Cisco Blogs


Cisco Blog > Connected Life Exchange

Digital Britain: Creating a Compelling Online Presence

How does a business become a category leader that fully leverages their online activity for market development and growth? I’ve previously described the process of using social media as an online lead generating tool, attracting prospective customers towards the corporate website.

Read More »

Tags: , , , , ,

How to Create a Technology Plan for Your Small Business

Guest post from our friends at SCORE

W. Kenneth Yancey, Jr., CEO
Ken Yancey is responsible for developing SCORE’s business plan and vision as well as coordinating national program efforts and all the association’s management operations. He also directs the efforts of the headquarters staff to serve and support the 370 chapters across the country.  Prior to joining SCORE in 1993, Ken was Executive Director at the National Business Association. A graduate of Texas A&M University (BBA/Finance), Ken is a recipient of the USA Freedom Corp Award of Excellence, the ASAE Summit Award, and the BSA Goose Creek District Award of Merit.

Do you hear about today’s technology tools for small business and wonder if they are right for you?  Do you dream about finding the perfect tools to help run your business, but not sure where to look or if you can afford them?  If you have an hour, follow these three easy steps to analyze your small business’ technology needs.

Read More »

Tags: ,

Multi-Vendor vs. Single-Vendor: Making the Choice

Guest Post by Contributing Author Ken Presti

The IT industry has long debated the benefits of single-vendor networks vs. multi-vendor networks. We sometimes act as though this discussion were unique or somehow surprising. But that’s not really true. After all, the people at Coke never asked you to drink Pepsi. And the folks at General Motors were never really all that taken with the idea of you tooling around in a Ford or a Lexus. So every time I hear about the benefits of single-vendor, a part of my brain thinks, “This just in!…… A sales guy thinks you should buy his products!”

But another part of my brain also recognizes that IT systems are different from cars. You buy your car from a single vendor. With the possible exception of hobbyists and other gear-headed types, nobody buys or designs cars that are part Chevy, part Toyota, and part Lamborghini. A Chevyoghini? Never mind.

Read More »

Tags: , , , ,

Workplace Web Browsing: Do Employees Put You At Risk?

When it comes to your company’s browsing policies, make sure you’re safe—not susceptible

Threats come at your business from every angle, including malicious parties lurking in cyberspace. As a smart small business, though, you have the security basics covered to protect you from viruses, spam, and other attacks. But as it turns out, security is often breached in more mundane ways—such as ordinary on-the-clock web browsing.

Read More »

Tags: , , ,

You’ve Been Hacked? Here’s What to Do

5 helpful steps for responding to and recovering from a network attack

Strange pop-up windows, unauthorized software, sluggish systems, mysteriously changed passwords, programs running automatically, or unofficial content posted to your website are all signs that your small business network has been hacked. If you suspect that your network security has been compromised, don’t panic! It’s important to remain calm, retain your professional demeanor, and act decisively.

In addition to seeking guidance from a security professional, these five steps can help you quickly respond and safely recover from a network attack.

Read More »

Tags: , , ,