Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

For once, Jangle felt at peace… at least, relative to this time of year.

The co-manager of the North Pole’s IT department scanned his array of monitors, seeking out the metrics coming in from the various departments that were all hard at work preparing for the big man’s annual ride around the world. Skimming the list, his smile grew with every statistic he saw.

Toy Assembly’s systems were all running fine. It seemed that the last time he had spoken to Woody about using the tablets that IT provided instead of keeping track of inventory on a spare plank had finally gotten the message across.

Coal Acquisition hadn’t had a hardware issue in some time, either… a Christmas miracle in its own right, considering how dusty that department inherently was. Fortunately, the foreman elf Smudge and his team were making liberal use of the canned air regularly delivered to them to keep their computers as clean as possible.

The Garage was doing a good job of requesting updates, rather than trying to implement them themselves. Jangle smiled, remembering how Torque used to simply add another booster to the sleigh whenever one had optimizations to install.

Satisfied, Jangle pushed himself back from his workstation and, picking up his mug, started off toward the cocoa bar. On his way, he stopped at his partner’s desk and collected the four or so empty mugs she had accumulated so far. Ginger nodded to him in silent thanks, barely taking her eyes from the screen. As he did so, he noticed her brows furrow behind the thick, festive glasses she wore.

Uh oh. If he knew Ginger, that furrow was a sign of a big, big problem.

He swiftly refilled all the mugs. He wasn’t ashamed to have a pretty lavish cocoa order—chocolate ganache melted into half-and-half, with a pinch of sea salt added, all topped with a cinnamon and nutmeg-infused whipped cream. Ginger, on the other hand… 98% pure dark chocolate, brewed directly in simple syrup.

Jangle added an extra-fluffy marshmallow to one of Ginger’s cups. It was his code that he didn’t want to interrupt her directly, but he was there if she had a conundrum she wanted to work through with him. She didn’t usually, but Jangle liked to let her know, regardless.

He delivered the cups to Ginger’s desk and started to return to his own. Two steps in, he heard a familiar slurp, followed by Ginger’s concerned voice.

“Hey, have you ever heard of ‘Knot-Today?’”

Jangle turned, looking back at his co-manager.

“Maybe… actually, yeah. It was a utility that helped organize ribbon supplies based on which toys needed wrapping. Man, it’s been decades since I’ve heard that name. Why do you mention it?”

Ginger grimaced, her glasses fogged up from her beverage.

“Is that something that would still be in use?”

Jangle shook his head.

“No, not for years. The devs fell behind on patching it, and it wound up leaking data. A lot of kids could have found out what to expect when they woke up if we kept using it. Why do you ask?” Jangle took another sip of his cocoa concoction.

Ginger sighed. “Half of the computers in Ribbons and Bows have it installed, and according to the usage data, it seems to be all they’re using over there.”

“Wha-ack-at?” Jangle choked on his steaming beverage for a moment. Coughing, he strode over to see what Ginger could see. She leaned back to give him room.

There it was. Ginger’s screen showed the ancient software present on a dozen or so workstations in the Ribbons and Bows departments. Jangle shook his head in frustration. Things were going so well, too.

Feeling a headache coming on, Jangle strode back to his desk. “I’m calling Tinsel. He’ll be able to get to the bottom of this.”

Tinsel picked up on the second ring. “Hello? Ribbons and Bows, Tinsel here.”

“Tinsel, hi, this is Jangle, over in IT. We noticed something that I wanted to ask you about. Are you familiar with Knot-Today?”

“Oh, is that the old supply management tool for ribbons? I remember using that back in the day. Why?”

“Well, Ginger just found it on some of your team’s computers, and the logs show you guys aren’t using Fit2B, that platform we installed for you.”

“Oh, that’s right.” Jangle heard Tinsel cough and shuffle some things on his desk. “Yeah, some of the team down here were having a hard time getting used to it, so I figured I’d let them go back to what they were comfortable with. Knot-Today may be a wee bit older, but it still does a good enough job of keeping the team on track.”

Jangle looked up, seeing Ginger listening in on the conversation and wordlessly shaking her head. He nodded to her in agreement before returning his attention to the call.

“Yeah, I understand that, Tinsel, but Knot-Today hasn’t been updated in a decade. Didn’t someone on our team tell you it was reaching end-of-life when we implemented Fit2B?”

Jangle and Ginger heard a long slurp of cocoa, then Tinsel’s voice again.

“Well, sure, but it works just fine. We didn’t need any new features, so why worry ourselves with learning a whole new system?”

Ginger slapped her hand on her desk in exasperation. Seeing this, Jangle gestured for her to take the reins. Only too happy to oblige, Ginger spoke up.

“Hi, Tinsel,” Ginger interjected. “I understand that sticking to the old software may seem like the better option, but there are a lot of reasons that’s not the case. One of the main reasons we migrated away from Knot-Today was that it wasn’t supported anymore, which we knew was a problem because it wouldn't receive any security updates. One of the things we appreciated the most about Fit2B is that it’s really well protected, and the development team is committed to maintaining this level of security moving forward.”

“But Fit2B has all this extra stuff that we just don’t need.”

Ginger nodded patiently. “That’s true, but it also has a lot of features that could directly help you guys accomplish more, and by working with Voyage Technology, we’re able to get a good deal… and again, the security concerns alone are enough to make Fit2Be a better choice.”

Jangle, still on the line, heard Tinsel grumble.

“Tell you what,” Ginger continued. “We’ll send Pixel and Delbert over to you guys every so often to help teach your department how to make the best use of Fit2Be. I think you’ll be pleasantly surprised as to how much you can accomplish with it.”

“And,” added Jangle, “I want to apologize for something going live without your team being fully briefed on it and properly trained. We’ll do our best to make sure that doesn’t happen again.

On the other end of the line, Tinsel hemmed and hawed. Finally, he replied.

“Okay, that sounds fair. I appreciate that.”

Jangle sighed in relief, making sure his mic was muted. Once the call was ended, he turned to Ginger.

“I think we should reach out to Voyage Technology and see if they have any educational resources we can use.”

“I agree.” Ginger nodded, draining one of her mugs. “I’ll send them a ticket now.”

Jangle nodded, turning back to his workstation to resume his watchful eye over the Pole’s IT.

***

We’re so grateful for each and every one of our clients, from all of those in Western Kentucky to those we have a special agreement with up north. If you’d like to learn more about working with us for your business IT’s benefit, give us a call at 800.618.9844. Happy holidays!

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Email Google Computer Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Facebook Artificial Intelligence Miscellaneous Cloud Computing Covid-19 Training Gadgets Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Data Security Vendor Mobile Office Two-factor Authentication Managed Services Apps App BYOD Mobile Device Management Gmail Tip of the week Chrome WiFi Budget Voice over Internet Protocol Employer-Employee Relationship Apple Networking How To BDR Hacker Avoiding Downtime HIPAA Computing Marketing Physical Security Applications Information Technology Access Control Office 365 Conferencing Managed IT Services Computers Operating System Website Router Virtual Private Network Risk Management Health 2FA Help Desk Office Tips Analytics Augmented Reality Big Data Retail Storage Password Healthcare Bring Your Own Device Cooperation Free Resource Project Management Windows 7 Customer Service Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Display Printer Firewall Paperless Office Windows 11 Infrastructure Monitoring Excel The Internet of Things Document Management Remote Workers Managed IT Service Social Telephone Scam Data loss Data Privacy Images 101 Hacking Presentation Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Wireless Technology Printing Wireless Content Filtering IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Word Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Supply Chain Safety Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Vulnerabilities Customer Relationship Management Entertainment Administration Best Practice Trends Supply Chain Management Alert Competition Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Organization Travel Social Networking Legislation Shortcuts Cortana Ransmoware Techology Fileless Malware Digital Security Cameras User Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Vendors Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce IP Address Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Knowledge Fraud Meta Google Drive User Error Microchip Recovery Internet Exlporer Software as a Service Hard Drives Username Managing Costs Amazon Domains Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Outsource IT Google Docs Unified Communications Database Surveillance Refrigeration Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Media Public Speaking Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Lithium-ion battery Tactics Development Windows 8 Entrepreneur Laptop Websites Mirgation Hypervisor Displays Drones Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Undo Management PCI DSS Halloween Chatbots Navigation Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Fun Co-managed IT Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care Application Financial Data Error History Business Communications Social Engineering Break Fix Scams IBM Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Search Dark Web Cables CES Tablet IoT Communitications

Blog Archive