facebook linkedin twitter

Computerware Blog

Why You Shouldn't Ask Just Anyone for Tech Advice

Why You Shouldn't Ask Just Anyone for Tech Advice

When it comes to dealing with things around the office, most people have almost no problem calling in a subject-matter expert to handle the issue. Toilet won’t stop running? Bring in a plumber. Simple, right? Yet, it seems that there’s one notable exception: technology issues.

Basically, there seems to be an assumption that, if someone uses a particular piece of technology or software, they are inherently an expert. Therefore, they can be trusted for advice that would otherwise come from IT.

This kind of thinking is fundamentally flawed and can be downright dangerous under the right (really, the wrong) circumstances.


It primarily has to do with how crucial technology is to any business today. In order to sustain operations, a business needs its technology to work. Otherwise, it just isn’t going to be as efficient, productive, or ultimately, as successful as it would be with the proper tools available.

Let’s say that you hired someone to hang shelves around your office - the tools they bring to the job are going to matter. An electric screwdriver will get the job done much faster than a manual one will. 

Your business is the same, in that it could very likely make do without working technology, but only by sacrificing the productivity benefits that technology solutions would provide. Depending on how your business operates, you may even find yourself unable to live up to some of your responsibilities without the right tech at your disposal - like if the person hanging your shelves had brought a box of nails with them, instead of screws.

Obviously, if this were to ever happen with someone you had hired, you would find it unacceptable. Yet so many people don’t think twice about just Googling the answer to their IT issues and taking whatever they find as gospel, or again, seeking out advice from someone who may only be marginally more familiar with a given solution. As a result, they risk collecting misinformation, further hurting their productivity, risking their security and doing little to improve their circumstances.

At Computerware, we’ve heard a few horror stories.

This only makes it more important that you and your team have a trustworthy resource to turn to for your IT support needs. Computerware can be that resource for you. With an agreement with us, you can get down to business... confident that your solutions will be operational and optimized. If there is an issue, we’ll step in and resolve it.

In order to minimize your in-office distractions, we do as much as we can remotely. This includes providing support to your employees as needed, ensuring that they always have a trustworthy resource to turn to before they resort to Google.

Reach out to my team at (703) 821-8200 to learn more about what we have to offer your business and its technology.

Two-Factor Authentication Works to Remove Security...
Tip of the Week: Determining the Return on Your IT...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, May 26, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Data Business Management Hackers Hardware Microsoft Network Security Workplace Tips Backup Hosted Solutions Managed Service Provider Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Computer Google User Tips Innovation Small Business IT Support Data Backup IT Support VoIP Smartphones Collaboration Network Quick Tips Mobile Devices communications Business Continuity Gadgets Microsoft Office Android Data Recovery Social Media Cybersecurity Upgrade Disaster Recovery Mobile Office Server Communication Virtualization Smartphone Miscellaneous Phishing Mobile Device Management Holiday Vendor Management Ransomware Windows 10 Operating System Tech Term Outsourced IT Passwords Windows Mobile Device Facebook Users Managed IT Services Remote Monitoring Unified Threat Management Internet of Things Apps BDR Automation Analytics Managed IT services Mobile Computing Data Management BYOD Remote Computing Apple WiFi Windows 10 Marketing Artificial Intelligence History Cloud Computing The Internet of Things Save Money Firewall Browser Training Alert Help Desk Encryption Big data App Office Office 365 Spam Business Technology Health IT Consultant Two-factor Authentication Information Technology Bandwidth Cybercrime Managed IT Bring Your Own Device Maintenance Antivirus Printer Access Control Windows 7 Budget Hard Drives Content Filtering Gmail Going Green Government Outlook Employer-Employee Relationship VPN Windows 8 Retail Wireless Technology Cost Management Information Virus Tech Support Search Healthcare Hiring/Firing Lithium-ion Battery Best Practice Managed Service Computers Saving Time Recovery Project Management Travel Augmented Reality Education Hacking Update Humor Networking It Management Money Blockchain iPhone Document Management Phone System Data Loss Customer Service Computing IBM Customer Relationship Management Solid State Drive Intranet Compliance Twitter PowerPoint Data storage File Sharing Password Hard Drive Value Flexibility Covid-19 Mobility Administration Risk Management Hacker Legal Save Time Data Security Downtime Avoiding Downtime Regulations Patch Management Applications Wireless Current Events SaaS Computer Repair Running Cable Proactive IT Website Data Breach Storage Law Enforcement Conferencing Digital Cooperation Websites Word Vendor Fax Server Remote Work Monitoring Cortana Black Market Cryptocurrency Google Maps Software as a Service Laptop Management Business Growth Net Neutrality Social Engineering Vulnerabilities Business Intelligence Digital Payment Router Voice over Internet Protocol User Meetings Paperless Office Private Cloud Virtual Desktop Social Sports Wi-Fi Comparison Tablet Company Culture Disaster Scam Telephony DDoS Hosted Solution Machine Learning End of Support Excel Robot Telephone Systems Social Networking Securty Network Congestion Public Cloud Licensing Virtual Assistant Lifestyle eWaste Identity Theft Gaming Console Start Menu Tech Terms Bluetooth Processor Streaming Media Mobile Technology Webcam Text Messaging Multi-factor Authentication Google Docs Virtual Reality Uninterrupted Power Supply Memory Politics Experience Processors Professional Services Automobile Vulnerability Telephone Emails Cleaning Chrome Bitcoin USB Monitors Chromebook Office Tips Computing Infrastructure Integration Hack Data Protection Presentation How To Inbound Marketing Downloads Specifications Safety Computer Accessories YouTube Download Smart Devices Settings Managed Services Provider Unified Communications Documents Pain Points Trending User Error Entertainment Mouse Redundancy Co-managed IT Distribution Teamwork Heating/Cooling Microchip Taxes Managed Services Employee/Employer Relationship Distributed Denial of Service Evernote Programming Statistics IT service Managed IT Service IT Assessment Software License Point of Contact Trends Technology Tips Music Cyber security Multi-Factor Security Cost Best Available Keyboard switches Writing Bookmark Hacks Physical Security Video Surveillance Domains Google Play Relocation Telephone Service Tablets Saving ZTime Remote Working Devices Fake News Upgrades Banking Employer/Employee Relationships Botnet Fraud Tactics Audit UTM Content Data Warehousing Microsoft 365 Sync Public Speaking LiFi Managing Costs Electronic Health Records IT Plan Access Best Practives Enterprise Resource Planning Analytic Medical IT Trend Micro Harddrive Recycling Legislation Emergency Error Hard Drive Disposal Shortcut Browsers Notifications CCTV Debate Addiction Computer Care Product Reviews Troubleshooting Work/Life Balance Security Cameras Reliable Computing Threats Accountants A.I. Microsoft Excel Entrepreneur Deep Learning User Tip Business Metrics Proactive Maintenance Computer Malfunction GPS Memes email scam External Harddrive Managing IT Services Google Drive Windows Server 2008 Read Environment Solutions In Internet of Things Microserver HIPAA Visible Light Communication Navigation Virtual Machine Surveillance Migration Spyware Connected Devices Mobile Payment Electronic Payment eCommerce Wireless Headphones Competition IT consulting Data Analysis Employees Electricity Get More Done Network Management Printing Business Owner GDPR Scalability Managing Risk Thin CLient Remote Workers Device Management Equifax Fleet Tracking SQL Server Motion Sickness 3D Ebay IT Tech Messenger Hypervisor Tracking Smart Phones Virtual Private Network Device security Printer Server Content Management MSP CIO Turn Key Business Managemenet IP Address Advertising Flash Development Desktop cache Trojan Finance Television Staffing Human Resources Google Wallet Holidays Nanotechnology Social Network Application Windows XP Fileless Malware Rental Service Hybrid Cloud Business Cards WannaCry Service Level Agreement Society Modem Strategy Cabling Leadership Startup Organize online Currency Asset Tracking Displays Proxy Server Azure Web Server Adminstration Pirating Information Term Books Workers Procurement Time Management Username Freedom of Information Micrsooft Electronic Medical Records Transportation Administrator Unified Threat Management Corporate Profile Backup and Disaster Recovery Video Conferencing Assessment Gamification SharePoint Drones Recording Optimization Screen Reader LinkedIn Customer Resource management Digital Signature Directions Display Supercomputer Communitications Piracy Upload Google Calendar SSID How To Worker Smart Tech Tip of the week Dark Web Free Resource Permissions Language Processing Reading Samsung Supply Chain Management HTML Touchscreen Webinar Archive News Health IT Fiber-Optic VoIP Database Skype Internet Service Provider Mobile Security Consultation PDF Logistics G Suite Virtual Machines Upselling Knowledge Telephone System Wasting Time Employer Employee Relationship Personal Information Regulation Capital Financial Productuvuty 3D Printing Printers CrashOverride Managing Stress