{"id":10540,"date":"2018-03-21T12:13:11","date_gmt":"2018-03-21T01:13:11","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=10540"},"modified":"2018-03-21T12:13:11","modified_gmt":"2018-03-21T01:13:11","slug":"10540-2","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/10540-2","title":{"rendered":"Nine Signs Your IT Person May Be Incompetent"},"content":{"rendered":"<p>In any organization, your IT gal or guy is important. They&#8217;re the person you go to when your computer freezes up, or you need a file recovered. But not all of them are made equal.<\/p>\n<p>If you hear them uttering these words, it&#8217;s a warning sign that you might have a flakier-than-normal IT &#8216;professional&#8217; on your hands.<\/p>\n<p><span style=\"color: #343e47; font-family: Lato, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 30px;\">1. &#8220;Ignore those errors.&#8221;<\/span><\/p>\n<p>Errors come up for a reason. It&#8217;s because the makers of the hardware, software or service is trying to tell you something is wrong.<\/p>\n<h4>2. &#8220;We&#8217;re going to take the chassis cover off your machine so it gets better ventilation.&#8221;<\/h4>\n<p>A time-honored solution for an at-home PC gamer who doesn&#8217;t want to fork out for a decent cooling system. A highly questionable decision for a workplace desktop or a server.<\/p>\n<h4>3. &#8220;Let me just email you both the username and password. Or wait, do you have Skype?&#8221;<\/h4>\n<p>Transferring your emails via an insecure channel is a lazy move. This is one of those &#8220;it&#8217;s fine until it isn&#8217;t, and then it <em>really<\/em> isn&#8217;t&#8221; things.<\/p>\n<h4>4. &#8220;I hate it when that happens.&#8221;<\/h4>\n<p>&#8230; So why does it keep happening?<\/p>\n<h4>5. &#8220;I don&#8217;t know what the problem is, so I can&#8217;t fix it.&#8221;<\/h4>\n<p>It&#8217;s not expected that an IT professional knows every single error code for every piece of software in your organization off the top of their head. What <em>is<\/em> expected is that they google it.<\/p>\n<h4>6. &#8220;I was reading through your emails. I see you&#8217;re going to a party this weekend.&#8221;<\/h4>\n<p>Just because an Administrator can access all your emails and folders doesn&#8217;t mean they should be without just cause.<\/p>\n<h4>7. &#8220;I deleted those files to free up server space. What do you mean, you were still using them?&#8221;<\/h4>\n<p>Those video files they thought weren&#8217;t business related? Turns out they were part of the company&#8217;s new marketing campaign. <a href=\"https:\/\/www.youtube.com\/watch?v=UQnkNunZgC8\">Uh-oh, spaghettios<\/a>.<\/p>\n<h4>8. &#8220;Uh, we don&#8217;t have backups of that data. It&#8217;s gone forever.&#8221;<\/h4>\n<p>Translation: &#8220;I really should have put in an automated backup plan to make sure that never happens, but I didn&#8217;t, and now you&#8217;ve got to suffer for it.&#8221;<\/p>\n<h4>9. &#8220;Those backups of your data were corrupted. It&#8217;s gone forever.&#8221;<\/h4>\n<p>Translation: &#8220;<a href=\"https:\/\/www.backupassist.com\/blog\/news\/why-your-business-needs-to-test-restore\/\">I should have run test restores<\/a> of those backups, but I didn&#8217;t, and then I assumed it would all turn out okay, and it didn&#8217;t.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wondering if your company&#8217;s IT staff are unusual or not? Here&#8217;s some warning signs to look out for, as written by other IT professionals.<\/p>\n","protected":false},"author":2,"featured_media":10548,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[634,270,650],"class_list":["post-10540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-featured","tag-humor","tag-it"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Nine Warning Signs Your IT Staff Might Be Incompetent<\/title>\n<meta name=\"description\" content=\"Wondering if your company&#039;s IT staff are incompetent or not? Here&#039;s some warning signs to look out for, as written by other IT professionals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/10540-2\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nine Warning Signs Your IT Staff Might Be Incompetent\" \/>\n<meta property=\"og:description\" content=\"Wondering if your company&#039;s IT staff are incompetent or not? Here&#039;s some warning signs to look out for, as written by other IT professionals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/10540-2\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-21T01:13:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/03\/1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"852\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/10540-2#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/10540-2\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\"},\"headline\":\"Nine Signs Your IT Person May Be Incompetent\",\"datePublished\":\"2018-03-21T01:13:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/10540-2\"},\"wordCount\":386,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/10540-2#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/03\/1.jpg\",\"keywords\":[\"featured\",\"humor\",\"IT\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/10540-2#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/10540-2\",\"url\":\"https:\/\/www.backupassist.com\/blog\/10540-2\",\"name\":\"Nine Warning Signs Your IT Staff Might Be Incompetent\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/10540-2#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/10540-2#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/03\/1.jpg\",\"datePublished\":\"2018-03-21T01:13:11+00:00\",\"description\":\"Wondering if your company's IT staff are incompetent or not? Here's some warning signs to look out for, as written by other IT professionals.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/10540-2#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/10540-2\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/10540-2#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/03\/1.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/03\/1.jpg\",\"width\":852,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/10540-2#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nine Signs Your IT Person May Be Incompetent\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"description\":\"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)\",\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/linus-chang\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nine Warning Signs Your IT Staff Might Be Incompetent","description":"Wondering if your company's IT staff are incompetent or not? Here's some warning signs to look out for, as written by other IT professionals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/10540-2","og_locale":"en_US","og_type":"article","og_title":"Nine Warning Signs Your IT Staff Might Be Incompetent","og_description":"Wondering if your company's IT staff are incompetent or not? Here's some warning signs to look out for, as written by other IT professionals.","og_url":"https:\/\/www.backupassist.com\/blog\/10540-2","og_site_name":"Cyber Resilience Blog","article_published_time":"2018-03-21T01:13:11+00:00","og_image":[{"width":852,"height":480,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/03\/1.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/10540-2#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/10540-2"},"author":{"name":"Linus Chang","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3"},"headline":"Nine Signs Your IT Person May Be Incompetent","datePublished":"2018-03-21T01:13:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/10540-2"},"wordCount":386,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/10540-2#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/03\/1.jpg","keywords":["featured","humor","IT"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/10540-2#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/10540-2","url":"https:\/\/www.backupassist.com\/blog\/10540-2","name":"Nine Warning Signs Your IT Staff Might Be Incompetent","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/10540-2#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/10540-2#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/03\/1.jpg","datePublished":"2018-03-21T01:13:11+00:00","description":"Wondering if your company's IT staff are incompetent or not? Here's some warning signs to look out for, as written by other IT professionals.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/10540-2#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/10540-2"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/10540-2#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/03\/1.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/03\/1.jpg","width":852,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/10540-2#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Nine Signs Your IT Person May Be Incompetent"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","caption":"Linus Chang"},"description":"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)","url":"https:\/\/www.backupassist.com\/blog\/author\/linus-chang"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/10540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=10540"}],"version-history":[{"count":0,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/10540\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/10548"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=10540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=10540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=10540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}