What’s More Important: Cloud Mobility or Workforce Collaboration?

It’s a trick question—A business needs both to be successful. Businesses without mobility are truly in the dark ages in terms of collaboration, productivity and integrated processes. And without collaboration, a business isn’t firing on all cylinders, which is why implementing effective mobility and collaboration to the organization should be top priorities.

two people working outside showing mobility

Why Cloud Mobility?

  1.  Employees are now expecting mobility at work, as nearly two-thirds of companies permit personal devices to connect to the corporate network. Having mobility in the enterprise is good for both employees and the business. Those organizations that embrace mobility and Bring Your Own Device (BYOD) are not only realizing cost savings, their employees gain an average of nine hours of productivity per week due to BYOD and having mobile access while out of the office.
  2. Mobility has been with us for almost a decade and it’s making a big impact in businesses, especially in sales where it’s critical to be available at all times from any location. Sales teams with mobile CRM experience have achieved significant results:
    • 25% increase in sales
    • 35% increase in prospect visits
    • 15% decrease in sales costs
    • 30% reduction in billing lag time
  3. Mobility is a win for IT and employees, with both groups saying mobile devices make the organization and the individuals more efficient. Mobility has an added bonus of making companies feel like they have an upper hand against their competition.

a team working through collaberation

Why Workforce Collaboration?

Collaboration is equally important, especially with a workforce that is distributed and has remote workers. In smaller companies collaboration is easier because sharing information across fewer people takes less time and resources. Big companies often stumble when it comes to collaboration because of large staffs, remote offices, hierarchical management models, and a lack of tools that break through these barriers. Giving employees tools that make collaboration easy can bring big rewards to businesses.

  1. Presence and audio/web conferencing are efficient, cost saving communication options. Presence ensures that calls don’t land in voicemail. Audio and web conferencing eliminates conference service bills and reduces toll costs. Companies that have 100 audio conferences and 50 web conferences can save more than $20,000 per year by adding collaboration resources.
  2. An organization’s highest revenue-generating programs rarely have a single contributor. Group projects generate the highest revenue, and their success relies on the team’s ability to work together effectively. Collaboration platforms make this possible, allowing faster completion rates and eliminating delays as much as 25 percent.
  3. Social media has made good customer service and fast responses more important than ever before, as one poor interaction posted on Facebook or Twitter can damage a company’s credibility for a lifetime. Organizations can avoid being called out by a disgruntled customer by relying on collaboration tools that help them respond more quickly to customers and route customers to the experts who can best answer their questions.

How well is your current system working for you? Ask yourself these 12 questions and see if it is time to discuss a change in your office:



12 questions to ask if ready for Cloud Unified Communication CTA




Don’t Let Cyberattacks Disconnect Your Business Communications

In early June the U.S. government announced one of the biggest cyberattacks on record when hackers compromised the personal information of four million current and former government employee records. This attack, following the Sony breach at the end of 2014, has moved the nation’s attention back to security and the real need to protect personal data. In fact, President Obama has made data security a national priority.

To date, the government has enforced few mandates that require companies outside of the healthcare and financial services industries to address security. Cyber security, for the most part, is unregulated and at the discretion of the individual company.

Some security experts have called for more governmental intervention to enforce protections and strengthen security across public and private companies. With that type of oversight ahead, it’s time to make sure the wireless, wired and voice networks are safe and secure from harmful cyberattacks.

  1. Secure the mobile devices: Whether an organization supports a BYOD program or not, employees are logging onto the corporate wireless network with their smartphones. It’s important that communications on mobile devices are secure, no matter what network users are on—whether it’s internal or external wireless LANs, cellular or wired networks.

    The first step to ensuring the communication between a user’s mobile device and the mobility server is secure is to enable authentication and encryption. When connecting from home or a public Wi-Fi hotspot, the addition of a VPN will provide additional security. A solution like ShoreTel Mobility provides secure mobile UC from Android, Apple, and other mobile devices on Cisco, Avaya, ShoreTel, Nortel and Microsoft phone systems. The ShoreTel RoamAnywhere Client, which runs on the smartphone or tablet, enforces the appropriate security policies, and the ShoreTel Mobility Router secures the communications between the client device and the enterprise UC system.

  2. Guard the network perimeter. Firewalls stand between the network and the connection to the outside world. These security appliances will prevent unauthorized traffic from entering or leaving the company’s network and that will help protect the business from attacks and malware. IT can create rules on the firewall to tightly control which applications and traffic are allowed to pass onto the corporate network.
  3. Enforce strong passwords. Birthdays and maiden names are not good passwords. Make sure the organization follows best practices for choosing strong passwords: between 8-14 characters long with a combination of lower and upper case letters, numbers, and a special character. However, remember not to make the password requirement too burdensome, or employees will write it down on a sticky note and paste it to their screens.

    ShoreTel lightens the load of enforcing passwords—which are required before using ShoreTel Communicator and voicemail. Both user and administrator passwords must be changed when a worker first logs into the ShoreTel system. Passwords must meet the requirements set by the system administrator. ShoreTel also integrates with Active Directory, which makes it easier for users to sign-on to multiple applications with a single password.

  4. Use VPNs to protect remote workers. Many remote workers use the public Internet to connect to corporate headquarters. It’s key to secure this connection so that communications cannot be snooped.
  5. Perform regular security maintenance. Performing regular patching and keeping security protections up to date on both endpoints and the UC system itself is just good sense. Administrators can use the web-based ShoreTel Director to manage all voice applications from anywhere on the network.
  6. Review cloud providers’ security. When considering a cloud provider, pay close attention to the security at the data center. Find out about guaranteed uptime, backup and redundancy. Ask about intrusion prevention systems and firewalls, as well as authentication, encryption and compliance credentials. Cloud providers should be ready to provide a comprehensive overview of all aspects of their security strategy.
  7. Don’t ignore potential internal attacks. While cyberattacks gain the majority of attention, the biggest danger comes from within companies. Employees have access to an incredible amount of sensitive information, and they often store it on their laptops, tablets or smartphones. This confidential information can walk out the door when an employee or contractor quits, is fired or moves to another company. HR and IT must work together to understand potential insider threats and protect internal documents.