Cisco Blogs


Cisco Blog > Inside Cisco IT

Essential Skills for Today’s Unified Communications Operations Staff

Just a decade ago, supporting enterprise voice services was simpler, our voice operations support scope was smaller, and one person could be proficient in everything you needed to know for voice operations. But as IP telephony capabilities grew into Unified Communications, the skills our engineers had to be proficient in grew exponentially.

Today, we support UC systems and collaboration platforms, both on traditional hardware and now on virtualized server platforms (Cisco UCS). We still support phones and softphones, but now we also support mobility services, video phones and mobile devices like the Cisco Cius, voice and video conferencing, menus of phone-based services, and ever-more sophisticated customer support tools in our contact centers. There are now so many things within the scope of the UC systems that we manage that it would be extremely difficult in an enterprise the size of Cisco to be an expert in everything. So, individuals on our voice operations team need to specialize.

Read More »

Tags: , , , , , , , , , , ,

Voice security is just as important as data security for small businesses

Learn the four most common threats that put your IP phone system at risk

There’s a big story about phone hacking that has kept newspapers in the U.K. and U.S. busy over the past month. Some former reporters of a popular tabloid newspaper in the U.K. have claimed that hacking into the phones of celebrities and members of the Royal Family was rife at the paper. The publication of conversations and messages between celebrities may be fun to read, but the unauthorized interception of communications inside businesses is no laughing matter.

The security of your small business phone system is just as important as the security of your network. Consider if someone hacked into your phone system and compromised your company voicemail. What could they learn? You need to be as diligent about voice security as you are with data security, particularly if you use IP telephony.

Read More »

Tags: , , , , ,