<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 5 Ways Employees Steal Data</title>
	<atom:link href="http://www.gfi.com/blog/5-ways-employees-steal-data/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/5-ways-employees-steal-data/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-ways-employees-steal-data</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Richard Andrews</title>
		<link>http://www.gfi.com/blog/5-ways-employees-steal-data/comment-page-1/#comment-29602</link>
		<dc:creator>Richard Andrews</dc:creator>
		<pubDate>Fri, 02 Sep 2011 06:03:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3444#comment-29602</guid>
		<description><![CDATA[In a big company, trust is an issue. Small and medium enterprises rely on the &quot;trust&quot; system simply because it worked on them. The case is different with multinational corporations, where bureaucracy is the life of the game. Multi-level departments are hard to deal with.  

This article would have more impact if it also included case studies or real-life scenarios of employees stealing company data and what the company did something about it. I&#039;ve read several cases about this online and most caught employees are bought to court and filed with criminal charges.]]></description>
		<content:encoded><![CDATA[<p>In a big company, trust is an issue. Small and medium enterprises rely on the &#8220;trust&#8221; system simply because it worked on them. The case is different with multinational corporations, where bureaucracy is the life of the game. Multi-level departments are hard to deal with.  </p>
<p>This article would have more impact if it also included case studies or real-life scenarios of employees stealing company data and what the company did something about it. I&#8217;ve read several cases about this online and most caught employees are bought to court and filed with criminal charges.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: @MakeYourMove</title>
		<link>http://www.gfi.com/blog/5-ways-employees-steal-data/comment-page-1/#comment-29584</link>
		<dc:creator>@MakeYourMove</dc:creator>
		<pubDate>Mon, 29 Aug 2011 17:15:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3444#comment-29584</guid>
		<description><![CDATA[Jhos all your statements here are valid but they don&#039;t apply to all companies or organizations. Remember that not all businesses have the same process of hiring and employing individuals. This is a case to case basis. 

For instance, hiring someone to work for a big corporation (such as Google, IBM, or Walmart) involves a lot of steps - preliminary interview, secondary interview, final interview, exam, background check, hiring, orientation, probationary, contractual, then regularization. 

On the other hand, SMEs are different. Because they&#039;re not that big, their hiring method tends to be so simple. Usually, they skip some processes. And most of time, they will hire someone they or someone from the company knows.]]></description>
		<content:encoded><![CDATA[<p>Jhos all your statements here are valid but they don&#8217;t apply to all companies or organizations. Remember that not all businesses have the same process of hiring and employing individuals. This is a case to case basis. </p>
<p>For instance, hiring someone to work for a big corporation (such as Google, IBM, or Walmart) involves a lot of steps &#8211; preliminary interview, secondary interview, final interview, exam, background check, hiring, orientation, probationary, contractual, then regularization. </p>
<p>On the other hand, SMEs are different. Because they&#8217;re not that big, their hiring method tends to be so simple. Usually, they skip some processes. And most of time, they will hire someone they or someone from the company knows.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Carter Rubens</title>
		<link>http://www.gfi.com/blog/5-ways-employees-steal-data/comment-page-1/#comment-29580</link>
		<dc:creator>Carter Rubens</dc:creator>
		<pubDate>Mon, 29 Aug 2011 10:58:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3444#comment-29580</guid>
		<description><![CDATA[Hi Jhos,

You are so right to do all this! Prevention is really better than cure. While you can never be sure somebody won&#039;t be tempted to steal data, when you do background checks and have a binding contract, you do minimize the risks. Honestly, I think that most insider jobs are due to poor staffing practices and to hiring unreliable people.]]></description>
		<content:encoded><![CDATA[<p>Hi Jhos,</p>
<p>You are so right to do all this! Prevention is really better than cure. While you can never be sure somebody won&#8217;t be tempted to steal data, when you do background checks and have a binding contract, you do minimize the risks. Honestly, I think that most insider jobs are due to poor staffing practices and to hiring unreliable people.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jhos Kent</title>
		<link>http://www.gfi.com/blog/5-ways-employees-steal-data/comment-page-1/#comment-29553</link>
		<dc:creator>Jhos Kent</dc:creator>
		<pubDate>Thu, 25 Aug 2011 13:52:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3444#comment-29553</guid>
		<description><![CDATA[As the HR Manager of a multinational company here in Houston, I always see to it that all incoming employees are throughly background-checked, even if they&#039;re a friend of a friend or someone close to the organization. Before signing the contract, all new employees are required to read and understand all statements - they&#039;re obligated to ask questions afterwards. This is because our contract has some interpolations that prohibit workers to divulge information and data to others. Think of it as a &quot;non-disclosure agreement (NDA)&quot; on steroids.

Also, if someone resigns (or was fired / terminated), that employee will not be allowed to work in a similar or competitor company. This way, no information or previous knowledge will be applied to his or her new job. Prevention is better than the cure. Being proactive always wins.]]></description>
		<content:encoded><![CDATA[<p>As the HR Manager of a multinational company here in Houston, I always see to it that all incoming employees are throughly background-checked, even if they&#8217;re a friend of a friend or someone close to the organization. Before signing the contract, all new employees are required to read and understand all statements &#8211; they&#8217;re obligated to ask questions afterwards. This is because our contract has some interpolations that prohibit workers to divulge information and data to others. Think of it as a &#8220;non-disclosure agreement (NDA)&#8221; on steroids.</p>
<p>Also, if someone resigns (or was fired / terminated), that employee will not be allowed to work in a similar or competitor company. This way, no information or previous knowledge will be applied to his or her new job. Prevention is better than the cure. Being proactive always wins.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tommy King</title>
		<link>http://www.gfi.com/blog/5-ways-employees-steal-data/comment-page-1/#comment-29546</link>
		<dc:creator>Tommy King</dc:creator>
		<pubDate>Tue, 23 Aug 2011 18:03:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3444#comment-29546</guid>
		<description><![CDATA[Definitely a lot to consider as far as ways in which your data and of course your physical property can be stolen. Security measures are improving both internally and externally as most major police forces are ramping up their cybercrimes divisions. Obviously the best phone call to the police is the one you never have to make, so setting up internal security policies and following them to the letter is ideal.]]></description>
		<content:encoded><![CDATA[<p>Definitely a lot to consider as far as ways in which your data and of course your physical property can be stolen. Security measures are improving both internally and externally as most major police forces are ramping up their cybercrimes divisions. Obviously the best phone call to the police is the one you never have to make, so setting up internal security policies and following them to the letter is ideal.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 01:23:32 by W3 Total Cache --