Quick question for IT leaders – can the switches on your network report 100% unsampled netflow? If they can’t, there may be elusive cybersecurity threats hiding within your network. Yes, inside your network.
Every week, I hear stories of intellectual property (IP) loss and personal identifying information (PII) being compromised. This is due in part to many agencies still approaching cybersecurity the way they always have – guarding the edges to keep threats out. But that’s not enough anymore. With malware now being custom-written to bypass the perimeter, external drives plugged in, and the ever-present possibility of tricked or malicious insiders, monitoring inside the network is now one of the most effective ways to find and eliminate threats.
Read More »
Tags: cybersecurity, national cybersecurity awareness month, netflow, security
Can there ever be enough discussion around “social media measurement”? While I joke as part of the opening of this post, it is a topic that we’ll continue to explore in upcoming #Ciscosmt activities. And as a follow up to my recent “Decoding Social Media Measurement” post, last Thursday Charlie Treadwell, Manager, Digital and Social Media Marketing at Cisco, shared his insights through the monthly #Ciscosmt Series Twitter chat. Below is a transcript of the interesting conversation as well as a few key takeaways.
Social Media Measurement #Ciscosmt Twitter Chat
I think this is a great start to the ongoing conversation we’ll explore further as we move forward. As it evolves, it provides more and more critical data points for business impact. I’m interested to hear how you are using social media measurement to benefit your business and also what types of metrics are most important to you.
- Social media measurement is a key element in showing business value…social media benefits are no longer taken at face value. Businesses must align metrics to overall goals and benchmark along the way.
- Metrics will vary from company to company based on individual goals. However, some basic types of data to measure includes: cost and/or support savings, revenue, influencers, share of voice, engagement, and crowdsourcing.
- Social media measurement can be implemented even on limited budgets. Use tools like Google Analytics, individual social channels, or other resources to gather data and make informed decisions.
Pilot and test social media strategies on an ongoing basis and create measurement benchmarks throughout the initiatives to ensure efforts are maximized.
- Quantity is an important part of the social media measurement equation. However, “quality” is an even more crucial element to consider. Take time to look deeper into the metrics to understand the types of engagement, influencers, or other data points that can be retrieved.
- Measurement can and should be implemented across the organization when it comes to social media. HR, sales, support, marketing, and other areas can benefit from strong measurement best practices.
October Twitter Chat
And mark your calendars for next month’s Let’s Chat! #Ciscosmt Twitter chat, taking place on Thursday, October 24th from 9-10 a.m. PT. More details will follow shortly on this blog and through the @CiscoSocial handle on Twitter. Stay tuned for more details by following the Cisco Digital and Social Blog and the #Ciscosmt hashtag!
Let’s Chat! #Ciscosmt Series: Engaging Employees in Social Media Twitter Chat Transcript
Cisco Social Media Training Program Opportunity:
If you have any questions or are interested in other types of social media training, check out our complimentary Cisco Social Media Training Program and follow the #ciscosmt hashtag. To request customized one-on-one team training sessions, email firstname.lastname@example.org.
Tags: B2B, B2C, Cisco, ciscosmt, education, Executive, information-sharing, learning, Listening, measurement, mentoring, metrics, monitoring, social, social learning, social media, social media strategies, social networking, training
So here we are again – seems like only yesterday that we were going through the difficult task of picking the BIG Awards 2012 finalists…. and now over a year later we are about to announce the finalists for the 2013 competition, and have had a full year supporting last year’s winners Snap Fashion and Digital Shadows.
The BIG Awards is one of the 4 main components of Cisco’s British Innovation Gateway (BIG) programme, which forms the core of our innovation-based legacy from London 2012.
So much has happened in the last 12 months it’s hard to fathom and already both 2012 winners are moving their businesses forward in so many ways. Snap Fashion launched in Singapore and Digital Shadows received Cool Vendor 2013 status from Gartner. It seems like they are the “grown-ups” to the new talent coming through – I have to say it was great to see Jenny, CEO from Snap Fashion, and Alastair, CEO from Digital Shadows, offering their advice and experience at our recent semi-final event at the Hospital Club in Covent Garden.
Phil Smith, CEO of Cisco UKI and Tom Kneen, BIG Programme Lead, Cisco with Jenny Griffiths, CEO and Founder of Snap Fashion and Alastair Paterson, CEO of Digital Shadows.
As a team we were wondering how we would match the quality of the 6 finalists from 2012. But when we first glanced at the early submissions for the 2013 competition we knew we had no need to be worried – the entries did not disappoint and once again the judging panel was set a very hard task to pick 20 semi-finalists and then in the last couple of weeks the finalists.
Read More »
Tags: BIG, British Innovation Gateway, corporate social responsibility, CSR, innovation, start-up, technology
For the last couple of years, Cisco Security Intelligence Operations has released a series of blog posts for National Cybersecurity Awareness Month. The theme for this month from the National Cyber Security Alliance is “Our Shared Responsibility.” The Department of Homeland Security is running a series on this theme, as are many other private organizations.
Our action and inaction have consequences for systems and services used by us, our friends, and our places of employment. Attackers use accounts compromised due to poor passwords and lack of two-factor authentication to launch other attacks on users connected to those accounts. End-user systems infected with malicious software are leveraged to conduct distributed denial of service attacks against financial and government websites. Users who fall victim to spear phishing attacks open the door for attackers to leap frog their way through sensitive networks and collect proprietary information from our places of employment.
Read More »
Tags: Cisco Security, cisco sio, cyber risk report, cyber security, cyber-security-month-2011, cyber-security-month-2012, ncsam-2013
Today’s IT organizations are stuck between a rock and a hard place. Most face an avalanche of new bandwidth requirements hitting their networks, yet too few resources to support the business’ needs. In 2013, three out of four organizations will not have any additional wide area network (WAN) budget (Nemertes Research). That means 75% of IT teams will not be able to buy more bandwidth to address exponential traffic growth, and will need to re-think their entire approach to the network if they want stay successful. Treading water will not be an option.
Here is a sampling of the trends that are challenging IT now:
Read More »
Tags: application experience, AX, Cisco, Intelligent WAN, ISR, ISR G2, ISR-AX, IWAN