Feeds

Communications breakdown

Managing UC risks

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Workshop Communications mechanisms in the workplace – from mobile devices to instant messaging and web conferencing – have proliferated over recent years. The days when a telephone was all you needed are long gone: nowadays, people juggle regularly between multiple mechanisms using various interfaces to communicate as they go about their jobs.

The resulting problem is that each mechanism has its own nuances that individuals have to tune into before it can work for them. So setting up a web conference, for example, may follow a quite different set of rules to setting up an audio conference. Moreover, these tools do not often interconnect seamlessly, even though there is an increasing need for them to do so.

The chart, taken from recent research carried out by Freeform Dynamics into advanced business communications captures just how fragmented our work environments have become, with many businesses having a broad mix of communications mechanisms and tools. There are varying degrees of implementation of these tools across organisations. While some, such as traditional telephony and email, are widely used in the workplace, others, such as video-conferencing and mobile SMS, enjoy only partial adoption, or haven’t yet been implemented.

Contrary to what people on the receiving end might think, this fragmented environment isn’t a deliberate ploy by the IT department to make communications complicated. Rather, it has crept up on us over time, with newer technologies tending to find their own way into the workplace, instead of being implemented through a structured, integrated approach. This often goes hand-in-hand with poorly enforced rules around usage, which, in turn, tend to lead to things not being exploited properly. However, to fix this chain of events would be no easy task.

As a result, business users tend to muddle through with something that works for them, although not nearly as well as it could. Such a complex landscape makes communications highly inefficient. Resulting issues range from delays in getting necessary information from within the business, to poor intra-company collaboration and team coordination, and of course poor customer satisfaction. For example, the scenario where customer support wasn’t able to track down the right person to help deal with a query, and had to leave an irate customer with a promise to call back as soon as they managed to locate some assistance, will be familiar to many.

Beyond inconvenience, inefficiency and customer impact, however, lie more serious ramifications. Fragmented communications can lead to regulatory compliance blind spots, if information that needs to be captured falls through the cracks where different tools do not properly interconnect. Security breaches are much more likely as well, as a result of the numerous interfaces between the comms mechanisms being used. There is also the potential for incorrect or inappropriate advice to be passed around when “community” sources – either internally created by groups within the organisation, or, more worryingly, external sources such as Wikipedia – are exploited without any form of sanity check taking place.

This problem is not going to go away any time soon, and is one that businesses can’t afford to ignore. Of course, unified communications (UC) vendors will jump up and down and wave their arms with the offer of a fix-it-all solution. Fair enough: UC is designed precisely to deal with the ever-increasing communications fragmentation that companies are facing. But be warned. While implementing an overlay solution like UC in its various guises of unified messaging, unified directory, presence and so on, will help to deal with many of the issues mentioned, it is not a quick and easy fix. And unless it is done well, businesses are unlikely to be any better off.

Rather than get caught up in the hype of UC, companies need to have a good grasp of the issues they are facing, defined clearly in their own terms, and the impact on the business if the issues are not addressed. This should span not only what is happening at an infrastructural and application level, but also extend beyond it. Areas that should be addressed include how well processes are defined and executed, what policies are in place and to what extent they are enforced, as well as what role senior business managers should take to make sure things work.

The output of this exercise will likely be worth its weight in gold, as it will provide insight into where the biggest problems already lie, which helps companies to prioritise what needs to be dealt with straight away, whether this is with UC or not.

As always, we’re interested to know how this reflects your own situation, and how well you feel your own communications mechanisms hang together. Have you had any serious breaches as a result of a fragmented environment? And if so, have you a plan in place for dealing with these problems? Do let us know. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?