Cisco Blogs


Cisco Blog > Small Business

3 Steps for Preparing Your Network for IPv6

IPv6 is coming—are you ready to make the transition?

The next generation of Internet networking protocol—IPv6—is coming and companies of all sizes are preparing their networks for it now. IPv6 makes room for more people, more companies, and more devices on the Internet than the current Internet protocol, IPv4.  IPv6 provides better security, faster performance over virtual private networks (VPN), and makes local networks easier to manage. The new protocol also offers improved quality of service (QoS) for more reliable voice and video performance and ensures better coverage and throughput for mobile devices.

Read More »

Tags: , , , ,

The Lone Admin and The Cisco Technical Support iPad App

Authored by : Kent Wong, Product Manager, Technical Services

It was a evening like any other.  The Lone Admin walks into a his local watering hole to relax after a full day of battling issues and keeping his company’s network safe and secure.  He is known somewhat as a miracle worker, a conundrum wrapped in an enigma.  Even against the most sinister of network issues he is able to stand his ground and find resolution all by himself.  How does he do it?  None of his peers know.

Read More »

Tags: , , , , , , , , , , , , , , , ,

What’s Considered “Acceptable Use” For Your Small Business?

Creating an acceptable use policy establishes rules for everyone using the company network

All small companies need an acceptable use policy (AUP). An integral part of any company’s network security program, an AUP is a set of rules that describes how everyone may use the company’s network and network resources, including the Internet. An AUP also spells out the consequences for not following these rules. With an AUP in place, you can protect your company from dangerous behavior online and hold those responsible for their actions. It’s relatively easy to create an acceptable use policy. To be truly useful, though, it must be tailored to your company’s specific needs and business operations.

Read More »

Tags: , ,

Should I invest in IT When the Economy is Down?

Guest Post by Contributing Author Ken Presti

There are times when budgets are relatively flush, and the decision to invest in the business comes relatively easily. Then there are times like we’ve seen recently. “Do we really need to buy this box of paper clips? Hmm. Better call a meeting.”

And with plenty of speculation about the direction of economic things to come, IT purchase decisions are being made as carefully as ever. To a certain extent, pent-up demand has loosened the flood gates. But sales and refresh cycles are still a bit long in certain circles, and the emphasis is constantly upon how the recommended investments will either pump up the revenues or trim back the expenses. That’s not a bad thing. That’s just good business in the post-bubble world.

Read More »

Tags: , , ,

Talkin’ Tech: Storage

Understanding the terms associated with network storage is the first step to making sure your critical data is protected

Storage may not be top of mind for many small businesses, but it should be. Small businesses are built on data—intellectual property, financial records, marketing materials, and more—and losing that data can cost your company in lost revenue, reputation, and customers. Your company’s continued success depends on protecting that business-critical information.

In this installment of our Talkin’ Tech series, we define key terms to help you understand the basics of network storage so you ensure your data’s protected in the event of a disaster.

Read More »

Tags: , , ,