Blog Layout

Unconciously Competent

Sally Latimer-Boyce • Feb 27, 2020

 

When it comes to resolving IT issues, many end users will automatically reach out to IT support. Whilst this is entirely understandable, there are occasions when this may lead to a missed opportunity of self-help and reduced support costs. 


The fact is, many users are actually very skilled and knowledgeable - they just don't know it.  I call this 'unconsciously competent'. 

 

Some end users are quite adept at grasping specific steps and processes (whether they have been shown by tech support or figured it out for themselves) and yet they resist the temptation to come to the aid of a colleague, even though they have a pretty good idea how to fix the problem.

 

Why are end users not sharing their skill sets with their colleagues, and helping one another fix their own IT problems? 

 

Notwithstanding the fact they may not be authorized to do so, they are likely to be afraid of breaking something.  They may have tried to help in the past, only to be shot down by a co-worker, or they might lack confidence and be afraid of getting it wrong.

 

If users were confident enough to share what they know, and their knowledge harvested and shared with other employees, the truth is that dependency upon IT support would reduce massively. 

 

Specifically, basic tasks that tech support may have just talked a competent end user through could be put to good use if that individual were to be empowered to share their knowledge with others.

 

Let me give you an example:  A computer user calls tech support. The fix was a few clicks away and the end user understood the instruction.  Five minutes later, a colleague two desks away from the first employee phones tech support with the same issue. Of course tech support will help, but it might have been just as easily handled by that first member of staff (given half a chance). 

 

Multiply this by 15-20 end users, and you have yourself a whole two hours of IT support charges that could have been handled in-house. At the very least, consider implementing a method for staff to share troubleshooting tips with one another. 

 

Alternatively, if you recognize an end user with a natural ability and flair for grasping IT, consider assigning them as the first point of contact for all IT issues. Even the responsibility of collating IT enquiries in the first instance is a good start, since it will eliminate duplication. With the right training, that appointed individual may even be able to resolve the issue directly.

 

With the right guidance from tech support, it is entirely possible to empower one end user to act as front line support - reducing the dependency on external support.


By Sally Latimer-Boyce 29 Apr, 2024
Teams is getting some Copilot-powered updates that will boost your business’s productivity even further. Here we tell you all about it.
By Sally Latimer-Boyce 22 Apr, 2024
Why Upgrade from Windows 10 to Windows 11
By Sally Latimer-Boyce 22 Apr, 2024
Small and medium-sized businesses are at more risk of a malware attack than ever. It’s time to take action to protect your business. Here we tell you how.
In the never-ending mission to be more productive, the latest Microsoft Edge browser could be a powe
By Sally Latimer-Boyce 17 Apr, 2024
Improving productivity is a never-ending mission for most business owners and managers. Whether it’s speeding up tasks or improving communication, every little helps. So it’s crucial to make the most of the tools you already have. And while you might think of your web browser as just a means to access the internet, it can be so much more than that. Especially if you use Microsoft Edge in Windows 11. It has loads of features that can help supercharge your productivity. Here are five of our favourites. 1. Split Screen for multitasking Multitasking is a skill every business owner needs, and Microsoft Edge's split screen feature makes it easier than ever. Whether you're comparing web pages, researching multiple topics, or simply keeping an eye on different sites simultaneously, split screen lets you view two pages side-by-side within the same tab. It's like having two windows open at once, but without the clutter. 2. Vertical Tabs for streamlined navigation Too many tabs? Yeah… we understand that. Microsoft Edge's vertical tabs offer a fresh perspective on tab management. By stacking tabs vertically along the side of the browser window, you can easily navigate between open tabs and access essential controls like close and mute. 3. Workspaces for seamless collaboration Collaboration is key in any business, and Microsoft Edge's Workspaces feature makes it easier than ever to work well with colleagues or clients. Create a workspace with a collection of open tabs, then share it with others via a simple link. It means they can open multiple tabs with one click. It's perfect for brainstorming sessions, project management, or team presentations. 4. Collections for organised research Gathering information from the web is a common task. Microsoft Edge's Collections feature makes this easier, allowing you to easily save and organise text, images, and videos from web pages into custom collections. Stay organised, focused, and productive. 5: Immersive Reader for distraction-free reading When you need to focus on reading an article or document online, distractions on the page can be a pain. Microsoft Edge's Immersive Reader feature provides a clutter-free reading experience by removing ads, links, and other interruptions. Customise the text size, spacing, and colour scheme to suit your preferences, and even have the content read aloud for hands-free reading. If your business doesn’t already use Microsoft Edge on Windows 11, this could be the perfect time to switch. Can we help you move over? Get in touch.
By Sally Latimer-Boyce 18 Sep, 2021
As a professional IT Consultant (and occasional user of Facebook), I wrote this article after my own Mother's Facebook account was hijacked... ... The perpetrator was only after my Mother's Facebook identify - and thankfully she was not scammed as a result. However, she did ask me why they did it, how they did it, and what she could do to prevent it in future. The easiest way for me to explain was anecdotally:- -- John has a Facebook account. He logs with his only email address ‘john@john.co.uk’ with the password ‘RedApples’ (John likes red apples, so it is his favourite password.) One day, John registers on a website selling Garden Furniture. He sets up an account with "gardenfurniture.com" and activates the account using his email address and favourite password (so that he doesn’t forget it later). Five months later, the garden furnitures website is hacked and thousands of registered users emails addresses and passwords are stolen (including Johns). Now the list of login names and password is on the market, available to the highest bidders. Eric is just one of many who buys that list. Eric is now free to attempt these credentials for ill gotten gains. He comes across john@john.co.uk on the list - password "RedApples". Eric tries logging into Barclays, Amazon, NatWest, Facebook etc (Eric has no idea if he will be successful, but he has both the time and incentive to persevere). Eric is successful - Facebook proves fruitful and he is now logged in as John. Now Eric has access to John's account - including Johns list of contacts. Eric exports a copy of Johns contacts (together with copy of Johns profile photos) and creates a brand new facebook profile (in Johns name). He uploads Johns profile photos, adds a few extra posts copied from the original hijacked account, then logs off - leaving the original Facebook account untouched (no need to draw attention to his unsolicited use of that account). From the new fake Facebook account, Eric is now free to send all of Johns contacts a Facebook request - knowing full well that many will unwittingly accept. A few accepted friend requests later, Eric now has an audience of PEOPLE WHO TRUST HIM BECAUSE THEY THINK HE IS JOHN. . Worse still, Eric can communicate with Johns contacts without John knowning, because the communication is not happening from within Johns original account. Eric now has an audience to illicit loans from, or to hook into narrative that leads them right into a scam. THE MORAL OF THE STORY? Do not re-use an already active password. Use different passwords for every site. Additionally, use a third-party password tool to generate and manage your online passwords. Users with different passwords for every site are less likely to get hacked in the way described above. -- I have now reset my Mother's Facebook password, and enabled two-factor-authentication (instructions below). I also changed her profile picture (so that it no longer matched the fake account). I did actually receive a friend request from fake account holder (which I subsequently accepted). I then observed who he/she had befriended and subsequently private messaged those I knew to warn them that they had accepted a friend request from a fake account. I then sat back and watched the quantity of "friends" start to drop on the fake account - with much pleasure!) I also posted on the wall of the fake account with a message of my own: "warning! this is a fake account - do not accept requests or communication from the trash who created it"! Within 5 minutes of my posting, the fake account was deleted. One small victory. Of course, there are other ways in which your online accounts can be compromised. This was just one of them - and topical to what happened to my loved one. Surf safely everyone. Sally Latimer-Boyce HOW TO CHECK IF YOUR EMAIL ADDRESS HAS BEEN COMPROMISED You can check to see if your email address has been breached by using this third party website . Simply enter your email address then click PWNED? This tool will list website sites that have been breached (assuming it was reported by the website owner) - giving you the heads up on whether or not you should change your password. Dont panic if this site says you have been "pwned" - just look at the section "breaches you were pwned in" and make an informed decision as to whether you need to change your password for any of the listed sites. PASSWORD MANAGEMENT TOOLS I would recommend a password application like 1Password and MSecure (links below). You do pay a small subscription for them, but it is worth it to keep your passwords safe. 1Password MSecure HOW TO SET UP TWO-FACTOR-AUTHENTICATION ON FACEBOOK On your PC or laptop, do the following: - login to Facebook and go to Account > Settings and Privacy > Settings - Click SECURITY & LOG - Click EDIT next to "use 2-factor authentication" Yyou can then chose your preferred method. I personally use "Text Message (SMS)" because I find that easiest, but have a play with all the options to find the one that suits you. HOW TO REPORT A FACEBOOK HACK You can report a Facebook hack using this link: REPORT HACKED ACCOUNT TO FACEBOOK.
By Sally Latimer-Boyce 17 Feb, 2021
When offered an 'all-you-can eat' buffet, you could be forgiven for delighting at the idea of eating an unlimited amount of food. However, there is still a limit – not in produce, but in consumption. There is only so much we can eat in one sitting and unless invited to stay the whole day, the so-called unlimited offer is in truth limited to what you can eat in a given time constraint.
By Sally-Latimer-Boyce 21 Apr, 2017
There are multiple ways you can avoid unnecessary IT support costs - this is just one of many shared in our free book.

Definition:  Meaning of Blog

A blog is a shortened named for "weblog”.  It is an online journal or informational website for writers to share their views on an individual subject.

Share by: