I have walked into a number of small businesses that have old-school phone systems. They pick up an analog, corded phone, choose which line to use, and dial out. There is absolutely nothing wrong with this kind of phone system, because for some it just gets the job done. But what if something goes wrong with one of the phone lines, or a new employee comes onboard and needs a phone? Or what if the company moves offices? Who takes care of all these issues? Read More »
It starts with a nagging suspicion that things aren’t in synch, and kind of grows from there. Symptoms include long response times, an inability to scale, and sometimes just an all-out failure to keep things working. At one time or another, every company faces the question of whether they have outgrown their IT guy.
The causes can be many, but typically fall into one of two buckets. The most obvious one is the inability of said IT guy to keep up with the changes of the industry and grow with the job. In these situations, the answer may be as simple as getting some additional training, as opposed to looking for someone new. But very often, it’s far more complicated than that. In some ways, Moore’s Law has now been applied to human resources. Managers are expected to get more from the people they’ve got, and next quarter they are expected to get more still. And if you think that’s bad, just wait til the quarter after that. So very often, it is not a lack of ability or a lack of willingness on the part of the employee, it is simply a matter of trying to get too much done with too few bodies.
When faced with such difficulties with your IT support, there are a couple of different ways you can go. The least advisable option is to keep bumping along with the situation you’ve got, due to the budget requirements at hand. Unfortunately, a lot of companies go this route, and they do so at substantial risk. The best choice, of course, is heavily dependent upon how much wiggle room there might be for that line item. For example, you may be able to bring someone onto the team, either as a full-time employee, a part-time employee, or a contractor of some type. In many cases, you may find channel partners in your area who are ready, willing, and able to either meet your IT needs, or at least add additional resources to the equation without increasing your headcount.
But the important part is that management recognizes the critical role that IT plays in the organization, and is willing to provide the extra support, and least as a defensive maneuver to help protect the company’s ability to deliver on business-level objectives. In this situation, it may be necessary to make some pretty difficult choices. But assuming that IT is mission-critical to the company, making such a choice is critical to the bottom line.
The good thing about working with a channel partner is that you can usually find some level of supplementary service that suit’s your company’s budget, whatever that might be. And sometimes the effects of just a little bit of help can far exceed the incremental cost.
Thus, with a little bit of planning, and a little bit of flexibility, you can bring a higher degree of IT efficiency, and oftentimes accomplish that goal while leaving your primary team intact.
Ken Presti has extensive experience in channel program analysis and development. He is the founder of Presti Research. His company focuses on channel and go-to-market programs and strategies in order to help our clients build successful and profitable partnerships with compatible companies.
Welcome to the Cisco Small Business Blog. We write about small businesses using technology to improve their business. It’s our goal to help small companies learn to leverage their technology investment for maximum business impact. If this is your first visit, I’m Dawn Brister and I’m the editor for our blog. I’ve been with Cisco, working with small companies for 11 years. I will share my experiences with you and help our team of subject expert bloggers communicate what they know.
If this isn’t your first visit to our blog, you may notice it looks a bit different. Life is full of change! We have moved to a new platform that will help us deliver richer blog content.
Yesterday, we hosted a live video broadcast via Ustream with VP of Worldwide Commercial Sales Dave O’Callaghan—during our half-hour talk, we discussed everything from Fast Track 2 (our new Commercial sales program), to our partner-led sales strategy in Commercial sales, to what we think Dave’s new nickname should be. (Read on to find out how you can participate in the contest for a chance to win a Flip camera.)
For those of you that didn’t get a chance to tune in live, here’s a replay of our broadcast:
Want to know more about what we talked about? Here’s a recap.
VoIP offers plenty of benefits to small businesses; unfortunately, it also presents many opportunities for hackers to cause harm to your voice network. IP-based voice networks are vulnerable to the same risks as data networks. But you can use many of the same security techniques and technologies for your VoIP network that you may already be using on your data network.
The Information Systems Control Journal of ISACA, an independent association that provides education on information systems assurance and security, has a useful article about security within VoIP networks.
Following are six tips for securing your VoIP network and voice data:
Lock up your servers: As with your servers and other central IT equipment, make sure your VoIP servers are under lock and key.
Encrypt voice traffic: To avoid unauthorized access to calls and unauthorized changes to voice messages and other VoIP content, encrypt your voice traffic. All good VoIP systems should have built-in encryption capabilities to protect against such threats as man-in-the-middle attacks and unauthorized snooping of voice data.
Install firewalls: Since VoIP traffic and data traffic all travel on the same physical network, protecting your data network helps protect your VoIP network. For example, the Cisco SA500 Series Security Appliances and Unified Communications 500 Series have security features to protect the entire network, both voice and data traffic, and use VLANs to virtually separate the two traffic flows from each other on the same physical network.
Separate voice and data traffic: The ISACA Journal article recommends using separate servers for your voice and data traffic. This way, you can minimize the risk of voice and data loss in the event that your business is the target of a distributed-denial-of-service attack.
Filter unauthorized traffic: Configure your switches, routers and firewalls to monitor and filter your network for unusual voice and data activities. For example, voice traffic should not be allowed on your data network and vice versa.
Setup dial plans and user profiles: You can use VoIP system features to identify users, the type of calls being made and restrict unwanted traffic, such as outbound international calls. Traffic limits can also be set to ensure call quality and maximum voice and data network performance. These features can also be set to log caller activities and events.
In addition to these measures, you should also put strong passwords in place for your VoIP servers. You should also make sure you to sign up for updates to your VoIP server operating system from the manufacturer. These updates often fix security vulnerabilities that may have been found in the software and should be installed as soon as you receive the alerts.
Following these steps should protect your voice data and ensure that your VoIP network runs smoothly. What measures have you employed to secure your VoIP network?