{"id":413,"date":"2019-11-18T16:44:43","date_gmt":"2019-11-18T16:44:43","guid":{"rendered":"https:\/\/www.limetreelabs.com\/blog\/?p=413"},"modified":"2020-01-10T18:16:45","modified_gmt":"2020-01-10T18:16:45","slug":"it-documentation-are-you-being-held-hostage","status":"publish","type":"post","link":"https:\/\/www.limetreelabs.com\/blog\/it-documentation-are-you-being-held-hostage\/","title":{"rendered":"IT Documentation: Are You Being Held Hostage?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img data-opt-id=554805415  fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"673\" src=\"https:\/\/mlqqfyvmtktq.i.optimole.com\/w:1024\/h:673\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2019\/11\/it-documentation-1.jpg\" alt=\"\" class=\"wp-image-421\" srcset=\"https:\/\/mlqqfyvmtktq.i.optimole.com\/w:1024\/h:673\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2019\/11\/it-documentation-1-scaled.jpg 1024w, https:\/\/mlqqfyvmtktq.i.optimole.com\/w:300\/h:197\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2019\/11\/it-documentation-1-scaled.jpg 300w, https:\/\/mlqqfyvmtktq.i.optimole.com\/w:768\/h:505\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2019\/11\/it-documentation-1-scaled.jpg 768w, https:\/\/mlqqfyvmtktq.i.optimole.com\/w:1536\/h:1009\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2019\/11\/it-documentation-1-scaled.jpg 1536w, https:\/\/mlqqfyvmtktq.i.optimole.com\/w:1644\/h:1080\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2019\/11\/it-documentation-1-scaled.jpg 2048w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>Is your IT Documentation held hostage by your IT Provider? Do you have access to your business systems&#8217; usernames and passwords? You might wonder, should I have access to these? Does my IT company &#8220;own&#8221; the keys to my systems?<\/p>\n\n\n\n<p>The answer is no. How can you be sure your current service won&#8217;t hold the credentials to your IT environment out for ransom? <\/p>\n\n\n\n<p>A <a href=\"http:\/\/limetreelabs.com\">professional IT service provider<\/a> will give you access to all IT Documentation from day one. Not only that, they will keep all documentation up-to-date based on best practices.<\/p>\n\n\n\n<p>With <a href=\"https:\/\/www.passportalmsp.com\/\">one click of a button<\/a>, you should have access to all your IT Documentation at any given time. If that&#8217;s not the case, your IT provider has some explaining to do!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IT Documentation Jail<\/h2>\n\n\n\n<p>Unfortunately, many IT providers can&#8217;t hang when it comes to personalized service. Instead, they rely on holding your IT Documentation hostage. After you&#8217;ve had it and your frustration is through the roof, you decide to switch providers. Only to find out they aren&#8217;t letting you <strong>off the hook<\/strong> without a fight!<\/p>\n\n\n\n<p>They will throw a fit. Drag their feet on giving up the credentials to your systems. Making it a terrible experience to move to a <a href=\"http:\/\/limetreelabs.com\">provider that understands service<\/a>.<\/p>\n\n\n\n<p>Sounds <strong><em>FISH-y<\/em><\/strong> to me.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">So, how do I protect my IT Documentation?<\/h2>\n\n\n\n<p>When hiring an IT service provider, here are three questions to ask when it comes to IT Documentation:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Will I have access to my IT Documentation?<\/strong><\/li><li><strong>Will my IT Documentation stay up-to-date?<\/strong><\/li><li><strong>Is my IT Documentation stored securely?<\/strong><\/li><\/ol>\n\n\n\n<p>It&#8217;s your data and you should have access to it. Don&#8217;t fall victim to the knock-off IT service providers who use access to your data as a bargaining chip. <\/p>\n\n\n\n<p>We&#8217;ve heard every excuse in the book. A recent situation led to a previous IT provider who was resistant to giving up the credentials. After further prodding, we discovered the reason they didn&#8217;t want to give us the passwords. They were using the <strong><em>same password for all their customers<\/em><\/strong>.<\/p>\n\n\n\n<p>Read that again. The IT service provider was <strong><em>using the same passwords for all customers<\/em><\/strong>. SCREAM! Talk about breaking the number one golden rule of password security. <\/p>\n\n\n\n<p>As of today, the previous provider is on <strong>day 5 of holding our new customer&#8217;s IT Documentation hostage<\/strong>. We are at a stand-still and you know who suffers? The customer. Don&#8217;t let this happen to you!<\/p>\n\n\n\n<p>Tired of the games? Want to work with a <a href=\"https:\/\/www.limetreelabs.com\/blog\/all-green-it-management\/\">transparent IT service provider<\/a>? Give us a call at <strong>208-901-3350<\/strong> or email <strong>hello@limetreelabs.com<\/strong>. There&#8217;s a better way and you don&#8217;t have to fall victim to an IT Documentation hostage situation.<\/p>\n\n\n\n<p>And then, there are contracts&#8230;we&#8217;ll save that soapbox for another day.<\/p>\n\n\n\n<div\n\t\t\t\tid=\"hustle-embedded-id-1\"\n\t\t\t\tclass=\"hustle-ui hustle-inline hustle-palette--gray_slate hustle_module_id_1 module_id_1  \"\n\t\t\t\t\n\t\t\tdata-id=\"1\"\n\t\t\tdata-render-id=\"0\"\n\t\t\tdata-tracking=\"disabled\"\n\t\t\t\n\t\t\t\tdata-intro=\"no_animation\"\n\t\t\t\tdata-sub-type=\"shortcode\"\n\t\t\t\t\n\t\t\t\tstyle=\"opacity: 0;\"\n\t\t\t\taria-label=\"Become an Insider popup\"\n\t\t\t><div class=\"hustle-inline-content\"><div class=\"hustle-optin hustle-optin--default\"><div class=\"hustle-success\" data-close-delay=\"10000\" style=\"display: none;\"><span class=\"hustle-icon-check\" aria-hidden=\"true\"><\/span><div class=\"hustle-success-content\"><\/div><\/div><div class=\"hustle-layout\"><div class=\"hustle-main-wrapper\"><div class=\"hustle-layout-body\"><div class=\"hustle-layout-content hustle-layout-position--above\"><div class=\"hustle-content\"><div class=\"hustle-content-wrap\"><div class=\"hustle-group-title\"><h3 class=\"hustle-title\">Become an Insider<\/h3><h4 class=\"hustle-subtitle\">Get a monthly roundup of IT tips, stories and insights from our pros.<\/h4><\/div><\/div><\/div><\/div><form class=\"hustle-layout-form\" novalidate=\"novalidate\"><div class=\"hustle-form hustle-form-inline\"><div class=\"hustle-form-fields hustle-proximity-joined\"><div class=\"hustle-field hustle-field-icon--static hustle-field-required \"><label for=\"hustle-field-email-module-1\" id=\"hustle-field-email-module-1-label\" class=\"hustle-screen-reader\">Your email<\/label><input id=\"hustle-field-email-module-1\" type=\"email\" class=\"hustle-input \" name=\"email\" value=\"\" aria-labelledby=\"hustle-field-email-module-1-label\" data-validate=\"1\" \/><span class=\"hustle-input-label\" aria-hidden=\"true\" style=\"flex-flow: row nowrap;\"><span class=\"hustle-icon-email\"><\/span><span>yourname@example.com<\/span><\/span><\/div><div class=\"hustle-field hustle-field-icon--static \"><label for=\"hustle-field-first_name-module-1\" id=\"hustle-field-first_name-module-1-label\" class=\"hustle-screen-reader\">First Name<\/label><input id=\"hustle-field-first_name-module-1\" type=\"name\" class=\"hustle-input \" name=\"first_name\" value=\"\" aria-labelledby=\"hustle-field-first_name-module-1-label\" data-validate=\"\" \/><span class=\"hustle-input-label\" aria-hidden=\"true\" style=\"flex-flow: row nowrap;\"><span class=\"hustle-icon-name\"><\/span><span>First Name<\/span><\/span><\/div><div class=\"hustle-field hustle-field-icon--static \"><label for=\"hustle-field-last_name-module-1\" id=\"hustle-field-last_name-module-1-label\" class=\"hustle-screen-reader\">Last Name<\/label><input id=\"hustle-field-last_name-module-1\" type=\"name\" class=\"hustle-input \" name=\"last_name\" value=\"\" aria-labelledby=\"hustle-field-last_name-module-1-label\" data-validate=\"\" \/><span class=\"hustle-input-label\" aria-hidden=\"true\" style=\"flex-flow: row nowrap;\"><span class=\"hustle-icon-name\"><\/span><span>Last Name<\/span><\/span><\/div><button class=\"hustle-button hustle-button-submit \" aria-live=\"polite\" data-loading-text=\"Form is being submitted, please wait a bit.\"><span class=\"hustle-button-text\">Submit<\/span><span class=\"hustle-icon-loader hustle-loading-icon\" aria-hidden=\"true\"><\/span><\/button><\/div><\/div><input type=\"hidden\" name=\"hustle_module_id\" value=\"1\"><input type=\"hidden\" name=\"post_id\" value=\"0\"><input type=\"hidden\" name=\"hustle_sub_type\" value=\"shortcode\"><div class=\"hustle-error-message\" style=\"display: none;\" data-default-error=\"Please fill out all required fields.\"><\/div><\/form><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Is your IT Documentation held hostage by your IT Provider? Do you have access to your business systems&#8217; usernames and passwords? You might wonder, should I have access to these? Does my IT company &#8220;own&#8221; the keys to my systems? The answer is no. How can you be sure your current service won&#8217;t hold the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":418,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[58],"class_list":{"0":"post-413","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-limetree-labs-experience","8":"tag-it-documentation","9":"entry"},"_links":{"self":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts\/413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/comments?post=413"}],"version-history":[{"count":11,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts\/413\/revisions"}],"predecessor-version":[{"id":489,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts\/413\/revisions\/489"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/media\/418"}],"wp:attachment":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/media?parent=413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/categories?post=413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/tags?post=413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}