Our Blog: Stuff we think you should know

Clarifying a Few IT Stereotypes

Clarifying a Few IT Stereotypes

We’ve long accepted that, as an IT provider, there are a lot of stereotypes about what we can do and how we do it. Yet, just because we’ve accepted it, doesn’t mean we aren’t going to do anything about it. That’s why we wanted to use this blog post to clear up a few misconceptions about the nature of IT services.

Misconception 1: Our vocabulary is limited to “Did you turn it off and on again?”
Yes, yes, ha ha. This one has become the go-to punchline for almost any joke having to do with IT. However, consider what humorist Leo Rosten said:

“Humor is the affectionate communication of insight.”

In other words, jokes tend to poke fun at a larger truth - in this case, IT resources have gained the reputation of asking this question so often because they do ask it quite often. This is because it actually is an effective way to resolve many issues. Reboots have proven their value countless times over, so when we ask you if you’ve already tried doing that, we’re actually taking a lot of explanations for your issue out of consideration. This allows us to more efficiently troubleshoot the actual problem - and if you hadn’t yet tried a simple restart, it might do the trick.

Misconception 2: IT is actually, like, super easy to manage.
With computers being remarkably more user-friendly than they once were, it also isn’t all that uncommon for many users to assume that everything that IT does, they could probably do for themselves.

Technically, in a lot of cases, yes… but it would probably be a mistake.

In IT, while a process might be simple in and of itself, there’s a good chance that there are a lot of other considerations to take into account. For instance, let’s look at the process of setting up a new workstation. It’s a pretty plug-in-and-play process, right? Right - except that there’s data transfer, continuity, and security to also consider. On top of that, there’s also the process of getting the new PC ready for use. If done incorrectly, there are a vast amount of ways that your business can be left vulnerable. This is why it is so crucial to entrust these processes to someone who is very familiar with them.

Misconception 3: An IT resource is really just a professional Googler.
It isn’t uncommon to see an IT professional consulting Google, and sure, it might be unsettling for an end user to see it happening. However, it might help to put things into perspective.

IT is one of the fastest-evolving fields in the world, so even the most credentialed and qualified tech might not be completely up-to-date. Therefore, to prevent their actions from causing a bigger problem, a good IT resource will turn to other resources to confirm that they are taking the right course of action. In fact, this makes it actually preferable to bring in a Google-happy tech. It just shows you that the tech is committed to doing their job correctly.

At Haber Group, we’re proud that our technicians know their stuff as well as they do - and know their limits enough to seek out the right answers to your issue. So, next time you experience a problem with your technology solutions, turn your system off and on again, and (if that doesn’t work) give us a call at 866.625.3560.

Are the Messaging Apps You Use Secure?
Tip of the Week: Create Useful Email Subjects
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 26 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Malware Computer Business Computing Microsoft Network Security Productivity Hosted Solutions Internet Google Software Tech Term Mobile Devices Efficiency Communication IT Services Data Small Business Backup Hardware Workplace Tips Windows 10 Smartphone Ransomware Android IT Support Microsoft Office Saving Money Cloud Computing Productivity Facebook Data Recovery Managed IT Services Social Media Browser Data Management Business Continuity Internet of Things Server Users Upgrade Phishing Managed IT Services Innovation Word Windows Mobile Device Gmail Data Backup Office 365 Smartphones Disaster Recovery Outsourced IT App Windows 10 Passwords Business Management Information Managed Service Provider Remote Monitoring VoIP Encryption Employer-Employee Relationship Network Chrome Vulnerability Cybersecurity Miscellaneous communications Artificial Intelligence Gadgets Government Money Spam Website BYOD Applications Infrastructure Save Money Office Tips Apple Virtual Reality Hacker Content Filtering Tip of the week Analytics IT Support Big Data Managed Service Education Virtualization Risk Management Access Control Robot Wireless Printing Router Automation Apps Augmented Reality IT Management Customer Service Maintenance Firewall Settings Two-factor Authentication Tablet Data storage Paperless Office Display Bandwidth WiFi YouTube Employee-Employer Relationship Avoiding Downtime Antivirus The Internet of Things VPN Monitors Wireless Technology Holiday Search Unified Threat Management Hard Disk Drive Data Security HIPAA Recovery IBM Data loss Business Technology Virtual Private Network Administration Operating System Chromebook Mobile Device Management Development Customer Relationship Management End of Support Wi-Fi Computing Server Management Password Mobile Security Document Management Touchscreen Google Drive Laptop Mouse Vendor Management Telephone Systems LiFi Hacking Safety Computers Quick Tips Downtime Scam Business Intelligence Storage Retail Hosted Solution Presentation SaaS Solid State Drive Networking Company Culture Outlook Office Social Permissions Assessment Time Management Legislation Identity Application Update Mobile Office MSP Scalability FCC Smart Tech PowerPoint Firefox Managing Stress Managed Services Cabling Typing Mixed Reality Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Hacks Fraud Internet Exlporer Politics LED Network Management Comparison Running Cable Migration Title II Connectivity Virtual Desktop Onboarding Techology Budget SharePoint Collaboration Cables Laptops Managed IT Cryptocurrency Buisness Slack Data Breach Digital Lenovo How To Licensing Private Cloud Continuity Mobility Google Maps Bring Your Own Device sip Managed IT Service Modem Hard Drives Mail Merge Value Tech Support IT solutions Smart Office Co-Managed IT Specifications Compliance Lithium-ion battery Charging Online IoT Computer Care Digital Signage Unified Threat Management Downloads IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion Refrigeration Samsung 5G Monitoring Hard Disk Drives Spyware Superfish Information Technology Cooperation User Solar Print Toner Statistics Best Practice telephony Break Fix Cookies Messaging Address Writing Hotspot Professional Services Public Speaking Websites Identity Theft Cortana Work Content Google Docs Black Friday Regulations Halloween Microsoft Excel Star Wars Competition Training Fun Desktop User Error Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Nanotechnology G Suite Spying Solid State Drives Google Wallet Staff Automobile Shortcuts Bluetooth Business Growth Dark Web Scary Stories Analysis Employee-Employer Relationships Corporate Profile Current Events Language USB Optimization Streaming Cyber Monday Social Networking Blockchain Cost Management Troubleshooting VoIP Legal Google Calendar Chatbots IP Address Cybercrime FinTech iOS Net Neutrality Screen Reader Undo How To Drones Printer Wearable Technology Security Cameras Alt Codes Dark Data Sports Students WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Human Error IT service Heating/Cooling Smart Technology Marketing Motherboard Remote Computing GPS Printers IT Consultant Unsupported Software Computer Repair Relocation Processors Cameras Tracking Meetings Cleaning Mobile Data Health CCTV Alert Windows 7 Domains Emoji Webcam Work/Life Balance Electronic Medical Records Error Regulation Mobile Computing Black Market Point of Sale Law Enforcement Physical Security Travel Notifications CrashOverride Upgrades Botnet Supercomputer Twitter Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Emergency Machine Learning IT Budget Web Server