Cisco Blogs


Cisco Blog > Small Business

Happy Thanksgiving

November 26, 2014 at 9:58 am PST

Just a quick note from our Cisco Team as we enter the Holiday Season.

Thank you all for your support this year. The team looks forward to launching more new products in the near future as well as some solid firmware updates. We hope you enjoy this holiday season.

From the Entire Cisco Small Business Team -- Happy Thanksgiving.

Marc

Cisco SG300 Series Cisco AP551

RV320 and RV325

RV320 and RV325

How-To Video’s on Demand

November 7, 2014 at 11:54 am PST

Hello all,

I hope everyone’s week has been a fruitful one.

Alike many product teams, ours sometimes have a tendency sometimes to keep a large amount of focus churning out new products with all of the features and performance characteristics our customers want in quality networking products.

While one of our product traits is #useability, we all know, there are features that are perhaps not as straightforward to the layman, small business owners, even though these savvy folks understand the need to use these features for their businesses to be successful.

So in that spirit, we have assembled a team of young, bright individuals and challenged them with an aggressive list of topics. The first of these topics is an informative yet light video-on-demand on Quick VPN configuration tips for some of my RV Series router models. Configuring VPN’s, even though it sounds exciting (yes that is a joke), is not always straightforward, so this video should be very helpful for many.

I would like to introduce you to Ruben:

I also wanted to pass along two Cisco Small Business Links that house a set of VoD’s that are a little more technical in nature that our team in Greenville has produced for topics such as Configuring VLAN’s on the RV320 and RV325 and setting up multiple types of VPN’s on RV130, RV320, RV325 and others. These again are little more technical in nature, but very informative and helpful in getting your Small Business Networking configured as needed.

Here is the Cisco Small Business YouTube Page.

And here is the Cisco Small Business Vimeo Page.

Make it a great day.

Marc

 

Tags: , , , , , , , ,

Product Transitions

October 24, 2014 at 3:42 pm PST

We made it! It is Friday afternoon and the weekend is almost upon us. But before closing up shop, it is a good time to bring up some product transitions that we have going on.

First off the wireless team has this update:KO27034

The popular WAP4410N model is no longer available. There are options:

The current replacement is WAP121 but if you looking  for more performance and more features, take a look at the WAP321, WAP551 or the dual-band WAP561.

To close this out, we have the new WAP371. It is brand new, it performs and it has wireless 802.11ac!

KN49154

Now for the RV Series:

The RV120W and RV220W will be going end-of-sale at the end of December this year. The RV180 and Rv180W will be going to end-of-sale by April of next year. Quantities could be limited on certain regional SKU’s.

The replacement models are the RV130 for the RV180, and the RV130W for the rest.

Update: We also have five PIDs that are now EoL: RV220W-A-K9-AU, RV180W-A-K9-AU (both for Australia/NZ), RV180-K9-AR (Argentina), RV180-K9-CN (China), and the RV016-G5 (EMEA). In Mexico, the RV180-A-K9-NA is now replace with the RV130-A-K9-NA.

Have a great week.

Marc

Tags: , , , , , , , ,

The Cisco RV130W – A Small Business Review

October 21, 2014 at 12:14 pm PST

Hello all,

I hope the week is going well for all of you.

KN49111

I had a Small Business owner reach out to me yesterday to let me know how her experience was in setting up and configuring her new Cisco RV130W wireless router for her small business she started a couple of years ago.

She owns a small but growing business that sells unique holiday card tree displays. Growth has been amazing so far as word is getting out about this new product. I am definitely planning on getting one for our house.

Here is here is Laura’s experience:

“As a small business owner, I am responsible for all aspects of the business – from accounting and marketing to shipping and IT.  I do not have time for technology that is hard to set-up or doesn’t work.  The Cisco RV130W works exactly as advertised.  It is easy to set-up, has been hands-off since the initial configuration and works – period.

I switched from an inferior solution that did not have wireless coverage for the entire office, connectivity consistently dropped, and was a drain on my time.  I am incredibly happy with my purchase and will be a Cisco customer from now on.”

Laura Burrows
Owner, Social Fruitfly
www.SeasonsTreetings.com

For more information on Laura’s business and these awesome card displays, skip on over to www.SeasonsTreetings.com.

Abby-400x599 IMG_1716-400x599

 

 

Tags: , , , , , , , , ,

How to Properly Implement a Secure BYOD Policy in Your Small Business

October 13, 2014 at 10:25 am PST

As technology pushes small businesses toward the use of smartphones and other devices in the workplace, securing your company’s privacy is not an easy task. However, if you follow these simple rules, integral information will not land into the wrong hands. Here are some tips on how to make bring your own device, or BYOD, a benefit to the workplace without worrying about security.

1. Establish the Objective

Image_via_flickr_by_Sean_MacAntee

Image via flickr by Sean MacAntee

When deciding on a BYOD policy, you must first identify what you plan to achieve through its implementation. Since there are so many security risks involved, a plan is imperative. If you can’t define the point of it, you might as well abandon it. While security is a risk, plans that are well researched have several advantages including increased employee work rate, improved customer satisfaction, and reduced cost on technological upgrades.

2. Decide What Devices Are Allowed

The next step is deciding what devices to allow. If you only want iPads or Androids, tell your employees specifically. If you are ever in doubt, purchase your own company devices to hand out to employees. While this may seem like an unnecessary expenditure, it will put your mind at ease. It’s also a tax-deductible expense. Check out these area-specific BYOD instructions to connect each of these devices to your company network.

3. Make Security Policies

Since employees are able to access sensitive information on your servers from home or anywhere else, bring forth a policy to curb potential pitfalls. The first thing to do is to decide if you are able to handle this task on your own. If not, you may want to consider hiring an IT firm to overlook the security of your BYOD security. You could also have authentication, as well as passwords. This means that your system will periodically require password updates or even a new password for each log-in, each which goes a long way to preserving important information.

4. Combine BYOD Policy with Acceptable Use

If you don’t already have an “Acceptable Use Policy” for your business, you should strongly consider one. Not only will it curb employee distractions, but it will reduce potential risk for harmful viruses and malware. While employees will undoubtedly slip at some point, set forth rules that will lay out the disciplinary actions for such indiscretion. In addition to this, make sure that you have some sort of monitoring system in place. There’s no need to be nosy, but knowing what your workers do while on your network can save you a headache in the future.

5. Train Your Employees

Training can be the difference between increased productivity and total catastrophe. Engage in communication with your employees about the BYOD policy, and hold training seminars on a frequent basis to show them potential risks of BYOD abuse. This shows employees not only how to use their device effectively, but also that they are being monitored at all times.

6. Develop an Exit Strategy

Undoubtedly, at some point, employees will leave your company. Removing them from access to information on the network, business email, and other apps to which they previously had access can be tricky. Make certain that you figure out a way to avoid security lapse by maintaining an exit checklist. On this list, you can decide how you want to shut down their access. Some of the most common security checks disable company emails, wiping company-issued devices, and changing the passwords to any company accounts used in their position. Once these steps are completed, you can stand assured that your company’s private information is secured.

Once you have considered all of these aspects, it is finally time to decide whether or not implementing a BYOD policy is in the best interest of your business. While there are downsides, the key advantage might lie in keeping up with your competitors. Remaining a forward-thinking business not only attracts new customers, but helps you to retain them in the future.