NexusTek Ranked on Channel Futures 2022 MSP 501

NexusTek Ranked on Channel Futures 2022 MSP 501
NexusTek Ranked on Channel Futures 2022 MSP 501

NexusTek Ranked on Channel Futures 2022 MSP 501—Tech Industry’s Most Prestigious List of Managed Service Providers Worldwide

For the Fifth Consecutive Year, Annual MSP 501 Includes NexusTek Among Industry’s Best-in-Class Businesses Growing Via Recurring Revenue and Innovation

Denver, CO (June 29, 2022) – NexusTek has been named as one of the world’s premier managed service providers in the prestigious 2022 Channel Futures MSP 501 rankings.

NexusTek has been selected as one of the technology industry’s top-performing providers of managed services by the editors of Channel Futures. For the past 16 years, managed service providers (MSPs) from around the globe have submitted applications to be included on this prestigious and definitive listing. The Channel Futures MSP 501 survey examines organizational performance based on annual sales, recurring revenue, profit margins, revenue mix, growth opportunities, innovation, technology solutions supported, and company and customer demographics.

MSPs that qualify for the list must pass a rigorous review conducted by the research team and editors of Channel Futures. It ranks applicants using a unique methodology that weighs financial performance according to long-term health and viability, commitment to recurring revenue and operational efficiency.

Channel Futures is pleased to name NexusTek to the 2022 MSP 501.

“We are deeply honored to be recognized on the Channel Futures MSP 501 list again this year,” said Mike Hamuka, Chief Revenue Officer, NexusTek. “NexusTek continually strives to accelerate performance by aligning our innovation and service initiatives with customer experience. Our commitment to our customers is the foundation of our success, and it is gratifying to see the outcomes of a customer-driven approach earn NexusTek a spot on the MSP 501 for the fifth consecutive year.”

This year’s list once again attracted a record number of applicants, making it one of the most competitive in the survey’s history. Winners are being recognized on the Channel Futures website and will be honored at a special ceremony at the Channel Futures MSP Summit + Channel Partners Leadership Summit, Sept. 13-16, in Orlando, Florida.

Since its inception, the MSP 501 has evolved from a competitive ranking into a vibrant group of innovators focused on high levels of customer satisfaction at small, medium and large organizations in public and private sectors. Today, many of their services and technology offerings focus on growing customer needs in the areas of cloud, security, collaboration and support of hybrid work forces.

“The 2022 Channel Futures MSP 501 winners are the highest-performing and most innovative IT providers in the industry today,” said Allison Francis, senior news editor for Channel Futures. “The 501 has truly evolved with the MSP market, as showcased by this year’s crop of winners. This is also the fifth consecutive year of application pool growth, making this year’s list one of the best on record.”

“We extend our heartfelt congratulations to the 2022 winners, and gratitude to the thousands of MSPs that have contributed to the continuing growth and success of the managed services sector,” said Kelly Danziger, general manager of Informa Tech Channels. “These providers are most certainly driving a new wave of innovation in the industry and are demonstrating a commitment to moving the MSP and entire channel forward.”

The complete 2022 MSP 501 list will be available on Channel Futures’ website on Monday, June 20th.

Background

The 2022 MSP 501 list is based on confidential data collected and analyzed by the Channel Futures editorial and research teams. Data was collected online from Feb. 1-April 30, 2022. The MSP 501 list recognizes top managed service providers based on metrics including recurring revenue, profit margin and other factors.

About NexusTek

Trusted by thousands of small and medium-sized businesses (SMBs), NexusTek is a national managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting. We design holistic solutions for customers that deliver a superior end-user experience, backed by a 24/7/365 domestically staffed support team. NexusTek Managed Service Plans offer end-to-end IT management with fixed-monthly, per-user pricing through which SMBs can leverage helpdesk, backup, disaster recovery, dedicated engineers, security, 24×7 remote support and network monitoring services while creating predictable IT budgets.

About Channel Futures

Channel Futures is a media and events platform serving companies in the information and communication technologies (ICT) channel industry with insights, industry analysis, peer engagement, business information and in-person events. We provide information, perspective, and connection for the entire channel ecosystem. This community includes technology and communications consultants, integrators, sellers, MSPs, agents, vendors and providers.

Our properties include the Channel Futures MSP 501, a list of the most influential and fastest-growing providers of managed services in the technology industry; Channel Partners events, which delivers unparalleled in-person events including Channel Partners Conference & Expo, the MSP 501 Summit and Channel Partners Europe; and Allies of the Channel Council (ACC) and DEI Community Group, our initiatives to educate, support and promote diversity, equity and inclusion (DE&I) in the ICT channel industry. Channel Futures is where the world meets the channel; we are leading Channel Partners forward. More information is available at channelfutures.com.

Channel Futures is part of Informa Tech, a market-leading B2B information provider with depth and specialization in ICT sector. Every year, we welcome 14,000+ subscribers to our research, more than 4 million unique monthly visitors to our digital communities, 18,200+ students to our training programs and 225,000 delegates to our events.

Share On Social

LinkedIn
Twitter
Facebook

Which IT Solutions Are a Perfect Fit for Growing Businesses?

Which IT Solutions Are a Perfect Fit for Growing Businesses?

READ TIME: 4 MIN

Which IT Solutions Are a Perfect Fit for Growing Businesses?

Which IT Solutions Are a Perfect Fit for Growing Businesses?

Growing businesses face a unique collection of challenges. There is never enough time in the day, your budget only goes so far, and opportunities for growth are often coupled with overwhelming demands on your company’s resources. IT systems can help small and medium-sized business (SMB) leaders to manage growing pains more effectively, but only 18% of SMB leaders feel confident in their ability to implement technologies in a strategic manner1.

If selected carefully, IT solutions truly can help to reduce strain on growing businesses. In particular, the cloud-based services referred to “as-a-service” solutions are perfectly tailored to the needs of growing businesses. Common solutions in this category include:

  • Infrastructure-as-a-Service (IaaS): IaaS refers to on-demand computing, storage, and networking resources that can be accessed via the internet.

  • Software-as-a-Service (SaaS): SaaS refers to specific software applications that be accessed through the internet rather than by installing the programs directly onto your devices.

  • Desktop-as-a-Service (DaaS): Also termed virtual desktop infrastructure (VDI), DaaS is also accessed via the internet but includes a full suite of applications that together make up an employee’s desktop.

Not only are these services delivered in the cloud, but they are managed by an IT services provider that will handle maintenance and regular updates. To understand why these cloud-based, as-a-service solutions are such a great fit for growing businesses, it is helpful to evaluate them in relation to critical factors for such businesses: cost, IT expertise, time investment, flexibility, and scalability.

Make Efficient Use of Smaller Budgets

In an investigation of barriers to adoption of new technologies by SMBs, the most frequently cited barrier—reported by 68% of leaders—was budget constraints2. Solutions like SaaS and IaaS are more affordable for smaller businesses because their pay-as-you-go pricing means that you only pay for the amount of licensing or data your business needs. Because payment is proportioned according to usage, growing businesses can obtain top-grade software and cloud computing resources with less expense compared to the equivalent on-premises software and hardware.

No Need for IT Expertise

Growing businesses typically have limited IT capacities, and in many cases, they lack an IT department altogether. On average, SMB leaders fulfil the responsibilities of 3 to 4 organizational roles2, which often includes IT management roles. As-a-service solutions are a great fit when IT expertise is lacking or in short supply, because they do not require that you set up and maintain complicated networking and hardware. If you know how to connect your device to the internet, you have the requisite level of IT expertise to set up and maintain IaaS, SaaS, or DaaS environments.

Time-Saving Implementation & Maintenance

For leaders of SMBs, insufficient time is one of the top 3 constraints on business growth2. This makes the fast and convenient nature of as-a-service solutions attractive to time-strapped leaders. Because applications, storage, computing, and networking are accessible through the internet, the setup process is just a matter of logging in. In addition, the service provider takes care of patches and updates for you, taking another time-consuming task off your to-do list.

Access Business Data Anywhere, Any Time

SMB leaders put in heavy hours, which is easier to manage if you can work from anywhere. DaaS or VDI solutions make this possible, providing users with their full desktop experience on any device and from any location with an internet connection. VDI solutions also allow growing businesses to offer remote or hybrid work, which has become essential for staying competitive in a tough job market.

Scale Usage Level Easily

With a growing business, it is important to be prepared for increases in demand while also keeping your costs as low as possible. Reflecting the difficulty of striking this balance, 50% of SMB leaders cited scaling technology as a major challenge to growth for the next 2 years2.

With SaaS and VDI, you can quickly and easily increase the number of software licenses without buying and installing new software; you just contact your service provider and submit a request. Similarly, IaaS data usage can be expanded with short notice, allowing you to quickly jump on growth opportunities that require greater computing power.

On the other hand, seasonal downturns or unexpected drops in business require downward scaling, which is just as quick and easy to accomplish. Because as-a-service solutions are subscription-based, you have the freedom to decrease usage levels as needed to control costs. This helps growing business leaders to avoid paying for unused software licenses and hardware, which is always a risk with on-premises deployments.

Offering a variety of cloud-based solutions including SaaS, DaaS/VDI, and IaaS, NexusTek supports SMBs to implement IT infrastructure that is tailor-made for growth.

Are you interested in exploring IT solutions for your growing business?

References:

  1. (2019). Tech buying trends among small and medium-size businesses. https://www.comptia.org/content/research/smb-technology-buying-trends
  2. (2019). Small & medium business trends report. https://www.salesforce.com/content/dam/web/en_gb/www/pdf/smb/salesforce-research-smb-trends-report-3.pdf

Are BYOD Practices Putting Your Business at Risk?

Are BYOD Practices Putting Your Business at Risk?

READ TIME: 4 MIN

Are BYOD Practices Putting Your Business at Risk?

Are BYOD Practices Putting Your Business at Risk?

In our hyper-connected world, most of us have experienced some degree of blurring between “work” and “personal” spheres. An example of this phenomenon is bring-your-own-device (BYOD) work practices, which refers to the use of personal devices for work purposes. Although BYOD was initially somewhat controversial, it is now the norm rather than the exception. In fact, 83% of companies now allow at least some use of personal devices for work purposes1. As BYOD creates distinct cyber security risks, it is important to understand the nature of those risks and how to contain them.

Why Have So Many Employers Adopted BYOD?

Before discussing risks, it is worthwhile to consider the reasons that BYOD has become so prevalent. One of the main reasons that BYOD has taken off is because it enhances job satisfaction for employees who have strong device preferences—and this is a sizable portion of the workforce. Specifically, 50% of employees over the age of 30 expressed a strong preference for their own devices over those provided by their employer2.

Use of personal devices can also cut costs and create efficiencies for employers. Whether employees are working remotely or in the office, using familiar equipment is less stressful and reduces the time a company must invest in device-related training and troubleshooting. It also increases productivity by making it easier for employees to keep working while away from their desks; on average, a BYOD employee puts in an extra two hours each day3.

Cost savings of BYOD are also attractive to employers, especially to small and medium-sized businesses (SMBs) that have limited budgets. Studies have demonstrated that BYOD practices may save a company $350 to $1,300 per employee, per year4. Given these clear benefits, it’s easy to see why BYOD has caught on so widely; however, with these benefits come distinct cyber security risks.

How Does BYOD Create Cyber Security Risks?

In spite of the benefits, BYOD practices introduce a higher degree of cyber risk for businesses. This is because every device that connects to a company’s network (i.e., every endpoint) creates a new point of vulnerability for hackers to exploit. Illustrating this risk, 51% of data breaches have been attributed to employees’ personal devices5. Risk emerges from multiple points:

  • Unmanaged devices: The term “shadow IT” refers to employees’ use of devices, software, and applications for work purposes without the knowledge of the employer. Shadow IT creates risk because if a company isn’t aware that a device is being used for work, then it cannot implement normal precautions (e.g., anti-malware software). When polled, 17% of employees admitted to using their cell phones for work without telling their employer6. It only takes one point of vulnerability for a data breach to occur, making this a considerable threat.

  • Lax personal device security: Although your company might require strong passwords and multifactor authentication, employees may be less stringent with security practices for their own devices. Many employees may even store company passwords in unsecured notes apps on their mobile devices. If an employee’s personal device is hacked, this gives the hacker easy access to business networks and data.

  • Malware: Another point of vulnerability is downloads; when using personal devices, employees may unwittingly download files or programs that contain malware. Malicious code can then be spread to the company network the next time the employee logs in from their device.

  • Device loss: Another source of risk is device loss, as employees are more likely to carry personal devices around with them than company-issued devices. This makes personal devices more likely to be lost, increasing the chances of business data falling into the wrong hands.

Cyber Defense Strategies for BYOD-Related Risks

Whether your business formally sanctions BYOD practices or not, enacting protective strategies is the safest option. Here are important methods to consider:

  • Managed endpoint detection: To recognize threats to your company’s network, it is necessary to first identify all endpoints. Keeping track of all personal devices manually is time-consuming and prone to error. With managed endpoint detection, however, any new devices that access your network are automatically detected, whether the employee has informed you of their intent to use the device or not.

  • Managed endpoint monitoring: In addition to detecting endpoints that are logged into your business network, it is important to proactively monitor for suspicious behavior or indicators of malware. With managed endpoint monitoring, any malicious activity is detected immediately, triggering an appropriate response such as logging the user out and issuing alerts.

  • Patch management: When vulnerabilities are identified in operating systems, software, or applications, patches that resolve them are issued. Because cyber criminals can exploit these vulnerabilities to hack into business networks, it is essential that patches and updates be installed immediately. With the expanded attack surface BYOD creates, falling behind on updates is a recipe for disaster.

  • Vulnerability scanning: In addition to endpoint detection, it is also important to routinely scan all endpoints on the network edge for vulnerabilities. With an ever-changing collection of personal devices accessing your network, spotting areas of vulnerability and addressing them promptly is sound practice.

  • Employee security awareness training: Your employees are the #1 source of cyber risk to your business, making cyber security awareness training essential in a BYOD environment. When employees are equipped to make smart choices, the whole business benefits.

With a range of solutions to defend against cyber threats of all types, NexusTek supports SMBs to take advantage of the benefits of BYOD practices while maintaining a robust cyber security posture.

Would you like to learn about cyber defense strategies to protect against BYOD-related risks?

References:

  1. Kolmar, C. (2022, October 17). 26 surprising BYOD statistics [2023]: What to know for your business. Zippia. https://www.zippia.com/advice/byod-statistics/
  2. Bullock, L. (2019, January 21). The future of BYOD: Statistics, prevention and best practices to prep for the future. Forbes. https://www.forbes.com/sites/lilachbullock/2019/01/21/the-future-of-byod-statistics-predictions-and-best-practices-to-prep-for-the-future/?sh=3f62f1501f30
  3. Kolmar, C. (2022, October 17). 26 surprising BYOD statistics [2023]: What to know for your business. Zippia. https://www.zippia.com/advice/byod-statistics/
  4. Barlette, Y., Jaouen, A., & Baillette, P. (2021). Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers’ coping strategies. International Journal of Information Management, 56, 1-16. https://doi.org/10.1016%2Fj.ijinfomgt.2020.102212
  5. AT&T. (2017). Mind the gap: Cybersecurity’s big disconnect–The CEO’s guide to cybersecurity. https://www.business.att.com/content/dam/attbusiness/reports/cybersecurity-report-v6.pdf
  6. Kolmar, C. (2022, October 17). 26 surprising BYOD statistics [2023]: What to know for your business. Zippia. https://www.zippia.com/advice/byod-statistics/

NexusTek Honored on CRN’s 2022 Solution Provider 500 List

NexusTek Honored on CRN’s 2022 Solution Provider 500 List
NexusTek Honored on CRN’s 2022 Solution Provider 500 List

NexusTek Honored on CRN’s 2022 Solution Provider 500 List

Recognized as a leading solution provider for the fourth consecutive year

Denver, CO, June 1, 2022 — NexusTek, a top national cloud, managed IT services, and cyber security provider, today announced that CRN®, a brand of The Channel Company, has named NexusTek to its 2022 Solution Provider 500 list.

CRN’s annual Solution Provider 500 ranks North America’s largest solution providers by revenue and serves as the gold standard for recognizing some of the channel’s most successful companies. With a combined revenue of more than $434 billion, this year’s list represents an impressive amount of influence and impact wielded by these companies on today’s IT industry and the technology suppliers they partner with.

“NexusTek is honored to be recognized on CRN’s 2022 Solution Provider List,” said Scott Ray, Chief Operating Officer of NexusTek. “At NexusTek, we place our customers’ success and satisfaction above all else, allowing their needs and priorities to drive our strategic solution offerings and customer service provision. We believe that our own success, evidenced by our inclusion on CRN’s SP500 for four years running, demonstrates the importance of making customer service the core of our values and actions. We plan to continue in this direction, evolving as a solution provider as our customers’ needs require.”

“The Solution Provider 500 list from CRN serves as the benchmark for the top technology integrators, strategic service providers, and IT consulting firms, making it an invaluable resource for technology vendors seeking to partner with today’s top-performing IT solution providers,” said Blaine Raddon, CEO of The Channel Company. “My congratulations go out to each of these companies for their extraordinary contributions to the continued growth and success of the IT channel.”

CRN’s 2022 Solution Provider 500 list is available online at www.CRN.com/SP500 and a sample from the list will be featured in the June issue of CRN Magazine.

With over 25 years of experience, NexusTek provides holistic solutions that combine best-in-class technology and an experienced workforce of highly skilled engineers and IT professionals to design, deliver, on-board, and maintain IT operations for thousands of businesses across the U.S. and Canada. 

About NexusTek

Trusted by thousands of small and medium-sized businesses (SMBs), NexusTek is a national managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting. We design holistic solutions for customers that deliver a superior end-user experience, backed by a 24/7/365 domestically staffed support team. NexusTek Managed Service Plans offer end-to-end IT management with fixed-monthly, per-user pricing through which SMBs can leverage helpdesk, backup, disaster recovery, dedicated engineers, security, 24×7 remote support and network monitoring services while creating predictable IT budgets.

About The Channel Company

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers, and end users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelcompany.com

Share On Social

LinkedIn
Twitter
Facebook

The Great Resignation and IT Employees: Where Do Things Stand Today?

The Great Resignation and IT Employees: Where Do Things Stand Today?

READ TIME: 5 MIN

The Great Resignation and IT Employees: Where Do Things Stand Today?

The Great Resignation and IT Employees: Where Do Things Stand Today?

April 2021 marked the onset of the Great Resignation when a record-setting 3.99 million U.S. workers voluntarily left their jobs1. Over a year later, many are wondering about the status of the Great Resignation. Is it over yet? Still continuing? We were interested in these questions as well—especially as they apply to IT employees—and the following is an overview of the situation we face today.

Status of the Great Resignation in 2022

Although many were shocked at the record-setting quit level of 3.99 million in April 2021, the ensuing monthly tallies of voluntary resignations reported by the Bureau of Labor Statistics (BLS) suggest that this was just the beginning. The number of monthly resignations has continued to climb, reaching a new record high of 4.51 million in November 20212.

Since the beginning of the Great Resignation, the average number of job quits has been 4.15 million per month, and in fact, the number of resignations per month has not fallen below 4 million since August of 2021. The most recent statistics from BLS show that 4.35 million workers left their jobs voluntarily in February 2022, indicating that the Great Resignation has not abated3.

Technology Employees and the Great Resignation

With a history of higher-than-average turnover that spans many years, the technology industry has been hit especially hard by the Great Resignation. To provide context, turnover rates for the technology industry in 2018 were the highest among all industries, at 13.2%4. More recently, in 2020, technology employee turnover rates were clocked at 21.3%5.

Data collected on turnover intentions during the Great Resignation suggest that turnover rates for technology professionals may only continue to climb in coming months. Survey data collected in September 2021 suggested that a full 72% of technology employees in the U.S. planned to quit their jobs in the next 12 months6.

The adverse effects of IT staff turnover are multifold. Losing members of your IT team can result in remaining team members feeling overworked and stressed, which can itself exacerbate turnover. Furthermore, losing IT knowledge and expertise can have a direct impact on the management and upkeep of your company’s IT systems. And of course, turnover in IT is expensive. A conservative estimate is that the cost of replacing an employee is about 30% of their salary7. This means that an IT employee who earns $90,000 per year costs approximately $27,000 to replace.

The Increasingly Important Role of Retention Strategies

The ongoing costs and challenges of high turnover have brought retention strategies into the spotlight. The high demand for talent in general—and IT employees specifically—translates to an employment market where job seekers are free to be choosy about which offers they accept. The abundance of demand places IT workers in a situation where, if they are unsatisfied with their current jobs, they have plenty of other options to consider.

For companies that wish to retain IT employees to the greatest extent possible, the questions then become: Why do IT workers quit, and what might entice them to stay? Research indicates that the most common causes of IT staff turnover are8:

  • Seeking better pay
  • Looking for better working conditions
  • Desire for more responsibility
  • Seeking opportunity to express creativity

Previous studies of turnover and retention in IT affirm these findings, demonstrating that factors like stress due to excessive workload and lack of professional development opportunities can send your best IT talent looking for greener pastures elsewhere9.

Managed IT Services as a Strategy for Curtailing High IT Turnover

Retooling your IT retention strategies is certainly a timely idea, and an option that you might not have considered is outsourcing a portion of your IT management to a managed services provider (MSP). By partnering with an MSP, you can:

  • Decrease stress and burnout in your in-house IT team: Co-managing your IT systems with an MSP allows you to outsource the time-consuming and urgent tech support requests that make for long, stressful days for your IT team. When your employees can call the MSP’s help desk for support whenever they need it, this relieves the pressure that often drives in-house IT talent out the door.
  • Give in-house IT staff opportunities for higher-value activities: Another benefit of co-managing your IT with an MSP is that, with the day-to-day tech support calls taken off your in-house IT team’s hands, they have more time for strategic IT activities. Not only does this provide your IT staff with more responsibility and opportunities for growth, but it also improves your company’s ability to achieve business goals by more effectively leveraging technologies.

Co-managing your IT in partnership with an MSP allows you to create working conditions that better meet the needs and expectations of top IT talent. In addition, containing turnover costs relieves pressure on your budget, allowing for salary increases for your IT team. In these ways, partnering with an MSP can help you to retain your key IT professionals.

Are you interested in exploring managed services as a retention strategy for your IT talent?

References:

  1. Kaplan, J., & Kiersz, A. (2021, September 8). Another 4 million workers quit for the 4th month in a row, and it shows how Americans are rethinking work in a way they haven’t in decades. Insider. https://www.businessinsider.com/record-number-workers-quit-fourth-month-labor-shortage-delta-economy-2021-9
  2. (2022). Quits by industry and region: Levels, seasonally adjusted. https://fred.stlouisfed.org/release/tables?rid=192&eid=7022&od=2021-11-01
  3. (2022). Quits by industry and region: Levels, seasonally adjusted. https://fred.stlouisfed.org/release/tables?rid=192&eid=7022&od=2021-11-01
  4. Booz, M. (2018, March 15). These 3 industries have the highest talent turnover rates. LinkedIn. https://www.linkedin.com/business/talent/blog/talent-strategy/industries-with-the-highest-turnover-rates
  5. Silverman, R. (2020). Retail sector wages are rising due to higher employee turnover and e-commerce demand. Aon. https://humancapital.aon.com/insights/articles/2020/retail-sector-wages-are-rising-due-to-higher-employee-turnover-and-e-commerce-demand
  6. (2021). Survey: Retaining tech employees in the era of The Great Resignation. https://www.talentlms.com/tech-employees-great-resignation-statistics
  7. Work Institute. (2020). 2020 retention report. https://info.workinstitute.com/hubfs/2020%20Retention%20Report/Work%20Institutes%202020%20Retention%20Report.pdf
  8. Stowe, L. (2020, March 25). Employee attrition rate. DevSkiller. https://devskiller.com/attrition-rate-in-tech/
  9. Harden, G., Boakye, K. G., & Ryan, S. (2018). Turnover intention of technology professionals: A social exchange theory perspective.Journal of Computer Information Systems, 58(4), 291-300. https://doi.org/10.1080/08874417.2016.1236356

How Cloud Computing Furthers Your Sustainability Goals

READ TIME: 3 MIN

How-Cloud-Computing-Furthers-Your-Sustainability-Goals

How Cloud Computing Furthers Your Sustainability Goals

As a top tech trend of 2023, sustainability has never been more important. In fact, 90% of businesses have now adopted some form of environmental, social, and governance (ESG) practice1. At the same time, the explosion in demand for business-related data processing has spurred debates about energy consumption for the cloud versus on-premises infrastructure, prompting the question: Is cloud computing better for the environment than on-premises IT infrastructure?

In short, the answer to this question is yes, and in this blog, we review current evidence related to cloud computing and sustainability.

Change in Energy Demand Over Time

Early forecasts from a decade ago suggested that the expansive data centers used by cloud providers would drive up energy consumption dramatically. However, the overall changes in energy demand across all types of data centers—on-premises deployments and cloud—illustrate the efficiencies of cloud computing and modern equipment. From 2010 to 2018, the computing output of data centers worldwide increased by 6 times, but the corresponding energy consumption rose by only 6%2. These efficiencies are attributed to widespread movement from on-premises servers to cloud computing, along with more efficient equipment.

More Efficient Equipment in Cloud Data Centers

Because cloud providers must cover the costs of running an enormous quantity of machines, they are incentivized to seek out efficiencies. For this reason, cloud providers are more likely than on-premises server rooms to use the most recent, energy-efficient hardware. This has significant implications for energy consumption; compared with servers from 10 years ago, modern servers use about 25% of the energy on a per-output basis3. Public cloud providers also take specific measures to reduce the total amount of energy their facilities consume, using tailored chips, high-density data storage, ultrafast networking, and airflow systems that are specially designed for the environment.

Location of Cloud Facilities

Another contributor to energy efficiency of cloud data centers is location. Public cloud facilities are often deliberately located closer to energy sources, such as hydroelectric dams in the Pacific Northwest. This proximity to sources of energy reduces the amount of energy loss during transmission. Some cloud providers may also locate cloud facilities in colder areas to reduce the need for cooling. Companies that choose to maintain their own private, on-premises servers are less likely to have the same level of control over location, resulting in a net higher usage of energy on a per-output basis.

Efficiencies Created by Higher Usage Levels

Cloud providers are also able to attain greater efficiencies due to their higher levels of server usage. This is because running a single server at a higher level is more efficient than running multiple servers at the lower levels that are typical for smaller businesses. Increasing the computing output of a single server by a factor of 4 only increases its energy consumption by a factor of 1.7, illustrating the comparative efficiency of using a single server at higher levels4. Through use of demand forecasting and multitenancy, cloud providers can serve a mix of customers whose use patterns balance each other out. This avoids spikes in usage that are followed by periods of wasteful idle time, as often occurs in on-premises server rooms.

As a provider of cloud services that utilizes cloud data centers, including a Sustainability Certified data center in Las Vegas, NexusTek can help you achieve your sustainability goals.

References:

  1. Overby, S. (2022, December 5). CIOs get serious about sustainability. CIO. https://www.cio.com/article/415205/cios-get-serious-about-sustainability.html
  2. Lohr, S. (2020, February 27). Cloud computing is not the energy hog that had been feared. New York Times. https://www.nytimes.com/2020/02/27/technology/cloud-computing-energy-usage.html#:~:text=Its%20data%20centers%20on%20average,of%20the%20world’s%20electricity%20output.
  3. Knight, W. (2020, February 27). Data centers aren’t devouring the planet’s electricity—yet. Wired. https://www.wired.com/story/data-centers-not-devouring-planet-electricity-yet/
  4. (2020). The carbon benefits of cloud computing: A study on the Microsoft Cloud in partnership with WSP. https://www.microsoft.com/en-us/download/details.aspx?id=56950

Are You on the Edge? Edge Computing, That Is…

Are-you-on-the-edge

READ TIME: 4 MIN

Are-you-on-the-edge

Are You on the Edge? Edge Computing, That Is…

As the next “big thing” in technology, edge computing has created a buzz that is exciting but not always easy to decipher. Is edge computing just a fancy name for the Internet of Things (IoT)? Will edge computing replace the cloud? How do I prepare my business for edge computing? These are all relevant questions for business leaders to consider, so let’s start with a straightforward description of how edge computing works.

What Is Edge Computing?

Although IoT devices are currently the most common application of edge computing, the two are not synonymous. Edge computing is similar to cloud computing, with a major difference being the distance between (a) where the data is created, and (b) where the data is processed. Usually, “where the data is created” equates to an endpoint, like a laptop or IoT device.

With cloud computing, the data you or your device creates might be processed in a cloud center two states away. With edge computing, however, that data will be processed in a location that is much closer to you or your device. Edge computing relies upon micro data centers that are more widely dispersed than cloud centers, as proximity to endpoints is central to its functionality.

Why Is Everyone So Excited About Edge Computing?

Although it is still in its nascent stages, edge computing is already used in some form by 38% of small and medium-sized businesses—and this proportion is expected to rise sharply over coming years1. The excitement swirling around edge computing is largely about its speed, and what its speed makes possible.

Because data travels a shorter distance with edge computing compared to cloud, the processed data is returned to the end user or device much more quickly. Although you might not notice this speed difference if you’re, say, creating a report in Excel using existing data, you might observe lags or delays (i.e., latency) for tasks that involve processing a higher volume of data, such as reviewing a dashboard that is fed by real-time data, or streaming video content.

Strategic IT Planning and Edge Computing

For purposes of strategic IT planning for your business, it is important to understand that edge computing is not expected to replace cloud computing. However, Gartner predicts that 75% of business data will be processed at the edge by 2025, a steep increase from 10% in 20182. Edge computing is expected to augment the cloud in an increasingly prominent way, with each type of computing occupying its own specific role.

Integrating edge computing into your IT strategy will require that you determine where it is needed to drive business outcomes and where it is not:

  • Real-time data processing: When real-time data processing is required for staying on top of sensitive processes or outcomes (e.g., medical or factory sensor monitoring), edge computing is the optimal choice.

  • Enhancing customer experience: When being faster makes a difference in customer experience, edge computing can give you the advantage. Keep in mind that even milliseconds matter in the customer experience. To illustrate, a 2020 study of mobile website performance across 37 brands found that an increase in speed of just 100 milliseconds was associated with an 8.4% increase in retail conversion rates3.

Edge Computing and Cyber Security

With the introduction of any new technology that is accessible via the internet, cyber security concerns should be front and center. Edge computing as a process is tightly intertwined with the devices that supply the data, such as factory sensors, actuators, mobile phones, and autonomous vehicles. Incorporating edge computing into your IT landscape will likely bring an explosion in the number of endpoints.

This has implications for cyber security because each endpoint creates an additional point of entry for hackers. The proliferation of IoT devices has not gone unnoticed by cyber criminals, who increasingly target these devices. At the same time, 48% of businesses that use IoT devices have no processes in place for detecting whether such devices have been hacked4. Having a solid cyber security plan, both preventive and responsive, is essential for businesses as they move into edge computing.

Integration of edge computing into your IT strategy requires careful planning and preparation. NexusTek can assist with strategic IT assessments, cyber security solutions, and ongoing managed IT to maintain optimal functionality of your edge computing infrastructure.

Would you like to learn more about optimizing your IT strategy?

References:

  1. Research and Markets. (2021, November 30). Global edge computing markets 2021-2026: Rising use of BYOD in modern business and technological evolution to drive the market growth. GlobalNewswire. https://www.globenewswire.com/news-release/2021/11/30/2342704/28124/en/Global-Edge-Computing-Markets-2021-2026-Rising-Use-of-BYOD-in-Modern-Business-and-Technological-Evolution-to-Drive-the-Market-Growth.html
  2. (2018, October 3). What edge computing means for infrastructure and operations leaders. https://www.gartner.com/smarterwithgartner/what-edge-computing-means-for-infrastructure-and-operations-leaders
  3. (2020). Milliseconds make millions. https://www2.deloitte.com/ie/en/pages/consulting/articles/milliseconds-make-millions.html
  4. Schwab, K. (2019, January 16). IoT security is so bad, many companies can’t tell when they’re hacked. Fast Company. https://www.fastcompany.com/90292568/iot-security-is-so-bad-many-companies-cant-tell-when-theyre-hacked

3 Teams Capabilities You Didn’t Know Existed

READ TIME: 4 MIN

3 Teams Capabilities You Didn’t Know Existed

The sharp increase in demand for remote or hybrid work arrangements over the last couple of years has thrust Microsoft Teams into the limelight as a video conferencing and chat all-star application. To illustrate, what comes to mind when you hear the phrase, “I have a meeting this afternoon”? Do you envision sitting around a table with colleagues in the conference room, or do you imagine sitting at your desk in your home office talking with coworkers via video on Teams?

More and more, “attending a meeting” means connecting with others through video conferencing, even when working in the office. For anyone who has used Teams, the video conferencing capability is surely familiar territory, as is the chat function that has made office communication so convenient. How nice is it to be able to ask a coworker a quick question through chat? It’s hard to imagine how we got along without this technology before!

Although Teams is often synonymous with video calls and chat in many people’s minds, the application has a few other nifty features that we’re betting you haven’t heard about. If you’re like us, you love getting the most out of your technologies, so we’ve put together this review of three lesser-known features of Teams to help expand your horizons.

#1 Links to Document Storage

We know that Teams offers great communication channels through video and chat, but another neat way that it allows us to communicate is through the documents we share. Our collaborative processes so often correspond with various documents—from presentations to spreadsheets to policies. Teams makes such collaboration even easier, allowing you to:

  • Directly access stored files on your OneDrive, SharePoint, or other cloud storage: The “Files” feature allows you to conveniently access files that you need to reference while communicating with coworkers through Teams. You can also share documents with others and use your Teams session to collaborate on document development and editing in real-time.

  • Automatically store documents in SharePoint: When documents are shared by a colleague in Teams, the files are stored in a default document folder on SharePoint. Every team that uses Teams will have its own folder on SharePoint, so you always know where to look for documents from previous conversations or meetings. Given that 31% of office professionals frequently struggle to locate documents when pressed1, this can be a mighty handy feature.

#2 Full Telephone System

You’ve probably noticed the little old-school phone handset icon labeled “Calls” in Teams. Maybe you’ve even used this feature to make audio-only calls to coworkers when you’re working from home and aren’t looking especially professional (read: are still in your pajamas). But, this phone icon represents a full telephone system that can be activated if you choose.

Using Teams for both internal and external calls may help to alleviate “app fatigue” in employees, a state of technology overload that can cut into productivity. App fatigue is a growing concern; employees report using an average of 28 different apps to complete daily tasks2. Consolidating all of your calls into one solution can be a nice way of streamlining your processes and making life a bit easier for employees.

#3 Integration With Other Apps

If you click the “Apps” icon on the bottom left of your Teams interface, you’ll open up a world of new possibilities for communication across different applications. Here are just a few:

  • Task planning: Teams can access task planning apps like Planner and To Do, which allows you to monitor task progress for a specific team all in one place. Using Power Automate, you can even set up workflows that will automatically initiate a task assignment following specified triggers, such as when a new message is added in Teams.
  • Approvals: You can also use Teams in conjunction with the Approvals app to request approval from an individual or group for items such as reports or budgets, which you can attach directly to the approval request in teams. Teams notifies the parties of the request for approval, and you can monitor the status of the approval request directly in Teams.
  • Create apps: By accessing PowerApps, you can set up your own custom apps right in Teams. More than a quarter of employees report that switching between apps causes them to miss actions and messages By keeping multiple apps in a central location, you reduce this risk. An advantage of PowerApps is that it is low-code, meaning that you don’t need sophisticated programming knowledge to create apps that make information collection and dispersal quicker and easier for everyone.

These and so many other great features of Teams are making it a staple of office modernization for both remote and onsite teams. As a Microsoft Gold Partner, NexusTek can help you with all phases of your workplace modernization efforts, from initial needs assessment through implementation and training.

Would you like to learn more about workplace modernization using tools such as Teams?

References:

  1. Mendoza, N. F. (2021, May 18). More than 50% of office pros spend more time searching for files than on work. TechRepublic. https://www.techrepublic.com/article/more-than-50-of-office-pros-spend-more-time-searching-for-files-than-on-work/
  2. Austin, M. (2020, October 13). Are workplace apps slowing you down? Out of Office. https://outofoffice.room.com/workplace-app-fatigue/#:~:text=Turns%20out%2C%20one%20of%20the,right%20applications%20decreases%20their%20productivity.
  3. Torres, R. (2021, January 29). App switching, bloat, a drag on employee efficiency: Report. CIO Dive. https://www.ciodive.com/news/app-switching-enterprise-asana-report/594233/

Using Workflow Automation to Boost Employee Productivity and Satisfaction

Using-Workflow-Automation-to-Boost-Employee-Productivity-and-Satisfaction

READ TIME: 4 MIN

Using-Workflow-Automation-to-Boost-Employee-Productivity-and-Satisfaction

Using Workflow Automation to Boost Employee Productivity and Satisfaction

When you hear the term “automation,” it may evoke images of robots performing manual tasks in factories or warehouses. Although this is one form of workplace automation, the type of automation we’ll discuss in this article involves use of software to automate routine office tasks.

This is the type of automation that employees love, as it takes some of the most disliked job tasks off their hands. What are employees’ most disliked office tasks? Here’s what topped the list of responses workers shared when asked this question: data entry, digital filing, managing emails, and creating reports1.

If your eyes glazed over just reading this list, we understand. These are essential tasks, without a doubt, but they are also undeniably boring and repetitive. Additionally concerning is that they often occupy a rather large proportion of employees’ time. In fact, office employees in the U.S. reported that they spend about 40% of the work week on repetitive, routine tasks2.

Obviously, work can’t always be fun—that’s why it’s called “work”—but creating a positive work environment for employees is important for staying competitive in the war for talent. Reducing routine task load is an important retention strategy to consider because when such tasks are excessive, employees may:

  • experience boredom and disengagement;
  • need to work extra hours;
  • make mistakes due to feeling rushed; and
  • have less time for higher-value activities.

Both boredom and burnout due to excessive workloads can decrease employee productivity and increase the likelihood of turnover3. So, it’s worth your while to evaluate possible ways to minimize routine tasks by taking advantage of business process automation.

Microsoft 365’s Power Platform offers some handy tools for automating routine work tasks. The great thing about these technologies is that they don’t involve writing code; you simply use a point-and-click approach within the flow designer4. They also allow for cross-platform connections, which opens up an enormous range of possibilities.

Following are just a few ideas for process automation using Microsoft’s Power Automate, Power BI, and Power Apps:

1. Expedite document approval, notifications, and filing processes:

Using Power Automate, you can designate a trigger that sets in motion an automated sequence of actions. For example, a trigger might be uploading an incident report to SharePoint or via Microsoft Forms. You could use this action to trigger notifications via Teams or email to persons in the approval chain.

For field employees, you might create an incident reporting app through Power Apps that allows them to submit reports via a mobile device. You can also add automatic reminders to ensure the approval process doesn’t stall. You can even specify the file format and location of the approved report, and Power Automate will take care of these final steps for you.

2. Receive notifications when data thresholds are reached:

Power BI can be used to track and visualize streaming data from multiple sources, which you can use to create real-time dashboards where you can specify data alerts. For example, you can create data alerts for sales targets, factory sensor readings, or mentions on social media. In Power Automate, you can then designate Power BI data alerts as triggers for notifications (via Teams, Slack, SMS, etc.) to keep team members updated.

3. Eliminate redundant data entry:

Power Automate allows you connect data sources across platforms to streamline data entry and reduce errors. If, for example, you were using Salesforce for lead tracking but also maintaining a related spreadsheet in SharePoint, you could designate new entries into Salesforce as a trigger for automatic updates to the SharePoint document.

4. Generate and disseminate reports:

Power BI allows you to generate reports using real-time data, and you can use Power Automate to distribute the reports via routes such as email or DropBox. As an example, you could collect customer feedback using Forms, stream this data into Power BI, and then specify the reporting interval in your Power Automate task flow. You could then set up additional task flow steps for distribution and storage of the final report.

As you’ve probably gathered by now, the combinations of automated workflows you can set up across platforms are numerous, creating almost endless opportunities to streamline your employees’ workflows. As a Microsoft Solutions Partner for Modern Work, NexusTek can provide support with implementing Power Platform in ways that meet your specific business needs.

Would you like to learn more about how to leverage business process automation tools?

References:

  1. Cision PR Newswire. (2020, January 21). Global research reveals world’s ‘most hated’ office tasks. https://www.prnewswire.com/news-releases/global-research-reveals-worlds-most-hated-office-tasks-300989956.html
  2. (2021). How much time do we actually spend on recurring tasks? (Study 2021). https://clockify.me/time-spent-on-recurring-tasks
  3. Lufkin, B. (2021, July 4). Being chronically bored at work can have damaging consequences—and we need to talk about it more, say experts. BBC Worklife. https://www.bbc.com/worklife/article/20210701-the-damaging-effects-of-boreout-at-work
  4. Foley, M. J. (2019, November 4). Microsoft rebrands Flow to ‘Power Automate’; adds no-code Power Platform virtual agents. ZDNet. https://www.zdnet.com/article/microsoft-rebrands-flow-to-power-automate-adds-no-code-power-platform-virtual-agents/

Disaster Recovery as a Service: Protecting Your Business From Ransomware

READ TIME: 4 MIN

Disaster Recovery as a Service: Protecting Your Business From Ransomware

Defending your business against ransomware attacks is a multifaceted process. Your first layer of defense is prevention, which should include measures such as employee awareness training, proactive monitoring for malware, and timely installation of updates and patches.

In spite of such precautions, ransomware attackers may still manage to find their way into your systems. “With 82% of ransomware attacks targeting small and medium-sized businesses (SMBs)1, this is clearly a threat of the highest order. This is why it is vital that you honestly assess the dreaded, worst-case scenario question:

What If My Company Were the Target of a Ransomware Attack?

If threat actors successfully launched a ransomware attack against your company, they would almost certainly encrypt your data. This means that, although your data would still be present, it would be converted into a form that is unusable. This would immobilize your IT system, effectively shutting down most if not all business operations.

When you consider the fact that the average downtime resulting from a ransomware attack is 3 weeks2, it becomes glaringly apparent that downtime is immensely expensive. Downtime costs quickly accumulate due to lost productivity, loss of daily revenues, and even loss of long-term customers. For some industries, such as healthcare, network downtime can even be life threatening (e.g., for patients who depend upon continuous care).

The operational paralysis caused by downtime is a primary source of leverage that hackers use to coerce their victims into paying ransoms. That coercion takes the form of an extortion attempt that would go something like this:

The threat actors would inform you that upon your payment of an untraceable ransom (usually in the form of a cryptocurrency like Bitcoin), they will provide you with the decryption code that will allow you to convert your data back into usable form. Until you pay, they will hold your data hostage.

To Pay or Not to Pay—Is That the Question?

Now, you might be thinking, “But we have our data backed up…why would I pay these criminals for a code to decrypt our data when we can just rely on our backups?” Smart question, but the thing is, before you thought to ask that question, the threat actors anticipated not only the question but the answer.

A concerning trend over the last few years has been for ransomware attackers to first go after existing backups, well before anyone is aware that their systems have been breached3. After deleting or compromising the backups, the attackers then proceed to the stage of their scheme when they inform the victimized business of their shakedown.

As a key decision maker for your business, this would put you into a position of choosing between (a) paying the ransom, or (b) losing your data and possibly your entire business. This is one reason why so many businesses ultimately do end up paying ransoms.

Interestingly, 66% of businesses polled stated that they would never pay the attackers if caught up in a ransomware attack; however, in reality, up to 65% do go through with the payments4. This suggests that if you wound up in the crosshairs of ransomware attackers, you might actually find yourself defenseless and willing to concede defeat by paying the ransom.

Your Protection Against Ransomware Attackers

This brings us to the good part of our story: The key to protecting your business against ransomware attackers is indeed backing up your data. However, cybercriminals may specifically seek out backup files in your network, so you must also maintain backups in off-site storage that is inaccessible to threat actors.

Disaster recovery as a service (DRaaS), which includes off-site data storage, is an essential element of establishing your business continuity strategy. Data is backed up continually and is immediately retrievable in the event of loss. Integrating DRaaS into your overall IT strategy helps you to prepare for the worst of situations, ensuring that your IT systems—and therefore your business operations—remain functional during crises such as ransomware attacks.

By storing backups safely out of reach, you disable the attackers’ capacity to manipulate you via data encryption. The happy conclusion to this story is that with thorough preparation that covers all contingencies, your company can successfully weather a ransomware attack.

Are you interested in learning more about how DRaaS solutions can help you to weather IT disasters?

References:

  1. Drapkin, A. (2022, February 7). 82% of ransomware attacks target small businesses, report reveals. Tech.co. https://tech.co/news/82-of-ransomware-attacks-target-small-businesses-report-reveals

     

  2. Durbin, S. (2021, June 1). Ransomware is everywhere—Here’s what you need to consider. Forbes. https://www.forbes.com/sites/forbesbusinesscouncil/2021/06/01/ransomware-is-everywhereheres-what-you-need-to-consider/?sh=2f0023ee7c1f

     

  3. Weeks, R. (2021, March 31). #WorldBackupDay: How to protect the last line of defense. Infosecurity Magazine. https://www.infosecurity-magazine.com/opinions/how-to-protect-the-last-line-of/

     

  4. Fruhlinger, J. (2020, June 19). Ransomware explained: How it works and how to remove it. CSO. https://www.csoonline.com/article/3236183/what-is-ransomware-how-it-works-and-how-to-remove-it.html