It’s hard to believe another year has come and (almost) gone. Every year seems to speed by ever faster, much like the pace of technological advancements. We understand that it’s a challenge keeping up with the latest technologies that impact your small business. So we were curious to find out what topics caught your eye this past year on the Small Business Blog.
Security was by far the most popular topic; and security in all forms—from your core network to personal devices to the cloud. That’s not surprising when you consider all the ways in which you can now access data.
Here’s the list of top 10 posts for 2011:
Read More »
Tags: cloud, networking, routers, security, small_business, switches
At Cisco, we are focused upon internally and externally sharing social media best practices and lessons learned from individuals who have successfully integrated social media into their day job. We recently sat down with one such social practitioner, Jennifer Halim, a subject matter expert (SME) on the Customer Support Team, to learn more about how she incorporates social media into her job at Cisco.
Jennifer joined the Cisco Technical Assistance Center (TAC) in 2007 and focuses on security products in Australia. In 2010, she became a Technical Account Manager with ScanSafe, Cisco’s cloud-based web security service. Even after the move, she managed to keep up to date with the technology that she used in her previous role by actively participating on the Cisco Support Community. With over 322,000 registered users and 11 years of history, the Cisco Support Community is a platform on which technical experts and Cisco customers can interact with each other by asking and answering questions in the discussion forums, commenting on blogs, rating videos, and more. While spending an average of one to three hours per day contributing to the discussion forums regarding Cisco Security products, she participates completely out of her own will during after business hours. Through her engagements on this website, Jennifer states that she is constantly learning from other contributors to the community, and she enjoys the satisfaction of being able to help customers by answering their questions and resolving their issues.
Community participants like Jennifer who have responded to customers have contributed to Cisco’s $80 million in annual cost savings that is attributed to the Cisco Support Community and is a conservative estimate based on TAC case deflection. Based on the number of customer cases resolved, Jennifer has been one of the top contributors since she joined the community in 2010.
How does she manage to integrate her Support Community activities into her day job?
Read More »
Tags: ambassador, Australia, best practices, Cisco, Cisco Supporty Community, Customer Support, forums, lessons learned, ScanSafe, security, social media, TAC, Technical Assistance Center
Organizations are faced with providing security for employees that are rapidly adopting new technology in their personal and professional lives and expect their work environments and employers to do the same. As the data from the new Cisco 2011 Annual Security Report and the Cisco Connected World Technology Report Chapter 3 show, organizations that do not or cannot provide that type of environment are at risk of losing the ability to compete for those employees and business opportunities. If employers attempt to block, deny, or forbid mobile devices, social networks, instant communications, and new technologies in the work place employees will likely ignore the policies or, even worse, find ways around them that open your environment to unrealized risks.
Read More »
Tags: 2011 annual security report, botnets, Cisco, cloud_computing, cyber security, DDoS, identity, malware, security, spam
As a new father and a security professional, it terrifies me to think of my daughter roaming freely around the Internet. However, I feel like restricting her completely will cut off a valuable avenue for education.
Recently, it seems in the media there has been a push to move websites that contain adult content into the .xxx sponsored top level domain (sTLD) in order to easily classify them. While I understand the reasoning for this, there is definitely a large spectrum of additional content which, in my opinion, is unsuitable for children and disallowing access to this sTLD would not provide an adequately restricted environment.
Read More »
Tags: Parental Controls, security, top level domain
Smart and managed switches can help secure your network from the inside out
Managing who can hop on to your network from the inside has become more important than ever, now that almost everyone who enters your building is carrying a laptop with an Ethernet port, a Wi-Fi-enabled smartphone, or a tablet computer configured to locate the nearest wireless network. Likewise, you may want to give visiting partners or other guests an Internet connection without giving them access to all your network resources. Bottom line: you need to secure your network on the inside. A switch with built-in security features adds another layer of defense for your network, protecting the devices on your LAN from internal threats.
Switches are the foundation of your network, connecting computers, servers, printers, and other peripheral devices. There are three types of switches—unmanaged, smart, and managed. Smart and managed switches both include security features, but managed switches give you the most control over network traffic with more advanced security and features.
Read More »
Tags: networking, security, small_business, switches