What’s on the Horizon for Cloud Computing?


What's on the Horizon for Cloud Computing?

What’s on the Horizon for Cloud Computing?

As cloud technology for small to medium-sized businesses continues to advance, a multi-cloud strategy is becoming the choice for growth-minded companies. This strategy is not without its challenges and some business owners may doubt the ease of managing one data migration and platform let alone multiple instances. The trend in cloud services for business is leveraging the power of a multi-cloud architecture for that competitive advantage in your market.

Defining Multi-Cloud Architecture

The term ‘multi-cloud’ refers to organizations using multiple cloud offerings (usually from different cloud providers) to manage their data. While a hybrid cloud refers specifically to supplementing on-site storage with an off-site cloud, multi-cloud architecture can stand on its own, or serve as part of a larger hybrid infrastructure.

Choosing the Right Vendor

When choosing the right cloud vendor for your business, make sure you have a clear understanding of the technology used. How reliable is the uptime? What’s the failover rate? Are there redundant data centers in case of a local power outage? A combination of private and public cloud instances allows companies to reap the benefits without compromising functionality.

The three most important aspects of functionality are computing, backup, and disaster recovery. This strategy isn’t vendor specific and will allow flexibility with hosted applications. For example, you can link cloud components with application components without restrictions if you later decide to switch providers.

Best Practice with Vendors

Regularly backing up your data in an easily consumable format will reduce the likelihood of future issues, whether accidental or malicious. As well, having security and disaster recovery options are crucial to maintaining business continuity and could mean the difference between being back online in under an hour, or business failure.

Emerging tech trends is another aspect you’ll want to consider when exploring a multi-cloud architecture. Reconfiguring your applications to run on a new platform, is both costly and time consuming. Using open platforms, on the other hand, allows organizations to isolate software and have them running on top of their infrastructure. When it comes time to transition to a new cloud provider – as technologies become more cost effective – those applications are easy to relaunch.

Cloud Providers on the Horizon

Today, there are many cloud providers to choose from and the trend on the horizon suggests even more will enter this growing market. The increase in competitors is sure to drive opportunities for you and your business.

At NexusTek, we can help match the right cloud provider to your mission-critical systems, allowing you to mature your operations while seeing a great return on your investment in IT.

Protecting Your Assets with a Solid Cyber Security Strategy


Protecting Your Assets with a Solid Cyber Security Strategy

Protecting Your Assets with a Solid Cyber Security Strategy

When considering a cyber security strategy, think in terms of creating concentric rings around your most important assets. Your first task is to determine your most important assets and then categorize them in terms of risk.

Here are some examples of information assets you may want to include:

  1. Employee HR information
  2. Health benefits information
  3. Social security numbers
  4. Business financial documents
  5. Customer lists
  6. Customer confidential information
  7. Much more…

Your ability to protect employee and customer information is bound by many regulations and records compliance. A breach compromising these assets not only would damage your brand reputation but could lead to legal battles, loss of business or complete business failure.

The idea of concentric rings as a cyber security strategy is very simple; guard your assets against accidental loss or destruction, nefarious actions by outsiders or even someone within your organization.

Backup, Threat Protection and Monitoring

A good backup protocol can eliminate accidental loss or destruction of your most critical data. Having a strong high-availability and disaster recovery process can guard against downtime.

Next, implementing data loss prevention(DLP) is a good way to make sure your highest risk (your employees) are not ex-filtrating data from your business. DLP can provide your organization with policies on access controls for viewing, editing, printing, downloading, and emailing various documents and files. Therefore, you are implementing total control over your proprietary information.

Create another ring of security in the form of threat protection for your email and endpoints. This is a great way to add on a meaningful layer or security, enabling you to catch anomalous activity before it wreaks havoc in your environment.

Implement a full-environment monitoring service to add that final ring. This is protection from the edge, all the way to your internal systems allowing for full visibility of all activity from all sources, whether activity slips through endpoint protection by an employee social media activity, a click on a malicious link, or loading up a compromised thumb drive, your monitoring service is watching 24x7x365 to make sure you’re protected.

Remember, there is no silver bullet to cyber security. The best you can do is to protect your company on many different layers and be diligent about your employees adhering to a policy of protections.

Stay safe out there! – Lynn Shourds, Vice President of Sales at NexusTek

3 Things to Know When Updating Your Phone System


3 Things to Know When Updating Your Phone System

3 Things to Know When Updating Your Phone System

Lower Your Cost of Ownership

Modern communications have certainly evolved well beyond the vision of our forefathers. When we reflect on the number of touchpoints we now manage between employees and customers, it is no wonder the pace of business growth is at an all-time high. Whether it’s email, chat, messaging apps, or video conferences, you need open communication to run your business. So, as you’re comparing phone systems and unified communications platforms, here are some things you’ll want to consider.

Right Plan, Right Person

When calculating the cost of a new phone system, you’ll want to factor in “add ons” to get the features and capabilities that will best serve your business goals. One of the advantages of working with NexusTek is our ability to tailor your Unified Communications System to your business needs, so each employee has the service level they need based on their daily workflow. If you require that your management team has access to deeper analytics and monitoring capabilities, but you only need basic functionality for the rest of your staff or call center, you can lower your total cost of ownership by picking the right plan for each person.

Minimizing Business Risk

Most business owners agree that risk is a scary word. You might take risks on marketing a new product but when it comes to your phone system, taking risks is like driving without insurance. By partnering with NexusTek, we’ll help you reduce your risk by controlling all communications on our platform end-to-end. Your customers’ data stays secure while you stay compliant – making it a “win-win” for your business and your customer!

Grow the Right Way

Growth can be another scary proposition for business owners. From big decision like moving into new markets, opening new offices, or acquiring new businesses, ensuring that your operational standards are maintained across your organization is a requirement.

Let NexusTek worry about setting up your communications system and adhering to regulatory environments. At the end of the day, our service is more than just phone coverage. NexusTek can help you comply with local telecommunications rules, set up your offices with local numbers and provide an interface that your employees’ can feel comfortable with using from the start.

When choosing a Unified Communications partner, it’s critical to dive into the technology, business relationships, and support capabilities of each provider you consider. NexusTek listens to your own specific communications needs to ensure your new phone system exceeds your expectations. Contact us about NexusTek’s Unified Communications program to learn more.

Could You Do More to Prevent Cyber Attacks?


Could You Do More to Prevent Cyber Attacks?

Could You Do More to Prevent Cyber Attacks?

Let’s face it, just about every organization could do more to thwart the cyber threats in today’s digital age. If you’re not sure where to start, we’ve got the best tool for you.

NexusTek’s FREE Cyber Security Self-Assessment can help you stay ahead of cybercrime by identifying vulnerabilities before you get hit.

As 2018’s Microsoft Partner of the Year for Project Management & Modern Workplace, NexusTek has been given a unique opportunity to offer your business this Cyber Security Self-Assessment.  This quick survey covers more than 20 security points in four key cyber security categories. The purpose of this self-assessment is to pinpoint your cyber security strengths and weaknesses, and provide a complete Cyber Security Health Check Report containing useful tips and recommendations in the following cyber security categories.

  • Prevent/Identify a Compromise – Help prevent against a compromise within your environment while uncovering potential breaches
  • Secure Apps and Data – Boost productivity with cloud access while keeping your information protected
  • Expand Device Controls – Deliver enhanced security across both company and personal devices
  • Safeguard your Infrastructure – Enforce policies that help keep cloud resources and hybrid environments safe

The self-assessment takes 5-10 minutes to complete. Once you submit your completed assessment, you will receive a custom report containing your cyber security scores and an expert’s recommendations covering security check points across identity, apps and data, devices and infrastructure. In addition, you will have the opportunity to schedule a FREE Cyber Security Consultation with one of NexusTek’s security experts. Start 2019 off right by ensuring your business is protected against cyber attacks.

Take your self-assessment here: https://www.nexustek.com/Cybersecurity-Self-Assessment

Collection No. 1 – Has Anyone Not Been Pwned?


Collection No. 1 – Has Anyone Not Been Pwned?

Collection No. 1 – Has Anyone Not Been Pwned?

There are approximately 7 billion humans on Planet Earth. Recently, over ten percent of them – 773 million of them, to be exact – now have their sensitive personal information released into public record. This is courtesy of what’s known as Collection No. 1, one of the largest collections of unique email addresses and passwords ever to be released.

Importantly, Collection No. 1 is not the result of a single data breach. Rather, it is a farrago – multiple separate and previously unheard-of data breaches accumulated into a single mass and released for public consumption.

Data breaches at this scale are illustrative. Not only do they show us how many people constantly reuse weak and insecure passwords across the internet, they also show us something about how data – emails, passwords, phone numbers, and so on – are used once it has been stolen. Here’s what the Collection No. 1 breach tells us about information security.

How to Use Stolen Data

Most stolen data isn’t immediately useable. Even if a hacker successfully steals a list of email, username, and password combinations, they’ll usually find that the password is protected by something called a hash. A hash is a one-way cryptographic algorithm that renders passwords into a protected format. Most applications never store plain-text passwords – only the hash is stored. When you put your password into a login form, it gets hashed and then checked against the stored hash for verification.

Hashes are not unbreakable, and hackers are creative. If you have a weak password, hackers can find it through something called a rainbow table attack or a dictionary attack, in which they take an example list of weak passwords, hash them, and then check a stolen database for matching hashes.

Alternatively, hackers may find that they’ve stolen a list from a company that does not adhere to good password management practices. For example, they might be using depreciated hashes – hashes that are widely solved and easy to decrypt. A lot of companies still use the MD5 hash, even though it’s been known to be insecure since 2005.

Even though there are methods, de-hashing stolen data takes a ton of work – which is what makes the Collection No. 1 breach so notable. Each one of the millions of passwords that were released as part of Collection No. 1 have been de-hashed. That means that they are immediately available for hackers to use – and most likely, they’ve already tried to use them.

The Lifecycle of Stolen Data

Data that’s stolen from companies and organizations doesn’t often get used right away. For example, criminals that steal data directly often don’t have any interest in or ability to de-hash it. That means that this data gets immediately sold. The buyer will then attempt to de-hash this data, and it takes time – stubborn hashes can take months or even years to decrypt.

Once the hashes have been decrypted, the hackers will attempt to use the resulting credentials – they’ll try to unlock bank accounts and steal money, or potentially use admin credentials to break into corporate networks and steal more information. Not all credentials will be easy to use – they might not be closely associated with either companies or bank accounts – and not all of them will still be valid by the time they’ve been decrypted.

Huge data dumps like Collection No. 1 are the end result of this process. This is the data that has either already been mined for immediate usefulness or can’t easily be mined for immediate profit.  The only thing that’s left for attackers to do is use it for what’s known as credential-stuffing attacks: taking huge lists of various usernames and passwords and then running them through various services in the hope of finding a useful combination.

Expect to see a lot of credential-stuffing attacks using the data from Collection No. 1 (and subsequent collections) in the coming weeks and months.

Protect Your Business with Help from NexusTek

Data breaches like Collection No. 1 highlight the need for companies to create secure password management strategies and protect their businesses from account hijacking. NexusTek can help with both. Our security experts will consult with companies in order to develop password protection schemes that use state-of-the-art cryptographic algorithms to protect user data. In addition, we offer monitoring solutions that can detect and mitigate the influx of login attempts that would accompany a credential stuffing attack.

Information security hinges on protecting user data and mitigating intrusion attempts – and NexusTek specializes in both. For more information on how to work with us, contact NexusTek today.

The Security Risks of Employee Online Shopping


The Security Risks of Employee Online Shopping

The Security Risks of Employee Online Shopping

The holiday season has come and gone. While I’m sure you hoped your employees closed out the year on a high note, the reality is that they were probably a bit preoccupied with all the shopping they had to do. Throughout December 2018, analysts expected $65.5 billion worth of online transactions.

In a perfect world, you’d expect your employees to keep all of this online shopping to their personal time (outside of the office). However, more than half of employees say they’ll spend work hours shopping online during the holiday season. Amazon validated this assertion when, on the day after Christmas, it announced that 2018 was a record-breaking holiday season for the eCommerce giant.

And that’s only the holiday season. Easy access to online shopping exists year-round and as such, is a never-ending security risk for your business.

Be honest – you didn’t love every single gift you received. According to research from WalletHub, 34 percent of Americans plan to return a gift this year. For business owners, this shows the need for constant diligence to defend against cyber attacks.

While it’s important to limit risky employee behavior, the best way to secure your business is to maintain real-time visibility of your network.

Social Engineering and the Risks of Online Shopping at Work

Even if you have strict policies to block non-work-related websites on your office network, employees still find ways to visit social media profiles and eCommerce sites.

But the security risks don’t come from eCommerce sites exclusively. Sites like Amazon, Walmart, and other popular eCommerce websites won’t inject malware into your network just from employees shopping on them.

The real security risks lie in social engineering threats. Attackers know that the majority of data breaches are caused by human error. One carefully-crafted email can lure employees into opening malware-laden attachments or clicking malicious links that compromise your network.

These kinds of threats are tied directly to online shopping in the workplace. When employees shop online through your network, they’ll often log into their personal email accounts to access coupons and special deals.

One misclick as they sift through large volumes of personal emails can release a virus, ransomware, or other type of foothold in your business network. According to Rob Otten and Michael Allen at Security InfoWatch:

“Unlike corporate email, which often blocks suspicious links and attachments, personal email cannot be easily filtered for malicious content by the enterprise. Webmail content is typically delivered over end-to-end encrypted communications, such as HTTPS, allowing attachments received via personal accounts to completely bypass the organization’s content filters.”

One of the best ways to combat these online shopping threats in the workplace is to create a culture of security. When you’re continuously training employees and building awareness of potential phishing threats, you can harden the front lines of your business network without any new technology.

But awareness training can only get you so far. You can’t eliminate human error and employees will keep finding ways to shop online during work hours. To fill the gaps, you need total network visibility and real-time monitoring.

Keep Your Network Secure 24/7/365

Whether you’re up against increased online shopping for the holiday season or you need to curb the ongoing vulnerabilities throughout the year, you can’t take a set-it-and-forget-it approach to security. Simply deploying a firewall and anti-virus software won’t get the job done.

To shore up vulnerabilities related to human error, online shopping, and other risky employee behaviors, you need:

• Real-Time Monitoring: Attackers can spend days or even weeks within your network if you don’t have the proper monitoring tools and practices. Any amount of disruption can have costly repercussions, so you need real-time insights into traffic anomalies and potential threats.

• Security Operations Center (SOC): Your network is constantly evolving, and it takes a full-time team to analyze the organization’s security posture. With a SOC, you have a dedicated set of security pros who are ready to plug any holes in your network security.

• Penetration Testing and Vulnerability Assessment: Network security is no longer just about reacting to threats. You have to proactively address vulnerabilities and spot weak points that attackers could target.

These are just a few of the keys to network security that can offset the risks of employee online shopping. But for many businesses, it’s too costly and complicated to bring them all in-house.

If you want a managed security provider that can partner with you for all your network protection needs, contact us today and find out how we can help.

3 Strategic Goals for your Cloud Migration


3 Strategic Goals for your Cloud Migration

3 Strategic Goals for your Cloud Migration

Begin with the end in mind.
What will your organization gain by a Cloud Migration project?

Top CIO’s suggest keeping your end goals in mind as you work with your managed IT services provider on a cloud strategy. This will ensure positive outcomes for your Cloud Migration project.

Here are the top achievable business goals using a solid Cloud Strategy:

  • Modernize for competitive advantage

Scenario: Your competition is adopting new cloud technologies that you cannot implement because your technology has not been upgraded.Let’s put aside the fact that your outdated equipment is an easy target for cyber threats (click here to learn more about Cyber Security Services), and let’s discuss your infrastructure that has servers and devices not adaptable for new technology. The latest applications that can help you do your business better, faster and with business intelligence/visibility will require an upgrade. Yes, that means some investment.

We get it…it takes so much time and energy to run your business that the cloud strategy discussion you’ve been meaning to have has been shelved repeatedly.  At the same time, these new tools and technologies are out there and your competition, including new businesses entering your industry, are using those tools to take business from you.

  • Scalability – Pay for What You Use

Cloud computing sets the stage for changes in your business technology needs that would otherwise be a financial drain.  Scalability of a business using cloud services is one of the most attractive aspects of the technology. Many have analyzed and written about the cost-benefit in the short term of a cloud migration today, for those companies wasting revenue due to a lack of agility, efficiency and resources.

A prime example would be that Company A needs to easily upscale or downscale their IT requirements to allow for incremental changes that are a factor of their business model or industry.  Where changes in Company A’s business needs (data storage, workloads, etc…) would mean unpredictable spending, cloud technology is a “pay for only what you use” scenario.

  • Access and Security of Multiple Locations

Considered the ultimate business collaboration tool, cloud computing is the answer to centralized systems and applications.  This is not only one of the biggest advantages for efficiently running a growing business but the value of cloud to secure data, networks and devices begins and ends with centralized control over operations in multiple locations.

Many companies are making the decision to migrate to the cloud, either fully or using a multi-phased approach, after having a security breach due to expansion that was poorly planned. This means as the company grew, no central control or hierarchy in policies and procedure were a priority. A perfect scenario for today’s Ransomware threats.

There is so much more to Cloud Strategy and Cloud Technology for business.  Stay tuned for future stories about cloud migration, trends in Cloud Services and NexusTek’s Adaptable Cloud Solutions.

As an MSP and Cloud Service Provider for more than 20 years, NexusTek continues to provide a solid domestic IT outsource for small and midsized businesses across the county. A cloud migration today, with a partner who knows how to build the best strategy for your business, can be the best decision for your future success.

2018 IT Spending Trends Predicted by Gartner and IDC


2018 IT Spending Trends Predicted by Gartner and IDC

2018 IT Spending Trends Predicted by Gartner and IDC

Information Technology is no longer simply an added function of a business, it is now a major driving force in achieving greatness. Statistics show that the most successful businesses have the ability to adapt to new technology. In conjunction with this trend, businesses are increasingly realizing their need to utilize an IT partner to keep up with the IT growth within their organizations.

In April of this year, Gartner reports Global IT Spending in 2018 will experience the highest increase at 6.2% up from 3.8% in 2017.

John-David Lovelock, research vice president at Gartner said, “This is the highest annual growth rate that Gartner has forecast since 2007 and would be a sign of a new cycle of IT growth.”

Let’s break down the IT spending forecast this year from top technology research firm, Gartner:

  • 2017 spending on IT Services = $933 billion
  • 2018 spending on IT Services will hit a record $985 billion and continue to rise.
  • 2019 spending on IT Services should reach $1.03 trillion  according to research firm predictions.
  • Device Spending in 2018 is estimated to reach $704 billion with a leveling-off expected for 2019.
  • IT Growth Trends for 2018 reported by Gartner show the largest percentage growth will be in Enterprise Software purchasing at 9.5 percent up slightly from 8.9 percent in 2017.
  • IT Services reaches 5.5 percent growth from 4.3 percent in 2017.
  • Data Center spending drops nearly 4 percent in 2018 according to researchers.

In addition to Gartner’s IT Spending Trends report, International Data Corporation (IDC) conducts a similar semi-annual study. The 2018 IDC report focuses on “Global IT Spending for the SMB,” predicting small and mid-sized businesses will spend a collective $602 billion on IT software and services.

SMB IT spending defined by company size:

  • More than two thirds of the $602 billion in IT spending globally, will be driven by firms with 100-999 employees through 2021.
  • Within the mid-market segment, medium-sized businesses (100-499 employees) will spend $229 billion in 2018.
  • Large businesses (500-999 employees) will spend $182 billion.
  • Small businesses with fewer than 100 employees will see IT spending growth of 4.7 percent over the five-year forecast period.

The U.S. leads in SMB spending on IT in 2018. Here’s a snippet of the global IT spending for the SMB:

  • The United States is the largest market for SMB spending with this year hitting a record $186 billion on IT, according to the IDC report.
  • China comes in well below the U.S. for IT spending at $56 billion
  • Germany IT spending for SMB’s reaching $37 billion
  • The U.K. IT spending for SMB’s is projected to be slightly under Germany at $36 billion.

Statistics from the IDC report broken down even more:

  • IT spending in the SMB market is expected to expand by $84 billion dollars over the next 5 years.
  • Of the $602 billion in IT spending globally, $115 billion this year alone will be on devices (PCs, mobile phones and peripherals)
  • The second largest spend will be on software applications at $99 billion this year.

Spending on IT products and services by the SMB is at an all-time high and for good reason. The value that information technology presents to businesses of all sizes cannot be debated when considering the trends of the last decade. Budgeting for technology upgrades and developing a plan for technology investment for the future of your business used to be an afterthought. In the age of digital transformation, budgeting for technology is now the main conversation.


The 4 Pillars of Virtualization Technology


The 4 Pillars of Virtualization Technology

The 4 Pillars of Virtualization Technology

Virtualization technology has been a standard of practice in the IT industry for nearly two decades, but has evolved since it’s general inception. Virtualization is the creation of a virtual, software-based version of networks, servers, applications, storage, operating systems, etc… As virtualization advances, this list continues to expand.

Traditionally an enterprise play, virtualization is now considered the most effective way to reduce IT expense, boost efficiency and agility for small and mid-sized business markets. Simplistically, virtualization will minimize your hardware footprint and optimize your applications that need a dedicated operating system.

Here are a few of the ways virtualization technology continues to raise the bar in providing business benefits.

1. Flexibility of your technology

Virtualization takes multiple systems running independently on dedicated hardware to one connected software-based environment. “Virtual machines” operate in a single physical environment while running the same applications but with more flexible capabilities. This also creates the ability to expand and share resources depending on the workload within that physical environment. The virtual environment provides agility that can also significantly decrease the time it takes your IT team to deploy changes to the systems.

What does this mean for your business? As we know, time is money, and having your critical software immediately accessible and running more efficiently can dramatically affect the year-end bottom line.

2. Network virtualization

Network virtualization is a way to optimize your network for speed, flexibility and scalability. It increases security and reliability through combining resources in a shared network – parsing bandwidth, each with the ability to be assigned (and reassigned) to devices and servers and giving all users access to all resources.

What does this mean for your business? By creating an environment that is responsive to change in real-time, administrator tasks become more automated and the system can effectively handle unforeseen surges in usage without productivity issues.

3. Server virtualization and hardware consolidation

Inserting multiple virtual instances of servers into one physical server can increase efficiencies by utilizing capacity and minimizing your hardware footprint. In the world of computing, for a business that manages 20 servers, incurred costs are related to energy consumption for cooling, space to house the servers and equipment necessary to fully operate the hardware and IT support for monitoring and maintenance.

What does this mean for your business? Scaling down the number of physical servers running the same applications and operating systems will produce a dramatic reduction in long term IT hardware costs.

4. Isolating applications

Isolating applications is a way to solve issues of application incompatibility. You may have experienced this when trying to run two versions of an application at the same time on the same device. Through virtualization, each operating environment will have its own registry entries, code libraries, etc. So, application incompatibilities are a thing of the past within the virtual environment.

What does this mean for your business? Isolated environment capabilities can mitigate the risk of failures and corruption in one environment affecting other applications or data. For some, this is the primary reason for virtualization.

NexusTek’s expert staff has years of experience migrating, implementing and maintaining virtual environments.  If this is the year you are looking to widen your profit margin by tighten up any technology gaps with a virtualization project, NexusTek can help.

Connect with NexusTek today to strategize on your current and future technology objectives.

Cost Comparison: IT Staff vs Domestic IT Outsourcing


Cost Comparison: IT Staff vs Domestic IT Outsourcing

Cost Comparison: IT Staff vs Domestic IT Outsourcing

Providing for your business needs takes planning and consistent evaluation. Evaluating and re-evaluating IT budgets is a frequent conversation we have with our clients and we have become well-versed with what type of IT budget planning will work for specific business types. Technology is the foundation of your business and the return on investment (ROI) of your technology – like hardware, software, IT Projects, IT Consulting, business services and yes, human resources – is regularly at the mercy of the market. Here is what you must ask yourself as an SMB in today’s environment of advanced Cloud Technology and XaaS (everything as a service):

What’s the ROI on your technology resources? How does one begin to measure the return on an investment in technology for business where factors like IT Help Desk support, Server maintenance, IT security, expertise, and availability are concerned? Does your staff have access to the knowledge in order to access all the factors available to make the most informed decision?

To help make the determination of ROI, we put together the top considerations when making the decision to either hire an in-house IT Professional or partner with a Managed Services Provider.

Let’s start with the cost/benefit consideration on both sides. Company parameters: 50 employees, 3 locations within the US, 50 workstations, 1TB of critical data, 2 physical servers and basic software needs. 

What your basic business technology needs include:

  • IT support – onsite or remote
  • Server maintenance/management – workstation protection, server monitoring and alerting, firewall management (updates and backups), managed backup and disaster recovery
  • Managed Cloud Services – fully-hosted managed solution and hosted exchange
  • Managed Cloud Backup – fully-hosted backup solution, monitored for data integrity
  • IT Consulting – providing strategic IT management, coordination of IT vendors, technology to support future growth projections and quarterly business reports (QBR’s) 

Cost considerations of in-house IT Professional:

  • Base Salary
  • Benefits (vacation/PTO/holidays/medical)
  • Knowledge gap
  • Downtime potential
  • 4% admin cost
  • 25% turnover rate
  • 20% unproductive rate

Here is a detailed assessment of ALL cost considerations of hiring IT staff – Download Our IT Employee Cost Calculator 

Cost considerations of outsourced IT (Denver market)

  • Monthly rate – Fully managed IT service and support
  • IT projects and IT consulting

Bottom-Line – Benefits of IT Outsourcing

  • 24/7/365 IT support
  • Teams of Highly-specialized IT professionals (certified)
  • No vacation days/sick or PTO days or medical benefit costs
  • Experts in upgrading Technology when applicable (IT Consulting Experts)
  • Human redundancy with multiple team members 

Bottom-Line – Benefits of hiring an in-house IT Professional

  • Human Resources control over IT staff

Last year we interviewed Mike Jenner, CEO of NexusTek, on hiring IT. As a veteran in the IT and Telecommunications space for more than 30 years, he was candid about the current environment of our industry and the factors businesses must take into consideration when deciding between in-house and outsourced information technology resources. View the article here: Interview with CEO, Mike Jenner on the Real Cost of Hiring an IT Person.

If you are interested in having a conversation with NexusTek on your IT project or Managed IT Services needs, don’t hesitate to contact us.