Cisco Blogs


Cisco Blog > Security

Summary: Tackling Mobile Security Risks for Government

As mobility becomes more pervasive, these concepts of cyber crime have become engrained in our work/life culture. These issues have earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures.

A few weeks ago, Cisco and Mobile Work Exchange released findings from a self-assessment tool that highlights some interesting statistics, enabling us to better understand mobile security best practices and vulnerabilities. The report specifically looks at government employees, 90 percent of whom claim to use at least one mobile device for work, and reveals that many government workers (41 percent) are putting themselves and their agencies at risk. Read More »

Tags: , , , , , , , , , , , , , , ,

Tackling Mobile Security Risks for Government

“Cyber threats. Security breaches. Hacking.”

As mobility becomes more pervasive, these words have become engrained in our work/life culture. The issue of cyber crime has earned national news headlines as governments across the globe grapple with how to build both secure and mobile-enabled infrastructures.

A few weeks ago, Cisco and Mobile Work Exchange released findings from a self-assessment tool that highlights some interesting statistics, enabling us to better understand mobile security best practices and vulnerabilities. The report specifically looks at government employees, 90 percent of whom claim to use at least one mobile device for work, and reveals that many government workers (41 percent)  are putting themselves and their agencies at risk.

Cisco_MobilitySecurity_PatFinn_Final

Here are a few other compelling findings:

  • On mobile devices, 31 percent use a public Wi-Fi connection and 25 percent do not set passwords.
  • 6 percent of government employees who use a mobile device for work say they have lost or misplaced their phone. In the average Federal agency, that’s more than 3,500 chances for a security breach.
  • Despite the Federal Digital Government Strategy, more than one in four government employees have not received mobile security training from their agencies.

Read More »

Tags: , , , , , , , , , , , , , , ,

Don’t Miss: [Webinar] Preparing K-12 Networks for Common Core Feb 5

If you’ve worked on a K-12 wireless network, you’ll know that one of the main customer careabouts is adapting to Common Core Standards. Online testing and BYOD places even higher demands on a high quality, high performing network. What exactly needs to be taken into consideration when designing these networks?

Join us tomorrow Wednesday, February 5 for a great, informational webinar packed with tips and tricks on how to design K-12 networks to optimize for Common Core. If you work in education IT or are a partner or network consultant that handles lots of K-12 school district deployments, this is the webcast for you. We’re starting at 10am PST and will run for about 45-60 minutes--and there’ll be a chance for you to ask questions directly to Cisco engineers.

Register here today, or read the full article: Is Your Network Ready for Common Core Standards?

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Is Your WLAN Ready for Unified Communications & Collaboration?

January 31, 2014 at 5:00 am PST

As Wi-Fi continues to be the primary mode of access, enterprise Unified Communication(UC) applications usage is increasing with smartphones, tablets and laptops.

Customers are asking, is there anything I can do to prioritize Jabber or Lync traffic over others or even identify how much of the traffic is really collaboration traffic vs. other types of media. The recently introduced Wireless Release 7.6 enhances the ability to classify Microsoft Lync 2013 and Jabber with Cisco WLAN Infrastructure.

In the first blog about Application Visibility and Control over Cisco WLAN, I captured what is AVC and the capabilities included in the release 7.4. In a subsequent blog, I had captured a success story about a customer who benefited from the reliability by deprioritizing scavenger level applications as well as captured highlights of the enhancements in release 7.5. This blog captures how the release 7.6 allows popular collaboration applications to be accurately classified and prioritized as well as provides a teaser to some of the innovations that can be expected in the future.

What exact capabilities AireOS 7.6 provide ?

The protocol pack 6.3 introduced in AireOS 7.6 allows you to identify and prioritize not just Jabber but also sub-classify Cisco Jabber Audio, Cisco Jabber IM and Cisco Jabber Video. Customers may want to prioritize the Cisco Jabber Audio as the highest priority while the others may be lower priority. Similarly you can classify not just Microsoft Lync but also Microsoft Lync Audio, rtcp and Microsoft Lync Video and thereby prioritize them separately. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

CMX Analytics: An Inside Scoop on CiscoLive! Milan #CLEUR

cmxclmilan1

Today is the final day of a very busy and successful Cisco Live Milan 2014. Read my initial observations from the event earlier this week.

As the event draws to a close, lets look at some of the location analytics available via Cisco’s Connected Mobile Experiences solution (CMX) and perhaps try to answer some of the following questions about the event.

For this I will just focus on the World of Solutions Show floor -- approximately 800,000 sq feet in size, and containing all the Cisco Booths and the partner displays.

  1. How many people actually visited the world of solutions?
  2. How many people did  the different Cisco Booths attract?
  3. Where was the busiest part of the show floor?

These and other insights can be derived from looking at the business intelligence that emerges from CMX. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,