Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

A Testimonial From the North Pole

A Testimonial From the North Pole

We’ve always been a proponent of preparing for the worst and hoping for the best where a business’ solutions are concerned. That’s why we were happy to receive an email from our friends at the North Pole telling us about a situation they ran into just a few days ago...

Dear Decatur Computers Inc.,

I just wanted to send you a quick letter thanking you… Thing is, you probably saved Christmas this year! Recently, there was a bit of a mishap here in the workshop that would have put us WAY behind schedule.

You know how we like to deliver presents to all the good boys and girls, and the boss has always kept the kids separated into the good ones and the naughty ones? Well, we decided to finally take your advice and digitize the list - thanks for that tip, by the way! It’s a lot easier to carry around, and now Santa can access it on his Noelkia smartphone whenever he needs to.

Anyways, that was working great, until the workshop’s server failed. We even restarted it and checked it twice! Nothing was working - including the Naughty & Nice CRM software.

We found out that Merry Hollycane (our office administrator elf) had accidentally downloaded the Cryptowall ransomware to the network. At $1,000 per file, there was NO WAY that we could afford to pay the ransom.

That hacker is definitely on the naughty list.

So instead of making toys, we were busy freaking out and trying to figure out what to do without the list! I mean, we still had the letters, so we knew what kids were asking for, but we needed to know which kids were naughty and which were nice! Without it, how would we know which children were supposed to get a gift from Santa, and which were only supposed to get coal?

It was an administrative nightmare!

Fortunately, Nougat Trufflesnaps (our internal IT elf) came to the rescue. He remembered that we had also started using a cloud-based data backup solution upon your recommendation! All Nougat had to do was log in and there was the list - a real Christmas miracle.

We were able to build a replacement server and download the list back to it, and we only lost about 23 minutes of work in total. I know that this may seem like hardly any time at all to you, but remember - we’re making toys for a whole world full of children. An hour would have been catastrophic to our operations.

Thanks to your advice, we were able to get back to work. I’m happy to report that we’re back on track for a successful delivery.

So, again, thank you so much for all of your advice - you really saved our gumdrops there. I’m pretty sure that you and your team all earned yourselves permanent spots on the nice list!


Drummer Brandybells
Lead Elf, Christmas Cheer Division

We’re glad that our advice was so helpful to our friends up at the North Pole, and that we were able to play a part in saving Christmas. If you’d like to discuss the solutions we used in more detail with us, give us a call at 217-475-0226.

In the meantime, from Decatur Computers Inc. to you, have a very happy holidays and a wonderful new year!

Tip of the Week: Neat Windows 10 Features
The Top 5 Smartphones for the Start of 2019


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Privacy Tech Term Business Computing Hackers Productivity Data Data Backup IT Support Software Android Innovation Efficiency Business Management Malware User Tips Data Recovery Google Computer Cybersecurity Internet Collaboration Email Communications Smartphone Windows 10 Backup IT Services Cloud Small Business Phishing Communication Ransomware Managed IT Services Mobile Device Hosted Solutions Artificial Intelligence Business Technology Social Media Facebook Hardware BDR VoIp Microsoft Office Browser Applications Blockchain Cloud Computing Information Mobile Devices Access Control Office 365 App Mobile Device Management IT Management Business Automation Managed Service Outsourced IT Cybercrime Cost Management Smartphones Maintenance Data Management Managed IT Services Encryption Workplace Tips Websites Saving Money Disaster Recovery Server Two-factor Authentication Network Hard Drive Holiday Patch Management Microsoft Data Security Update Scam Antivirus Passwords Apps Gadgets Bandwidth Remote Monitoring Windows Tech Terms Gmail Users SaaS Printer Project Management Vendor Start Menu Laptop Internet of Things Managed Service Provider Conferencing Document Management Save Money Google Maps Analytics Alert Data loss Quick Tips Hacking Apple Cooperation Business Continuity VPN Saving Time Law Enforcement Money Vulnerability Data Breach Search Spam Vulnerabilities Bitcoin Operating System Mobility Big Data Word Augmented Reality Healthcare Touchscreen Digital Social Engineering Data Protection Best Practice Twitter Health IT PowerPoint Vendor Mangement IT Support Computing Infrastructure BYOD Directions YouTube Managed IT Telephone Router email scam Regulations Upload Browsers Fake News Wireless Virtual Reality Screen Reader Government Tech Access Consultant Machine Learning Proxy Server History VoIP Voice over Internet Protocol Software License Wireless Headphones Unsupported Software Mobile Security Comparison Professional Services Business Mangement Networking Legislation Computer Care Microchip Excel Settings Company Culture Social Network Google Calendar Modem Accountants Trends Monitoring Legal Term Running Cable Spyware HTML Network Management Help Desk SharePoint IBM iPhone Cleaning Administration Paperless Office Sports Specifications Solid State Drive Business Cards Virtualization Travel Processor Tip of the week Identity Theft Outlook Customer Resource management SSID eWaste Training Gamification Entertainment Microsoft Excel Tablet Software as a Service Management Downloads Google Play Cabling Virtual Assistant Service Level Agreement Disaster Vendor Management Distributed Denial of Service Corporate Profile Time Management Information Technology Computers Employer-Employee Relationship Upgrades Multi-factor Authentication Database Emergency Television Samsung Username Navigation Desktop Chromebook Telephone System Google Docs Password Robot Equifax Data Analysis Cryptocurrency How to Unified Threat Management Computing Security Cameras Devices Going Green Freedom of Information Mobile Technology Nanotechnology Cortana Device security Tactics User Tip Mouse Uninterrupted Power Supply Google Drive Downtime Emails Unified Communications Evernote Backup and Disaster Recovery Redundancy Electronic Medical Records Budget Medical IT Startup Content Audit Fileless Malware Virus Error Social Worker Automobile Hard Drive Disposal Compliance Download Knowledge Bookmark News Unified Threat Management WiFi Miscellaneous Printing Telephone Systems Website Addiction DDoS Telephony Piracy Bluetooth Office Regulation Office Tips Retail CrashOverride Managing Stress Windows 10 Marketing Multi-Factor Security Printers

Latest Blog

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.