Last week, Sage Software announced that Net at Work received the 2011 Top Five Award designated for Sage Software’s five elite and most successful partners.
In addition to the top 5 level of distinction, Net at Work was also awarded Sage Chairman’s Club and President’s Circle status, two annual Sage Software programs recognizing the top-producing business partners.
Related Posts
ERP
23 Jul 2020
How Your Company Can Tame the Tail Spend Beast
What Is Tail Spend?
Is your company familiar with the concept of tail spend? Even if you’re not familiar with it, you have it. Simply put, “tail spend” refers to approximately 20% of non-core procurement transactions that are largely left unmanaged, usually due to a high volume of suppliers and limited in-house resources. The best way to illustrate tail spend is through the Pareto Principle, wherein 80% of an organization’s spend is strategically managed with 20% of the suppliers. This 80% spend typically includes the cost of goods, tooling, and other capital expenditures, insurance, occupancy, and utilities.
Conversely, 20% of the spend, or “tail spend,” is with 80% of the suppliers. Included in this 20% segment are thousands of operating consumables SKU’s (MRO, PPE, packaging, shipping and warehouse supplies, janitorial and sanitation supplies, industrial gases), logistics by multiple modes, telecom circuits and services, and other services such as waste, uniforms and payroll processing. Consider, too, that the cost of processing and paying invoices for these purchases often exceeds the value of the goods or services received. This spend segment is not only challenging to manage effectively but also to realize industry-best pricing with suppliers that most closely align with your requirements.
For example, a recent manufacturing client with $56M in spend revealed the following:
This $9.4M tail spend is comprised of MRO, packaging, insurance, information technology, logistics, telecom, uniform and waste services, office supplies, marketing, education, regulatory, etc.
Savings of 10-40% or more are typically available in certain expense categories. These potential savings are often overlooked due to a low expectation of return, lack of visibility and internal resources, and benchmark data. Executives and procurement leaders must change the way they look at tail spend. Executives might reason that tail spend is too costly to manage from a process point of view, but that’s the reason they should not ignore it, as it’s too costly from a business point of view.
Read the full whitepaper from our partner Expense Reduction Analysts or contact us for more information.
Read more
CRM
23 Feb 2023
Microsoft Dynamics CRM Tip: How to Quickly Edit Multiple Records at Once
In this video our Microsoft Dynamics CRM expert will walk you through how to edit multiple records at once by selecting them and clicking the edit button. This only allows you to edit a maximum of 250 records at a time.
Contact Us if you have any questions or would like more information about Microsoft CRM features and enhancements.
.embed-container { position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden; max-width: 100%; } .embed-container iframe, .embed-container object, .embed-container embed { position: absolute; top: 0; left: 0; width: 100%; height: 100%; }
Read more
IT / Infrastructure
11 Oct 2021
Four Lessons Learned About Cyber Security and the Remote Workforce
There’s been no single more significant shift in the workforce than that caused by the Coronavirus pandemic in 2020. Almost overnight, millions of workers left the office to continue their workplace efforts from their dining room tables. While technologies made this massive shift possible, those same technologies revealed security lapses in companies’ IT infrastructures, exposing them to ransomware attacks, data loss, and business continuity risks.
What lessons have we learned about cyber security and the remote workforce? Here are four that resonate with our expert team.
1. Do your homework on at-home work
Does your company have a network and remote work security plan and policies? If you didn’t have one in place prior to your workforce leaving the office, it’s still not too late to create one and act on it.
Network security policies provide a roadmap for how you plan to secure and protect your organization’s IT infrastructure. The first step in creating a network security plan is to perform a risk analysis. We recommend you engage a Managed Security Services Provider (MSSP), like Net at Work, experienced in the task to help complete the analysis. An MSSP has access to vulnerability testing tools that most companies do not. The actual network security policy is a written document that defines your security guidelines and practices. Make this a living document that is updated frequently.
2. Start at the end
Advanced endpoint protection (AEP) platforms are the first step in the cybersecurity battle and are critical for companies with a remote or mobile workforce. As the name implies, these applications are designed to protect endpoints, which are any devices (servers, desktops, laptops, tablets, phones, and smart watches), that have access to your network resources. A remote workforce may have doubled or even tripled the number of endpoints accessing your network — increasing the risk exponentially.
Think of advanced endpoint protection as antivirus software all grown up and ready for the 21st century. Where antivirus software protects an individual device, endpoint protection platforms protect the entire technology infrastructure from attacks directed to an endpoint. Where antivirus is only as good as its last update, advance endpoint protection continually monitors network traffic. By relying on machine learning and artificial intelligence, advance endpoint protection platforms get better and faster at identifying threats over time.
3. Beware of the shadows
You’ve likely heard the term “shadow IT” to refer to employees accessing services and applications outside of corporate IT. This practice is sure to be more prevalent as employees work from home and may even be using their own computers to access the corporate network. The danger with shadow IT is that the applications may contain vulnerabilities that are exploitable by cybercriminals.
Managing shadow IT involves educating your workforce about the dangers, as most aren’t bad actors, they are simply defaulting to routine, at-home behaviors. Uncover what apps employees are using and make recommendations for approved apps with similar functionality. You should also consider full-time network monitoring and auditing services provided by an MSSP to find the current assets, spot anomalies, and respond to threats quickly and effectively. In addition, vulnerability scanning tools can find unauthorized usage and related threats that may seem innocuous or that are undetectable with traditional network monitoring solutions.
4. Take a comprehensive approach
For remote workforces to function efficiently, they need technology that gives them easy access to necessary resources. Making this possible, safely and securely, requires a comprehensive, concerted effort that combines people, processes, and technology.
Security features, such as multi-factor authentication (MFA) and proactive endpoint management and maintenance, gain new importance as companies determine how to protect their companies and employees while they are working remotely. Network monitoring applications also have a place in your security plan, as do firewalls, email security solutions, data loss prevention tools, and a robust backup and disaster recovery plan that is fully documented and tested frequently. Combine these tools with employee security awareness training and a strategic, proactive approach to managing your technology for the most comprehensive approach.
It’s impossible to create a network that is 100% secure 100% of the time. But with some expert guidance, a robust toolset, and continuing employee education, you can create a remote work environment that will stay out in front of threats and keep the dangers at bay. Learn more about how to protect your organization by connecting with one of the information and cyber security specialists on Net at Work’s Managed Services team.
Read more
0 Comments