Cisco Blogs


Cisco Blog > Small Business

When Communications Really Matter

Guest Post by Contributing Author Chintan Patel

Chintan Patel is currently the Head of Business Development in Cisco’s Collaboration Business based in the UK.  His background in Engineering and Economics gives him a unique perspective in bridging the business and technology worlds, as does his experience on the buy and sell side of transformational technology.

Over the coming months an organization the size of a Fortune 100 company will be assembled and dissembled to deliver the 2012 Olympiad. Being given the chance to host the greatest show on earth is no simple task. According to LOCOG, the London Organizing Committee of the Olympic and Paralympic Games, around 200,000 people will be working on the Games at Games time, supporting those who visit using the 11 million tickets that have been made available.

Read More »

Support Resources Help Resolve Network Issues

July 3, 2012 at 8:00 am PST

Available whenever you need them, these 4 tools can help minimize the impact of network downtime

Networking trouble can happen at any time—day or night—not just during business hours. Let’s face it, business happens 24 hours a day, 7 days a week whether or not the proverbial lights are on. If a router or other critical piece of your network goes down, that could mean lost revenue and productivity for your company. But help is just a mouse click away.

If your network is built with Cisco Small Business products, you have unlimited access to innovative tools and resources to help troubleshoot and resolve the issue you’re experiencing. Because these resources are available all day, every day, they’re available whenever you need them.  Next time you need support—and fast—try one of these tools to get your network up and running.

Read More »

Tags: , ,

Secure Remote Access Is Key to BYOD

You need to provide safe network access before allowing employees to bring their own devices to work

Almost every small company is experiencing the phenomenon referred to as “the consumerization of IT.” If you were the first in your office to log into your company’s network with your smartphone, you may even have been leading the charge. As more and more employees follow the “bring your own devices” trend (BYOD, for short) to work, you need to figure out how to give them remote access to the company network while keeping corporate data and personal information separate and secure.

In general, the BYOD movement is good for employers, even though people are using devices that aren’t necessarily provided by the company. Employers want to find ways to accommodate their employees’ desire to access their work email and other applications whenever and from whatever device they’re using, such as tablets and smartphones. That usually means that employers need to make some changes to the access policies. As an employer, you need to have network access policies with visibility and  control over every device and application; and the user has to follow some rules to protect critical company data when accessing the network remotely.

Read More »

Tags: , , ,

Are You a Search Engine Marketing Maven or a Trade-Show Pro?

Probably not. It’s not that you don’t want to be. You’re just busy with a million other details, like running a business.

That’s why the Cisco mConcierge program developed a set of concise Tactical Marketing Guides. These guides are designed entirely to help you better execute on more than a dozen common marketing initiatives, including social media networking, newsletters, and radio ads — just to name a few.

Think of them as marketing “Cliff Notes,” or “cheat sheets:” just the basics, boiled down to two pages, complete with objectives, best practices, and a sample timeline.

Read More »

Tags: , ,

How to Make Social Media Safe

Reap the benefits of social sites by protecting your network from security threats and data loss

In a relatively short amount of time, social media has gone from an annoying productivity killer to an important business productivity and marketing tool. Of course, employees can still while away time on sites like Facebook and YouTube, but they’re also using these sites, along with LinkedIn, Twitter, and Pinterest, to promote their companies’ products and brands, track the success of marketing campaigns, respond to customers’ complaints and compliments, and recruit new talent. Social media sites have even become a way to collaborate with coworkers and business partners. Companies that limit access to social media may actually find themselves at a competitive disadvantage.

Finding the balance between business needs and risk is key to allowing employees access to social media sites. You can do this by loosening some of your security controls, adjusting your acceptable use policy (AUP), and tolerating a little personal use of social media by employees.

Read More »

Tags: , ,