3: Tackling I.T. Issues On Your Own Can Cost You More Than You Save
June 17, 2021

We have a few clients that like to think of themselves as technically inclined, they like to tinker. They sometimes think they know that they know how to tackle their technology because they set their kids X-Box up on their Wi-Fi network at their house over Christmas.

Then they try to take that and apply that to their business. They get into it and find out, oh, this is not my home router and this is not the X-Box with the nice big screen and the controller. I can just pick my preferences out right there. That’s one of the pitfalls we see, especially with, you some of our smaller clients who are looking to save money.

They want to do as much of this as they can themselves. They may have a guy on staff. It’s typically the young guy that they’ll go to, to try to troubleshoot things before they give us a call. And it always comes back to us worse than what we left it. So it takes a little longer to fix.

It costs a little more. And the guy that tried to do it, his production went down for the month because he was playing computer guy. It initially happens when someone has a new business or a smaller business and they’re, and they’re really trying to cut costs, which means they’re trying to cut corners.

And that usually means they’re paying more in the end. So we see that quite a bit. Again, smaller clients, as they grow, they tend to kind of grow out of that. They tend to know, okay, well, I’ve got to focus on my business and my guys need to focus on their business. And, you know, I can’t have my employees spending their days trying to troubleshoot things when I’ve got this other company here that can do it efficiently, have it done, and get us back on track.

Host info

Kelly Herrod, the founder and CEO of Herrod Technology, started the company in 2000 to provide simple IT solutions for small and mid-sized businesses. His personal approach, over 30 years experience and his ability to simplify IT sets him apart in the IT industry.

Thanks for listening! Don’t forget to subscribe on Apple Podcasts, Spotify, Google, or Stitcher. (Or your favorite podcast app.) If you like what you heard, please leave a review on iTunes and share what you liked about the show.

Latest Episodes

16. Having A Great Relationship With Our Customers Is Key

I can't remember any meeting I've ever sat in with a potential client who asks us about our certifications. Most of our clients don't even know what those certifications are, or what's required to get that certification, and how it applies to them. When I was at EDS,...

15. Multifactor Authentication Could Save Your Bacon

Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it's been around for a while. The reason it's making such a big push here lately is because Microsoft is starting to push that out to their Office 365...

14. Do Your Laptops Have Encryption Enabled? They Should!

Your phone and tablets, those are a little easier to secure in that most people either have a pass code or face ID or fingerprint identification. That's pretty secure. That's about as secure as it can get out there. You can do face ID on your laptop with Windows now,...

Subscribe
Stories of Life and Business on Apple Podcasts
Listen to Stories of Life and Business on Spotify
Listen to Education Evolution on Stitcher

Related Posts

15. Multifactor Authentication Could Save Your Bacon

15. Multifactor Authentication Could Save Your Bacon

Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it's been around for a while. The reason it's making such a big push here lately is because Microsoft is starting to push that out to their Office 365...

14. Do Your Laptops Have Encryption Enabled? They Should!

14. Do Your Laptops Have Encryption Enabled? They Should!

Your phone and tablets, those are a little easier to secure in that most people either have a pass code or face ID or fingerprint identification. That's pretty secure. That's about as secure as it can get out there. You can do face ID on your laptop with Windows now,...

13. Password Best Practices for Ultimate Security from Hackers

13. Password Best Practices for Ultimate Security from Hackers

When it comes to passwords, there's some pretty hard and fast rules on what you should and shouldn't use as far as length of password and types of characters. What I like to tell people, and what even a lot of our business clients have started doing, is use a Password...

Subscribe for Podcast Announcements and New Episodes, Along with Information Tech and Cybersecurity Tips!

* indicates required
~

Your email is safe and secure.