<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Are USB ports the Achilles heel of your network security?</title>
	<atom:link href="http://www.gfi.com/blog/are-usb-ports-the-achilles-heel-of-your-network-security/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/are-usb-ports-the-achilles-heel-of-your-network-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-usb-ports-the-achilles-heel-of-your-network-security</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Benny</title>
		<link>http://www.gfi.com/blog/are-usb-ports-the-achilles-heel-of-your-network-security/comment-page-1/#comment-17408</link>
		<dc:creator>Benny</dc:creator>
		<pubDate>Mon, 03 Jan 2011 00:21:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3090#comment-17408</guid>
		<description><![CDATA[Wouldn’t data theft also be a (probably even bigger) problem for larger businesses and not only SMEs? If there’s anything I learned from system’s management, the bigger more complicated the system, the more difficult it’ll be to secure, manage and monitor. With more vulnerabilities to account for, I’d expect a large company to easily fall prey to internal data theft. But the question is, since we hear so little about it, how do they get around it?]]></description>
		<content:encoded><![CDATA[<p>Wouldn’t data theft also be a (probably even bigger) problem for larger businesses and not only SMEs? If there’s anything I learned from system’s management, the bigger more complicated the system, the more difficult it’ll be to secure, manage and monitor. With more vulnerabilities to account for, I’d expect a large company to easily fall prey to internal data theft. But the question is, since we hear so little about it, how do they get around it?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: nelson chadwick</title>
		<link>http://www.gfi.com/blog/are-usb-ports-the-achilles-heel-of-your-network-security/comment-page-1/#comment-17405</link>
		<dc:creator>nelson chadwick</dc:creator>
		<pubDate>Mon, 03 Jan 2011 00:10:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3090#comment-17405</guid>
		<description><![CDATA[Data theft seems to be a bigger problem than most SME managers realize. And though the idea of stealing confidential company information when you’re job’s in jeopardy is always a good joke tossed around in after hours conversation, I honestly didn’t figure it would be as high as 39%: even higher apparently if you’ve already been fired. It now looks as if companies (of any size) need to reevaluate their data management and access policies.]]></description>
		<content:encoded><![CDATA[<p>Data theft seems to be a bigger problem than most SME managers realize. And though the idea of stealing confidential company information when you’re job’s in jeopardy is always a good joke tossed around in after hours conversation, I honestly didn’t figure it would be as high as 39%: even higher apparently if you’ve already been fired. It now looks as if companies (of any size) need to reevaluate their data management and access policies.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Trisha Hill</title>
		<link>http://www.gfi.com/blog/are-usb-ports-the-achilles-heel-of-your-network-security/comment-page-1/#comment-17064</link>
		<dc:creator>Trisha Hill</dc:creator>
		<pubDate>Tue, 28 Dec 2010 06:04:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3090#comment-17064</guid>
		<description><![CDATA[I definitely agree that that blocking of USB ports is not the way to deal with potential security vulnerabilities. Not only are you taking away a mainstream form of data access from your company, but you’re allowing security threats to disable a potentially critical part of your work flow. If you shut down one system in hopes of staving the advance of a threat, that threat has already (like it or not) succeeded.]]></description>
		<content:encoded><![CDATA[<p>I definitely agree that that blocking of USB ports is not the way to deal with potential security vulnerabilities. Not only are you taking away a mainstream form of data access from your company, but you’re allowing security threats to disable a potentially critical part of your work flow. If you shut down one system in hopes of staving the advance of a threat, that threat has already (like it or not) succeeded.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tom Clark</title>
		<link>http://www.gfi.com/blog/are-usb-ports-the-achilles-heel-of-your-network-security/comment-page-1/#comment-17062</link>
		<dc:creator>Tom Clark</dc:creator>
		<pubDate>Tue, 28 Dec 2010 05:53:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3090#comment-17062</guid>
		<description><![CDATA[We’ve actually found flash drives so utterly problematic to our systems that certain departments in our company are completely disallowed from using USB storage devices as means of storing, transferring and sharing files. It’s seems a bit fascist, I know, but after trying everything from educating workers on proper security practices to limiting USB use, we realized this was the best option. Now, all files must be shared, transferred and acquired through the internet or the company intranet.]]></description>
		<content:encoded><![CDATA[<p>We’ve actually found flash drives so utterly problematic to our systems that certain departments in our company are completely disallowed from using USB storage devices as means of storing, transferring and sharing files. It’s seems a bit fascist, I know, but after trying everything from educating workers on proper security practices to limiting USB use, we realized this was the best option. Now, all files must be shared, transferred and acquired through the internet or the company intranet.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Leonard</title>
		<link>http://www.gfi.com/blog/are-usb-ports-the-achilles-heel-of-your-network-security/comment-page-1/#comment-16987</link>
		<dc:creator>Leonard</dc:creator>
		<pubDate>Mon, 27 Dec 2010 06:04:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3090#comment-16987</guid>
		<description><![CDATA[Just to be clear, I’m not knocking on the usefulness of these USB security articles, but I firmly believe that USB interfacing is outdated technology as far as data transferring goes. Surely it’s the mainstream method of remotely transferring data, but it doesn’t make it the best. USB 2.0 is horridly slow for today’s needs, and though USB 3.0 is coming out on higher end motherboards, it’s still a long ways away from taking the place of its cumbersome older brother.]]></description>
		<content:encoded><![CDATA[<p>Just to be clear, I’m not knocking on the usefulness of these USB security articles, but I firmly believe that USB interfacing is outdated technology as far as data transferring goes. Surely it’s the mainstream method of remotely transferring data, but it doesn’t make it the best. USB 2.0 is horridly slow for today’s needs, and though USB 3.0 is coming out on higher end motherboards, it’s still a long ways away from taking the place of its cumbersome older brother.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 01:59:06 by W3 Total Cache --