“Corsica is a one-stop shop for us. If I have a problem, I can go to my vCIO or a number of people, and you take care of it. That’s an investment in mutual success.”
It takes dedicated experience to use technology strategically in your industry. That’s why we specialize in certain verticals while offering comprehensive technology services.
It’s challenging for midmarket companies to meet the technology needs of their internal and external customers. For many organizations, outsourcing IT is the answer.
But how bad is the pain, and where does it hurt most?
How do you choose the right functions to outsource—and the right partner?
To answer these questions, Corsica Technologies commissioned an in-depth study from IHL Group, a leader in market research. IHL Group conducted a comprehensive survey of midmarket companies in numerous verticals to uncover a detailed picture of the state of technology outsourcing today.
Key takeaways:
The talent gap is real in IT and cybersecurity, but top-performing organizations solve the problem with outsourcing.
Outsourced cybersecurity is especially popular with companies that lead their industries in terms of sales and profits.
Legacy software and cybersecurity concerns are top pain points.
Remote infrastructure management is the #1 IT function outsourced today.
1. Top performing companies invest 285% more in cybersecurity
The study separated companies with >10% sales growth from average performers and below-average performers. In terms of cybersecurity investment, the study uncovered a startling fact.
Companies with >10% sales growth invest 285% more in cybersecurity than below-average performers.
That might sound like higher-revenue companies are spending more—but companies were split out by growth, not revenue.
The takeaway is clear. Low-growth companies are spending significantly less on cybersecurity than companies that are on a growth trajectory. This makes sense, considering the fact that a data breach costs $4.45M on average (IBM). Yet even companies that aren’t experiencing growth must consider the risks of leaving cybersecurity unaddressed, as a breach can put them that much farther behind their peers.
2. Skilled IT and cyber talent is harder than ever to find (and keep)
The study revealed an uncomfortable fact: 42% of companies rated IT staff availability as a top pain point.
This isn’t too surprising. Given high salary expectations and high demand, IT professionals can choose their roles carefully. For example, the U.S. Bureau of Labor Statistics expects job growth of 32% in the cybersecurity sector between 2022 and 2032.
When it comes to specialized technologies like EDI, skilled talent can be even harder to find. EDI solutions are a unique beast. Just like cybersecurity, they require dedicated expertise—and the best EDI providers come with a strong background in both EDI and cybersecurity. This ensures your solution is kept up-to-date against the unique security risks of EDI.
The same is true of digital transformation and AI consulting skills. It’s challenging to find that comprehensive skillset that can cast a vision (and run operations) across a diverse range of technologies.
Unfortunately, specialized talent accrues toward the top-paying organizations—which are often global enterprises far outside the midmarket. This leaves midsize organizations scrambling to cover their staffing needs in technology.
In many cases, the solution is to outsource to an IT services company, also known as an MSP (managed IT service provider). The best MSPs also act as an MSSP (managed security service provider). This means they cover both IT and cybersecurity, and services can be co-managed or fully managed.
For some organizations, managed services may not be the right fit. These companies may prefer IT staff augmentation services. This model allows the organization’s IT leadership to work with their supplemental personnel in a hands-on way, while avoiding the cost and hassle of staff hiring.
Whether outsourcing or hiring, the study shows that midmarket organizations really need to find a solution because…
3. Solving the IT staffing problem correlates with 125% higher profit growth
There’s no way around it. Companies that invest in technology experts see higher profit growth.
Specifically, the study uncovered a remarkable fact. Companies who reported that lack of IT staffing was not an issue saw profit growth 125% higher than those who did.
These high-performers also reported 136% higher sales growth—and they projected 90% higher profits this year.
Clearly, solving the technology staffing problem correlates with greater profitability. While the reasons for this correlation are complex, we can sketch them briefly.
Whether outsourced or on staff, companies with proper IT resources are equipped to support business-critical systems day-in and day-out. This creates less downtime and lost revenue from technical bugs. It also keeps costs lower by providing resources and proactive triage processes rather than operating in a reactive mode when technology issues occur.
Whether outsourced or on staff, companies with proper cybersecurity resources are less likely to experience a catastrophic cyberattack. While no one can guarantee bulletproof security, organizations that invest in cybersecurity have the systems, processes, and professional resources in place to contain a threat. This minimizes downtime, data loss, and the impact on brand reputation and revenue.
Companies that invest in technology experts are more likely to have a clear strategic direction for technology investments. With a document in place like a 3-year technology roadmap, they can replace end-of-life systems before critical vulnerabilities occur. They can also plan for net-new technology investments, digital transformation, and data integration initiatives like EDI solutions, which correlate with greater operational efficiency and new opportunities to capture revenue.
4. Top performing companies are 29% more likely to use an MSSP for cybersecurity
This should be no surprise.
Given the challenges in hiring talent and the importance of cybersecurity, top performers know they have to find a solution. For many midmarket companies, that means outsourcing IT security services to an MSSP (managed cybersecurity services provider).
But that simple fact isn’t the whole story.
There are two big reasons that top performers seek out MSSPs to handle cybersecurity.
They rate the importance of an MSSP having a physical SOC (security operations center) 36% higher than average performers.
They rate the importance of an MSSP taking full responsibility for cybersecurity 25% higher than average performers. This includes critical functions like threat detection, response, mitigation, and cleanup.
The devil is in the details here. Top performers aren’t looking for just any MSSP. They want a strategic partner who takes ownership of cybersecurity from top to bottom, including a Cybersecurity Service Guarantee that offers free services for incident remediation (within limits). They recognize that this type of relationship empowers them to focus on their core business while their MSSP keeps them safe.
5. Cybersecurity leads among cloud spending growth categories
In fact, cloud systems require just as much cybersecurity expertise as on-premises systems. The skillset is slightly different, but the need is the same.
It’s not too surprising, then, that cybersecurity leads among cloud spending growth categories. Here’s the full breakdown from the report.
Cloud technology spending growth by category
Cybersecurity +7.0%
Data hosting/storage +5.5%
Collaboration software +5.4%
Marketing systems +3.8%
Business intelligence/analytics +3.7%
Supply chain systems +1.9%
6. Legacy software is the top pain point (74%)
Midmarket organizations are suffering.
The culprit? Outdated software that can’t keep up with modern business requirements.
Whether it’s homegrown solutions that the organization can’t support, or third-party applications that have reached end of life, 74% of midsize companies reported legacy software as their biggest pain point overall.
What does this look like in real life? Here are a few examples that we see frequently.
Broken or nonexistent EDI integrations (more on that below)
Bespoke backend systems that should be replaced with best-in-class solutions from top software vendors
On-premises systems serving functions that would be better served in the cloud
Considering the shortage of technology talent, the pain of legacy software hits hard. How can midmarket organizations address these issues if they can’t get help from expert resources? Like so many trends here, this one is pushing decision-makers to outsource their IT support.
7. Cybersecurity issues are causing significant pain (56%)
This trend comes as no surprise, given the increasing prevalence of cyberattacks, data breaches, ransomware, phishing, and other threats.
The situation is changing rapidly for midmarket companies. Global enterprises have hardened their defenses significantly, which makes it more challenging for cyber criminals to breach them. Now the criminals are looking for softer targets. Midmarket companies offer the perfect combination of weaker cybersecurity controls coupled with enough financial resources to pay ransoms.
With a breach costing $4.45M on average, that’s a significant impact to any organization.
Yet it’s tough for midmarket companies to keep up with evolving cybersecurity trends. From attacks powered by generative AI to cyber warfare and state-sponsored operations, the threats against midsize companies are getting more and more sophisticated.
For all these reasons and more, it’s no wonder that 56% of respondents rated cybersecurity as a top pain point.
8. Data integration issues are disrupting operations
Business-critical systems must talk to each other—and those integrations must be reliable.
Unfortunately, the reality looks far different at many midmarket organizations. In fact, 52% of respondents cited B2B data integration issues as a top pain point.
Without proper, reliable integrations, organizations must turn to human labor to move data between systems. Whether it’s rekeying business documents, scrubbing and uploading CSV files, or some other workflow, these processes create errors and waste.
What systems are we talking about?
Here are some of the common ones we see.
Inadequate (or nonexistent) EDI integration. While the organization has a self-service integration solution to send and receive EDI documents, that solution isn’t cutting it. There’s no integration to backend systems (ERP, MRP, SCM, etc.), and EDI is causing significant pain. Even if an integration to backend systems exists, when the backend system gets an update, it can break the connection—which requires expertise to reconfigure, redeploy, and test the integration.
Disconnected internal applications. A system doesn’t have to be customer-facing to create problems when it isn’t integrated. Any internal application that can’t share data appropriately creates lost productivity and the potential for data errors.
Disconnected ecommerce. No matter the industry, an ecommerce solution is a liability if it doesn’t integrate with backend systems. This can lead to lost revenue, rekeying information, growth in order errors, and damaged customer relationships, as a broken integration can affect customer experience and product availability on the site.
While self-service integration solutions exist to connect virtually any system to any other system, such solutions can’t always keep up as integration requirements become more complex. Typically, we see self-service tools covering 20% of a client’s easiest data integration requirements. The remaining 80% generally fall outside the scope of self-service integration tools.
Welcome to the latest episode of Unraveling IT, Expert Tech Talks. I’m Nikita with Corsica Technologies, here to introduce our latest podcast featuring Ross Filipek, our our chief information security officer. In March 2024, Ross joined industry analysts at the IHL Group for an illuminating webinar on strategic technology and IT outsourcing for midmarket companies. Listen into this week’s episode to hear our take on the top cybersecurity trends and threats for 2024. Enjoy. Hey, everybody. I’m Ross Filipek, chief information security officer at Corsica Technologies. I’ll be talking about some cybersecurity trends and threats for 2024. And as a managed cybersecurity services provider, I think that Corsica is kind of in a unique position. We work with clients in a lot of different industries. So manufacturing, healthcare, finance, really all across the board. So I think we have, you know, some pretty unique perspective for observing some of these different cyber trends and threats, and I’m gonna be talking about, some big things that we’re seeing out there. Just a high level agenda. Some of you probably will recognize a handful of these things as not necessarily being new for 2024, but rather these are the types of things that we continue to see organizations struggling with really, in all industries and all over the globe. So I think it’s important to really hammer on those to talk about what we can do to mitigate risk from these types of things. And, you know, I hope it goes without saying, but this is gonna be a nonexhaustive list. Yeah. There’s really no way I could capture every potential cyber threat and and trend for for 2024 in a single presentation. So I’m gonna focus on the types of things that we see the most of. So to start out, just to lay the groundwork a little bit, some background information. The cost of cyberattacks on the global economy is predicted to top ten point five trillion dollars by the end of this year. So if you try to wrap your mind around that figure, I mean, this is just, you know, it it it’s mind boggling. I mean, clearly, cybersecurity is no longer something that we can just leave up to chance. So this really means that cybersecurity has to be treated as a strategic priority for us on an individual, organizational, and governmental level. Yeah. This is really why I’m such a proponent of conducting a proper cybersecurity risk assessment for your environment, you know, using a tried-and-true framework, you know, something like CIS RAM or the FAIR model. Yeah. Those are both great resources. But really, you know, if you guys think about the cybersecurity product marketplace today, there there are million products out there, you know, all kinds of security hardware and software and services. All those vendors position their products as kind of being the magic bullet for cybersecurity. But, unfortunately, there is no magic bullet when it comes to cyber, you know, and no organization has enough time or people or money to just go out and buy all the products to implement them. Right? You know, so we need some judicious way to figure out what do we really need from a safeguard perspective to protect our environments. You know, what’s what’s actually going to be effective for us to implement and what can we kind of put on the back burner. So that’s really the purpose of conducting a cybersecurity risk assessment, so we know where to focus our protection efforts. Also, as Greg mentioned earlier, AI is gonna have a transformative impact this year on both attack and defense. Its impact is gonna be felt across every one of the trends that I’ll cover here. I’ve got some more slides coming up about AI, so stay tuned. The cybersecurity skills crunch. As a managed cyber services provider, this one kinda hits close to home for me. But we’ve been seeing a shortage of professionals with the skills needed to protect organizations from cyber attacks continuing to be a running theme. And in fact, the research indicates that fifty four percent of cyber professionals believe that the impact of the skill shortage on their organizations has actually gotten worse over the past couple years. You could kinda see the graphic there, on the slide over on the right from the IHL study. Forty two percent of companies have IT staff availability as a top pain point. So this continues to be something that that we see. And, you know, for those of you who have ever tried to hire cybersecurity talent, you know, particularly good cybersecurity talent, those people tend to be expensive, they tend to be difficult to find, and they tend to be difficult to retain. So, you know, we really see that continuing to be a running theme. But efforts to rectify the situation include increasing salaries. So, you know, that’s great, but you it can only only go so far before the economics just don’t make sense. Certainly, greater investment in training and development and upskilling programs. You know, these are great ways to attract and retain skilled cybersecurity talent. But here again, you know, these things tend to be expensive and they tend to get more expensive over time. So as a result of this, we’ve really seen a dramatic increase in the amount of outsourcing to, manage providers with the necessary tools and skill sets. Generative AI for both good and evil. You know, we’ve talked about AI a couple times already, today. But as AI increases in sophistication, we’re gonna continue to see more sophisticated and smarter AI powered attacks. These are gonna be things that range from deep fake social engineering to automated malware that in intelligently adapts to the detection. So, you know, kind of the classic example of this, if there is such a thing, you know, you guys remember, like, five years ago or ten years ago, it was usually pretty easy to spot phishing emails. You know, there’d be a lot of misspelled words and poor grammar. Really a lot of red flags that our users can be trained to be on the lookout for to spot a phishing email or, you know, some kind of social engineering attack, that’s coming in and and reaching them. So really what we’ve been seeing as the result of generative AI tools are that cyber criminals, you know, particularly those who are not native English speakers, now have the ability to craft very believable, emails written in perfect English, no misspellings, no bad grammar. And now, you know, our our end users are having to contend with those types of attacks. So it it just really puts an additional burden on us as organizations because the number of red flags that are at our disposal to look for now is dramatically shrunk. So, you know, that’s not to say that it’s only the bad guys who are able to make use of AI. The good guys are having excellent results with it as well. So at the same time, AI is gonna help us detect and neutralize cyber threats thanks to things like real time anomaly detection, smart authentication, and some automated incident response capabilities. So, yeah, I could speak for Corsica as a managed cybersecurity provider. Many of the tools that we use to deliver our cybersecurity services and the tools that our security operation center uses to to monitor, those tools and and those services, already make heavy use of artificial intelligence. So they just really help our SOC analysts be much more efficient and effective and accurate when it comes to investigating and triaging cyber attacks. So I think, you know, definitely some some strong advantages for AI for the good guys as well. So, what we can say is that if cyber attacks and defense this year is like a game of chess, then AI is the queen. So whoever controls that has the ability to create powerful strategic advantages. Next level of phishing attacks. So, you know, this is certainly nothing new. Phishing has been a problem for a lot of organizations for a long time. It’s going to continue to be a problem, you know, particularly, when used in conjunction with generative AI, like I was talking about on the previous slide. Saw a pretty interesting statistic, a couple of months ago, and that’s that eighty percent of all successful cyber attacks actually target people, not computers. That makes sense. Right? You know, if you’re an attacker, why do you wanna spend a month or a week, you know, a a week or a month or, you know, even a year trying to hack your way in to, you know, through somebody’s firewall or hacking to somebody’s server where you could just fish their employees and trick all those people into giving you their usernames and passwords. You know, attackers like to work smart, not hard. So certainly, they’re gonna continue to hammer away at phishing until we get better at detecting and stopping it. So the response to this, yeah, kind of, like I implied a second ago is that it it’ll largely revolve around organization wide awareness and education. So continuing to be aggressive about security awareness training for our employees, it’s just gonna be so critical to do. You know, for for many clients, I recommend that if you’re in a position right now where you’re doing, like, a like, a big batch of annual cybersecurity awareness training, Look at splitting that up over the course of the year, so maybe move to a quarterly training model with a smaller volume of training courses. And the reason that tends to be more effective is that, you know, as long as we can routinely get this training information and testing, in front of our employees, that tends to keep these concepts fresh in memory and, you know, people, are are less likely to, you know, kinda put it on the shelf and and forget about it. IoT cyberattacks. So some of you probably recognize IoT. IoT is the acronym for Internet of Things. So when I talk about IoT devices, I’m talking about really any electronic gadget that connects to our network in some capacity, but it doesn’t actually have a human user sitting behind it. So, you know, you think about nowadays, refrigerators and, you know, toasters and smart TVs are a great example. All these things, you know, people buy them and then they connect them to the network and then they tend to forget about them. So over time, a lot of these things wind up missing firmware updates and security patches. And really what that does is just, really, increases what we call the attack surface for our organizations. It gives those potential attackers a lot more that they could potentially grab on to and hammer away at to try to breach our environments. In addition, with the work from home revolution continuing, the risks posed by workers connecting or sharing data over improperly secured devices is gonna continue to be a threat. So, you know, I would imagine most of you, you know, certainly back during the pandemic, had a lot of employees working from home, you know, probably using personal devices, connecting to your, business environments across infrastructure that your IT department didn’t necessarily have visibility into or the, control over. So that caused a lot of problems for a lot of organizations. Cyber resilience. So, I think two terms that a lot of times get used interchangeably but really mean two different things are cybersecurity and cyber resilience. But the distinction, I think, is becoming increasingly important. So while the focus of cybersecurity is on attack prevention and detection, the focus on cyber resilience is on response. So some of you may have heard the adage that it’s not a question of if you get breached, it’s a question of when you get breached. So from the cyber resilience standpoint, the more effort we can put into preparing for that inevitable breach, In other words, sitting down and taking the time to develop a proper incident response plan and then periodically testing that plan to make sure it’s doing what we need it to do. Yeah. All the preparation we can do ahead of time is just gonna make life so much easier for us if we ever end up needing to respond to a breach. So very important to do. It’s gonna be crucial going forward. Less than zero trust. Some of you may be familiar with what it’s called the excuse me. Some of you may be familiar with what’s called the zero trust framework. This is a model of network architecture that stresses that there’s really no perimeter within which the network activity, can be assumed to be safe. So really what that means is, you know, you think about ten years ago, a lot of organizations were set up so that if employees were physically working in the office, you know, you had people coming in and working in their their offices or out of their cubicle. A lot of times, we set those up so those people could bypass things like multifactor authentication and many of the other cybersecurity controls that they would otherwise have to go through if they were trying to connect from the outside. Right? So what zero trust says that we do is kinda flip that model on its head And it says that we should assume that all of the devices in our environment, whether they’re devices in our offices or the devices that our users are using to connect from home or from hotel rooms. We should assume that all those things are compromised. So we’re gonna take other measures to protect our organization’s data. And, generally, that amounts to very granular, very accurate authentication and authorization mechanisms for that data. But, for those of you who are familiar with CISA, that’s the US government’s, cybersecurity and infrastructure security agency. They recently put together a really great white white paper on zero trust architecture that does a fantastic job of explaining what that is conceptually. So, you know, if that if that’s the type of thing that interests you, I’d really encourage you to, check out that that CISA white paper. It’s a great reference. Cyber warfare and state sponsored attacks. Yeah. These have been going on for a long time. They’re not gonna let up anytime soon. And, you know, I think for for the rest of, yeah, the rest of our existence, we’re we’re gonna have to continue to deal with these things. So, certainly, the war in Ukraine, has exposed the extent to which nation states are willing and able to deploy cyber attacks. Against both military and civilian infrastructure. And, you know, that that we’re we’re not just seeing that in Ukraine, you know, certainly with Israel and Gaza. This is a big deal as well. Going forward, wherever military operations take place around the world, they’re gonna go hand in hand with cyber warfare operations. If physical warfare and cyber warfare are gonna be inseparable, they’re always gonna go together. So the most common attacks that we continue to see originated from state sponsored actors are phishing attacks. You know, like I mentioned a few minutes ago, eighty percent of all successful breaches start with phishing. Attackers know this. They know it’s highly effective. So that continues to be what they focus on. So being able to gain access into their victim environments to do disruption and espionage And even things like denial of service to knock systems offline, you know, that that tends to be the hallmark of these state sponsored threat actors. Separately from warfare though, we’ve got major elections coming up this year in the US, in the UK, in India, and we can expect to see an increase in cyberattacks that are aimed disrupting those processes. And lastly, we are continuing to see a trend toward soft skills becoming increasingly essential for cybersecurity professionals. So, you know, I can tell you, you know, ten years ago, fifteen years ago, when we would hire a talented, you know, cybersecurity engineer, chances are pretty strong that we’d end up putting him or her in, know, in a closet someplace and just having them focus on malware analysis or, you know, doing the technical things to detect cyber threats in the environment. And that worked well for that time. But, you know, if you think about today, cybersecurity is just so tightly woven into all of our business processes and all of the information technology that we use across our organizations. It’s just becoming so important for those who are tasked with cybersecurity for our environments to be able to communicate effectively with all the rest of our employees. So, yeah, certainly the soft skills, we we definitely put a premium on. And I think, unfortunately, a lot of times, you know, that just, you know, continues to make it more difficult to find, people who are able to do what really needs to be done. But, yeah, certainly, this is gonna be a trend that continues and is just gonna get more important as the years go on.
9. Network speed and reliability are hampering productivity
44% of respondents selected network speed and reliability as a significant pain point.
This is concerning, as modern organizations can’t function without secure, reliable network connectivity—especially in the age of remote work. Yet downtime, poor wireless coverage, congestion, and interference all combine to make networking challenging for many organizations.
Combine this with the difficulty of hiring IT talent, and network usability becomes a serious issue.
Once again, we’re seeing organizations outsourcing their IT support to solve this problem. Managed network services cover the skills gap in your organization, ensuring every team member gets the connectivity they need.
10. Data security and connectivity is the #1 technology priority
Zooming out a little, the survey asked respondents what their top technology priority was for this year.
62% chose data security and connectivity.
This makes sense, as it encapsulates nearly everything we’ve covered so far. Network speed and reliability, cybersecurity, and data integration were all significant pain points, so it stands to reason that midmarket companies would make them the #1 technology priority.
But there’s one more thing to note here. Top performers rate data security and connectivity higher than other organizations.
In fact, companies that grew profits by 10% or more in 2023 rated this priority 56% higher than average performers. This is most likely due to the fear of not having proper security controls in place to protect rapid growth in market share.
11. Remote infrastructure management is the #1 IT function outsourced today
The survey asked respondents to indicate how they source four technology functions today:
Hardware purchase
Hardware installation
Remote infrastructure management
End user support
The options offered were “Support in-house,” “OEM/vendor service,” and “third-party service.”
Remote infrastructure management led among types of support outsourced to an IT company, with 42% of respondents engaging a trusted partner for this function.
Not surprisingly, end user support was overwhelmingly covered in-house, with 67% of respondents addressing the need this way. This makes sense, as end users typically require assistance with things like application support and understanding internal processes. In-house resources are best positioned to help with these needs, while IT outsourcing services are best positioned to handle remote infrastructure management, which requires more technical expertise.
The takeaway: Top performing companies outsource their technology services strategically
There’s one overarching theme here. Both in terms of sales and profits, top performers are outsourcing IT and cybersecurity strategically. This allows them to sidestep the tough labor market in IT and cybersecurity, as their MSP/MSSP handles staffing concerns, system documentation, 3-year technology roadmaps, and more.
Conversely, below-average performers are less likely to outsource these IT support functions. That could be for several reasons. They may not understand their needs in cybersecurity and IT, so they can’t cover those needs. They also may not realize how affordable it is to work with an MSP/MSSP. Midmarket companies can usually get access to an entire team of experts for roughly the cost of one full-time hire.
Whatever the reason, the takeaway is clear. Midmarket companies shouldn’t hesitate to outsource their cybersecurity and IT needs strategically. Those who do so consistently outperform their peers in terms of sales and profits.
Want to learn more about outsourcing IT and cybersecurity?
Reach out to schedule a consultation with our technology specialists.
George Anderson is a blogger and trade journalist in IT and technology. Covering topics from IT to ecommerce to digital transformation, his work has appeared in numerous outlets around the internet. He loves writing on complex subjects in plain language to help companies succeed with technology.
💡 Compare Copilot vs. ChatGPT Get Your FREE Chart Originally published November 1, 2023. Completely refreshed March 31, 2026. Short answers: ChatGPT is better for general-purpose tasks and non-Microsoft users. Copilot is the clear winner for Microsoft 365 environments. Both
💡 Ready to grow with AI? Let’s talk about your transformation. Book a Consultation Technology isn’t the finish line. It’s the force multiplier—and that’s especially true of AI solutions. For modern business leaders, the goal isn’t simply to accumulate more tools. Rather, it’s to create more impact, drive faster decisions, and generate outcomes that actually
💡 Ready to improve your security? Talk to us about your challenges. Book a Consultation The recent cyberattack on Stryker, a leading manufacturer of medical equipment, offers a sobering window into the vulnerabilities that companies tolerate every day. As I