Author Box
Articles Categories
All Categories
Articles Resources

Why Should You Be Nice to Your IT Technician?

January 23, 2012 | Comments: 0 | Views: 114

If there is one reason as to why you should always be nice to an IT technician in your company, it is that he or she has the capability and capacity to see all that is going on in your computer system if he or she so wishes to do so. To say the truth, there is nothing like privacy when it comes to working on net work or work computers. Even that laptop computer you purchased the other day for your private computing when connected to a company's network, it is no longer private - everything you do on it can be observed by a knowledgeable IT technician.

Apart from this, these professionals can actually check and see any website you visited outside the permitted sites, every email that you sent over the internet, the installed software, in additional to all saved documents in your computer hard disk.

For instance, if a certain investigation mission has been sanctioned by the bosses, there is little the file originator could do to prevent it from being accessed by snoopy IT technicians; in fact, they can access the information even before it has reached its recipients, thereby spilling the beans in advance. However, there are several things you can do to make it harder for unscrupulous IT technicians from carrying out these unauthorized snoops.

Utilize the available encryption technology and encrypt a segment of your computer's hard drive or sensitive files so that if anyone wants to access the said files or any other sensitive data, he or she will have to input an accessing password. However, check your company's IT policies before encrypting the said hard drive as you may have just performed or want to perform a disallowed action. Basically, the information technology policies in a given organization clearly outline how data can be encrypted so that it could be accessed if a password is forgotten by the user. A master password has to be secured, though it should not be availed or accessible to low level IT technicians in a said organization.

Another way of making information in question private is to clearing the browsers' history. Although, this will not prevent higher level IT technicians from accessing and seeing where you browsed while on the internet, it makes it pretty hard for a lower level IT technicians to do so, thereby your private or sensitive data is likely to stay private and where it is supposed to be, or to whom it is supposed to be sent to.

It is quite helpful to be conscious about your email subject lines. When any given IT technician in an organization is carrying out an email troubleshooting task, it is quite common for email subject lines to pop up on his or her system. To try and curb his or her curiosity, try to keep the email subject lines as bland as you could possibly be able to.

Nowadays, it is common for technicians to be bound to confidentiality and ethical agreements, before they could get hired in most organizations. All in all, effective IT department and its staff is normally concerned with ensuring that a said computer systems is working as is expected, in addition to troubleshooting and consequently correcting IT problems as they come and in a quick and efficient manner.

Your IT technician may very well save the day so make sure that you appreciate your IT help desk!

Source: EzineArticles
Was this Helpful ?

Rate this Article

Article Tags:

It Technician


It Help Desk


It Support

Windows 8 will change the way you work and play, says Microsoft and we agree. Nearly all of the previous iterations of the Windows OS have been evolutionary but Windows 8 is set to change all that.

By: Sakshi Sharma l Computers & Technology > Mobile Computing l April 03, 2013 lViews: 662

Many antivirus programs available today have various features but it entirely depends on the user to make the best choice from among these different computer virus protection programs online. Before

By: Alex l Computers & Technology > Software l December 28, 2012 lViews: 370

You can add a new color to your entertainment life with iskysoft video converter for mac & iskysoft dvd creator for mac and make your Christmas holidays all the more special. iskysoft video

By: Zaithyn Galter l Computers & Technology > Software l December 23, 2012 lViews: 1070

The choices you make regarding the type of recruiting software you choose to use are important. Being an informed consumer is essential to getting a system or components that complement systems of

By: Maria Warne l Computers & Technology > Software l December 14, 2012 lViews: 306

The Cisco certification has become the most popular IT training in recent days and it offers three different levels of these certifications include as: associate, professional and expert-level.

By: sandidas chakma l Computers & Technology > Certification Tests l December 11, 2012 lViews: 237

Millions of prospective 12th standard students are gearing up their preparations for the Joint Entrance Exam for engineering seats. From 2013, it has been decided by the IITs, CBSE, JEE organizing

By: Sarkariexam l Computers & Technology > Certification Tests l December 07, 2012 lViews: 633

Users of the game Diablo III have had many of their online valuables wrongfully stolen from them. Some of the valuables consist of online currency and precious hard to obtain gear.

By: David Kyl Computers & Technology > Computer Forensicsl June 21, 2012 lViews: 156

SCADA typically refers to computer based industrial control system which basically aids to monitor and control facility based industrial processes and infrastructure. Here industrial processes

By: Ananta Modakl Computers & Technology > Computer Forensicsl June 20, 2012 lViews: 183

The reason why the PCI DSS is often seen as overly prescriptive and over-bearing in its demands for so much security process is that card data theft still happens on a daily basis. What's more

By: Mark Kedgleyl Computers & Technology > Computer Forensicsl June 20, 2012 lViews: 150

An important part of an private investigation can be preliminarily accomplished with nothing more than a telephone, reliable laptop and an Internet connection. Conducting thorough and successful

By: Joseph C Gioconda, Esql Computers & Technology > Computer Forensicsl June 14, 2012 lViews: 253

Since the birth of computers and computer crimes, a relatively new field called computer forensics has served to expertly retrieve data or evidence from these devices. There are various computer

By: Samora Jinqual Computers & Technology > Computer Forensicsl June 13, 2012 lViews: 157

The best SEO companies provide e-marketing services. These firms train online businesses specifically small-scale proprietors to sell their merchandise in a highly cost effective way to intended

By: Roy Allensl Computers & Technology > Computer Forensicsl June 12, 2012 lViews: 153