Cisco Blogs


Cisco Blog > Channels

Tap into the ‘Force’ to Drive Your Success in 2012

January 27, 2012 at 8:57 am PST

Have you heard the news? 3D versions of the Star Wars movies will begin rolling out in 2012. I know some sci-fi geeks…ah, friends…who can hardly wait.

Me, I prefer Force 3. I like to think of them as the living, breathing version of Star Wars. No Darth Vaders, no jittery C-3POs, but plenty of Luke Skywalkers—regular “heroes” intent on designing technology solutions with a relentless focus on meeting their customers’ business needs.

But what really grabs my attention in their video below is that Force 3 gets it, they truly do. As a thriving Cisco Master Partner, pushing products isn’t on their intergalactic radar— it’s not even within low-earth orbit.

So if it’s not selling gear, what’s Force 3’s strategy for success? Read More »

Tags: , , , ,

Cisco 4Q11 Global Threat Report

The Cisco 4Q11 Global Threat Report has been released. The report covers the period from 1 October 2011 through 31 December 2011 and features data from across Cisco Security Intelligence Operations. This quarter’s contributors were Cisco Intrusion Prevention System (IPS), Cisco IronPort, Cisco Security Research and Operations (SR&O), and Cisco ScanSafe.

Read More »

Tags: ,

2012 Predictions: These I Like

January 23, 2012 at 9:13 am PST

It took me awhile to go through all the random Top 10 of 2011 lists for various topics, so now I’m ready to look ahead to 2012’s preponderance of pundit predictions. Or maybe I’m just fashionably late. I’ve tripped over a few reports here and there – some quite possibly developed by caffeinated squirrels on a treadmill.

Not me, but she looks like she's predicting something...

On the technology front, I found one more interesting than others. Instead of putting a small group of experts in a room and not letting them out until they agree on a list, Baseline Magazine annually surveys business and technology managers at companies with 100+ employees to ask about their organizations’ investments, plans, and strategies. Across several hundred respondents, patterns evolve.

Whoever these people are, coming from the desk I use, I like the way they (and their companies) think. Following – their predictions and my two cents (maybe three or four).

Read More »

Tags: , , , , , , , ,

Mythbusters: All Data Encryption is the Same, Right?

Many small businesses opt for wireless networks; they provide the connection you need and are easier and less expensive to set up than a wired network. But that convenience can cost your company in compromised security and lost data if the network isn’t appropriately encrypted.small_business, wireless, wireless network, WLAN, security

Although most wireless LAN (WLAN) equipment comes with many settings preconfigured, encryption isn’t one of them. In this latest installment of Mythbusters, we explain why the encryption protocol you choose—Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA)—makes a difference.

Read More »

Tags: , , , ,

Keep passwords safe and secure with password management

A password manager can encourage users to adopt unbreakable passwords

As users, we know that we should use complex, secure passwords that aren’t easily guessed words from the dictionary like ”admin” or personal dates to protect our systems. Nonsensical words and phrases that substitute digits and symbols for letters, such as ”45Monk3y t1m3 fun!,” are the most secure. But we also know how difficult it can be to create several unique, strong passwords—and even harder to remember them all.

To encourage employees to create passwords that are hard to crack but easily remembered and used, you can provide them with a password management system. Password management is both a standard company-wide policy for developing passwords, and, for many companies, a password manager application you add to your security arsenal as part of your small business security policy.

Read More »

Tags: , , ,