🔒 Patreon Special

IT Pros: exclusive shows await you on Patreon, focusing on the more challenging aspects of running your practice and working with clients and employees.


318: Interview With Tim Nyberg Of The MacGuys+ - Value Based Billing

Topics:

-From the days of the Apple II, Tim Nyberg was known as “The Mac Guy” in his college days because he could confidently fix any Apple computer. Tim kept the name, opened The MacGuys+ in 1991 and today he and his team are still obsessed with Macs and Apple technology. 

-Tim talks about his history from typing papers for fellow students, to a job at Kinkos, and eventually landing back in Minneapolis to build his current business. 

-Tim has a brick and mortar location that serves a purpose for walk in traffic and repairs. 

-Having a location has its challenges but provides opportunity and space to perform some large scale tasks 

-As Tim’s business has seen changes over the years, Jerry notes that the tools that he uses has allowed him to work more efficiently

-Tim starts to see himself being more of the business end of the company and transitioning from the technical end of the company. He is on his way to obtaining his MBA. 

-There are some clients that have been around for 20 years who want nothing to do with managed services 

-Value based billing is a concept that Tim has been presenting to his clients. Part of this is setting expectations with the customer and making them realize what the value of the work is. 

-As Jerry asks for a practical example, Tim talks about value based billing in projects like Synology setups, Wi-Fi roll outs where the value of expertise and padded time for potential pitfalls are covered as a part of the cost. 

-If projects go more smoothly than expected, it provides opportunity to offer a discount to the customer.

-One book that provided good information on this topic was "Value-Based Fees" By Alan Weiss

-It is important to express to the customer what your value is. Less important than total hours on an invoice is the details of all the work performed. 

-Like many of us, Tim leverages the TidBITS Content Network and a variety of social media tools to provide content to his customers. 

317: Working On & Working In

Topics:

-Joe kicks off the show bringing up leisure time and time management 

-Working ON the business vs working IN the business

-A challenge for Sam is meeting interruptions that occur when clients reach out. Not just for him but for his staff

-Sam may be on the lookout for a new hire but does he look for an admin or a tech?

-The CCP crew are very appreciative of the collective audience and their feedback/advice

-“This is not for everyone”. Sam comes to the realization that running a business isn’t something everyone can handle. 

-A continual question for Sam is taking on Windows clients. 

-Joe explores marketing new services to current clients as a method of increasing revenue. For instance, offering Ubiquiti installations for clients in need of upgraded Wi-Fi. 

-QuickTime screen recording to the rescue for Sam as he tries to see a message that quickly disappears on his screen

-Joe has some follow up to how he sets up his clients with individual Ubiquiti UniFi controllers. While Sam is moving to a central controller, specific logins per client is something they agree on. 

-Cloud Key stability has plagued all of us. After some research, Joe has dug up information about the Mongo database and how it is prone to failure during a power loss. To combat this, Joe discusses his backup power plan for the Cloud Key. 

-After a recent discussion with Christopher Stout on Episode 311, Sam is looking to setup a closed system like UniFi, Synology Surveillance Station or Security Spy

-Sam learns some interesting details from a SonicWALL vendor about true throughput 

-Friend of the show, Weldon Dodd points out a great write up by Rich Trouton on his site, Derflounder. It’s an interesting piece about enabling Touch ID for sudo commands.

316: Wi-Fi On A Stick

Special Thanks To Our VIP Sponsors!

Topics:

wifistick.jpg

-Sam has a first run working with the ”Wi-Fi on a stick” method of mapping out Wi-Fi. He uses a product from wifistand.com and NetSpot to create a map":
https://wifistand.com

-Joe brings up a great tool called Magic Plan to create floor plans on iOS:
https://www.magicplan.app/en/

-The nanoHD is a particular Ubiquiti model that same used and likes to deploy

-Joe warns of things to be aware of when scouting out an environment for Wi-Fi

-Another new monthly service that Sam is offering is hosting a UniFi controller in his environment to manage firmware updates and alerts. Joe weighs the responsibilities that comes with such an offering.

-Joe throws Sam a curve ball explaining how he has a singular login for his clients

-Another issue in the long line of networking troubles that Sam has experienced: finding incompatibility between a SonicWall and WAN connection at a NYC client. The fix? A dumb switch!

-That story rings a bell for Joe who has a similar story to tell about a Zywall and WAN connection that turned out to be a multi pronged problem.

Thanks to our Patreon Sponsors!

Thanks to our Patreon Sponsors!

315: The Skeleton Just Popped Up!

Topics:

-Jerry has a “non-technical” gripe about health bowls he wants to share

-Drink every time Joe says açaí

-To bring it back to technology, Jerry has issues with the motivational announcements on the Nike Run app

-Client perceptions and marketing terms often are deceiving

-clients that won’t spend money are nothing new. But Joe & Jerry dive deeper into the disfunctional relationships that persist through time.

-The “computer friend” is a red flag

-A potential customer approaches Jerry about doing project work or “cost plus” work before establishing an ongoing relationship

-A move to G Suite ends up being a challenge for Jerry as he gets bounced around support.

-Joe flips the conversation to show when clients can be correct and prove us wrong

-A shoutout to TidBITS Content Network (https://tcn.tidbits.com)

and all that they provide to us on a regular basis, as well as the bonus material during Apple announcements

-Joe compares directing a client to your blog to explain something as a customized “Let Me Google That For You”

-Sam wishes he was a part of the conversation as Jerry & Joe have a good ole’ fashioned gripe session about client habits

WWDC Skeleton.jpg

-“Oh no the skeleton popped up” - One of Joe’s clients saw Apple's branding for WWDC on apple.com and thought it was a result of her recent hacking, calling it a skeleton

314: Give Your Dough To The Baker

Topics:

-Sam has some follow up regarding his “Ubiquiti Hell” from a few weeks ago.  In the end, it turned out to be a bad UniFi USG device.

-Joe has some wise sayings to share that ring true in our industry and the value we bring as consultants:
"Let the Baker Bake the Bread, even if he takes half the Dough" - Persian Saying 

“Give your Dough to the Baker, even if he will eat half the bread.” 

-Sam says we are like bomb technicians.  “You are paying us to know which wire to cut.”

-Jerry has some follow up about two factor authentication being baked in to one of our favorite apps, 1Password.  This was brought to our attention by long time listener, Michael Reinhart.

-Jerry is curious about the various methods of how 1Password can sync you data and what Joe & Sam use

-1Password’s secure options for recovering your security related data can sometimes be off-putting for some users and drive them away from password management tools

-1Password has an affiliate program that is fairly easy to sign up for.  It is run by commission junction.

-Moving back to Addigy territory, Joe expresses his frustrations with the interface at times

-Joe shares a tip about creating a custom table view. There is a view option in the column toggle icon in the top right of the Devices list.  Then you can adjust it and Save the changes using the table view menu in the top left of the Devices list.

-Joe encourages the group to scratch beneath the surface of Addigy and find resources available in the community

-For Sam, he’s been utilizing Addigy to enable MDM features like white listing Kernel Extensions (KEXT) and deploying PPPC profiles.  In the case of PPPC, there is a great Git Hub project that makes the process easier for those who are not familiar with these profiles:
https://github.com/jamf/PPPC-Utility

-Joe covers the topic of User Approved MDM and Sam tags along with a discussion of Apple Business Manager and enrolling into MDM at Setup Assistant.

-Another Git Hub project, UMAD, provides a nice GUI interface to encourage your users to onboard and enroll into UAMDM
https://github.com/erikng/umad

313: Addigy And More...

Topics:

-Joe has spent time recently dedicating his focus on Addigy and Watchman Monitoring and understanding how to best leverage those tools

-Scripts has been what Joe has been concentrating on and he has found a tremendous amount of help and support through the MacAdmins Slack and the Addigy community

- Joe created a script to help ensure your client's Mac fleet gets restarted regularly, according to the best practice you decide. Initial prompt to gently suggest a restart after a "recommended" uptime, default to do nothing if ignored. Second prompt when uptime reaches "preferred", defaulting to gracefully restart if ignored. Final prompt when uptime reaches "limit", defaulting to try a graceful restart and then try a forcible restart if needed. Default values: 7 days, 21 days, 75 days. "I prefer HyperCard"

- Joe's script, for Addigy users: Restart Mac per Best Practice gets approved while recording the show!

-Sam talks about the “Easy Button” he learned while working with Jamf. He likes the thought of empowering the users to have them complete step 0 before calling support.

-These conversations seem to always point to how it weaves into your managed services or hourly plans. And having clients wonder why they have you if things are working so well.

-Joe also created a couple of great scripts to work with Watchman Monitoring functionality:
— This script to easily "Adjust Watchman Monitoring Time Machine Warning", default 21 days. For those users who just can't seem to run a backup regularly whether by circumstance or habit. Previously used to connect remotely to adjust this, since it can't be changed remotely in the Monitoring Client web interface. Now we can deploy it remotely, even across multiple machines or an entire client!
—Another script to "Adjust Watchman Monitoring Root Capacity Warning", default 95%. For those users who perpetually, or periodically, ride the edge of Apple's recommended best practice and you want to give them a bit more leeway. Again, it can't be changed remotely in the Monitoring Client web interface and we used to have to connect remotely to adjust this.

-Jerry gets a call from a new client in a remote location and discovers a 2011 iMac that was fairly unresponsive. Jerry is tasked with the job of migrating to a new iMac. He sees an old version of TeamViewer on the computer and discovers a surprise!

-Jerry & Joe discuss an episode of the CYBER podcast - Snowden on iPhone: with Android, patching landscape is a disaster because manufacturers discontinue phones quickly and don't continue providing software updates, and because phone vendors don't control chipset updates like for WiFi and cellular chips. This leaves many older phones vulnerable but in many different ways so there's no simple exploit or "skeleton key" for all devices. This mitigates the kind of widespread attack that can be developed for iPhone, since so many iPhones are running the same versions of iOS and have the same chips and firmware running on the chips.

-A worrisome story about sharing sensitive data with others on Dropbox is shared by Joe. It leads him to think of a method of phishing or scamming end users: create phony Dropbox accounts, create shared folders, share some data with strangers "accidentally" in a folder with a generic name like “SECURE”. Listen as Joe talks about how he would set his trap.

-Dave Provine brought up the SS7 vulnerability in the MacAdmins Slack, which was originally demonstrated at the Chaos Communication Congress hacker conference in 2014 and made some news on 60 Minutes in April 2016. It exploits vulnerabilities in a system called Signaling System No 7 (SS7), originally developed in 1975. So it's not just SIM hijacking that makes SMS a weak link. By hacking SS7, an attacker could silently snoop on SMS text messages, phone calls, and access phone location data. Yikes!

-iOS 12.3 and macOS 10.14.5: wow they fixed a lot of security issues! "An application may be able to execute arbitrary code with system privileges" and "A malicious application may be able to read restricted memory" and "A malicious application may be able to elevate privileges" and "A local user may be able to modify protected parts of the file system" and "Processing maliciously crafted web content may lead to arbitrary code execution"