Cisco Blogs


Cisco Blog > Small Business

Understanding the Difference Between Wireless Encryption Protocols

The WPA data encryption protocol you choose depends on your wireless network’s needs

It’s critically important to secure your wireless networks, but security can be complex, particularly when it comes to configuring each network component appropriately. A smart place to start is with the wireless router, which connects your local area network (LAN) to the Internet. Routers allow you to encrypt data as it travels in and out of your network, making it much more difficult to be read or altered by hackers trying to steal confidential information. Most small business routers let you choose which data encryption protocol you want to use, but in order to make the best choice for your network, you need to understand the differences between encryption protocols.

Read More »

Tags: , , ,

Raising the Bar: Cisco Managed Switches Outperform Competitors

March 27, 2012 at 8:00 am PST

Daily, we read about and experience the increasing importance of mobility and cloud offerings in the SMB market—and inherent in these trends is the capacity to configure appropriate switches. Tablets, smartphones and laptops are prevalent in the workplace and as SMBs often forgo funding an IT department, it is crucial that their hardware and solutions scale as business transforms.

That said, a recent testing report conducted by Miercom details how Cisco SMB Ethernet switches outperform those of HP and D-Link across the board. From overall performance and price to security, ease of use, and energy efficiency, Cisco’s switches are raising the bar. Highlights from the report include:

Read More »

Tags: , ,

Mythbusters: Cloud Computing Is a Deployment Model, Not a Point Product

Cloud computing gives you a new way to access many different types of software, no matter how small your company

It seems that everyone’s talking about how cloud computing is the answer to all your technology problems—and, depending on your problems, it may be. But before you can use the cloud, you need to understand what it is.

Cloud computing is not a product that you purchase; cloud computing is a deployment model. It is a new way to access and use software for your small company; it is also a new way for vendors to sell their products. How you use cloud computing is up to you.

Simply put, cloud computing allows you to use a vendor’s software over the Internet. Though the software is hosted on the provider’s server, it functions on users’ computers in the same way as installed software—your employees simply connect to it online. You do not purchase and install the application on your server or your desktops; depending on the cloud-based software (also referred to as Software-as-a-Service or SaaS), you might install a specialized client that people use to connect to the service or users might simply connect through their Web browser.

Read More »

Tags:

Protect Data Shared Through Unified Communications

Lock down your UC system to prevent the theft or loss of sensitive business information

Companies large and small have embraced VoIP (voice over IP) and unified communications (UC), and malicious parties are there, too. In fact, some research firms estimate that targeted attacks on VoIP infrastructure account for as much as one third of all attacks around the world, in part because companies haven’t secured their VoIP and UC systems as well as other online applications like email. Unauthorized persons can use holes in UC systems to sneak onto your network, access stored business data like sensitive customer information, or commit toll fraud.

Read More »

Tags: , , , ,

Keep Videoconferencing Conversations Confidential

Follow these tips to secure critical company information from prying eyes

Videoconferencing—conducting meetings with anyone, at anytime, from anywhere—seems like a win-win solution. Videoconferencing both saves time and cuts down on travel costs. And it can help employees collaborate more efficiently and stay better connected.

What can go wrong? As it turns out, videoconferencing can open a giant security hole in your business. Like a tap on your CEO’s phone or a bug hidden under your conference table, videoconferencing can allow eavesdroppers access to your company’s confidential conversations.

Read More »

Tags: , , ,