Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons About Shadow IT, Direct from the North Pole

Lessons About Shadow IT, Direct from the North Pole

Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.

For once, Jangle felt at peace… at least, relative to this time of year.

The co-manager of the North Pole’s IT department scanned his array of monitors, seeking out the metrics coming in from the various departments that were all hard at work preparing for the big man’s annual ride around the world. Skimming the list, his smile grew with every statistic he saw.

Toy Assembly’s systems were all running fine. It seemed that the last time he had spoken to Woody about using the tablets that IT provided instead of keeping track of inventory on a spare plank had finally gotten the message across.

Coal Acquisition hadn’t had a hardware issue in some time, either… a Christmas miracle in its own right, considering how dusty that department inherently was. Fortunately, the foreman elf Smudge and his team were making liberal use of the canned air regularly delivered to them to keep their computers as clean as possible.

The Garage was doing a good job of requesting updates, rather than trying to implement them themselves. Jangle smiled, remembering how Torque used to simply add another booster to the sleigh whenever one had optimizations to install.

Satisfied, Jangle pushed himself back from his workstation and, picking up his mug, started off toward the cocoa bar. On his way, he stopped at his partner’s desk and collected the four or so empty mugs she had accumulated so far. Ginger nodded to him in silent thanks, barely taking her eyes from the screen. As he did so, he noticed her brows furrow behind the thick, festive glasses she wore.

Uh oh. If he knew Ginger, that furrow was a sign of a big, big problem.

He swiftly refilled all the mugs. He wasn’t ashamed to have a pretty lavish cocoa order—chocolate ganache melted into half-and-half, with a pinch of sea salt added, all topped with a cinnamon and nutmeg-infused whipped cream. Ginger, on the other hand… 98% pure dark chocolate, brewed directly in simple syrup.

Jangle added an extra-fluffy marshmallow to one of Ginger’s cups. It was his code that he didn’t want to interrupt her directly, but he was there if she had a conundrum she wanted to work through with him. She didn’t usually, but Jangle liked to let her know, regardless.

He delivered the cups to Ginger’s desk and started to return to his own. Two steps in, he heard a familiar slurp, followed by Ginger’s concerned voice.

“Hey, have you ever heard of ‘Knot-Today?’”

Jangle turned, looking back at his co-manager.

“Maybe… actually, yeah. It was a utility that helped organize ribbon supplies based on which toys needed wrapping. Man, it’s been decades since I’ve heard that name. Why do you mention it?”

Ginger grimaced, her glasses fogged up from her beverage.

“Is that something that would still be in use?”

Jangle shook his head.

“No, not for years. The devs fell behind on patching it, and it wound up leaking data. A lot of kids could have found out what to expect when they woke up if we kept using it. Why do you ask?” Jangle took another sip of his cocoa concoction.

Ginger sighed. “Half of the computers in Ribbons and Bows have it installed, and according to the usage data, it seems to be all they’re using over there.”

“Wha-ack-at?” Jangle choked on his steaming beverage for a moment. Coughing, he strode over to see what Ginger could see. She leaned back to give him room.

There it was. Ginger’s screen showed the ancient software present on a dozen or so workstations in the Ribbons and Bows departments. Jangle shook his head in frustration. Things were going so well, too.

Feeling a headache coming on, Jangle strode back to his desk. “I’m calling Tinsel. He’ll be able to get to the bottom of this.”

Tinsel picked up on the second ring. “Hello? Ribbons and Bows, Tinsel here.”

“Tinsel, hi, this is Jangle, over in IT. We noticed something that I wanted to ask you about. Are you familiar with Knot-Today?”

“Oh, is that the old supply management tool for ribbons? I remember using that back in the day. Why?”

“Well, Ginger just found it on some of your team’s computers, and the logs show you guys aren’t using Fit2B, that platform we installed for you.”

“Oh, that’s right.” Jangle heard Tinsel cough and shuffle some things on his desk. “Yeah, some of the team down here were having a hard time getting used to it, so I figured I’d let them go back to what they were comfortable with. Knot-Today may be a wee bit older, but it still does a good enough job of keeping the team on track.”

Jangle looked up, seeing Ginger listening in on the conversation and wordlessly shaking her head. He nodded to her in agreement before returning his attention to the call.

“Yeah, I understand that, Tinsel, but Knot-Today hasn’t been updated in a decade. Didn’t someone on our team tell you it was reaching end-of-life when we implemented Fit2B?”

Jangle and Ginger heard a long slurp of cocoa, then Tinsel’s voice again.

“Well, sure, but it works just fine. We didn’t need any new features, so why worry ourselves with learning a whole new system?”

Ginger slapped her hand on her desk in exasperation. Seeing this, Jangle gestured for her to take the reins. Only too happy to oblige, Ginger spoke up.

“Hi, Tinsel,” Ginger interjected. “I understand that sticking to the old software may seem like the better option, but there are a lot of reasons that’s not the case. One of the main reasons we migrated away from Knot-Today was that it wasn’t supported anymore, which we knew was a problem because it wouldn't receive any security updates. One of the things we appreciated the most about Fit2B is that it’s really well protected, and the development team is committed to maintaining this level of security moving forward.”

“But Fit2B has all this extra stuff that we just don’t need.”

Ginger nodded patiently. “That’s true, but it also has a lot of features that could directly help you guys accomplish more, and by working with Voyage Technology, we’re able to get a good deal… and again, the security concerns alone are enough to make Fit2Be a better choice.”

Jangle, still on the line, heard Tinsel grumble.

“Tell you what,” Ginger continued. “We’ll send Pixel and Delbert over to you guys every so often to help teach your department how to make the best use of Fit2Be. I think you’ll be pleasantly surprised as to how much you can accomplish with it.”

“And,” added Jangle, “I want to apologize for something going live without your team being fully briefed on it and properly trained. We’ll do our best to make sure that doesn’t happen again.

On the other end of the line, Tinsel hemmed and hawed. Finally, he replied.

“Okay, that sounds fair. I appreciate that.”

Jangle sighed in relief, making sure his mic was muted. Once the call was ended, he turned to Ginger.

“I think we should reach out to Voyage Technology and see if they have any educational resources we can use.”

“I agree.” Ginger nodded, draining one of her mugs. “I’ll send them a ticket now.”

Jangle nodded, turning back to his workstation to resume his watchful eye over the Pole’s IT.

***

We’re so grateful for each and every one of our clients, from all of those in Western Kentucky to those we have a special agreement with up north. If you’d like to learn more about working with us for your business IT’s benefit, give us a call at 800.618.9844. Happy holidays!

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Workplace Tips Privacy Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Compliance Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Vendor Business Technology Windows 10 Bandwidth Virtualization Apps Data Security Two-factor Authentication Mobile Office Managed Services Networking App Employer-Employee Relationship BYOD Mobile Device Management Chrome Tip of the week Gmail Budget Voice over Internet Protocol WiFi Apple Managed IT Services How To BDR Computing HIPAA Hacker Physical Security Information Technology Applications Avoiding Downtime Marketing Access Control Office 365 Conferencing Password Operating System Computers Router Risk Management Virtual Private Network Website Health Office Tips 2FA Analytics Help Desk Augmented Reality Storage Retail Bring Your Own Device Healthcare Big Data Social Cooperation Free Resource Project Management Going Green Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Customer Service Vulnerability Cybercrime End of Support Vendor Management Solutions Display Printer Paperless Office Windows 11 Infrastructure Monitoring Firewall Excel Document Management Remote Workers Managed IT Service The Internet of Things Telephone Scam Data loss Entertainment Vulnerabilities Data Privacy Images 101 Customer Relationship Management Telephone System Settings Multi-Factor Authentication Robot Mobility Printing Cost Management Wireless Content Filtering Hacking Presentation YouTube IT Management Cryptocurrency VPN Employees Meetings Integration Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Data storage LiFi Holidays Word Data Storage Outlook Smart Technology Supply Chain Money Video Conferencing Machine Learning Managed Services Provider Humor Saving Time Virtual Machines Professional Services Safety Sports Mouse Maintenance Antivirus Downloads iPhone Licensing Administration Application Best Practice Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Buisness Tablet IoT Communitications Dark Web Cables Alert IBM Legal IT solutions Trends Supply Chain Management Business Growth Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Cortana Notifications Staff Value Business Intelligence Gamification Flexibility Alt Codes Organization Travel Social Networking Legislation Shortcuts Competition Techology Fileless Malware Digital Security Cameras Downtime Google Maps Smart Devices Ransmoware Content Remote Working Wearable Technology Memory Vendors Hosted Solution Typing Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Knowledge Wasting Time Threats Google Drive User Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta User Error Microchip Internet Exlporer Software as a Service 5G Username Experience Managing Costs Amazon IP Address Google Docs Unified Communications Bitcoin Running Cable Point of Sale eCommerce Black Friday SSID Virtual Assistant Outsource IT Google Wallet Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Media Recovery Hard Drives Windows 8 Proxy Server Reviews Laptop Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Domains Drones Tactics Development Websites Mirgation Hypervisor Displays Refrigeration Shopping Halloween Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing Public Speaking SharePoint Addiction Management PCI DSS Chatbots Navigation Lithium-ion battery Hacks Lenovo Gig Economy Entrepreneur Scary Stories Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Fun Deep Learning Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Undo Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Twitter Alerts SQL Server Technology Care Education Download Net Neutrality Financial Data Error History Business Communications Mobile Computing Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Search Remote Computing Azure Hybrid Work Upload Procurement

Blog Archive