Devices are everywhere

The security advantages of cloud-based calling

As it emerged recently about former Prime Minister Liz Truss’s mobile phone allegedly being hacked, the question resurfaces about the security of mobile devices – even some of the most supposedly secure in the country.

Because of high profile hacks such as the one on Truss, there are many small businesses wary about making the switch to cloud-based telephony. But along with cost savings and other advantages, security at the endpoint device level can be significantly reinforced by doing so.

How cloud-based communications can improve mobile security
The security of cloud-based telephony systems – and the data that resides on mobile devices - are handled by experts at your cloud provider. This provides a layered approach to security around the cloud-based data, irrespective of the platform or provider. Some providers also offer the “poison pill” with remote mobile device wiping and data backups.

With VOIP-based calling, you’ll also benefit from encrypted security connections for users inside or outside the safe confines of the corporate networks. This makes it ideal for remote or hybrid working environments from a security perspective – as well as reducing the cost of calls across the business.

When choosing a new VOIP provider, you’ll also want to look for security accreditations such as UK GDPR, the EU GDPR if you are holding the data of any European customers, or any industry-specific accreditations in sectors such as healthcare or financial services.

Related Articles
Devices Unlock the potential of Microsoft Surface
Unlock the potential of Microsoft Surface

Three ways to save time and costs - and maximise productivity.

Devices The stage for AI
The stage for AI

How Microsoft Surface adds another layer to the AI story.

Devices Growing business with smarter decisions
Growing business with smarter decisions

An eight-step guide to using resources more intelligently.

Devices Print solutions whatever the requirement
Print solutions whatever the requirement

Kitting out your users with the solutions they need

Devices What's going on in the devices market?
What's going on in the devices market?

A look under the bonnet of the global PC market

Devices Why manage Chrome browsers?
Why manage Chrome browsers?

Forrester's insight into cost savings and productivity gains.

Devices Are endpoints your weak link?
Are endpoints your weak link?

How to build and implement a cloud EDR solution.

Share this story

Rate the Article

Click the link below to rate this article

Rate this article

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Interested in what you see? Get in touch, and let's start a conversation Get in touch