Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 3 March 2013

My Take on Third Party Tech Support.

Posted on 08:31 by Unknown
We've all had issues with software or hardware at one point in time, there is an argument that some software is even designed to fail at some point. But when we need help, who do we turn to? Tech Support can be offered in house for free, it can offer representatives who are quite knowledgeable and can help you with your issue. If you are not satisfied, you cancel or return the product or service. This translates to less money on the bottom line for the company offering the support, so they offer support for free, knowing that doing so is cheaper then trying to get a paying customer back.

However, some companies outsource Tech Support to a third party service. Those that work for these third parties often work on commission from service packages sold. Some even go as far as to refuse service unless you buy a support package even when you have already bought and paid for the software. Some claim that if you do not buy the support package, your product or service will stop working altogether. In the case of a computer: "Your hard drive will be physically damaged and you will lose all your data if you do not pay." Those who work for third party support have a "I do not care about your issue, now get off the line" mentality.

Sound shady to you? Well, some third party support companies and organizations are not like this. They do not use deceptive business practices in order to get a sale. What I have said to discredit third party support is not true for all third parties, but I will be honest: There are just too many bad apples in the bin. I am not trying to discredit any one company or organization, and this is only an opinion of someone who has gotten the runaround with tech support several times in the past. If you do not agree, that is fine by me.

I would like to call upon companies that outsource Tech Support to do it in house. I ask this because of two things.

1. Ultimately, outsourcing a service does not relieve a company of accountability for the results produced, no matter if positive or negative.

2. You make and maintain the product or service, you should know how to use it and fix it better then a third party.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ►  July (26)
    • ►  June (17)
    • ►  May (25)
    • ►  April (15)
    • ▼  March (7)
      • Malware Spotlight Double Header: Bagle and Netsky.
      • What Does It Mean? Layered Defense
      • What's In A Name: Rootkits
      • How do I make sure my Antivirus Software is protec...
      • Spotlight On Malware: The Conficker Worm.
      • Where did this whole issue with Malware begin?
      • My Take on Third Party Tech Support.
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile