Too Many Cooks in your Tech Kitchen?


As a 25+ year old company, we recognize that more is not always better.  In fact, it is often much worse.


Being the trusted technology advisor for thousands of employees throughout the world comes with a lot of responsibility.  As a result, a way to take steps backward is to try and have multiple entities leading your technology endeavors.  A primary reason why this is nearly impossible is the simple mathematical equation that there are literally thousands of solutions and approaches for accomplishing similar business results when it comes to technology.  If you are being pulled in multiple directions because you have conflicting advisors, you will end up confused, stalled in your decision making and often, far more vulnerable than before.


I want to be clear – having a third party evaluate what you are being provided from a technology provider is not harmful.  In fact, in many cases, it is a good move.  But when is the last time you had another CPA firm evaluate your CPA’s work?  Or your attorney’s?  Or your banker’s?  My guess is never.


Why is that?  Typically, because you trust them wholeheartedly.  And everyone recognizes that it is a poor practice to explore.  Then why is technology any different?


At PCA, we have been known to use the “you don’t want too many cooks in the kitchen” analogy.  When we take over IT management, we request you work entirely with us.  We believe that the relationship you have with your Trusted IT Advisor needs held in the same regard as your CPA, attorney, and banker.


Specialization is different, of course.  PCA does not offer software programming so if there is a business case for it, you would engage another provider for that portion.  However, your trusted technology partner would oversee and engage alongside that provider to assure you reach your business outcomes.  The two entities would interact, but not try to accomplish the same goals.  This is like a having both a business attorney and a defense attorney that could collaborate but perform completely different tasks.


It is common practice to engage a cybersecurity firm to do penetration testing and vulnerability assessments.  But it is ill-advised to do that without your Technology partner’s involvement.  The partner should take the results and implement the solutions to provide you with a more secured environment.


There are some providers that do not believe in this approach.  Given the heightened security risks today, it is a poor practice to have multiple providers doing the same thing as you have now increased your attack vectors.  Having a “snapshot” assessment of your overall security or IT posture is one thing – setting a “recording” for an extended period of time to gather more data is a risk not worth taking because #TheThreatsAreReal.



Sign Up for Our E-Newsletter

Every month, we'll send you our latest blogs, news and announcements.

News & Articles

5 essential things to do before ransomware strikes

By failing to prepare you are preparing to fail – here’s what you can do today to minimize the impact of a potential ransomware attack in the future The post 5 essential things t...

Read More

Most health apps engage in unhealthy data‑harvesting habits

Most medical and fitness apps in Google Play have tracking capabilities enabled and their data collection practices aren’t transparent The post Most health apps engage in unhealthy dat...

Read More

OSINT 101: What is open source intelligence and how is it used?

OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers The post OSINT 101: What is open source intelligence and how...

Read More
 

Call or Text

1-833-YOUR PCA

Business texting is possible with VoIP. Learn more today!

Nashville Virtual Office

Main Office

12824 Cantrell Road, Suite 200
Little Rock, AR 72223
View on a map

Bentonville Office

Grit Studios
125 West Central Avenue, Suite 200
Bentonville, Arkansas 72712
View on a map

How can we help your business?

Top