You Don’t Get What You Don’t Pay For

Why the Temptation to Engage Low-Cost Friends and Relatives for Skilled Work Should Be Avoided at All Costs

Introduction

Hiring friends or relatives for skilled work at a discounted rate may seem economical in the short term, but this decision often incurs significantly higher long-term costs—financial, relational, and operational—compared to hiring trained professionals. Below is a structured defense of this thesis:

### 1. **Quality of Work and Redo Costs**

* **Professionals** bring experience, training, and often certifications that ensure the job is done right the first time.

* **Unqualified friends/relatives**, even with good intentions, often lack the specialized knowledge required to handle complex problems or meet professional standards.

* **Redoing subpar work**—from rewiring faulty electrical jobs to redesigning botched websites—frequently results in paying twice: once for the friend/relative, and again for a professional to fix it.

### 2. **Time is Money**

* Professionals have systems, tools, and workflows to complete tasks efficiently.

* Amateurs often take significantly longer, both in execution and in correcting errors. This results in **opportunity costs**—delays to launch, missed deadlines, and disruption of dependent tasks.

> Example: Hiring a cousin to remodel a bathroom might drag on for months, delaying property sales or tenant occupancy, while a contractor would complete it in two weeks.

### 3. **Accountability and Warranty**

  • Professionals typically offer **contracts**, **insurance**, and **warranties**. If something goes wrong, there’s recourse.

  • Friends and relatives don’t offer legal remedies. You risk **eating the loss** or damaging the relationship by pursuing repayment or repairs.

### 4. **Relationship Strain**

  • When expectations are unmet, criticism—no matter how justified—can cause lasting rifts with people close to you.

  • Professionals maintain a client-service provider relationship. If something isn’t up to standard, feedback is transactional—not personal.

> Emotional fallout from disputes with friends/family can carry heavier, longer-lasting consequences than a financial setback.

### 5. **Hidden Costs and Scope Creep**

* Friends/relatives often **underestimate the scope** of skilled work. Their lower initial bids may not factor in the full range of tasks, tools, or materials required.

* What starts as a favor can morph into an open-ended obligation—creating frustration, delays, and a quietly ballooning budget.

### Summary

Paying more upfront for a professional ensures quality, efficiency, and legal/financial protection. The cost savings from using a less-skilled, lower-rate friend or relative can quickly erode through rework, time delays, strained relationships, and unexpected scope increases. As such, **the true cost of discounted labor is often hidden—and it shows up precisely when it’s least convenient**.

### One-Line Takeaway:

**A job done right the first time is cheaper than a favor done wrong three times.**


An Example Use-Case

Butch and Sundance own a small business. Butch is somewhat proficient with technology, so he avoids using professionals for things like the company web site, internal infrastructure, and social media accounts. If he encounters something “Over his head” he will reach outside. But usually to a “friend of a friend” that “knows a lot about tech” who can be engaged for very little money compared to professionals in these areas.

Let’s discuss what Butch is risking with this approach:

Butch’s approach—favoring his own limited skills or cheap, informal labor over professional expertise—introduces serious and compounding risks to the business he and Sundance are trying to grow. While the initial costs appear lower, the long-term risks span technical, operational, reputational, and legal domains.

Here’s a breakdown of what Butch is risking

1. Brand Credibility and First Impressions

A DIY or amateur-built website often suffers from poor design, broken functionality, or mobile incompatibility.

Customers judge businesses instantly based on digital presence. A clunky site or inactive social media profile can erode trust and send potential clients elsewhere.

Risk: Lost business due to poor digital presentation—often invisible, unmeasurable, but constant.

2. Security Vulnerabilities

Butch’s casual helpers likely lack formal training in cybersecurity, leaving the business vulnerable to:

  • Data breaches
  • Ransomware attacks
  • Stolen customer or payment info

Professionals follow best practices like access control, data encryption, regular patching, and penetration testing. Butch’s “friend of a friend” may not even use a password manager.

Risk: A single breach can destroy a small business—legally, financially, and reputationally.

3. Business Continuity and Maintainability

When Butch builds something himself or relies on informal help:

  • There’s no documentation
  • No backups
  • No continuity plan if someone disappears

If Butch gets sick, leaves, or the amateur helper vanishes, Sundance is left with a black box no one can operate or repair.

Risk: Critical business operations grind to a halt at the worst possible time.

4. Missed Strategic Opportunities

Professionals don’t just “set things up”—they bring strategic insight. For example:

  • A real web developer may suggest SEO strategies, analytics, and conversion optimization.
  • A professional IT consultant could recommend scalable cloud solutions instead of patchwork hardware.
  • Butch’s patch jobs may “work”, but they don’t grow.

Risk: The business stagnates because its digital infrastructure was never designed to scale.

5. Liability and Compliance

Informal IT help might not understand:

  • ADA website compliance (risk of lawsuits)
  • GDPR or CCPA data handling rules
  • PCI-DSS requirements for storing credit cards
  • A professional would. A “tech-savvy friend” won’t even know the acronyms.

Risk: Fines, legal action, or regulatory shutdowns.

6. Loss of Time, Focus, and Leadership Leverage

Every hour Butch spends cobbling together tools or fixing things himself is an hour not spent building revenue, acquiring customers, or managing staff.

Worse, when the work breaks, Butch gets dragged back into fire-fighting, preventing the business from ever running smoothly.

Risk: Burnout and leadership bottleneck.


Final Thoughts

Butch isn’t just cutting corners—he’s building his business on a foundation of sand.

By prioritizing short-term savings over long-term stability, he’s undermining the very infrastructure that should support growth. In contrast, investing in professionals may cost more now—but it pays off in resilience, scalability, and peace of mind.

Call to Action

For Butch and Sundance to succeed, they must reframe professional help as an investment, not a cost. Because in business, you don’t get what you don’t pay for.

Takeaway:  Butch is at serious risk of losing command over his technology stack, and this risk is not hypothetical. It’s a systemic vulnerability built into his approach of relying on informal, underpaid, and unaccountable “buddy” technologists. Let’s break down the technical and business consequences if the “friend of a friend” becomes disgruntled—or simply disengaged—and walks away with access.

⚠️ Immediate Risks When Informal Technologists Hold the Keys

1. Credential Lockout

If the technologist set up key infrastructure—such as:

  • Domain registration
  • Hosting provider accounts
  • Email admin consoles
  • DNS records
  • Social media platforms
  • SaaS tools like CRM, marketing automation, etc.

and did so using their personal credentials that only they control, or worse, without documenting access:

  • Butch and Sundance could be completely locked out of their own business systems.

This is equivalent to a landlord giving a stranger the only copy of the master key.

 

2. Data Ransom or Destruction

A disgruntled helper with admin privileges could:

  • Delete websites or databases
  • Reassign domains to another party
  • Wipe cloud storage
  • Lock accounts and demand payment (or vengeance)

Without clear contracts or legal recourse, Butch would have little leverage to recover data or restore service.

3. Legal Liability and Customer Fallout

If customer data is lost or exposed, or business operations are suspended:

  • Butch and Sundance could face legal consequences for failing to secure sensitive information.
  • Clients may walk away permanently, citing unprofessionalism or distrust.
  • A moment of poor vendor management becomes a business-ending crisis.

4. Irretrievable Brand Assets

If the technologist controls:

  • Google My Business
  • Facebook, Instagram, LinkedIn and other social media logins
  • Analytics, ad accounts, etc.

Then even rebuilding the business becomes harder: they’ve lost their SEO rankings, customer engagement channels, and ad data.

5. No Recourse or Recovery Plan

Because Butch didn’t engage a professional:

  • There is no Service Level Agreement
  • No backup administrator
  • No centralized password vault (like 1Password for Teams or Bitwarden)
  • No audit trail

The business is left powerless, and Sundance—who relied on Butch—is left holding the bag.

🧠 Root of the Problem: Informal Trust <>Professional Trust

Butch trusted this helper personally. But trust without formalized roles, contracts, and contingency plans isn’t a sign of loyalty—it’s a sign of negligence.

Professionals use:

  • Shared credential managers
  • Role-based access controls
  • Formal handoffs and offboarding
  • Documentation and disaster recovery plans

Informal helpers don’t. And when things go south, they disappear into thin air—often with no accountability.

🛠️ What Should Have Been Done

  • Use a single email address known to critical internal personnel in the company’s domain (@company.com) for admin credentials
  • Centralize passwords in a secure, shared vault.
  • Create role-based user accounts, not shared logins.
  • Require signed work-for-hire contracts that assign ownership of all accounts and intellectual property to the company.
  • Maintain an updated, internal credential and system access list with periodic reviews.

🔚 Bottom Line

Butch’s shortcut may cost him everything:

  • His company’s data
  • His customer relationships
  • His digital identity
  • His peace of mind
  • And even his business partnership with Sundance, who rightly may lose trust in Butch’s judgment

Butch didn’t just hire the wrong person—he outsourced control of his company’s nervous system to an unqualified, unaccountable party.

That’s not delegation. That’s abdication.

How Professionals Do It

The term “Information Technology Stack” – “IT Stack”, for short -to refer to everything that typically falls under a Chief Information Officer’s (CIO) purview. Most small and medium business do not have a dedicated CIO. The business operators may have suffered ‘sticker shock’ when they engaged a profession service provider for a level of effort (LOE) assessment. Some typical functional areas of the IT Stack.

  • Credential Management (this is huge)
  • Domain name(s)Registration/Maintenance
  • Email administration
  • Social Media Presence

Using “IT Stack” to describe the sum total of responsibilities typically overseen by a CIO is both accurate and extremely relevant for small and medium businesses (SMBs), especially those without dedicated IT leadership. While SMBs often treat technology reactively, the functional domains of the IT Stack are expansive and deeply integrated into modern operations and deserve focused investment.

What does a well-managed technology stack look like?

Here’s a comprehensive list of functional areas within a well-managed IT Stack:

🔐 1. Credential & Identity Management

  • Centralized password vaults
  • Multi-Factor Authentication (MFA)
  • Role-based access control (RBAC)
  • Single Sign-On (SSO)
  • Offboarding procedures

🌐 2. Domain Name & DNS Management

  • Domain registration and renewal
  • DNS hosting and zone configuration
  • Subdomain structure planning
  • SSL/TLS certificate management

📧 3. Email Infrastructure

  • Mail hosting (e.g., Microsoft 365, Google Workspace)
  • Email deliverability (SPF, DKIM, DMARC)
  • Shared mailboxes and aliases
  • Email archiving and retention
  • Spam filtering and anti-phishing measures

📱 4. Social Media & Digital Presence

  • Branding and identity consistency
  • Account security and ownership
  • Scheduling and analytics tools
  • Crisis response and public communication channels

🖥️ 5. Website Infrastructure

  • Hosting (shared, VPS, cloud, managed WordPress, etc.)
  • Content Management System (CMS) administration
  • Uptime monitoring and performance optimization
  • Accessibility and SEO audits

🔧 6. Business Application Ecosystem

  • CRM platforms (e.g., HubSpot, Salesforce)
  • ERP, accounting, and inventory tools
  • Collaboration suites (e.g., Slack, Teams, Zoom)
  • Project management platforms (e.g., Asana, Trello)
  • Licensing and subscription management

🧮 7. Data & Analytics

  • Web and product analytics (Google Analytics, Mixpanel)
  • Business Intelligence dashboards (Power BI, Tableau)
  • KPI tracking and reporting
  • Event and conversion funnel instrumentation

💾 8. Data Storage & Backup

  • Cloud file storage (e.g., Dropbox, SharePoint, Google Drive)
  • Server or NAS infrastructure
  • Automated backup systems
  • Disaster recovery planning and drills

🛡️ 9. Security & Compliance

  • Antivirus and endpoint protection
  • Firewalls and network segmentation
  • Security audits and penetration testing
  • Legal compliance (GDPR, HIPAA, CCPA, etc.)
  • Acceptable Use Policies and employee training

🧑‍💼 10. User & Device Lifecycle Management

  • Onboarding/offboarding checklists
  • Asset inventory tracking (laptops, phones, tablets)
  • Mobile Device Management (MDM)
  • Software updates and patching workflows

☁️ 11. Cloud Services Architecture

  • Cloud provider management (AWS, Azure, Google Cloud)
  • SaaS licensing & provisioning
  • Virtualized infrastructure (VMs, containers)
  • Scalability, redundancy, and cost optimization

📄 12. IT Documentation & Knowledge Management

  • Runbooks, SOPs, how-to guides
  • Change logs and revision control
  • Password reset policies
  • Documentation tools (Confluence, Notion, etc.)

🔁 13. Vendor & Service Management

  • Contracts and SLAs
  • Contact and escalation points
  • Monitoring service performance
  • Third-party integrations and API management

💡 Summary

Many Small and Medium Businesses distribute their Information Technology Stack across various informal roles —often with no one formally-obligated to be a steward for the business’ continuity, security, or strategic planning. Each of these functional areas represents an expansive risk surface when done wrong, as well as a powerful business accelerator, when done right, deserving of the label ‘investment’, that pays dividends, not an ‘expense’.