Top Ten Worst Tech Support Users

[vc_row][vc_column][vc_column_text]

Whether you’re head of your IT department or the go-to tech guru for your family and friends, take a moment to think about what you like most about the position. Perhaps it’s helping people, or solving problems or even just playing with technology (new and old). Now think about the people that when seen heading your way, cause you to seek refuge under your desk or in a closet. We found a fun slideshow presented by InfoWorld that highlights some of our “favorite” tech users.

 

1. Johnny Paranoid

Paranoid

 

 

 

 

 

Characteristics:
  • Reads about every possible threat to his/her electronics.
  • Is convinced he/she has been infected with the newest computer virus
  • Usually the first to call to make sure he/she is protected with the right anti-virus software or applicable security measure; Also usually the first to be preyed upon by scammers.

 

2. Constant Coveter

Coveter

 

 

 

 

 

Characteristics:
  • Needs the newest piece of technology (i.e. hardware, smartphone model, accessories).
  • Demands IT have any of the above available and ready ASAP regardless of knowing what it does or what problems may arise.

 

3. Personal Pete

Personal Pete
 

 

 

Characteristics:
  • Treats the help desk like his/her own personal assistant.
  • Asks questions about non-work-related gadgets (i.e. “What laptop should I get for my son?” or “Can you help me back up my photos on my i-Phone?”).
  • Never sees his/her questions as an imposition.

 

4. Mr./Mrs. Know-It-Some

know it all
 

 

 

Characteristics:
  • Is an amateur IT expert – knows just enough to be dangerous.
  • Tries to take matters into his/her own hands before calling you inevitably making the problem worse (i.e. tweaked Outlook settings to make his/her email “work better” or deleted important files to free up space on his/her computer).

 

5. Mr./Mrs. No-Skills

No Skills
 

 

 

Characteristics:
  • Cannot figure anything IT-related out for himself and calls the help desk every time sandwich crumbs fall in between the keyboard keys.

 

6. Defiant Debbie

defiant debbie
 

 

 

Characteristics:
  • Refuses to following instructions.
  • Doesn’t understand why (above) is a problem.
  • Ignores software update prompts, uploads insecure files to the wrong location…

 

7. Bad Liar

liar
 

 

 

Characteristics:
  • Thinks he/she is sneaky and can get away with things without you knowing (i.e. “I didn’t delete those files” or “I don’t know why my phone won’t turn on, nothing happened to it”).

8. Andy Amnesia

amnesia
 

 

 

Characteristics:
  • Doesn’t remember anything – ever.
  • Forgets passwords, how to set reminders, and anything you’ve already shown him/her how to do at least ten times.
  • Does NOT forget how to call you, though.

 

9. Search-Impaired Sally

google it
 

 

 

Characteristics:
  • Asks you internet-related (non-tech support) questions habitually instead of Googling it himself/herself (i.e. “Which website should I buy office supplies?”)
  • A Senate bill called “Let Me Google That for You” was proposed because of people like Search-Impaired Sally.

10. Incessant Complainer

complainer 2
 

 

 

Characteristics:
  • Complains about everything tech-related (i.e. “Why is the internet always so slow” or “Why do we always have to update our computers?”).

 

Leave the tech support headache to us. Learn more about our managed service offerings, by filling out the contact form to the right or calling us at 800-550-3795.

[/vc_column_text][vc_raw_js]JTNDJTIxLS0lNUJpZiUyMGx0ZSUyMElFJTIwOCU1RCUzRSUwQSUzQ3NjcmlwdCUyMGNoYXJzZXQlM0QlMjJ1dGYtOCUyMiUyMHR5cGUlM0QlMjJ0ZXh0JTJGamF2YXNjcmlwdCUyMiUyMHNyYyUzRCUyMiUyRiUyRmpzLmhzZm9ybXMubmV0JTJGZm9ybXMlMkZ2Mi1sZWdhY3kuanMlMjIlM0UlM0MlMkZzY3JpcHQlM0UlMEElM0MlMjElNUJlbmRpZiU1RC0tJTNFJTBBJTNDc2NyaXB0JTIwY2hhcnNldCUzRCUyMnV0Zi04JTIyJTIwdHlwZSUzRCUyMnRleHQlMkZqYXZhc2NyaXB0JTIyJTIwc3JjJTNEJTIyJTJGJTJGanMuaHNmb3Jtcy5uZXQlMkZmb3JtcyUyRnYyLmpzJTIyJTNFJTNDJTJGc2NyaXB0JTNFJTBBJTNDc2NyaXB0JTNFJTBBJTIwJTIwaGJzcHQuZm9ybXMuY3JlYXRlJTI4JTdCJTBBJTA5cG9ydGFsSWQlM0ElMjAlMjIzNzg1ODY5JTIyJTJDJTBBJTA5Zm9ybUlkJTNBJTIwJTIyNTc4NjFiZjMtZTIxNS00OTQyLWJhOTgtZDRiZTRkM2E4MzVmJTIyJTJDJTBBJTA5Y3NzJTNBJTIwJTIyJTIyJTBBJTdEJTI5JTNCJTBBJTNDJTJGc2NyaXB0JTNF[/vc_raw_js][/vc_column][/vc_row]

Continued Reading

8 DOs and DON’Ts for Keeping your Windows XP Machines Secure

[vc_row][vc_column][vc_column_text] The highly anticipated XP shut down has come…and gone. […]

LEARN MORE

6 Tips to Lighten the Data Load and Make Way for Lean Information Governance

[vc_row][vc_column][vc_column_text] Companies are accumulating data at an alarming rate. Much […]

LEARN MORE

Contact us Today!

Chat with an expert about your business’s technology needs.