Traditionally businesses have led the way in communications innovation. Over the next ten years this will no longer be the case and, as we have already seen to some extent with the likes of Twitter and Facebook, we will increasingly see businesses follow where the consumer market leads. The online identity of an employee will become increasingly important. Individuals can map their social networks to a greater level of granularity than ever before. A strong online identity which includes communication channels such as phone numbers, web addresses, Facebook pages and instant messaging profiles will become increasingly important to business networking. Employees are beginning to habitually move jobs more frequently than their predecessors, so they will require a fully portable communications profile that they can take with them when they move. Businesses will no longer provide email addresses and phone numbers to their employees but will instead take their employees’ existing profiles and overlay the company’s branding for the duration of the individual’s time with them. These communication channels will be location and device independent, instead being mapped to the employee. They will be carried to whichever technology is in use at the time, whether that is a phone handset or a soft client on a laptop. The result of these changes is that relationships between businesses and telecoms operators will become more important. With a wider variety of communications services layered across the network and offered over the cloud, businesses will need to trust their communications providers in a way never seen before. It is up to the telecoms industry to ensure that it offers reliable and secure solutions which enable more innovative working practices than today – operators that manage to do this successfully will prosper in the new communications landscape. Pic: Asthmahelpercc2.0 Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe