Interoperability. This is a broadly used term in the industry, and at Cisco, we often talk about it in the technical context of the IT stack. However, let’s take a step back and focus on what we want to achieve through interoperability—connecting the right collaboration experiences to the right devices and users.
With Cisco Unified Communications (UC) 9.0 we deliver a series of enhancements that bridge systems, resulting in increased interoperability to enable these critical collaboration experiences.
Many of you are familiar with email-style calling, aka URI (Uniform Resource Identifier) dialing, available if you use our current Cisco TelePresence endpoints. With Cisco UC 9.0, you can now use URI dialing beyond video endpoints. Choose whatever you prefer—an email address or phone number—to Read More »
Tags: bridging systems, collaboration, interoperability, IP Phones, TelePresence, unified communications, video
When considering security, make sure you’re protecting the data on your phones, too
In July 2011, the world saw just how vulnerable voicemail systems can be when a phone hacking scandal took down the News of the World newspaper and created a huge public backlash against News Corp. and its CEO Rupert Murdoch. Reporters were illegally intercepting voicemail messages left for the British Royal Family, celebrities, British soldiers, and others in their quest to scoop stories. Public figures’ voicemail messages aren’t likely to reveal product secrets, credit card numbers, or confidential business strategies, but your employees’ voicemails can. Voicemail systems can be configured insecurely and easily hacked—if you don’t take the right precautions.
Whether you have an analog or IP-based phone system, your company’s private voicemails are vulnerable. Most voicemail systems require only a simple four-digit personal identification number (PIN) to protect a user’s voicemail, and hackers have a few different methods for figuring out those numbers and gaining access to voice mailboxes, including caller-ID spoofing, and social engineering.
The good news is that deleted voicemail messages can’t be hacked. Therefore, the easiest and most effective step you can take in securing your voicemail system is encouraging your employees to delete sensitive messages as soon as they’ve listened to them.
Read More »
Tags: IP Phones, security, small business, voicemail, voip
IP telephony has been deployed for over 12 years now within Cisco. We are constantly in an ongoing process to refresh our older phones with next generation devices. It’s not easy – it’s a little like painting the Golden Gate Bridge: you’re never finished.
Read More »
Tags: Cisco 7960, Cisco 9971, coc-collaboration, CPE, entitlement, IP Phones, IPT, phone, refresh, standardization, UC, unified communications, upgrade