facebook linkedin twitter

A Testimonial From the North Pole

A Testimonial From the North Pole

We’ve always been a proponent of preparing for the worst and hoping for the best where a business’ solutions are concerned. That’s why we were happy to receive an email from our friends at the North Pole telling us about a situation they ran into just a few days ago...

Dear Computerware,

I just wanted to send you a quick letter thanking you… Thing is, you probably saved Christmas this year! Recently, there was a bit of a mishap here in the workshop that would have put us WAY behind schedule.

You know how we like to deliver presents to all the good boys and girls, and the boss has always kept the kids separated into the good ones and the naughty ones? Well, we decided to finally take your advice and digitize the list - thanks for that tip, by the way! It’s a lot easier to carry around, and now Santa can access it on his Noelkia smartphone whenever he needs to.

Anyways, that was working great, until the workshop’s server failed. We even restarted it and checked it twice! Nothing was working - including the Naughty & Nice CRM software.

We found out that Merry Hollycane (our office administrator elf) had accidentally downloaded the Cryptowall ransomware to the network. At $1,000 per file, there was NO WAY that we could afford to pay the ransom.

That hacker is definitely on the naughty list.

So instead of making toys, we were busy freaking out and trying to figure out what to do without the list! I mean, we still had the letters, so we knew what kids were asking for, but we needed to know which kids were naughty and which were nice! Without it, how would we know which children were supposed to get a gift from Santa, and which were only supposed to get coal?

It was an administrative nightmare!

Fortunately, Nougat Trufflesnaps (our internal IT elf) came to the rescue. He remembered that we had also started using a cloud-based data backup solution upon your recommendation! All Nougat had to do was log in and there was the list - a real Christmas miracle.

We were able to build a replacement server and download the list back to it, and we only lost about 23 minutes of work in total. I know that this may seem like hardly any time at all to you, but remember - we’re making toys for a whole world full of children. An hour would have been catastrophic to our operations.

Thanks to your advice, we were able to get back to work. I’m happy to report that we’re back on track for a successful delivery.

So, again, thank you so much for all of your advice - you really saved our gumdrops there. I’m pretty sure that you and your team all earned yourselves permanent spots on the nice list!


Drummer Brandybells
Lead Elf, Christmas Cheer Division

We’re glad that our advice was so helpful to our friends up at the North Pole, and that we were able to play a part in saving Christmas. If you’d like to discuss the solutions we used in more detail with us, give us a call at (703) 821-8200.

In the meantime, from Computerware to you, have a very happy holidays and a wonderful new year!

Tip of the Week: Neat Windows 10 Features
The Top 5 Smartphones for the Start of 2019


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Hackers Business Computing Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Saving Money Network Security Malware Email IT Services Hosted Solutions IT Support Efficiency Google Small Business Computer Quick Tips Smartphones User Tips Mobile Devices Gadgets Innovation Business Continuity Disaster Recovery Social Media Microsoft Office Android VoIP Mobile Office Virtualization Network Data Backup Mobile Device Management Collaboration Communication Smartphone Server Data Recovery Miscellaneous Productivity Ransomware Windows 10 Tech Term Upgrade IT Support Unified Threat Management Windows Operating System Holiday Passwords Remote Monitoring communications Facebook BYOD Cybersecurity Remote Computing Vendor Management Managed IT services Apps Mobile Computing WiFi Phishing BDR Users Mobile Device Marketing Analytics Automation The Internet of Things History Outsourced IT Apple Firewall Internet of Things Browser Save Money Alert Artificial Intelligence Managed IT Services Data Management IT Consultant App Encryption Big data Antivirus Health Bandwidth Office Content Filtering Going Green Spam Bring Your Own Device Maintenance Printer Gmail Tech Support Virus Hard Drives Search Cybercrime Saving Time Business Technology Managed IT Cost Management Best Practice Information Technology Lithium-ion Battery Cloud Computing Office 365 Outlook Windows 10 Windows 8 Budget Help Desk Two-factor Authentication Hiring/Firing Wireless Technology Access Control Training Recovery Computers Employer-Employee Relationship VPN Phone System Blockchain Travel Hacking Update IBM Money Document Management SaaS Information Administration Proactive IT Government Running Cable Website Law Enforcement Healthcare It Management Intranet Compliance Hard Drive Twitter Education Data storage Mobility Applications Risk Management Managed Service Networking Legal Save Time Regulations Humor Customer Service Company Culture DDoS Disaster Computing Telephone Systems Hosted Solution End of Support Computer Repair Robot Social Networking Securty Data Security File Sharing Word Avoiding Downtime Patch Management Solid State Drive Current Events Password Cortana Google Maps iPhone Value Data Loss Black Market Flexibility Scam Hacker Cryptocurrency Social Engineering Laptop Excel Data Breach Business Growth Digital Fax Server Customer Relationship Management Project Management Business Intelligence Websites Digital Payment User Augmented Reality PowerPoint Router Downtime Social Paperless Office Wireless Sports Machine Learning Comparison Tablet Entertainment Management Trending Heating/Cooling Distributed Denial of Service Uninterrupted Power Supply Mouse Storage Vulnerabilities Public Cloud Bitcoin Vendor Programming Statistics IT service Data Protection Inbound Marketing Identity Theft Network Congestion Retail eWaste Bluetooth Politics User Error Virtual Reality Pain Points Streaming Media Co-managed IT Emails Automobile Redundancy Processors Google Docs Chromebook Experience Conferencing Evernote Net Neutrality USB Computing Infrastructure Hack Chrome Lifestyle Monitors How To Presentation Cleaning Office Tips Private Cloud Download Specifications Safety Monitoring Virtual Desktop Gaming Console Start Menu Tech Terms Telephony Mobile Technology Computer Accessories YouTube Documents Webcam Software as a Service Unified Communications Settings Microchip Taxes Text Messaging Drones Reading Samsung External Harddrive Google Drive Windows Server 2008 LinkedIn Teamwork Multi-factor Authentication Managed IT Service Wireless Headphones Telephone Employer Employee Relationship Spyware Mobile Payment Get More Done Migration Connected Devices G Suite Vulnerability Bookmark Ebay Electricity Printing Google Play Archive Turn Key PDF Network Management Licensing Thin CLient Skype Printer Server Permissions Language Equifax Hacks Fleet Tracking Physical Security 3D Relocation Tablets Smart Phones Windows 7 Trojan Best Available Keyboard Device security Banking MSP Botnet Processor Domains Music Nanotechnology Social Network cache Television switches Writing Desktop Finance Sync Browsers Point of Contact Organize Adminstration Pirating Information WannaCry Downloads Security Cameras Upgrades Business Cards Service Level Agreement Leadership User Tip Public Speaking Startup Notifications Asset Tracking CCTV Unified Threat Management Backup and Disaster Recovery Reliable Computing Time Management Freedom of Information Shortcut LiFi Business Metrics Username Computer Malfunction Corporate Profile Navigation Troubleshooting Screen Reader Customer Resource management Assessment SharePoint Recycling Entrepreneur Gamification In Internet of Things Data Analysis Analytic Google Calendar GDPR Environment Deep Learning Piracy Upload Tip of the week Product Reviews Webinar HIPAA Work/Life Balance Smart Tech Distribution Tech Read Electronic Payment Fiber-Optic Database Scalability Touchscreen News Competition Visible Light Communication Memory HTML Motion Sickness VoIP Business Owner Messenger Telephone System Tracking Consultation IT consulting Mobile Security Upselling Knowledge Fileless Malware Rental Service Cost Meetings Video Surveillance Technology Tips Modem Device Management Software License Trends Virtual Assistant Proxy Server IP Address Multi-Factor Security Audit Term Content Management Human Resources CIO Fraud Tactics Cabling Saving ZTime Fake News Electronic Medical Records Business Managemenet Application Advertising Flash Devices Web Server Staffing Google Wallet Books Workers Data Warehousing Best Practives Windows XP UTM Wi-Fi Content Administrator Directions Legislation Error Supercomputer Debate Access SSID online Currency Displays IT Plan Enterprise Resource Planning Harddrive Emergency Hard Drive Disposal Dark Web Society Computer Care Processing Microserver Micrsooft email scam Addiction Worker Microsoft Excel Health IT Digital Signature Accountants A.I. GPS Cooperation Medical IT CrashOverride Printers 3D Printing Managing Stress Capital Regulation Productuvuty