Red Flags

Red Flags

Some of our customers were in bad relationships with their technology systems, or previous providers.  It wasn’t until we began working with them that they knew the warning signs to look for.  Don’t feel bad!  Technology is complicated, and it takes a long time to become experienced enough to know which questions to ask.

As a public service, we’ve compiled a list of observations you can check against your own experiences with your technology systems and provider.  If some of these hit close to home, don’t worry – they’re all problems that other people have had, and they’re all problems that we’ve cured for our customers.

Please note that this is not an exhaustive list……..

  1. You get into arguments with your I.T. provider over whether something is actually broken
  2. Someone at your company has had a ransomware (CryptoLocker) infection on their PC…
  3. …and you had to pay the ransom…
  4. …because you can’t restore from backups…
  5. …because you don’t have any backups.
  6. You’re reluctant to call on your provider when you need help…
  7. …because it costs money every time you call or they come out…
  8. …or because you’re unlikely to get the one person there who can fix things…
  9. …or both
  10. If a big storm came and hit your technology systems, your employees would be out of work for weeks
  11. Your network or internet is slow, and nobody knows why
  12. You have to reboot “the server” to get things working again
  13. You have a panic attack every time the power goes out
  14. You have PC’s running Windows XP…
  15. …and aren’t sure what the big deal is about upgrading…
  16. …because your provider hasn’t really mentioned it
  17. Your office runs on a Windows Small Business (SBS) server…
  18. …on version 2003…
  19. …and aren’t aware how frightening that is
  20. You get a lot of spam email…
  21. …that is, when the email server is working…
  22. The person who hosts your mail server also hosts your website…
  23. …and if you changed providers, your email could be gone forever…
  24. …which you hadn’t thought about until just now, and are having a panic attack
  25. You use a “Remote Desktop” for everything, even email…
  26. …even when you’re actually in the office…
  27. …from a regular PC…
  28. …and come to think of it, you don’t actually know where the remote server is
  29. You think it’s a little odd that your login “domain” or email “domain” domain doesn’t look anything like your company’s name
  30. Your company uses a mix of personal email accounts on Gmail, Yahoo, etc. for business purposes
  31. If your life depended on it, you wouldn’t be able to say which folders people could access on your server…
  32. …or when any given person changed any access permissions or security settings
  33. Your provider recycles login names and email addresses for your employees as they come and go
    1. We desperately wish this were a jokereal life, actually happened  — ed.
  34. Your employees use a lot of thumb drives or external USB drives…
  35. …or seem to all have Dropbox / Box / etc. installed…
  36. …even though you have a server they’re supposed to be using for business files
  37. Your provider’s slogan seems to be “we can’t do that”…
  38. …or worse, “we can do it if you pay us more”
  39. You never change your password…
  40. …or you are constantly changing your password…
  41. …and the only way to remember it is a sticky note under your keyboard
  42. Your company WiFi still uses WEP encryption…
  43. …and a very simple security key…
  44. …or neither
  45. You have a Guest WiFi that doesn’t need a password…
  46. …and people who connect to it can reach anything on your company network…
  47. …and actually, you don’t know if they can or can’t…
  48. …or how far outside your building someone could still connect to it

While some of these items may seem humorous, they are realities that many of our customers were dealing with before we began to simplify and stabilize their technology systems.  We hope that none of these red flags are flying in your company, but if they are, we hope you won’t hesitate to call us at 918-770-4099.

Righting The Wrongs of Others

Righting The Wrongs of Others

Our team is doing incredible work trying to right the wrongs committed by other small IT service providers with a few of our new customers – often at no additional cost. Some of what we’ve seen would be funny if it wasn’t so serious, and sadly, the customers didn’t fully realize how bad it was. Not all MSPs or IT providers are the same. If you suspect you’re not being well taken care of, or that technology is just too complicated, I hope you won’t hesitate to call us. Even if you think everything is “okay”​ today, isn’t it good to know for sure?

On Fishes In Bags

On Fishes In Bags

I had occasion at lunch today to use one of my favorite analogies referencing one of my favorite lines from a movie.  In cautioning against the urge to do something without planning (i.e. considering the cost of success as it were), I like to advise against becoming a “fish in a bag.”

“Now what?”  was the final line of dialog, uttered by the puffer fish named Bloat at the very end of the movie “Finding Nemo.”

What preceded that question was, of course, the successful completion of a very complex plan undertaken by the fish in the dentists’ office in search of freedom.  Clog up the filter, so that he’d have to clean the tank by hand, which means he’d take the fish out and put them in bags, so that they could sneak out the window, across the street, and into the harbor.  Freedom!

When they finally accomplished this feat – impressive as it was – they inevitably found themselves adrift in the ocean, absent thumbs or any other tools with which to exit their plastic bags.  Only then, in that joyous moment of triumph, did it begin to set in – they were fishes, in bags, in the ocean.

This probably wouldn’t end well.

Fortunately, the kind people at Pixar spared us from seeing this play out – the point was made beautifully.  Not every success is a success.  Just because you can, doesn’t mean you should.  Different isn’t necessarily better.  Be careful what you wish for.  Etc., etc., etc.

On a less pessimistic note, taking some time to think through the results for each step of a plan is crucial to making defensible decisions, which is the least any of us should expect of ourselves and those with whom we work.

Probably everyone has been guilty of becoming a fish in a bag at one point or the other, and we’ve probably all be fortunate enough to have someone with a pair of scissors to happen across our paths when we did – which is great if it happens, but a little tough to plan around.

May you always bring your own pair of scissors, and always use them generously.  Feel free to share stories of your own escapes!

P.S.  A fish who could have seen the “now what?” coming would have been pretty valuable to have around, wouldn’t they?  A friendly reminder to pick partners with wisdom for your business’ journey.