Small and medium-sized businesses are facing unprecedented challenges amid the COVID-19 pandemic. And for those with newly remote workforces, effective teamwork can be one of the biggest issues. After all, how do you work together if you can’t be together in the same location? How do you collaborate from afar when you’re accustomed to in-person meetings and group-level planning sessions? How do you communicate quickly and effectively when face-to-face conversations are no longer possible? Microsoft’s answer is Teams.
Teams is Microsoft’s communication and collaboration hub within Office 365. It’s an integrated software solution that allows people to chat, collaborate, and meet – virtually – whenever they like, from wherever they are.
For the past three years, Microsoft Teams has empowered SMBs locally and globally. Today, more than 40 million people are active on Teams every day, using the secure platform (web and mobile) to carry out essential business tasks and to maintain contact with remote workers, colleagues, managers, customers, and service partners.
Microsoft favourites like Word, Excel, and PowerPoint are built into Teams to create a comprehensive shared workspace where it’s as easy to share files as it is to share ideas. Powerful communication tools are integrated as well, to enable one-on-one conversations, group discussions, and online meetings. With Teams, remote workers can:
Microsoft has made the free version of Teams available to everyone in response to the current coronavirus crisis. There’s also a way to explore the benefits of premium Teams even if you don’t have Office 365.
Free Teams. The no-cost version of Teams gives you unlimited chat, built-in group, one-on-one audio or video calling, 10 GB of team file storage, and 2 GB of personal file storage per user. Explore the differences between free and paid plans here.
Teams via the Office 365 E1 Trial. In early March 2020, Microsoft announced a free six-month Office 365 E1 Trial, including Teams, because of the increased need for people to work from home during the COVID-19 pandemic. Contact us to learn more about this special offer.
Teams via your existing Office 365 licence. Microsoft Teams is part of Office 365. If your organisation is correctly licensed for Office 365, then you already have access to Teams. Talk to your IT staff (or your BUI account manager) about activating Teams if you haven’t already done so. And share the in-depth resources below to help your people maximise Microsoft Teams while they’re working remotely during South Africa’s national lockdown.
This scanning electron microscope image shows the new coronavirus (orange) among human cells (blue, pink and purple). Colour has been added to the scan to better show the virus and its environment. Photo: Courtesy of the National Institute of Allergy and Infectious Diseases
With seven confirmed cases of the coronavirus in South Africa, there’s rising concern about the business impact of a health crisis we may not be fully prepared to deal with. There’s an abundance of information – and misinformation – on the web and social media, and some of the news headlines are downright scary. And while we hope our leaders can work together to address the particular challenges of COVID-19, it’s prudent to prepare for a business scenario where remote work is necessary.
If you’ve been watching the news, then you know that several corporate giants have already shuttered their offices. Some companies are encouraging remote work – and others are actually insisting upon it. Much-anticipated gatherings like SXSW, Facebook’s F8, and the Google I/O Conference have been cancelled. And other technology conferences – including the Microsoft MVP Global Summit, the Adobe Summit, and IBM Think – have been converted to online-only events.
Today, whether by choice or necessity, you’re likely exploring ways to keep your teams connected and productive, wherever they are. Now is the time to capitalise on the assets you already have, and to consider those you may need in the future.
WINDOWS 10 | Microsoft’s operating system for PCs, laptops, tablets, smartphones, and IoT devices provides antivirus, firewall, and ransomware protections, plus the universal apps that enable everyday efficiency.
OFFICE 365 | Microsoft’s productivity suite puts popular tools like Word, Excel, PowerPoint, OneNote, Skype, and cloud-based email within easy reach, so that collaboration can continue no matter the circumstances.
SHAREPOINT ONLINE | Microsoft’s centralised, secure space for file-sharing harnesses the power of the cloud to make it easier for every team member to store, share, and manage digital information – on any device, from any location.
TEAMS | Microsoft’s hub for teamwork in Office 365 allows seamless, real-time communication between individuals and groups through chats, calls, online meetings, and video conferences.
Microsoft has already responded to the increased need for people to work from home. They’re offering a six-month Office 365 E1 trial to eligible customers. The free version of Teams is already open to everyone. Other technology companies have also made resources available to foster collaboration and communication during remote-working periods.
Coronaviruses are a large family of viruses which may cause illness in animals or humans. They take their name from the Latin word “corona”, which means “crown”, and it’s easy to see why when you examine these viruses under magnification: barbs extend from the surface just like the pointed spikes on an ornate crown.
In humans, several coronaviruses are known to cause respiratory infections ranging from the common cold to more serious diseases including Middle East Respiratory Syndrome (MERS) and Severe Acute Respiratory Syndrome (SARS).
The coronavirus dominating the headlines now is a new type of coronavirus. First reported in Wuhan, China, in December 2019, the virus was initially called the “2019 novel coronavirus” or “2019-nCoV”. Since then, the International Committee on Taxonomy of Viruses (ICTV) and the World Health Organization (WHO) have announced formal designations for 2019-nCoV and the disease it causes.
The virus is officially named Severe Acute Respiratory Syndrome Coronavirus 2, abbreviated as SARS-CoV-2. According to the ICTV, this name was chosen because the virus is genetically related to the coronavirus responsible for the SARS outbreak of 2003.
The disease is officially named Coronavirus Disease, abbreviated as COVID-19. The CO refers to corona; the VI refers to virus; and the D refers to disease. The -19 refers to the year (2019) in which the first confirmed case of the disease was reported.
Several organisations (including the WHO) have chosen not to use the official name of the virus (SARS-CoV-2) in their content collateral. “From a risk communications perspective, using the name SARS can have unintended consequences in terms of creating unnecessary fear for some populations, especially in Asia, which was worst affected by the SARS outbreak in 2003,” said the WHO in a statement, explaining its decision to refer to SARS-CoV-2 simply as “the virus responsible for COVID-19”.
At the time of publication, there were seven confirmed cases of the new coronavirus in South Africa: six in KwaZulu-Natal and one in Gauteng. All seven patients had recently visited Italy as part of the same tour group, according to a news report.
South Africans in other parts of the world have also been affected. A 39-year-old SA teacher working in Daegu, South Korea, was quarantined after testing positive for the virus. Two South African crew members working aboard a Japanese cruise ship were treated in hospital after contracting the virus. And more than 180 SA citizens are waiting to be repatriated from China’s coronavirus-hit Wuhan region.
Learn more about the coronavirus responsible for COVID-19 and stay up to date with global developments by checking out these resources:
The World Health Organization coronavirus channel is updated daily with the latest guidance from international health experts.
The US Centers for Disease Control and Prevention have published detailed answers to the most common questions about COVID-19.
The Johns Hopkins Center for Systems Science and Engineering has an online dashboard that uses real-time data to track the spread of the new coronavirus.
The Johns Hopkins University & Medicine Coronavirus Resource Center provides ongoing analysis of the impact of COVID-19.
Certain South African hospitals have been designated as emergency centres for the isolation and treatment of local coronavirus patients. Here’s the current list.
Thankfully, much of the world hasn’t seen any COVID-19 cases or outbreaks. However, with health officials encouraging an abundance of caution and numerous international travel advisories in place, it’s clear that preparation is our best defence.
Here at BUI, we’re putting plans in place to help our customers find solutions that work for them during this period of uncertainty.
So is your company remote ready? Another resource you might try out is Toptal’s Remote Work Readiness Assessment. Find out how remote ready your organization is with their 3-5 minute assessment.
How many “We’re updating our Privacy Policy” emails did you receive at the beginning of the year? Five? Ten? For many people, the dawn of 2020 was marked by a deluge of inbox messages from some of the biggest technology companies in the world. Why? Because California’s Consumer Privacy Act (CPA) came into effect on 1 January 2020 – and Silicon Valley giants had to comply with the new law in America’s Golden State.
California’s CPA is not the only piece of legislation that deals with data privacy. The European Union’s General Data Protection Regulation (GDPR) and South Africa’s own Protection of Personal Information Act (POPIA) were both designed to ensure that organisations (private, public, governmental and non-governmental) manage sensitive data responsibly.As internet access increases and communities become more connected, there’s a growing need to educate web users about online privacy. Data Privacy Day is a global initiative to create more public awareness about the value of private data: it’s intrinsically valuable to you as an individual, but it’s also commercially valuable to companies and – unfortunately – cybercriminals.
Web-enabled mobile phones, laptops, wearable gadgets, and other smart devices are capable of gathering and sharing substantial information about who you are and what you do… Your name. Your phone number. Email address. Home address. Location history. Search history. Purchase history. If you don’t set boundaries regarding the treatment of your personal data, then there’s a risk it could be used in unwelcome ways.
Data Privacy Day is co-ordinated by the National Cyber Security Alliance, and is observed annually on the 28th of January. This year, BUI is supporting the campaign as a Data Privacy Day Champion organisation to encourage bigger conversations about the importance of being #PrivacyAware. Follow us on LinkedIn, Facebook, and Twitter for handy resources and helpful tips. And take action today with these three simple steps to improve your data privacy…
Enable two-factor authentication (2FA) and multi-factor authentication (MFA) methods whenever possible – especially for critical digital accounts like your online banking profile. Usernames and passwords are no longer enough to safeguard your personal information. One-time PINs, biometric scans, facial recognition, and even voice identification can put extra layers of security between your precious data and the cyber villains who want it.
Review the applications you have installed on your devices – and be ruthless. If you don’t use an app, then uninstall it and delete the associated folders. This will free up storage space, but more importantly, it will get rid of old, outdated, and unmaintained software that could be vulnerable to malware and other threats. Conversely, when you download a new app, read the Ts & Cs from top to bottom and check the permissions and privacy settings so that you can make an informed choice about the use of your private data.
Lock your phone, tablet, and computer screens to protect your data from prying eyes. If you step away to grab a coffee, chat with a friend, or attend a meeting, then you need to prevent unauthorised access to your still-in-use devices. Lock screens are particularly important for smartphones, which are frequently misplaced, forgotten, lost, or stolen. A screen-specific password, PIN, or swipe pattern is one more barrier to help keep your data from being compromised.
Have you heard? Our Cyber Security Operations Center is now open! Take a look inside to see how our security specialists protect and defend critical data 365 days a year…
Microsoft Ignite The Tour Johannesburg takes place from 30-31 January 2020 at the Sandton Convention Centre. Designed to showcase the latest cloud technologies and developer tools, the conference attracts hundreds of delegates eager to engage with experts from Microsoft and its partner organisations.
It’s an exciting time for the South African IT industry, with Microsoft’s local cloud data centres now open, and with the company’s ongoing efforts to empower tech startups and entrepreneurs.
As an award-winning Microsoft Partner and the only South African company to hold the new Microsoft Gold Security Competency, BUI is proud to support Microsoft Ignite The Tour Johannesburg as a Gold Sponsor for the second year in a row.
This conference is a much-anticipated deep-dive experience for IT professionals, but it’s also a premier opportunity for business decision-makers to discover the power and potential of the Microsoft Cloud environment.
You can chat to the BUI team at Booth 202, near Theatre 1 in the main exhibition area, at any time during the event. Our cloud, security, and infrastructure specialists will be available to answer your most pressing questions around cloud migration, data protection, and digital transformation.
Drop by the BUI booth to learn more about our new, 24-hour Cyber Security Operations Center, and to explore a wide range of modern workplace solutions designed to enable secure productivity for your people. If you’re pondering your best path to the cloud, start by having a conversation with us.
Microsoft Ignite The Tour Johannesburg has limited capacity. Submit your application to attend on the official registration page.
Can’t make it? Follow BUI on LinkedIn, Facebook, and Twitter for news and pictures from the conference. We’ll be sharing updates from the Sandton Convention Centre on both days. You can also follow the #MSIgniteTheTour and #MSIgnite hashtags on social media for a real-time stream of content from Microsoft, event sponsors, keynote speakers, presenters, MVPs, and delegates. We look forward to seeing you in Sandton!
EVENT | Microsoft Ignite The Tour Johannesburg
DATES | 30 & 31 January 2020
VENUE | Sandton Convention Centre, 161 Maude Street, Sandton, 2196
WEBSITE | www.microsoft.com/en-za/ignite-the-tour/johannesburg
The service, which is called the BUI Cyber SoC, is a state-of-the-art facility backed by world-class Microsoft security technology, including Azure Sentinel – Microsoft’s cloud-native security information and event management (SIEM) software – to not only manage your Microsoft security landscape but your entire IT infrastructures security landscape. The BUI Cyber SoC is staffed 24 hours a day, seven days a week by certified consultants.
As the first local company to hold the prestigious Microsoft Gold Security Competency, BUI is the leader in security innovation.
“The combination of cutting-edge technology, industry-leading skills, and award-winning service is what makes our Cyber SoC so distinctive,” says BUI Security Manager Hilton Ashford. “It’s a cyber security resource unlike any other in South Africa. We aim to provide a comprehensive, compelling solution for organisations for their digital security.
“There’s a new headline about cyber crime almost every day,” continues Ashford. “And as the threats evolve, so too must our responses. Effective cybersecurity is not a one-time operation: safeguarding sensitive data requires constant vigilance, and not some software you buy.”
The BUI Cyber SoC uses multiple data sources (on-premises or in any cloud) to continuously monitor business environments. Its “tech-agnostic” system integrates with existing applications and products, including other security products and platforms as well as custom enterprise tools to provide a robust security overview for your unique security landscape.
With cloud-powered data collection and processing, threats are detected, analysed and managed in near real-time, while machine learning minimises false positives. Businesses have full visibility across the security landscape (with situational awareness of applications, devices, servers and users) on a continuous basis. The BUI Cyber SoC is billed based on each client’s usage, lowering the barrier to entry and overall costs and allowing for virtually unlimited capacity.
Have you noticed how many public places offer free Wi-Fi to help you stay connected while on the move? How many times have you taken advantage of the complimentary Internet access at your favourite restaurant or shopping mall? It’s tempting to use resources that don’t dent your pocket, but you could pay a high price if you’re not savvy about personal security and the protection of your web-enabled devices… Because open wireless networks and public hotspots are not secure – and cyber crooks are always on the lookout for chances to exploit vulnerabilities. Here are three of their most common tricks…
Picture this… You’re inside Cuppa Joe’s coffee shop at the airport. You’re waiting for your to-go cappuccino before you head down to departures. You decide to use the free Wi-Fi to check the weather in your destination city. You turn on your phone’s Wi-Fi and see a list of available networks, including Cuppa_Joes, CuppaJoe, CuppaJoePublic, and CuppaJo. How do you know which Wi-Fi is the shop’s legitimate network for customers?
It’s easy for cyber villains to set up a fake Wi-Fi hotspot that mimics the local network in a specific area. And if you’re distracted, tired, or in a hurry, you might not be as alert as you normally are. One simple mistake on your part might be all a hacker needs to access your device.
Picture this… You’re standing in line at the reception desk of your hotel. You’re connected to the public Wi-Fi in the lobby and you’re typing in your Facebook username and password so you can post a quick update for your family back home. There’s a stranger in line behind you, standing close enough to see your device screen. You’re not really paying attention to their movements, but they’re watching yours like a hawk. And they’ve just seen your login credentials.
What could they do with that information? They could access your Facebook account and see the personal information you’ve listed on your profile. Information like your full name, birthday, email address, phone number, and place of work. Private material like photos of your family or your home. Sensitive details like your location-based check-ins, your friend lists, your comment history, and your group affiliations. This kind of data is a goldmine for identity thieves and fraudsters.
Picture this… You’re relaxing by the hotel pool, sharing the free Wi-Fi with dozens of other sunbathers who are also busy on their laptops, tablets, or smartphones. How much do you know about your fellow pool patrons? How much do you know about their cyber security habits, or the health of their devices? Do they have the latest anti-virus software installed on their mobile? Do they use a VPN on their laptop? Do they carry out security updates on their tablets?
When you’re connected to the public Wi-Fi, you’re sharing an open network with strangers. And that’s risky behaviour, because it only takes one compromised device to put all the other connected devices in harm’s way. Malicious infections can spread from machine to machine in seconds, and that’s something the cyber villains count on.
Stop and think before you connect!
Have you heard? October is National Cyber Security Awareness Month – a collaborative global campaign involving governments, educational institutions, agencies, and companies like ours to ensure that people are empowered to be #CyberAware in their daily lives. BUI is proud to be a 2019 NCSAM Champion organisation! Follow along on Facebook, LinkedIn, or Twitter for more tips and resources to help you #BeCyberSmart this month and every month!
There are more than four billion Internet users around the world today – and they’re spending a lot of time on social media. Content is viewed, shared, and downloaded on a massive scale. Every 60 seconds, 347 222 people are scrolling through Instagram; 87 500 people are tweeting; and 1 million people are logging in on Facebook.
Social media can be a great way to keep in touch with family and friends – but it can be risky, too. Especially when people start sharing personal information about themselves, their loved ones, or their friends. Both cybercriminals and real-world fraudsters could use such sensitive data for any number of schemes, including identity fraud, mobile scams, or phishing attacks. When it comes to posting on social media, privacy is paramount. Take these precautions, and take control of your social profiles.
It’s all too easy to skip through the Terms & Conditions, the Disclaimers, the Privacy Policies, and the User Agreements when you’re setting up a new social profile. This kind of documentation is often lengthy and complicated, but it’s important to know your rights, and the rights of the service provider, from day one. Don’t just tick the boxes and move on: understand what permissions you’re granting to the social network concerned and how your account data is going to be used and managed.
Many social networks allow you to restrict content access to certain groups of people. Facebook, for example, lets you customise the privacy of each post, so you can opt to share it with the Public, with Friends, or with Specific Friends (selected individuals). This is a useful feature for controlling the visibility of your words and pictures. Check the settings of your social profiles to see the enhanced privacy options available – and then take advantage of them.
We’ve included links to the relevant information pages from the most popular channels, in the list below. Bookmark them for future reference, or take a few moments now to learn more about the privacy controls on your favourite social site.
It’s tempting to share the daily details of your life on social media, especially when you’re enjoying a holiday or celebrating an event. But stop and think about how such information could be used by other people. A photo of your new big-screen TV, for example, might seem harmless. But what if you’ve listed your residential address in your public biography? A real-world villain could use that geographic data to locate your house, monitor the property, and then pick a suitable time to break in and steal your new TV! Don’t make your personal data public. Sensitive information – like your full name, date of birth, residential address, email address, and mobile number – is valuable to you. It’s valuable to scammers as well. Protect your privacy by being discreet on social media.
Have you heard? October is National Cybersecurity Awareness Month – a collaborative global campaign involving governments, educational institutions, agencies, and companies like ours to ensure that people are empowered to be #CyberAware in their daily lives. BUI is proud to be a 2019 NCSAM Champion organisation! Follow along on Facebook, LinkedIn, or Twitter for more tips and resources to help you #BeCyberSmart this month and every month!
National Cybersecurity Awareness Month (NCSAM) is held annually in October to promote online security and privacy.
Jointly led by the National Cyber Security Alliance and the Cybersecurity & Infrastructure Agency of the US Department of Homeland Security, NCSAM is an increasingly global initiative to highlight the importance of a collaborative approach to Internet safety.
Now in its 16th year, NCSAM encourages governments, businesses, nonprofit organisations, industry associations, and educational institutions to spread the message about cybersecurity best practices.
Own IT. Secure IT. Protect IT.
This year, NCSAM is about emphasizing personal accountability under the theme Own IT. Secure IT. Protect IT. With the number of web-enabled intelligent devices rising every day, it’s critical to understand our digital profiles, as well as the threats that exist in cyberspace.
BUI is proud to be a 2019 NCSAM Champion alongside the likes of Microsoft, Kaspersky, McAfee, Symantec, and dozens of other organisations committed to empowering people to use the Internet responsibly and safely.
Throughout October, we’ll be sharing top tips, how-to guides, and other useful resources to help you become more cyber aware at work, at home, and on the go. Follow us on Facebook, LinkedIn, or Twitter and join the conversation by using the #CyberAware and #BeCyberSmart hashtags online.
From left, Paul Wallet, Willem Malan, Ryan Roseveare, and Thys janse van Rensburg at The Houghton Hotel, Spa, Wellness & Golf in Johannesburg.
We were the Finalists in 6 Awards and we Won.
Further, BUI was a finalist in the Modern Workplace and Go to Market Partner categories.
Nearly 300 Microsoft Partners attended the gala dinner and prize-giving ceremony at the upmarket Houghton Hotel in Houghton Estate. Held annually, the Microsoft Partner Awards acknowledge and celebrate Partner organisations that have excelled in delivering Microsoft solutions. Judging takes place across numerous competencies after intensive reviews of the award submissions.
BUI won the most awards of any Partner on the night, and the First Technology Group took away 7 in total.
A personal best for BUI
“It was a great evening,” says Managing Director Ryan Roseveare with a smile. “I’m thrilled that we took home the Cloud Platform Partner of the Year award for the sixth year in a row! We collected four trophies in total, and that’s a personal best for us. But it’s also a testament to the commitment of every person at BUI. I’m enormously proud of them all. Winning these awards means a great deal to us and our business, and is achieved through dedication and teamwork. BUI truly owned the night in the most important award categories.”
BUI is equally excited about scooping the Security Partner of the Year award. “We’ve made significant investments in our security division this year. We’ve added a dedicated Security Operations team focused on cloud security operations. We’ve also built a cloud-centric Security Operations Centre to provide our customers with cutting-edge security and oversight solutions. This award is a wonderful endorsement of the local skills and local capabilities that we offer to the market.”
An era of opportunity
In his opening remarks on Wednesday evening, Lionel Moyal (Commercial Partners Lead at Microsoft South Africa) urged Partners to explore new ways of helping their customers adapt to the digital age. “As we move towards the fourth industrial revolution, it is important that we work together, sell together, and win together. We are seeing every industry embrace tech intensity, as every company is becoming a digital company.”
“We’ve seen sustained interest in cloud technology, especially since the launch of Microsoft’s Hyperscale Cloud Data Centres here in South Africa. At BUI, we added 23 new Azure customers this financial year alone, and they’re consuming Azure at an exceptional rate. We’ve positioned ourselves to strengthen organisations in diverse industries, and I think our Services Partner of the Year and Azure Consumed Revenue Partner of the Year trophies speak to our success in this regard,” says Roseveare.
Microsoft gave this year’s award-winners an extraordinary token of appreciation in addition to their trophies: a celestial body! Winning Partners will have an actual star named after them. “We took home more awards last night than any other Partner. It’s an incredible feeling! And it’s because of the stellar work done by the BUI team,” concludes Roseveare.
Tech startups have been early adopters of productivity apps like Evernote, Slack, Google Drive, Trello. The way in which they’ve spread the word, as the vanguard about the future of work, have been documented. It’s the adoption of tools and new methodologies that allowed them to move quickly, and not worry about digital transformation and the transition from legacy systems; and the subsequent change management of people.
The reason the above mentioned apps are favoured is because… they were first to crack their purpose ; usage scaled, and users bought into the vision. As SaaS platforms they made it easy for users to login and manage across operating devices and platforms, with the ability to scale.
However, they’ve not always been able to consolidate or integrate seamlessly with other ‘legacy’ platforms (hence the rise of Zapier) for cross-purpose and projects needs. For instance – email to chat ( Gchat failed, & Slack didn’t crack video chat). Trello have plugins to Slack, but not all Users use it, or understand the functionality of it…
This is where Microsoft is playing the long game with MS Office365 and sees a gap, to consolidate and eventually move all 365 users into, at least a Hybrid Cloud. For a seamless cross platform experience, using terminologies people know – think of File, Edit, View, Tools, Insert.
With MS Teams – they’re reaching an end goal – with even more real-time/multiplayer edit capabilities; for better collaboration – sharing of files, instant saving, and plus cross platform integrations with software suites like Adobe. More open API’s will be made available soon.
In SA, the latest announcement around the hosting and migration of 365 Office, to local data centres, (and Core data of Sharepoint, Exchange & OneDrive)…allows; not only for a faster experience in MS Teams, but can now integrate with VoiP for call and video meetings, or to setup their PBX systems.
Small Businesses and Startups can be allocated faster than any on-site resources can many times over. Take for instance getting a new Sales team on board, who requires onboarding with the aim to get them up and running asap. Setting up their Services from CRM, Email, Teams, and Sales Collateral, can now be done within minutes; and the dynamically changing nature of Agile teams and the remote force, enables management – to plan for such a move more accurately.
With a growing remote workforce,Own Devices, adds to security risks ; which can be better mitigated from the cloud through multi-step verification.
Also, SMEs with private Customer Data records now have more piece of mind, knowing the record of truth will now be stored locally, adhering to more stringent data protection policies ( GDPR/POPI).
Small Business owners are in the enviable position that software has become more user friendly, even for the non-technical execs. Hardware setups and technical support is another matter, and still requires dedicated expertise. The cloud takes care of this, where the installation of new servers and configuring them don’t require a full or even part time IT person, but comes with a checklist, and is taken care of in the back-ground.
Starting out is easier than growing and scaling a team, and adopting a new way of work. The cost to try out different software and SaaS tools are low compared to before. It’s the transition from onsite to the cloud and the risk involved, that have many burying their heads in the sand, until another lunar moon passes. Stalling to migrate is costly.