.

Technically, in a lot of cases, yes… but it would probably be a mistake.

In IT, while a process might be simple in and of itself, there’s a good chance that there are a lot of other considerations to take into account. For instance, let’s look at the process of setting up a new workstation. It’s a pretty plug-in-and-play process, right? Right - except that there’s data transfer, continuity, and security to also consider. On top of that, there’s also the process of getting the new PC ready for use. If done incorrectly, there are a vast amount of ways that your business can be left vulnerable. This is why it is so crucial to entrust these processes to someone who is very familiar with them.

Misconception 3: An IT resource is really just a professional Googler.
It isn’t uncommon to see an IT professional consulting Google, and sure, it might be unsettling for an end user to see it happening. However, it might help to put things into perspective.

IT is one of the fastest-evolving fields in the world, so even the most credentialed and qualified tech might not be completely up-to-date. Therefore, to prevent their actions from causing a bigger problem, a good IT resource will turn to other resources to confirm that they are taking the right course of action. In fact, this makes it actually preferable to bring in a Google-happy tech. It just shows you that the tech is committed to doing their job correctly.

At Haber Group, we’re proud that our technicians know their stuff as well as they do - and know their limits enough to seek out the right answers to your issue. So, next time you experience a problem with your technology solutions, turn your system off and on again, and (if that doesn’t work) give us a call at 866.625.3560.

Are the Messaging Apps You Use Secure?
Tip of the Week: Create Useful Email Subjects


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, March 25 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Hackers Business Malware User Tips Computer Business Computing Google Network Security Internet Microsoft Productivity Tech Term Software Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Backup Windows 10 Hardware Smartphone Data Ransomware Android IT Support Saving Money Workplace Tips Productivity Microsoft Office Browser Business Continuity Data Recovery Managed IT Services Data Management Cloud Computing Server Upgrade Internet of Things Managed IT Services Gmail Innovation Windows Facebook Data Backup Users Office 365 Phishing Word Disaster Recovery Smartphones Outsourced IT Passwords Windows 10 App Cybersecurity communications Artificial Intelligence Social Media Business Management Remote Monitoring Managed Service Provider Employer-Employee Relationship VoIP Mobile Device Encryption Chrome Vulnerability Content Filtering Analytics Spam Website IT Support Managed Service Big Data Miscellaneous Information Money Government Applications Infrastructure BYOD Office Tips Network Apple Tip of the week Hacker Employee-Employer Relationship Data storage Paperless Office Antivirus Bandwidth Display YouTube Access Control Router Robot Risk Management Wireless Printing Automation Firewall IT Management Customer Service WiFi Maintenance Save Money Avoiding Downtime The Internet of Things Virtual Reality Tablet Settings Two-factor Authentication Networking Hosted Solution Company Culture Retail SaaS VPN Data Security HIPAA Outlook Business Technology Search Education Unified Threat Management Monitors Holiday Data loss Apps IBM Development Virtual Private Network Administration Operating System Chromebook Server Management Mobile Device Management Hacking Mobile Security Touchscreen Customer Relationship Management End of Support Wi-Fi Computing Document Management Google Drive Telephone Systems Laptop Password Mouse Vendor Management Presentation Augmented Reality Quick Tips Office Scam LiFi Business Intelligence Safety Wireless Technology Computers Gadgets Virtualization Storage Recovery Downtime How To Printer Wearable Technology Security Cameras Scary Stories Net Neutrality Screen Reader Current Events Computing Infrastructure Dongle Legal Recycling Human Error IT service Heating/Cooling IP Address Cybercrime Smart Technology Motherboard WannaCry Permissions Assessment Drones Time Management Legislation Identity Alt Codes Dark Data MSP Scalability Hard Disk Drive PowerPoint Hard Drives Firefox Knowledge Managing Stress Managed Services Remote Computing Cabling Sports FCC Smart Tech Going Green Social Engineering Alerts Service Level Agreement eWaste Device Update BDR Servers Mobile Office Distributed Denial of Service Social Fraud Internet Exlporer LED Network Management Comparison Typing Migration Onboarding Refrigeration Digital Payment Techology Experience Unified Communications SharePoint Deep Learning Humor Cables User Laptops Managed IT Title II Connectivity Politics Digital Lenovo Licensing Continuity Mobility Public Speaking Google Maps Running Cable Managed IT Service Modem Hacks Slack Value Budget Smart Office Co-Managed IT Competition Collaboration Specifications Compliance Cryptocurrency Charging Mail Merge Virtual Desktop How To Digital Signage Unified Threat Management Downloads IT Technicians Bring Your Own Device sip Wires Software as a Service Disaster Shortcut Buisness Online IoT Tech Support Spyware Superfish IT solutions Cooperation Solar Print Toner Statistics Lithium-ion battery Break Fix Cookies Monitoring Hotspot Professional Services Work Content File Sharing Black Friday Regulations Bitcoin Network Congestion Messaging Computer Care Address Information Technology Desktop Undo User Error Multi-Factor Security Mirgation Best Practice telephony Voice over Internet Protocol Entertainment Samsung Uninterrupted Power Supply Patch Management 5G Microsoft Excel Star Wars Marketing Spying Websites Identity Theft Cortana Staff Google Docs Shortcuts Bluetooth Halloween Dark Web Nanotechnology Writing Language USB Optimization Streaming Cyber Monday Social Networking Windows 8 Analysis Application Corporate Profile Training Fun Cost Management Google Wallet Troubleshooting Automobile VoIP Google Calendar Chatbots Business Growth FinTech iOS Solid State Drive G Suite Blockchain Botnet Supercomputer Twitter Motion Sickness Gadget Staffing Emergency 3D Printing Printers Personal Information Administrator Crowdsourcing Taxes Machine Learning IT Budget Web Server GPS Domains Unsupported Software Computer Repair IT Consultant Relocation Processors Cameras Tracking Meetings Mobile Data Health Windows 7 Cleaning Private Cloud Alert CCTV Emoji Webcam Electronic Medical Records Regulation Work/Life Balance Error CrashOverride Black Market Point of Sale Mobile Computing Physical Security Travel Law Enforcement Upgrades Notifications