Enter your keyword

The 7 KPIs for ROI from IT

The 7 KPIs for ROI from IT

The 7 KPIs for ROI from IT

How to ensure your business’s budget on IT is an investment, and never an expense



In the years we’ve been looking after businesses round here, we’ve noticed there are two different ways that owners and managers buy IT and technology.

Some see it as an expense.

Others see it as an investment.

We choose not to work with the first group. It never ends well!

Don’t get us wrong; all businesses have moments where every last penny counts. That’s fine in the short-term.

The problem is when that becomes the long-term driver of the business, and all spending decisions are made by asking “what’s the cheapest way to do this”.

We’d rather deal with the second group of people. Our existing clients fit into this category.

This second group recognizes that IT is their infrastructure; the backbone to their business. And they don’t want to take any risks on the quality.

No matter what kind of business you run, technology sits at the heart of it today. And it’s going to become more and more important in the future.

Big thinkers see IT as a long-term investment. They understand the link between the short-term impact to cash flow, and the enormous long-term benefits of business growth, increased productivity and highly satisfied staff and customers.

If you’re nodding your head and agree with what we’ve just written, we really should talk – our businesses sound like a good fit.

However, before you pick up the phone, here’s something else to think about.

Just because our clients are big thinkers and are willing to invest doesn’t mean we don’t focus very hard on giving them an excellent ROI – Return On Investment.

It’s a big thing for us when doing our technology planning and regular strategic reviews with clients.


We love to have regular strategy meetings with our clients. This helps ensure the infrastructure is sound for each client’s IT.


You’ve heard the saying “you can’t manage what you can’t measure”.

So here are 7 technology KPIs – Key Performance Indicators – that you could use to ensure you’re getting your return.

Disclaimer: We don’t necessarily use all of these KPIs with every client. We work with each client individually to understand what kind of reporting is most important to them. And then deliver that. There’s no point doing reporting unless it’s actually being used to make good strategic decisions.


Budgeted IT spend vs actual spend

 It’s possible to forecast the costs of technology, and reduce the chances of “urgent, emergency spend”.

You have to do this over the long-term. Accurate forecasts come from investing in quality infrastructure that’s designed to accelerate growth and never hold it back.

This is why you need a technology partner who’s deeply involved with your business and its long-term planning. If someone doesn’t understand where you’re going and why, how can they accurately advise on your technology?


Percentage of infrastructure projects delivered on time, to budget and spec

This is an easy KPI to both understand and measure.

By tracking this, you encourage your IT partner to make realistic estimates about the length and cost of projects. Experienced IT professionals will not find it difficult to build in extra time and cost to account for foreseeable problems


Average time to solve a problem

 It’s a common question most IT support companies get while talking to prospective new clients: How long will it take to solve problems?

The answer is “it depends”. We mean, it depends on the problem and the impact of it.

All IT companies run a form of triage for problems that come in, just as emergency room doctors do in hospitals.

You wouldn’t expect a broken arm to get the same amount of urgency and attention as a heart attack, because resources aren’t unlimited.

It’s the same with technology issues.

What’s important is your IT partner understanding which of your systems are critical to normal operations, and what’s just annoying when it doesn’t work properly for a short while.

These boundaries should be established during onboarding with your new IT partner.


Uptime vs planned/unexpected downtime

Downtime is when systems and devices are not available for your team to do their usual work.

There are two types of downtime – planned and unexpected.

A good IT partner will work with you to make sure that planned downtime for maintenance has as little impact as possible on your staff and overall productivity.

Of course, it’s impossible to eliminate all unexpected downtime. Some of it is unavoidable, such as a loss of internet access in the wider area, not just your office.

Uptime is all the rest of the time when your systems are working fine.


Recovery Point Objective and Recovery Time Objective

Whoa! We just hit you with some technical terms. Here’s what they mean.

They’re both about the backing up of your data.

Recovery Point Objective (RPO) is used to determine how often your data needs to be backed up. This will depend on how often it changes and how critical the data is.

For example, if you were a bank, you’d want an RPO of 0 minutes. If a bank’s systems crash, they need to be able to recover every single transaction that happened right up to the point of the crash.

But let’s say you ran an architects’ office. Your staff might only save a few files a day. So, an RPO of 2 hours might be acceptable. It means in the event of a big crash, the worst amount of data that can be lost is 2 hours’ worth.

Setting an RPO is always a trade-off between cost and convenience. There are always clever solutions a good IT partner can create for you – for example backing everything up in real time within your office, then only sending it to a secure data center away from your office twice a day.

Recovery Time Objective (RTO) is the length of downtime your business can tolerate until data recovery. Put another way, it’s how long you realistically have to restore full operations.

Again, your critical systems will have a lower RTO than other systems. This is an important conversation to have with your IT partner.


Mean Time Between Failures

Mean Time Between Failures (MTBF) is the average time between system breakdowns.

Knowing this can help you measure the performance and reliability of your infrastructure.

Tracking it can give you a real life view of how robust your systems are. Your staff may perceive there are “always problems”, but measuring the MTBF might show your systems are running as expected.

This also works the other way round, when you can discover you’re suffering more failures than would be expected. This can help you build a business case for making an investment in new software, hardware, or systems.


Mean Time To Recovery

This final KPI, Mean Time To Recovery (MTTR) measures the average time it takes your business to recover from a failure: From discovery to fix.

It’s the average time it takes your business to get back up and running again.

This can also be a useful measure of how robust your business’s infrastructure is, and help you decide where to invest long-term.




Of course, there are other KPIs that you could measure to look even more deeply into your IT systems. But these are the ones we recommend starting with.

Not only will they give you insight into how well your current infrastructure is working for you, but they will also tell you a lot about how well your IT provider is performing.


We can help you figure out the right technology KPIs for your business and show you how to measure them.


Would you like help figuring out the right technology KPIs for your business and measuring them? We can help. Let’s talk.



Ready to Get Started?

Fill in the details and we'll contact you about your business.
  • This field is for validation purposes and should be left unchanged.


Dropsuite is a cloud software platform enabling businesses and organizations globally to easily backup, recover and protect their important business information including emails, contacts, calendars and OneDrive/Sharepoint files. Compliant email backup and archive system with a 10-year retention policy.

Vade Secure:

Vade Secure is an AI-based email security solution to improve security for Office 365 and block advanced phishing, spear phishing, and advanced malware threats. Vade Secure analyzes emails, webpages, attachments, and images with machine learning and deep learning algorithms that are trained to detect behaviors and anomalies common to advanced email threats.

Office Protect:

Office Protect is a service that’s designed to help you secure your Microsoft 365 tenant. Using our powerful in-house security software, our analysts actively monitor for threats, investigate alerts, eliminate false positives, and provide guided response and remediation. Protects against account break-ins, data exfiltration, business email compromise, phishing, internal threats, lateral movement, ransomware, and attacks by nation states.

Dark Cubed:

Dark Cubed focuses on real-time monitoring, threat intelligence, predictive analytics, elegant dashboard, streamlined workflow, executive reporting and active blocking. This is another layer of security that integrates with the firewall.


ThreatLocker is a zero-trust endpoint security tool giving companies control over what software can run, by whom, and what data can be accessed.

It keeps a full detailed audit of what applications are used and data accessed/transferred/deleted and by what users (signature tracking, etc.) If something unusual happens, such as a signature change, or a user opens an application that is out of their normal routine the administrator is alerted. This is a crucial tool in identifying malware threats, as well as helping organizations identify if users are accessing applications and/or data/ files they should not be.

ThreatLocker provides a solution that allows businesses to control the content that runs on their network. Unlike AntiVirus software ThreatLocker is not looking for known viruses or malware. ThreatLocker uses a complex set of rules to determine what can be executed on a network and stops anything that has not been approved before it can even execute.


Huntress is a supplement to SentinelOne. Hackers are becoming more sophisticated, and Huntress actively seeks out these threat actors with a "defend forward" mentality. This software combines both advanced security tools along with human intervention to ensure even the most advanced hackers can't penetrate your network.


SentinelOne is a comprehensive enterprise security platform that provides threat detection, hunting, and response features that enable organizations to discover vulnerabilities and protect IT operations. SentinelOne integrates static artificial intelligence (AI) to provide real-time endpoint protection and reduce false positives that derail investigations or make threat detection a capital-intensive process. This will replace Webroot in your current environment.