Cisco Blogs


Cisco Blog > Small Business

How Safe is Your Phone System?

When considering security, make sure you’re protecting the data on your phones, too

In July 2011, the world saw just how vulnerable voicemail systems can be when a phone hacking scandal took down the News of the World newspaper and created a huge public backlash against News Corp. and its CEO Rupert Murdoch. Reporters were illegally intercepting voicemail messages left for the British Royal Family, celebrities, British soldiers, and others in their quest to scoop stories. Public figures’ voicemail messages aren’t likely to reveal product secrets, credit card numbers, or confidential business strategies, but your employees’ voicemails can. Voicemail systems can be configured insecurely and easily hacked—if you don’t take the right precautions.

Whether you have an analog or IP-based phone system, your company’s private voicemails are vulnerable. Most voicemail systems require only a simple four-digit personal identification number (PIN) to protect a user’s voicemail, and hackers have a few different methods for figuring out those numbers and gaining access to voice mailboxes, including caller-ID spoofing, and social engineering.

The good news is that deleted voicemail messages can’t be hacked. Therefore, the easiest and most effective step you can take in securing your voicemail system is encouraging your employees to delete sensitive messages as soon as they’ve listened to them.

Read More »

Tags: , , , ,

Voice System Helps Eyewear Company Focus on Customer Service

Eyewear company RestroSpecs & Company had an antiquated, low-quality phone system that was preventing employees from delivering top-notch customer service. In addition to providing subpar call quality, the system was crashing up to three times per day. By implementing the Cisco Unified Communications 300 Series voice system, employees now can seamlessly communicate with clients, and the company has experienced tremendous cost savings.

Check out the video to learn more!

Read More »

Tags: , ,

Technology Roundup: Routers and Wireless

Looking to connect your business to the world? These resources can help

They’re small, often kept out of view, and rarely thought about beyond the purchase. However, without a reliable router, you can’t securely connect to the Internet. Whether wired or wireless, a router is critical to connecting your company to your world of employees, partners, and customers. A router is also your first line of defense for protecting your network resources against malicious attacks. So choosing the best routing and wireless solutions for your business are key to ensuring that you’re building the right network to support your business today and tomorrow.

In this third installment of our Technology Roundup series, we offer some resources to help you understand routers and wireless networks and make the best decision for your small business network.

Read More »

Tags: , , ,

Cloud Computing vs. Virtualization: The Differences and Benefits

Both solutions can help maximize your current resources and technology dollars

Like many technologies that were once available only to large organizations, virtualization and cloud computing are being scaled down for small business use. The two technologies are often mentioned in the same breath as though they’re interchangeable—they’re not. Here’s where the two technologies overlap: Virtualization is one of the fundamental technologies that makes cloud computing work. However, virtualization is not cloud computing.

In enterprise networks, virtualization and cloud computing are often used together to build a private cloud infrastructure. For most small businesses, however, each technology will be deployed separately to gain measurable benefits. In different ways, virtualization and cloud computing can help you keep your equipment spending to a minimum and get the best possible use from the equipment you already have.

First, you need to understand what virtualization and cloud computing are. Virtualization software allows one physical server to run several individual computing environments. In practice, it’s like getting multiple servers for each physical server you buy.  This technology is fundamental to cloud computing.  Cloud providers have large data centers full of servers to power their cloud offerings, but they aren’t able to devote a single server to each customer. Thus, they virtually partition the data on the server, enabling each client to work with a separate “virtual” instance of the same software. Read More »

Tags: , , , ,

5 Steps for Avoiding Data Breaches

These tips can protect your business and customers from financial loss and identity theft

So far this year, 369 data breaches have been reported to the Open Security Foundation Data Loss Database, affecting 126,749,634 records. A breach in your business data can come from loss, theft, or exposure of information, which opens you and your customers up to such risks as financial loss and identity theft. Most reported breaches involve stealing private information, like customers’ email addresses and credit card numbers.

A small business can suffer data loss through a variety of data breaches, not all of which can be pinned on a malicious hacker. Data can be lost when a mobile device goes missing, gets accidentally deleted from a server or computer, or when an employee inadvertently makes private data public or steals it outright. And sometimes data is lost not by human error or interference but by an unfortunate accident such as a natural disaster or computer failure. In some way and at some time, a data breach can—and eventually will—happen to everyone.

These five steps can help you secure your critical data against breaches and mitigate the risk of losing customers, intellectual property, and regulatory compliance.

Read More »

Tags: , , ,