<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Are you providing security for your customers?</title>
	<atom:link href="http://www.gfi.com/blog/are-you-providing-security-for-your-customers/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/are-you-providing-security-for-your-customers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-you-providing-security-for-your-customers</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/are-you-providing-security-for-your-customers/comment-page-1/#comment-17694</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Fri, 07 Jan 2011 13:24:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3067#comment-17694</guid>
		<description><![CDATA[@Stewart H.  

You&#039;re right, service providers can do so much and the rest depends on the users. The problem is that most users do not have the technical knowledge to do much. As you correctly say, a bank might offer all the encryption in the world but if the victim has a key logger installed on her machine her credentials will still be compromised. A service provider can only control his side of the security and that&#039;s all I mean. If like in my case my service provider is running a web mail gateway on an insecure link the average user can do nothing to secure it. 

@Jenny Whitson

I&#039;m afraid it&#039;s quite the opposite, satellite internet is generally not encrypted. The reason for this (in a nutshell) is that internet via satellite is slow and bandwidth is expensive, so to speed things up compression and acceleration algorithms are used, but these work only on unencrypted data so everything is left unencrypted. Using satellite for data exchange is generally very unsafe unless you take precautions and encrypt everything yourself beforehand.

@Kevin P. 

I agree completely, we can provide the tools but the users need to use those tools and follow policy. There is no silver bullet obviously. If we provide the facilities to help with the user&#039;s security it will be his responsibility if he decides to go around that in the end.]]></description>
		<content:encoded><![CDATA[<p>@Stewart H.  </p>
<p>You&#8217;re right, service providers can do so much and the rest depends on the users. The problem is that most users do not have the technical knowledge to do much. As you correctly say, a bank might offer all the encryption in the world but if the victim has a key logger installed on her machine her credentials will still be compromised. A service provider can only control his side of the security and that&#8217;s all I mean. If like in my case my service provider is running a web mail gateway on an insecure link the average user can do nothing to secure it. </p>
<p>@Jenny Whitson</p>
<p>I&#8217;m afraid it&#8217;s quite the opposite, satellite internet is generally not encrypted. The reason for this (in a nutshell) is that internet via satellite is slow and bandwidth is expensive, so to speed things up compression and acceleration algorithms are used, but these work only on unencrypted data so everything is left unencrypted. Using satellite for data exchange is generally very unsafe unless you take precautions and encrypt everything yourself beforehand.</p>
<p>@Kevin P. </p>
<p>I agree completely, we can provide the tools but the users need to use those tools and follow policy. There is no silver bullet obviously. If we provide the facilities to help with the user&#8217;s security it will be his responsibility if he decides to go around that in the end.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: gordon channon</title>
		<link>http://www.gfi.com/blog/are-you-providing-security-for-your-customers/comment-page-1/#comment-17539</link>
		<dc:creator>gordon channon</dc:creator>
		<pubDate>Tue, 04 Jan 2011 21:09:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3067#comment-17539</guid>
		<description><![CDATA[I think providing a secure link for our staff and our customers to enter personal information and credentials is the least bit of security we can offer them. No matter how random or strong our passwords might’ve been chosen to be, it’s all without merit if the people who are intended to use them aren’t able to do so quickly, efficiently and (more importantly) securely. Whether it be via satellite, remote or WAN connection, a secure connection is paramount.]]></description>
		<content:encoded><![CDATA[<p>I think providing a secure link for our staff and our customers to enter personal information and credentials is the least bit of security we can offer them. No matter how random or strong our passwords might’ve been chosen to be, it’s all without merit if the people who are intended to use them aren’t able to do so quickly, efficiently and (more importantly) securely. Whether it be via satellite, remote or WAN connection, a secure connection is paramount.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: kevin p.</title>
		<link>http://www.gfi.com/blog/are-you-providing-security-for-your-customers/comment-page-1/#comment-17538</link>
		<dc:creator>kevin p.</dc:creator>
		<pubDate>Tue, 04 Jan 2011 21:08:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3067#comment-17538</guid>
		<description><![CDATA[I think providing a secure link for our staff and our customers to enter personal information and credentials is the least bit of security we can offer them. No matter how random or strong our passwords might’ve been chosen to be, it’s all without merit if the people who are intended to use them aren’t able to do so quickly, efficiently and (more importantly) securely. Whether it be via satellite, remote or WAN connection, a secure connection is paramount.]]></description>
		<content:encoded><![CDATA[<p>I think providing a secure link for our staff and our customers to enter personal information and credentials is the least bit of security we can offer them. No matter how random or strong our passwords might’ve been chosen to be, it’s all without merit if the people who are intended to use them aren’t able to do so quickly, efficiently and (more importantly) securely. Whether it be via satellite, remote or WAN connection, a secure connection is paramount.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: kevin p.</title>
		<link>http://www.gfi.com/blog/are-you-providing-security-for-your-customers/comment-page-1/#comment-17516</link>
		<dc:creator>kevin p.</dc:creator>
		<pubDate>Tue, 04 Jan 2011 13:29:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3067#comment-17516</guid>
		<description><![CDATA[Unfortunately, I believe that we can only provide as much security as our customers allow. For decades now, end-users have been able to set the sensitivity of their security protocols and usage filters. However, these are still settings that require the end-users full authorization and compliance. As suppliers, developers and programmers, we can only hope to provide the tools users need to protect themselves. But it’s up to them to do the actual protecting.]]></description>
		<content:encoded><![CDATA[<p>Unfortunately, I believe that we can only provide as much security as our customers allow. For decades now, end-users have been able to set the sensitivity of their security protocols and usage filters. However, these are still settings that require the end-users full authorization and compliance. As suppliers, developers and programmers, we can only hope to provide the tools users need to protect themselves. But it’s up to them to do the actual protecting.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: jenny whitson</title>
		<link>http://www.gfi.com/blog/are-you-providing-security-for-your-customers/comment-page-1/#comment-17513</link>
		<dc:creator>jenny whitson</dc:creator>
		<pubDate>Tue, 04 Jan 2011 13:20:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3067#comment-17513</guid>
		<description><![CDATA[I haven’t had the luxury of using an internet connection via satellite (or via cruise liner for that matter), but are they really that insecure? I’d think that most modern satellite connections are heavily encrypted most especially since they are used mostly used for highly sensitive international data transfers. Or am I missing a key element of satellite connection security here? Are satellite connections more difficult to secure than more traditional networks?]]></description>
		<content:encoded><![CDATA[<p>I haven’t had the luxury of using an internet connection via satellite (or via cruise liner for that matter), but are they really that insecure? I’d think that most modern satellite connections are heavily encrypted most especially since they are used mostly used for highly sensitive international data transfers. Or am I missing a key element of satellite connection security here? Are satellite connections more difficult to secure than more traditional networks?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Stewart H.</title>
		<link>http://www.gfi.com/blog/are-you-providing-security-for-your-customers/comment-page-1/#comment-17407</link>
		<dc:creator>Stewart H.</dc:creator>
		<pubDate>Mon, 03 Jan 2011 00:17:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3067#comment-17407</guid>
		<description><![CDATA[Although it’s a duty for a service providing company to be able to make sure that our services are provided in a safe and secure environment, I think we seem to sometimes forget how much of that responsibility is that of the end-user as well. Even as a security provider, the company can only go so far as to protecting our clients if they don’t take the measures to protect themselves on their own.]]></description>
		<content:encoded><![CDATA[<p>Although it’s a duty for a service providing company to be able to make sure that our services are provided in a safe and secure environment, I think we seem to sometimes forget how much of that responsibility is that of the end-user as well. Even as a security provider, the company can only go so far as to protecting our clients if they don’t take the measures to protect themselves on their own.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jerome Albrando</title>
		<link>http://www.gfi.com/blog/are-you-providing-security-for-your-customers/comment-page-1/#comment-17073</link>
		<dc:creator>Jerome Albrando</dc:creator>
		<pubDate>Tue, 28 Dec 2010 07:30:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3067#comment-17073</guid>
		<description><![CDATA[Most people tend to take internet security for granted. Research has shown that most people believe that internet security isn’t their responsible, even if they understand that they have the most to lose. Many phishers are heading to public computers like libraries and internet shops to pilfer identities that haven’t been logged off. 

Ironically, Google has been trying to address such security exploits by introducing Chrome’s Incognito window. I haven’t personally verified on how reliable this “cookie-less” / “fingerprint-less” browser works, but since most people don’t even bother to use it, it might not even matter.]]></description>
		<content:encoded><![CDATA[<p>Most people tend to take internet security for granted. Research has shown that most people believe that internet security isn’t their responsible, even if they understand that they have the most to lose. Many phishers are heading to public computers like libraries and internet shops to pilfer identities that haven’t been logged off. </p>
<p>Ironically, Google has been trying to address such security exploits by introducing Chrome’s Incognito window. I haven’t personally verified on how reliable this “cookie-less” / “fingerprint-less” browser works, but since most people don’t even bother to use it, it might not even matter.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Wanda</title>
		<link>http://www.gfi.com/blog/are-you-providing-security-for-your-customers/comment-page-1/#comment-16989</link>
		<dc:creator>Wanda</dc:creator>
		<pubDate>Mon, 27 Dec 2010 06:10:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3067#comment-16989</guid>
		<description><![CDATA[At out firm, we thought it best to eventually divide the responsibilities of the security department. One branch is responsible for all internal software and network security of the company, while the other deals with software and network security of clients. Since businesses are (unavoidably) dependent on the satisfaction and security of their clients to stay successful, we thought this the best option all around. Our security department still works together to improve our security and our client’s at the same time. In the end, everyone wins.]]></description>
		<content:encoded><![CDATA[<p>At out firm, we thought it best to eventually divide the responsibilities of the security department. One branch is responsible for all internal software and network security of the company, while the other deals with software and network security of clients. Since businesses are (unavoidably) dependent on the satisfaction and security of their clients to stay successful, we thought this the best option all around. Our security department still works together to improve our security and our client’s at the same time. In the end, everyone wins.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 16:17:54 by W3 Total Cache --