Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

For once, Jangle felt at peace… at least, relative to this time of year.

The co-manager of the North Pole’s IT department scanned his array of monitors, seeking out the metrics coming in from the various departments that were all hard at work preparing for the big man’s annual ride around the world. Skimming the list, his smile grew with every statistic he saw.

Toy Assembly’s systems were all running fine. It seemed that the last time he had spoken to Woody about using the tablets that IT provided instead of keeping track of inventory on a spare plank had finally gotten the message across.

Coal Acquisition hadn’t had a hardware issue in some time, either… a Christmas miracle in its own right, considering how dusty that department inherently was. Fortunately, the foreman elf Smudge and his team were making liberal use of the canned air regularly delivered to them to keep their computers as clean as possible.

The Garage was doing a good job of requesting updates, rather than trying to implement them themselves. Jangle smiled, remembering how Torque used to simply add another booster to the sleigh whenever one had optimizations to install.

Satisfied, Jangle pushed himself back from his workstation and, picking up his mug, started off toward the cocoa bar. On his way, he stopped at his partner’s desk and collected the four or so empty mugs she had accumulated so far. Ginger nodded to him in silent thanks, barely taking her eyes from the screen. As he did so, he noticed her brows furrow behind the thick, festive glasses she wore.

Uh oh. If he knew Ginger, that furrow was a sign of a big, big problem.

He swiftly refilled all the mugs. He wasn’t ashamed to have a pretty lavish cocoa order—chocolate ganache melted into half-and-half, with a pinch of sea salt added, all topped with a cinnamon and nutmeg-infused whipped cream. Ginger, on the other hand… 98% pure dark chocolate, brewed directly in simple syrup.

Jangle added an extra-fluffy marshmallow to one of Ginger’s cups. It was his code that he didn’t want to interrupt her directly, but he was there if she had a conundrum she wanted to work through with him. She didn’t usually, but Jangle liked to let her know, regardless.

He delivered the cups to Ginger’s desk and started to return to his own. Two steps in, he heard a familiar slurp, followed by Ginger’s concerned voice.

“Hey, have you ever heard of ‘Knot-Today?’”

Jangle turned, looking back at his co-manager.

“Maybe… actually, yeah. It was a utility that helped organize ribbon supplies based on which toys needed wrapping. Man, it’s been decades since I’ve heard that name. Why do you mention it?”

Ginger grimaced, her glasses fogged up from her beverage.

“Is that something that would still be in use?”

Jangle shook his head.

“No, not for years. The devs fell behind on patching it, and it wound up leaking data. A lot of kids could have found out what to expect when they woke up if we kept using it. Why do you ask?” Jangle took another sip of his cocoa concoction.

Ginger sighed. “Half of the computers in Ribbons and Bows have it installed, and according to the usage data, it seems to be all they’re using over there.”

“Wha-ack-at?” Jangle choked on his steaming beverage for a moment. Coughing, he strode over to see what Ginger could see. She leaned back to give him room.

There it was. Ginger’s screen showed the ancient software present on a dozen or so workstations in the Ribbons and Bows departments. Jangle shook his head in frustration. Things were going so well, too.

Feeling a headache coming on, Jangle strode back to his desk. “I’m calling Tinsel. He’ll be able to get to the bottom of this.”

Tinsel picked up on the second ring. “Hello? Ribbons and Bows, Tinsel here.”

“Tinsel, hi, this is Jangle, over in IT. We noticed something that I wanted to ask you about. Are you familiar with Knot-Today?”

“Oh, is that the old supply management tool for ribbons? I remember using that back in the day. Why?”

“Well, Ginger just found it on some of your team’s computers, and the logs show you guys aren’t using Fit2B, that platform we installed for you.”

“Oh, that’s right.” Jangle heard Tinsel cough and shuffle some things on his desk. “Yeah, some of the team down here were having a hard time getting used to it, so I figured I’d let them go back to what they were comfortable with. Knot-Today may be a wee bit older, but it still does a good enough job of keeping the team on track.”

Jangle looked up, seeing Ginger listening in on the conversation and wordlessly shaking her head. He nodded to her in agreement before returning his attention to the call.

“Yeah, I understand that, Tinsel, but Knot-Today hasn’t been updated in a decade. Didn’t someone on our team tell you it was reaching end-of-life when we implemented Fit2B?”

Jangle and Ginger heard a long slurp of cocoa, then Tinsel’s voice again.

“Well, sure, but it works just fine. We didn’t need any new features, so why worry ourselves with learning a whole new system?”

Ginger slapped her hand on her desk in exasperation. Seeing this, Jangle gestured for her to take the reins. Only too happy to oblige, Ginger spoke up.

“Hi, Tinsel,” Ginger interjected. “I understand that sticking to the old software may seem like the better option, but there are a lot of reasons that’s not the case. One of the main reasons we migrated away from Knot-Today was that it wasn’t supported anymore, which we knew was a problem because it wouldn't receive any security updates. One of the things we appreciated the most about Fit2B is that it’s really well protected, and the development team is committed to maintaining this level of security moving forward.”

“But Fit2B has all this extra stuff that we just don’t need.”

Ginger nodded patiently. “That’s true, but it also has a lot of features that could directly help you guys accomplish more, and by working with Voyage Technology, we’re able to get a good deal… and again, the security concerns alone are enough to make Fit2Be a better choice.”

Jangle, still on the line, heard Tinsel grumble.

“Tell you what,” Ginger continued. “We’ll send Pixel and Delbert over to you guys every so often to help teach your department how to make the best use of Fit2Be. I think you’ll be pleasantly surprised as to how much you can accomplish with it.”

“And,” added Jangle, “I want to apologize for something going live without your team being fully briefed on it and properly trained. We’ll do our best to make sure that doesn’t happen again.

On the other end of the line, Tinsel hemmed and hawed. Finally, he replied.

“Okay, that sounds fair. I appreciate that.”

Jangle sighed in relief, making sure his mic was muted. Once the call was ended, he turned to Ginger.

“I think we should reach out to Voyage Technology and see if they have any educational resources we can use.”

“I agree.” Ginger nodded, draining one of her mugs. “I’ll send them a ticket now.”

Jangle nodded, turning back to his workstation to resume his watchful eye over the Pole’s IT.

***

We’re so grateful for each and every one of our clients, from all of those in Western Kentucky to those we have a special agreement with up north. If you’d like to learn more about working with us for your business IT’s benefit, give us a call at 800.618.9844. Happy holidays!

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Saving Money Communication Cybersecurity Managed Service Data Backup Smartphone Android Upgrade AI Disaster Recovery Data Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Gadgets Cloud Computing Covid-19 Server Managed Service Provider Compliance Remote Work Outsourced IT Employee/Employer Relationship IT Support Encryption Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Tip of the week Chrome Mobile Device Management Managed Services Budget Voice over Internet Protocol Gmail Apple Networking App Employer-Employee Relationship BYOD Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR HIPAA Computing Applications Information Technology Computers Health 2FA Help Desk Website Office Tips Analytics Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Operating System Router Virtual Private Network Risk Management Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Social Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Physical Security Customer Service Display Computer Repair Mobile Security Processor Presentation Virtual Desktop Holidays Wireless Technology Data storage LiFi Data Storage Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Word Humor Managed IT Service Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Safety Vulnerabilities Entertainment Administration Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Content Filtering IT Management Customer Relationship Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Hacking Experience Virtual Assistant Outsource IT Google Docs Unified Communications Database Surveillance Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment User Media Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development Windows 8 IP Address Laptop Websites Mirgation Hypervisor Displays Drones Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Management PCI DSS Halloween Chatbots Recovery Navigation Lenovo Gig Economy Screen Reader Hard Drives Writing Distributed Denial of Service Workplace Domains Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Refrigeration Fun Co-managed IT Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Technology Care Financial Data Lithium-ion battery Error History Business Communications Social Engineering Break Fix Scams Entrepreneur Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Search Dark Web Cables CES Tablet IoT Communitications Undo Best Practice Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Organization Travel Social Networking Application Legislation Shortcuts Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working IBM Wearable Technology Memory Vendors Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Knowledge Fraud Meta Google Drive User Error Microchip Internet Exlporer Software as a Service Competition Username Managing Costs Amazon Point of Sale eCommerce 5G Black Friday SSID

Blog Archive