Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Some of 2020’s Biggest Tech Flubs

Some of 2020’s Biggest Tech Flubs

It’s no secret that 2020 has been relatively tough on all of us, down to the technology that so many use and rely on each year. Now that we’re in the home stretch towards a hopefully better 2021, let’s look back at some of the technologies that didn’t deliver as promised and some of the other issues that we saw this year—some relatively harmless, and some decidedly not.

Quibi’s Crash and Burn

In a market already saturated with on-demand streaming services, Quibi offered something at least a little different in its short-form episodic storytelling and big-name casting. It also had quite the financial backing to support it—$1.75 billion in funding. Pair that with a monthly price tag of $5, and on paper, it would seem to be a surefire hit.

Unfortunately, this just wasn’t enough for the platform. With much more time on their hands thanks to the pandemic, short-form content didn’t have the same appeal… especially that which was restricted to a mobile device, and inaccessible on the entertainment systems that many prefer to use while at home. Quibi also had an uphill battle to fight against other options and services for such content, like YouTube and other free and ad-supported platforms.

This ultimately led to Quibi shutting down seven months after it launched, with much of the funding for it returned to investors.

So, what can we learn from this?

Simply put, it is not enough to just have an idea, especially when the timing is wrong. While we can’t say for certain that Quibi would have fared better should circumstances have been different, it is an interesting possibility to consider.

Bitcoin Scam Twitter Hack

In one of the most unsettling attacks that took place this year, many high-profile Twitter accounts—including those belonging to Bill Gates, Barack Obama, Elon Musk, and Kanye West—were hacked in an attempt to push a Bitcoin-based scam.

Fortunately, Twitter jumped into action and locked down these accounts before too much damage was done and has taken further steps to ensure account security… although it did raise some questions as to what might have happened if the motives behind the attacks were more destructive.

Zoom’s Security Missteps

As the world locked down, people and businesses needed to find a new way to communicate amongst one another. While many video conferencing systems like Skype, Microsoft Teams, and others fumbled this opportunity, Zoom was able to embrace it.

Unfortunately, Zoom’s security was lacking early on, which was made abundantly clear once so many had started using it. Hate speech and lewd content was shared in meetings, coining the term “Zoombombing.”

Since then, Zoom has taken steps to improve the platform’s security and users have given more thought to securing their conferences.

The Assorted Coronavirus Myths and Misinformation

Of course, we can’t talk about the technology fumbles of 2020 without bringing up the coronavirus and the various messes created because of it. For instance:

  • Numerous conspiracy theories linking the development of 5G connectivity to COVID-19, resulting in acts of cell tower vandalism and assault against telecom employees.
  • Bill Gates being accused of masterminding COVID-19 or using the pandemic to implant people with microchips—despite his long history of contributing to disease-fighting causes and efforts.
  • Fumbled information sharing efforts on the part of the US Centers for Disease Control and Prevention’s website.

To their credit, many social media platforms took more aggressive efforts against misinformation, flagging some misleading posts.

So, What Does This Have to Do with Your Business?

Simple: while the above examples were obviously larger-scale issues, they demonstrate that technology is far from perfect and how easily it can be turned against your interests. This is especially the case when you consider the technology you utilize in your business.

Here at Total Tech Care, we’re experts in all things IT, and lend that expertise to your business’ benefit. Not only can we help optimize the technology you currently use, we can also help you make the improvements needed to advance your operations. Whether it’s helping you keep your work accounts secure or steering you away from an application that will ultimately create bigger problems, we are at your service.

It’s just what a good managed IT service provider does.

To find out more about what our team offers, give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Users Business Management Windows Managed IT Services Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Server Data Recovery Save Money Passwords Windows 10 Chrome Virtualization Tech Term Saving Money Holiday Gadgets Social Media Managed Service Managed IT Services Automation Microsoft Office Computers Facebook Artificial Intelligence Operating System Cybercrime BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Health Information Remote Spam Office 365 Covid-19 Telephone Systems Information Technology Alert Managed Service Provider Router BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Money Encryption Remote Monitoring Applications Mobile Computing Data Breach Application Law Enforcement App History Big Data Password Human Resources Apps Remote Computing Data Storage Patch Management Mobile Office Government Office Tips Training Private Cloud VPN Blockchain How To Managed IT Paperless Office Two-factor Authentication Flexibility Infrastructure Mouse Vulnerability Voice over Internet Protocol HaaS Marketing WiFi Windows 7 Google Drive Word IT solutions Entertainment Website Budget Servers Avoiding Downtime Wireless Data Security Gmail Settings Bring Your Own Device Data Management Work/Life Balance Connectivity Virtual Reality Remote Work Apple End of Support Social Conferencing Physical Security Education Scam User Error Safety HIPAA Meetings Vendor Sports Redundancy Managed Services Keyboard Display USB Data Protection Vendor Management Risk Management Hacker Employee/Employer Relationship RMM The Internet of Things Lithium-ion battery Save Time Staff Software as a Service Firewall Telephone System Cleaning Machine Learning Update Hiring/Firing SaaS Virus Procurement Workplace Strategy Net Neutrality Google Docs Battery Unified Threat Management Computer Accessories Network Congestion Help Desk Shadow IT Identity Theft eWaste Printing Legal Business Intelligence Internet Exlporer Managed Services Provider Audit Worker Augmented Reality Printer PDF IT Management Fraud Bluetooth Wearable Technology Database Hard Drives Remote Worker Retail Botnet Remote Workers Instant Messaging IT Plan Proactive IT Cryptocurrency Robot Excel Processor Best Practice Biometrics Unsupported Software YouTube IT Consultant Virtual Desktop Black Market Hard Drive Comparison Charger Compliance Humor DDoS CES OneNote Computer Care Document Management SharePoint Computing Solid State Drive Wireless Technology Current Events How to Business Technology Telephony Downtime Content Management Access Control Samsung Virtual Assistant Customer Service Data storage Authentication Environment Value Automobile Digital Signage Spam Blocking Electronic Medical Records Fax Server Computing Infrastructure Going Green Digital Signature Tablet Windows 10s Streaming Media AI Mobile IT Infrastructure Reputation FinTech Content Warranty Domains Cast Bing Tech Support Emergency User PowerPoint Social Network Techology HVAC Windows Media Player Tip of the week Laptop Google Apps webinar Investment Customers Analysis Public Cloud Employer Employee Relationship IaaS Maintenance Professional Services Employees Audiobook Administrator Employee/Employer Relationships Devices Bloatware Assessment Managing Stress Windows 365 Enterprise Content Management Windows Server 2008 ISP Touchpad ROI Accountants Tablets Video Conferencing MSP Tools Sales Politics Microchip Cameras Bitcoin Advertising Thought Leadership Entrepreneur Shortcuts Credit Cards Television Point of Sale Personal Password Management Cryptomining Password Manager Notifications Multi-Factor Security Supply Chain Management Shortcut Monitoring Search Engine Batteries Twitter Cost Management Public Computer Transportation Windows 8.1 Digitize NIST Social Networking Regulations Business Mangement Windows Server 2008 R2 Relocation Smart Tech Computer Fan Trending Rootkit Customer relationships Printer Server Addiction Amazon Benefits Email Best Practices Running Cable IT Assessment Video Games Manufacturing Recycling Workers Practices Memory FENG Worker Commute Wiring Computer Tips Experience Managed IT Service Cache Security Cameras Amazon Web Services IBM Smart Technology Virtual CIO OneDrive Scalability Safe Mode Flash Biometric Security Criminal Hosted Computing Peripheral Business Owner GDPR Digital Security Cameras Using Data Wireless Internet Software Tips NarrowBand Online Shopping Supercomputer Emails Copiers Search File Sharing Sync 5G Science iPhone Inventory Specifications Quick Tip Camera Ergonomics Wire Smartwatch Evernote Netflix Travel Two Factor Authentication Distributed Denial of Service Development Customer Relationship Management OLED Printers Virtual Machine Files Analyitcs Root Cause Analysis Millennials Consultant PCI DSS Music 2FA Analytics Fiber Optics Smart Office Programming HBO Employee Chromecast Wireless Charging Knowledge Messaging Skype Cabling Virtual Private Network Hypervisor Colocation Data loss Uninterrupted Power Supply Workforce Best Available Policy Troubleshooting WIndows 7 Dark mode Antivirus Trend Micro Outlook Cables Leadership Windows 8 SMS Start Menu Default App Monitor Project Management IT service Saving Time Nanotechnology Screen Mirroring Telecommuting Loyalty Procedure Books dark theme Shopping Frequently Asked Questions Google Search Cortana

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code