Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Let Work Ruin Your Friendships, or Friendships Ruin Your Work

b2ap3_thumbnail_be_the_boss_400.jpgAs a business owner, you walk a fine line between boss and friend. While you want to be approachable and have a company culture that’s friendly, you can’t have your employees be your closest friends. Being too close to your staff will blur your authority, breed favoritism, and make it difficult to fire people; but not being friendly will make for a cold working environment. How do you manage this social dynamic?

Recognize the Situation
The first step is to evaluate the situation by asking yourself if there are any employees that you may have gotten too close to. If you haven’t set up boundaries in order to guard yourself against such situations, then you probably have certain members of your staff that you’re overly chummy with. Don’t be down on yourself if you’re in this predicament. It’s only natural to form close bonds with people that you spend a lot time with.

Remember Who’s the Boss
One of the main problems with the boss-friend relationship is that, when push comes to shove and you need to correct or reproach an employee that you’re close to, they might not take you seriously. If other employees witness a friend/co-worker getting away with such brazen disregard, dissension in the office will spread and you’ll lose control. The best way to nip a potential situation like this in the bud is to not allow a subordinate to get close enough to where they would feel comfortable dissing your authority.

Keep Your Work Life and Personal Life Separate
It’s tempting to divulge the details of your personal life to your employees, like what hobbies you’re passionate about, all the fun activities you did over the weekend, and even what your personal opinions are over hot-button issues. The problem with being so transparent is that a shrewd employee can take note of these personal details and use them to weasel their way into a pseudo friendship. If you’re not on guard against such subtle suck-uppery, then you could get played.

What’s worse, even though you might miss these cues, the rest of your staff sure won’t. They’ll grow to despise the co-worker who’s manipulating the boss. This will cause major divisions in the workplace. By being careful and not revealing too much about your personal life to your team, employees will be forced to advance their careers based on their job performance, instead of “getting cozy with the boss.” In turn, this will create a strong company made up of workers that are good at their job, as opposed to a weak organization where the managers have spots of brown on their nose.

Look for Meaningful Relationship Elsewhere
We understand that these tips are easier said than done. When you pour your life into running your company, it can be difficult to keep those whom you spend the most time with at arm’s length. Instead of defaulting to your employees for your most meaningful and influential relationships, be intentional about looking elsewhere. There are dozens of social settings and groups outside of work where you can fit right in. Sure, it may take a bit of initiative on your part to leave the office and go to these social gatherings, but the payoff will be worth it when you make a strong friend who has absolutely nothing to do with your business.

At the end of the day, we’re not suggesting that you ignore your employee’s personal needs and be a cold boss-bot. Instead, we’re trying to help business owners by bringing to light an all-too-common pitfall that holds small companies back. Another common pitfall holding companies back is misusing and underutilizing their technology. We can help with this too, professionally speaking of course.

 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 01 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade VoIP Business Management AI Smartphones communications Data Recovery Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Automation Information Facebook Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Bandwidth Windows 10 Blockchain Business Technology Virtualization Wi-Fi Mobile Office Vendor Apps Two-factor Authentication Data Security Chrome BYOD Budget Managed Services Voice over Internet Protocol Mobile Device Management Apple Gmail App Tip of the week Employer-Employee Relationship Networking Avoiding Downtime Marketing Access Control HIPAA WiFi Applications Computing Information Technology How To BDR Office 365 Conferencing Hacker Augmented Reality 2FA Storage Website Password Bring Your Own Device Virtual Private Network Healthcare Health Router Operating System Retail Big Data Risk Management Help Desk Managed IT Services Computers Analytics Office Tips Remote Monitoring Windows 11 Telephone End of Support Vulnerability Vendor Management Physical Security Excel Cooperation Display Remote Workers Printer Firewall Paperless Office Infrastructure Free Resource Going Green Project Management Document Management Windows 7 The Internet of Things Cybercrime Microsoft 365 Social Scam Solutions Data loss Monitoring Customer Service Patch Management Save Money Money Data Storage Humor Downloads Wireless Technology Video Conferencing Licensing Managed Services Provider IT Management Supply Chain Virtual Machines VPN Professional Services Meetings Entertainment Sports Mouse Word Computer Repair Administration Telephone System iPhone Cost Management Vulnerabilities Safety Machine Learning Data Privacy Images 101 Settings Wireless Printing Multi-Factor Authentication Content Filtering Mobility User Tip Modem YouTube Maintenance Processor Mobile Security Antivirus Cryptocurrency Employees Customer Relationship Management Smart Technology Integration Virtual Desktop Data storage LiFi Saving Time Hacking Robot Outlook Holidays Presentation Managed IT Service Alerts Hypervisor Download Small Businesses Shopping Optimization PowerPoint Unified Threat Management IP Address Displays Browsers Connectivity Hacks Break Fix Scary Stories Unified Threat Management Employer/Employee Relationships Fun Navigation Upload PCI DSS Outsourcing Social Network Network Congestion Gig Economy Deep Learning Multi-Factor Security Recovery IoT Internet Service Provider Dark Web User Error Teamwork Regulations Compliance Education Evernote Hard Drives Workplace Trends Hiring/Firing Customer Resource management Regulations Memes Google Calendar Domains Point of Sale SQL Server Data Analysis Paperless Star Wars Mobile Computing Net Neutrality Microsoft Excel Financial Data Staff History Search Network Management Refrigeration Tech Support Co-managed IT Gamification Technology Care Monitors Smartwatch Social Networking Best Practice IT Legislation Public Speaking Azure Lithium-ion battery Fileless Malware Business Communications Procurement Buisness Legal Telework Wearable Technology IT solutions Cyber security Tech Websites Scams Content Entrepreneur Hybrid Work Health IT CES Motherboard Business Growth Communitications Comparison SharePoint Directions Electronic Medical Records Human Resources Assessment Supply Chain Management Permissions FinTech Cortana Term Undo Cables Writing Alt Codes IT Assessment Specifications Lenovo Downtime Value Microchip Virtual Reality Google Apps Internet Exlporer Flexibility Fraud Organization Hosted Solution Server Management Private Cloud IT Maintenance Username Identity Theft Business Intelligence Digital Security Cameras Typing Smart Devices Black Friday Superfish Memory Application Twitter Shortcuts Database Remote Working Google Drive IT Technicians Data Breach Knowledge Google Play Error Ransmoware Vendors Proxy Server Social Engineering Videos Cookies Electronic Health Records Cyber Monday IBM Wasting Time 5G Remote Computing Be Proactive Tactics Hotspot Google Docs Mirgation Unified Communications Trend Micro Experience Security Cameras Workforce Tablet Threats Nanotechnology Bitcoin Software as a Service Running Cable Managing Costs Alert Workplace Strategies Addiction Google Wallet Language Management Dark Data Chatbots eCommerce Managed IT SSID Competition File Sharing Meta Amazon How To Screen Reader Windows 8 Surveillance Distributed Denial of Service Laptop Virtual Assistant Computing Infrastructure Virtual Machine Notifications Service Level Agreement Drones Outsource IT Reviews Identity Medical IT Travel Google Maps Environment Bookmark User Media Smart Tech Development Halloween Techology Transportation

Blog Archive