Cisco Blogs


Cisco Blog > Digital and Social

Social Media Mindset fostered with the help of IDEO

October 25, 2011 at 12:21 pm PST

I’ve been with Cisco for about 11 years with a few breaks in between and I’ve always been in awe at how technology advances each time I return.  I think back to Eudora email and conference call bridge scheduling via Meeting Place.  Anyone else remember those days of simplicity?

My mindset has had to change and adapt each time I have returned.  With the help of the “The Mindset” book by Carol S. Dweck, Ph.D., I had at least prepared myself to have a “growth mindset” when coming back to work each time.  I have to admit I still battled the fixed mindset of “I may fail at this” from time to time.  Regardless, I chose to press on and adapt.

The biggest mindset shift for me in the past few years has been all things related to social media such as Facebook, Twitter, YouTube, Flickr, LinkedIn, etc.. We are now connecting with customers in real time and listening to their thoughts, concerns and feedback.  Much has changed from filtered feedback via press and analysts, to today where listening data is being viewed and responded to in real time.  These advances have all required me to incorporate a social media lens into the overall strategy and tactics of my job.

Read More »

Tags: , , ,

10 LinkedIn Groups Lessons Learned

October 17, 2011 at 2:30 pm PST

In the B2B world, LinkedIn offers marketers a wide array of different resources that they can use to enhance their social media efforts. A vast majority of people use LinkedIn as a viable platform for uncovering business information. Due to the nature of the site, on LinkedIn people are more inclined to provide detailed professional information than on Facebook or Twitter. You, as the marketer, have the advantage of leveraging this very rich profile data to target your messages to people on a very specific basis! Essentially, LinkedIn allows you to engage with a very particular target niche population that is strictly relevant to your core business needs.

Did you know that LinkedIn Groups is one of the most widely used activities on LinkedIn with over one million different groups (Source: LinkedIn Groups Directory)? Specifically for B2B companies, people may use professional interest groups to share knowledge and find answers to tough questions. A regular LinkedIn user, David Deans, Digital Marketing Manager in Cisco’s Service Provider organization, shared some of his experiences to make the most of LinkedIn Groups participation. These best practices will surely take your own social media efforts to the next level, so read on to learn more. 

Read More »

Tags: , , , ,

Workplace Web Browsing: Do Employees Put You At Risk?

When it comes to your company’s browsing policies, make sure you’re safe—not susceptible

Threats come at your business from every angle, including malicious parties lurking in cyberspace. As a smart small business, though, you have the security basics covered to protect you from viruses, spam, and other attacks. But as it turns out, security is often breached in more mundane ways—such as ordinary on-the-clock web browsing.

Read More »

Tags: , , ,

5 Tips for Keeping Your Small Business Running

As a small business professional you know only too well how difficult it can be to keep your company thriving, much less prepared for unexpected bumps down the road. But there are several “gotchas” that are critical to address now so if the future does contain a trapdoor, your company won’t fall through.

Here are my top five “musts” to keep your business up and running:

Read More »

Tags: , ,

Introducing the NX-OS Hardening Guide

As the Nexus platform has become a staple in the data center environment, securing the environment begins with the Nexus Operating System (NX-OS). The recently published NX-OS hardening guide seeks to deliver on that. The Cisco NX-OS Hardening Guide provides information to help administrators and engineers secure NX-OS system devices, inherently increasing the overall security of a network environment. With the ever-increasing opportunity for exploits and vulnerabilities to prevail, it is imperative that organizations adopt and apply best practices to harden their infrastructure devices. We all know that an environment is only as strong as the weakest link, thus every effort should be made to ensure that each device is hardened.

Read More »

Tags: , , ,