In the B2B world, LinkedIn offers marketers a wide array of different resources that they can use to enhance their social media efforts. A vast majority of people use LinkedIn as a viable platform for uncovering business information. Due to the nature of the site, on LinkedIn people are more inclined to provide detailed professional information than on Facebook or Twitter. You, as the marketer, have the advantage of leveraging this very rich profile data to target your messages to people on a very specific basis! Essentially, LinkedIn allows you to engage with a very particular target niche population that is strictly relevant to your core business needs.
Did you know that LinkedIn Groups is one of the most widely used activities on LinkedIn with over one million different groups (Source: LinkedIn Groups Directory)? Specifically for B2B companies, people may use professional interest groups to share knowledge and find answers to tough questions. A regular LinkedIn user, David Deans, Digital Marketing Manager in Cisco’s Service Provider organization, shared some of his experiences to make the most of LinkedIn Groups participation. These best practices will surely take your own social media efforts to the next level, so read on to learn more.
When it comes to your company’s browsing policies, make sure you’re safe—not susceptible
Threats come at your business from every angle, including malicious parties lurking in cyberspace. As a smart small business, though, you have the security basics covered to protect you from viruses, spam, and other attacks. But as it turns out, security is often breached in more mundane ways—such as ordinary on-the-clock web browsing.
As a small business professional you know only too well how difficult it can be to keep your company thriving, much less prepared for unexpected bumps down the road. But there are several “gotchas” that are critical to address now so if the future does contain a trapdoor, your company won’t fall through.
Here are my top five “musts” to keep your business up and running:
As the Nexus platform has become a staple in the data center environment, securing the environment begins with the Nexus Operating System (NX-OS). The recently published NX-OS hardening guide seeks to deliver on that. The Cisco NX-OS Hardening Guide provides information to help administrators and engineers secure NX-OS system devices, inherently increasing the overall security of a network environment. With the ever-increasing opportunity for exploits and vulnerabilities to prevail, it is imperative that organizations adopt and apply best practices to harden their infrastructure devices. We all know that an environment is only as strong as the weakest link, thus every effort should be made to ensure that each device is hardened.
Hope you found last week’s inaugural blog on the “Tablet Welcomed.” series interesting enough to come back.
Today, I am sitting down for an interview with Brett Belding, who was instrumental in designing a mobile device access policy for Cisco, in his role as the Senior Manager of IT.
I met Brett over Cisco Telepresence one early morning (when I typically I am still asleep, let alone in the office) to accommodate his Eastern time zone schedule. For the videophile readers, I should say that I pointed my camera directly to the Telepresence screen, which is why you may notice my reflection at certain points. However, this amateur video alone could be a case study for the quality of Cisco Telepresence.