ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Testimonial From the North Pole

A Testimonial From the North Pole

We’ve always been a proponent of preparing for the worst and hoping for the best where a business’ solutions are concerned. That’s why we were happy to receive an email from our friends at the North Pole telling us about a situation they ran into just a few days ago...

Dear ClearView IT,

I just wanted to send you a quick letter thanking you… Thing is, you probably saved Christmas this year! Recently, there was a bit of a mishap here in the workshop that would have put us WAY behind schedule.

You know how we like to deliver presents to all the good boys and girls, and the boss has always kept the kids separated into the good ones and the naughty ones? Well, we decided to finally take your advice and digitize the list - thanks for that tip, by the way! It’s a lot easier to carry around, and now Santa can access it on his Noelkia smartphone whenever he needs to.

Anyways, that was working great, until the workshop’s server failed. We even restarted it and checked it twice! Nothing was working - including the Naughty & Nice CRM software.

We found out that Merry Hollycane (our office administrator elf) had accidentally downloaded the Cryptowall ransomware to the network. At $1,000 per file, there was NO WAY that we could afford to pay the ransom.

That hacker is definitely on the naughty list.

So instead of making toys, we were busy freaking out and trying to figure out what to do without the list! I mean, we still had the letters, so we knew what kids were asking for, but we needed to know which kids were naughty and which were nice! Without it, how would we know which children were supposed to get a gift from Santa, and which were only supposed to get coal?

It was an administrative nightmare!

Fortunately, Nougat Trufflesnaps (our internal IT elf) came to the rescue. He remembered that we had also started using a cloud-based data backup solution upon your recommendation! All Nougat had to do was log in and there was the list - a real Christmas miracle.

We were able to build a replacement server and download the list back to it, and we only lost about 23 minutes of work in total. I know that this may seem like hardly any time at all to you, but remember - we’re making toys for a whole world full of children. An hour would have been catastrophic to our operations.

Thanks to your advice, we were able to get back to work. I’m happy to report that we’re back on track for a successful delivery.

So, again, thank you so much for all of your advice - you really saved our gumdrops there. I’m pretty sure that you and your team all earned yourselves permanent spots on the nice list!

Sincerely,

Drummer Brandybells
Lead Elf, Christmas Cheer Division

We’re glad that our advice was so helpful to our friends up at the North Pole, and that we were able to play a part in saving Christmas. If you’d like to discuss the solutions we used in more detail with us, give us a call at 866-326-7214.

In the meantime, from ClearView IT to you, have a very happy holidays and a wonderful new year!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 13 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Facebook Windows 10 Business Continuity Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Remote Work Internet of Things Data Management Saving Money Operating System Government Artificial Intelligence Managed IT services Gadgets Workplace Strategy Networking Windows Business Technology App Virtualization Blockchain WiFi Spam Server Information Remote Bandwidth Encryption Mobile Device Management Office Apple Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship Budget History Gmail Analytics Conferencing Access Control Data Security Cybercrime Wi-Fi BDR Health Big Data Help Desk Hacking Cost Management IT Management Remote Computing Training Document Management Hacker Save Money Patch Management Vendor Compliance Employer-Employee Relationship Remote Monitoring Voice over Internet Protocol Hiring/Firing Outlook Managed Services Password Data loss Legal Data storage Money Customer Service Unified Threat Management Firewall Search... Applications Best Practice Augmented Reality Word Project Management BYOD Vulnerabilities IBM Retail Website Computing Alert Vendor Management Mobile Office Hard Drive User Windows 7 The Internet of Things Free Resource YouTube Twitter Google Maps Scam How To Law Enforcement Laptop Chrome End of Support Printer VPN Update Mobile Computing Social Sports Travel DDoS Virtual Reality Marketing Data Breach SaaS Social Engineering Cryptocurrency Paperless Office Running Cable Antivirus Black Market iPhone Cleaning Maintenance Cortana Storage Education Windows 11 Robot Content Filtering Monitoring Healthcare Websites Router Remote Workers Meetings Mobility Managed Services Provider Chromebook Software as a Service Drones Bitcoin Data Protection Computers Virtual Private Network Automobile Telephone Current Events How To Wireless Technology Microchip eWaste Excel Solutions Flexibility Images 101 Integration Downtime Tech Terms Safety Identity Theft PowerPoint Display Hack Notifications Managed IT Administration Unified Communications Virtual Assistant Digital Presentation Virtual Desktop Experience Specifications Google Docs Employees Taxes Avoiding Downtime IT Consultant Bluetooth Distributed Denial of Service Holidays Office Tips Customer Relationship Management Private Cloud Processor Memory Co-Managed IT Cooperation Disaster Entertainment Physical Security Video Conferencing Virtual Machines Politics Lithium-ion battery Computer Repair Machine Learning Settings Multi-factor Authentication Professional Services Start Menu Computer Care Solid State Drive Downloads Processors Vulnerability Saving Time HIPAA Error Tablets Financial Data Risk Management Visible Light Communication IT Scams Reading Bookmark Monitors Download Google Apps Windows 8 Supercomputer Piracy Google Calendar Term Virus Business Owner HTML Telework Smartwatch Advertising Motion Sickness Communitications Microsoft 365 Cables Relocation Browsers Public Speaking Displays Nanotechnology Work/Life Balance Google Drive Upload Tech Support Software License Procurement Streaming Media Comparison Google Play Social Network Keyboard FinTech CES IT Assessment Point of Sale Knowledge Data Analysis Hard Drives Corporate Profile Screen Reader Telephony Trends intranet Employer Employee Relationship Mobile Technology Supply Chain Management Value In Internet of Things Television Security Cameras Cyber security Shortcuts Wireless Hacks Customer Resource management Inbound Marketing Shortcut Network Congestion Cabling Devices Organization Environment G Suite Tip of the week Smart Devices Reliable Computing Fileless Malware Heating/Cooling Writing Tablet VoIP Gamification Social Networking Tracking Company Culture Remote Working Windows XP Mouse Trend Micro Be Proactive Telephone System Regulations AI Digital Security Cameras Web Server Electronic Health Records Transportation Scalability Directions Electronic Payment Backup and Disaster Recovery Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Administrator SharePoint eCommerce Modem Workplace Strategies Bring Your Own Device Electronic Medical Records Worker Accountants Phone System Videos Surveillance Access Database Time Management Music Public Cloud Managing Costs SSID Staffing Health IT Equifax Media Hard Drive Disposal Development Employer/Employee Relationships Audit IP Address Spyware Tactics Username File Sharing Virtual Machine Botnet Optimization Smart Technology Rental Service Redundancy Micrsooft Startup Computer Accessories Reviews Freedom of Information 2FA email scam Teamwork Navigation Flash Cache Addiction Telephone Systems Unified Threat Management Business Growth Workers Mobile Security Data Storage Hypervisor Medical IT Recovery User Tip Competition Legislation Shopping News Paperless CCTV SQL Server Printing Evernote Network Management LiFi Banking Touchscreen Entrepreneur Google Wallet PCI DSS Licensing Humor Supply Chain Documents Messenger Emergency Proxy Server Application Deep Learning Emails Gig Economy Computer Malfunction Fake News Vendor Mangement Service Level Agreement Business Communications Business Intelligence Computing Infrastructure Internet Service Provider Azure Business Metrics Management Troubleshooting Hosted Solution Samsung Device security Regulations Compliance Managed IT Service Webcam Microsoft Excel Memes Workplace Securty Books Uninterrupted Power Supply Wireless Headphones Domains Language Business Mangement Going Green Human Resources Society Business Cards Net Neutrality Tech

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?