To give you the best experience, this site uses cookies. By continuing to use our site, you agree to our use of cookies. To learn more, please read our privacy policy.
To give you the best experience, this site uses cookies. By continuing to use our site, you agree to our use of cookies. To learn more, please read our privacy policy.

The VoIP Report

The VoIP Report Weekly Roundup – June 30, 2017
June 30th, 2017

The VoIP Report Weekly Roundup – June 30, 2017

Missed something on The VoIP Report? If so, check out the weekly roundup June 30 and see what happened in the world of VoIP this week.


This week on The VoIP Report we discuss how the role of the CIO is changing and what the means for the CIOs of today. We also share some tips on reducing the threats BYOD creates from inside a business. Finally, we shed light on IoT and how you can get your business ready to embrace the tech head one.

If you missed any of our articles or any of this week’s industry news check it out below.

Featured Article

The Changing Role of the CIO

The CIO is responsible for maintaining the effectiveness of business technology. Right! The CIO is responsible for improving the business value of technology. Right! The CIO is responsible for managing the business. Possible!

It’s not long since the CIO was rarely seen outside the IT department. Some made it to board level, but their influence on business strategy and associated investments was limited. The job of the CIO was to keep IT running efficiently and control the costs. The most visible impact occurred if there was an IT outage or if downtime affected users.

CIOs and their teams controlled the release of software and applications, provided they were compatible with the existing infrastructure. And, of course, they fixed equipment if it went wrong. In effect, the CIO kept a tight control on the way IT was used in the business.

Read More

Other Articles

On the Inside: How to Reduce Insider BYOD Threats

A BYOD policy wherein employees work on their own mobile devices is a classic case of on the one hand….., on the other hand.

On the one hand, it cuts company’s costs. No longer does the employer have to pay for mobile devices and training. On the other hand, unless security policies are formulated, laid out, and firmly enforced, BYOD is a potential open door to data theft and hardware.

On the one hand, employees enjoy using devices with which they are already familiar. It’s also nice not to have to juggle two phones or tablets. On the other hand, should they be lax in following security measures, they can face consequences ranging from discipline to dismissal. It all depends on their employer’s BYOD policy.

If your company is considering adopting BYOD, there are steps you can take tight from the start. The first might very well be sizing up the pluses and minuses and deciding it’s no your cup of tea. And that’s fine. But should you think it just might work, consider the following policy tips. These will help you reduce insider BYOD threats.

Read More

Prepping Your Business for the Internet of Things

Have you noticed how many people are wearing fitness trackers? Or using a smart TV? How about all those smart appliances and thermostats? It looks like we’ve reached the frontier of the Internet of things.

Hopefully, you’re not one of those business owners who are saying “Wow! We didn’t see that coming.” Surely you know one or two. They’re the people who heard all the talk surrounding life when IoT arrived and dismissed it as hype.

Now they’re reading about how valuable the data can be to their businesses, and they’re scrambling to catch up. Fortunately, it’s not too late for them (or for you). While it’s still impossible to predict all the ways IoT will affect us, we do know…..

Read More

In the News

How to Create the Perfect Call Flow

5 Skills Needed to Take on the Industrial IoT

How to Ensure Successful Digital Sales Tool Adoption

Do You Manage Your Password Like the Rest of America?

How to Be at Work but Out of the Office

Switching to Business VoIP is Smart for Sales Teams

Banned: Why Getting Saying No to Remote Work Doesn’t Work

The 5 Biggest Mobile Security Threats You Need to Know

See an article you like? Make sure to share it with your colleagues or on social media and don’t forget to tag us @TheVoIPReport.

Related Articles