Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

A Testimonial From the North Pole

A Testimonial From the North Pole

We’ve always been a proponent of preparing for the worst and hoping for the best where a business’ solutions are concerned. That’s why we were happy to receive an email from our friends at the North Pole telling us about a situation they ran into just a few days ago...

Dear Prosper Solutions,

I just wanted to send you a quick letter thanking you… Thing is, you probably saved Christmas this year! Recently, there was a bit of a mishap here in the workshop that would have put us WAY behind schedule.

You know how we like to deliver presents to all the good boys and girls, and the boss has always kept the kids separated into the good ones and the naughty ones? Well, we decided to finally take your advice and digitize the list - thanks for that tip, by the way! It’s a lot easier to carry around, and now Santa can access it on his Noelkia smartphone whenever he needs to.

Anyways, that was working great, until the workshop’s server failed. We even restarted it and checked it twice! Nothing was working - including the Naughty & Nice CRM software.

We found out that Merry Hollycane (our office administrator elf) had accidentally downloaded the Cryptowall ransomware to the network. At $1,000 per file, there was NO WAY that we could afford to pay the ransom.

That hacker is definitely on the naughty list.

So instead of making toys, we were busy freaking out and trying to figure out what to do without the list! I mean, we still had the letters, so we knew what kids were asking for, but we needed to know which kids were naughty and which were nice! Without it, how would we know which children were supposed to get a gift from Santa, and which were only supposed to get coal?

It was an administrative nightmare!

Fortunately, Nougat Trufflesnaps (our internal IT elf) came to the rescue. He remembered that we had also started using a cloud-based data backup solution upon your recommendation! All Nougat had to do was log in and there was the list - a real Christmas miracle.

We were able to build a replacement server and download the list back to it, and we only lost about 23 minutes of work in total. I know that this may seem like hardly any time at all to you, but remember - we’re making toys for a whole world full of children. An hour would have been catastrophic to our operations.

Thanks to your advice, we were able to get back to work. I’m happy to report that we’re back on track for a successful delivery.

So, again, thank you so much for all of your advice - you really saved our gumdrops there. I’m pretty sure that you and your team all earned yourselves permanent spots on the nice list!

Sincerely,

Drummer Brandybells
Lead Elf, Christmas Cheer Division

We’re glad that our advice was so helpful to our friends up at the North Pole, and that we were able to play a part in saving Christmas. If you’d like to discuss the solutions we used in more detail with us, give us a call at (617) 369-9977.

In the meantime, from Prosper Solutions to you, have a very happy holidays and a wonderful new year!

Tip of the Week: Neat Windows 10 Features
The Top 5 Smartphones for the Start of 2019
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Data Security Evernote Passwords Statistics Router Administration Identity Theft Digital Payment IT service Customer Resource management Managed Service Provider Data Protection Capital Managed IT Browsers Hackers USB Memory YouTube Windows 7 Conferencing Monitors Upgrades Connected Devices Dark Web IT Consultant Smartphone Devices Spyware the Internet of Things Cooperation Hack Rapid City In Internet of Things Micrsooft Data Loss Google Drive Botnet Documents Business Mangement End of Support Data storage Upgrade Black Market Cache Vendor Mangement Encryption Legal Rental Service Internet Solid State Drive Physical Security Best Available Phishing Upload Staffing Malware Cleaning Logistics Applications Deep Learning Outsourced IT Telephone Systems Business Cards Visible Light Communication Apple Mobility Piracy Email Company Culture Data Breach Operating System cloud computing Google Maps Mobile Device Management Paperless Office Webcam Virus Windows10 Wireless Holiday IT consulting Scam LiFi Specifications Running Cable Tech Support Innovation Messenger iPhone Administrator Server Human Resources Excel Competition Travel Safety VPN Microsoft Office Taxes Office 365 Data Computing Infrastructure Alert Update Content Filtering Unified Threat Management Music Troubleshooting Office Education Business Technology Bitcoin Antivirus Computer Malfunction Managed IT Services Information Technology Browser Google Wallet Bata Backup IT Plan Hacker Bandwidth Bluetooth Virtualization Worker Storage Network Congestion User Tips User Error How To Electronic Medical Records Unified Communications Proactive IT Windows Server 2008 Phone System Content Telephony Cost Management switches Automobile Congratulations Business Growth Business Management Google Docs 3D Printing Error Reading GDPR Cost Chromebook Electronic Payment Emails Employer-Employee Relationship Best Practice Gmail Computers Cryptocurrency App Technology Tips eWaste User Tip Windows 10 Intranet CrashOverride Productuvuty Privacy Uninterrupted Power Supply clout services Money Customer Service cloud Network Security Hosted Solutions Analytics Apps Windows 8 Software Nanotechnology Application Business Continuity Drones Fleet Tracking Television Vendor Outlook Society Two-factor Authentication Citrix Xenapp Information Tracking Processor Trends Mobile Devices Android Fake News Pain Points Consultation Printer Virtual Assistant Value Cybercrime Managed IT Service Managed Service Redundancy Data Backup uptime Printers Audit Licensing Big data Directions Public Cloud Efficiency Backup Social Media Fiber-Optic Hosted Solution Product Reviews Emergency Knowledge Gadgets Vulnerability Integration Sync Data Warehousing Management Twitter Business Marketing Social Network cyber security Disaster Recovery Healthcare Environment BDR Term Analytic Corporate Profile Risk Management Health BYOD Flash Current Events Fileless Malware Tablets Backup and Disaster Recovery Hacking Going Green Inbound Marketing VoIP Freedom of Information Co-Managed IT Computer Accessories Securty HIPAA IT Support Collaboration Username Windows 10 Technology Hiring/Firing Business Intelligence A.I. Wi-Fi SSID Politics IT Services Patching Patch Management SharePoint Employer Employee Relationship Regulations Bring Your Own Device Displays Computing Security Cameras Banking Work/Life Balance Chamber Unified Threat Management WannaCry Website Machine Learning Help Desk Electricity Office Tips Screen Reader Addiction Voice over Internet Protocol Compliance G Suite Business Computing Time Management Business Metrics Laptop Blockchain Asset Tracking Vendor Management hardware VoIP Microsoft 365 Smartphones Workplace Tips Best Practices Ransomware Finance Hard Drives Mouse Distributed Denial of Service Multi-Factor Security Mobile Technology Meetings Skype Sports Mobile Security CIO Project Management Scalability Firewall Writing Business Owner Robot Managed IT services Telephone Motion Sickness Teamwork DDoS Network Management Network IP Address Augmented Reality SaaS Supercomputer cloud storage HTML Entrepreneur Downloads Printing Programming Smart Tech Read Avoiding Downtime Windows Users Equifax Database Medical IT Data Analysis Settings Tech Terms Gaming Console History File Sharing Professional Services outsource cloud computing Digital Signature Tablet Quick Tips Microsoft Google Facebook Productivity Virtual Desktop Vulnerabilities Startup Software as a Service Access Thank You Workers Experience Wireless Headphones Social Samsung Solutions Migration Spam Maintenance outsource cloud storage Computer Repair Small Business Telephone System Saving Time IBM Entertainment Hard Drive Managing Stress Comparison Microchip CCTV Automation Service Level Agreement Health IT Relocation Productivity Software License Miscellaneous Download Reliable Computing Hard Drive Disposal Password Start Menu Public Speaking Google Calendar Data Recovery Windows XP Internet of Things PowerPoint Gamification IT Management Mobile Device Assessment IT IT Support Lithium-ion battery Navigation News User Websites Budget Tech Heating/Cooling Access Control Desktop Language Microsoft Excel Flexibility Fraud Processing Recovery Modem Distribution Web Server Data Management Tip of the week Social Networking Domains Government Virtual Reality PDF Mobile Computing Security Proxy Server Shortcut Cabling Permissions Device security Computer Care Social Engineering Communication Networking Text Messaging Touchscreen UTM Search Document Management Save Time Mobile Payment Tip of the Week Chrome communications Regulation Presentation Computer Private Cloud Processors Remote Computing Bookmark Word Wireless Technology Accountants Downtime Books WiFi Digital Cybersecurity Google Play Remote Monitoring Cortana Notifications Training Retail Monitoring email scam Multi-factor Authentication Enterprise Resource Planning Keyboard Saving Money Save Money Hacks Net Neutrality Streaming Media Tech Term Trending Disaster MSP Law Enforcement Artificial Intelligence Customer Relationship Management Tactics Advertising Legislation

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150