<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Leigh Dworkin</title>
	<atom:link href="http://www.gfi.com/blog/author/leigh-dworkin/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Apply Those Security Patches Today… And Prevent a Costly Security Breach</title>
		<link>http://www.gfi.com/blog/apply-those-security-patches-today-and-prevent-a-costly-security-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=apply-those-security-patches-today-and-prevent-a-costly-security-breach</link>
		<comments>http://www.gfi.com/blog/apply-those-security-patches-today-and-prevent-a-costly-security-breach/#comments</comments>
		<pubDate>Wed, 30 Jan 2013 15:00:24 +0000</pubDate>
		<dc:creator>Leigh Dworkin</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Data Protection Act]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[ico]]></category>
		<category><![CDATA[Information Commissioner’s Office]]></category>
		<category><![CDATA[network auditing]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[security patches]]></category>
		<category><![CDATA[Sony]]></category>
		<category><![CDATA[Sony fine]]></category>
		<category><![CDATA[vulnerability assessment]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10305</guid>
		<description><![CDATA[Sony has been in the news recently regarding a quarter of a million UK pound fine ($395K) levied by the UK’s Information Commissioner’s Office (ICO). This was because of a breach of the Data Protection Act that allowed millions of &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/02/ICO.jpg"><img class="alignright size-full wp-image-10309" style="border: 0px solid black; margin: 10px;" title="ICO. " alt="" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/ICO.jpg" width="225" height="225" /></a>Sony has been in the news recently regarding a quarter of a million UK pound fine ($395K) levied by the UK’s Information Commissioner’s Office (ICO).</p>
<p>This was because of a breach of the Data Protection Act that allowed millions of UK gamers’ details to be made available online, including names, addresses, email addresses, dates of birth and account passwords. Credit card details were also at risk, the ICO said following an investigation.<span id="more-10305"></span></p>
<p>It affected systems running the PlayStation Network (PSN) back in April 2011.</p>
<p>According to the ICO, if the latest security patches had been applied to the system software, then the data breach could not have occurred.</p>
<p>This could have been prevented had the IT staff responsible regularly run a network security tool such as GFI LanGuard, which guarantees that security patches are applied in a timely manner.</p>
<p>For as little as $10 per monitored IP for a 250 IP network, GFI LanGuard offers three vital services:</p>
<p>1)      <strong>Vulnerability assessment</strong> checks the network against a frequently updated database of known vulnerabilities that may be exploited by hackers</p>
<p>2)      <strong>Patch management</strong> ensures that the latest security and non-security patches are applied to servers, workstations, laptops on your network; both Windows and Mac OS X machines are supported</p>
<p>3)      <strong>Network auditing </strong>discovers all the hardware and installed software on your network and can flag open ports, unexpected users and groups and detect unauthorized applications being installed and extra devices being added by comparing the network to a known safe baseline.</p>
<p><a href="http://www.gfi.com/network-security-vulnerability-scanner?adv=13872&amp;loc=5">GFI LanGuard</a> helps to prove compliance to security standards which can protect companies from being fined, and costs a tiny fraction of the quarter of a million that companies like Sony have experienced.</p>
<p>It is a false economy not to invest in such a tool, which brings benefits of comprehensive network security and increased productivity for your IT staff and end users, in addition to setting your mind at ease over compliance.</p>
<p><em><strong>Learn more about</strong></em><strong> </strong><strong><em><a href="http://www.gfi.com/network-security-vulnerability-scanner?adv=13872&amp;loc=5">GFI LanGuard 2012</a> <em>or start your <a href="http://www.gfi.com/pages/patch-management-sm.asp/?adv=13558&amp;loc=23">30-day trial</a> </em></em></strong><em><strong>today!</strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/apply-those-security-patches-today-and-prevent-a-costly-security-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Keeping Software Updated in a Multi-platform Environment</title>
		<link>http://www.gfi.com/blog/keeping-software-updated-in-a-multi-platform-environment/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=keeping-software-updated-in-a-multi-platform-environment</link>
		<comments>http://www.gfi.com/blog/keeping-software-updated-in-a-multi-platform-environment/#comments</comments>
		<pubDate>Wed, 05 Dec 2012 15:00:10 +0000</pubDate>
		<dc:creator>Leigh Dworkin</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[Bring your own device]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Mac laptop]]></category>
		<category><![CDATA[Mac OS X]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SME]]></category>
		<category><![CDATA[SysAdmin]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[Windows]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9952</guid>
		<description><![CDATA[The typical system administrator in a small- to medium-sized business (SMB) has many time-consuming tasks to keep the network secure, guarantee 24*7 corporate email availability, allocate and configure new machines as new employees join and help the CEO with the &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/Keeping-software-updated-without-compromising-the-security-of-the-corporate-network.jpg"><img class="alignright size-medium wp-image-9959" style="border: 0px solid black; margin: 10px;" title="Keeping software updated without compromising the security of the corporate network" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/Keeping-software-updated-without-compromising-the-security-of-the-corporate-network-300x200.jpg" width="300" height="200" /></a>The typical system administrator in a small- to medium-sized business (SMB) has many time-consuming tasks to keep the network secure, guarantee 24*7 corporate email availability, allocate and configure new machines as new employees join and help the CEO with the latest gadget several times per month, amongst myriad other tasks.</p>
<p>One popular CEO gadget is a Mac laptop, even when the rest of the company has standardised on PC workstations and laptops.</p>
<p>There is also a growing trend of Bring Your Own Device (BYOD) where laptops, mobile phones, even tablets from home are expected to be embraced by the corporate network. How is the overworked system administrator meant to balance the requirements of supporting these devices, without compromising the security of the corporate network?<span id="more-9952"></span></p>
<p>BYOD is causing CEO gadgetry to spread to the CxOs, executives and even down to grass-roots employees. Its benefits of being able to use the device of choice to maximize productivity when on the road, at home, out of the office or even on vacation, outweigh the potential threats to security – at least in the minds of those not responsible for maintaining security.</p>
<p>Yet such threats of exposing the network to malware and other vulnerabilities which can result in data loss and network downtime cannot be ignored. Unless the system administrators can use sophisticated tools to help him or her, there is a real risk to the security of the network. For some businesses, any network breaches can mean failure to meet security compliance standards which may translate to lawsuits and fines.</p>
<p>Scanning for vulnerabilities and remediating any found through automatic patch management is a must. And it can’t be limited to the Windows machines on your network. It needs to work cross platform, and a vital first step is to support the Macintoshes on the network.</p>
<p>These can be “executive gadget”-style Macs, but also many businesses have their own design departments, where Mac desktops and laptops are prevalent.</p>
<p>The latest version of <a href="http://www.gfi.com/blog/gfi-languard-now-supports-mac-os-x/">GFI LanGuard 2012 supports patching of the Mac OS X operating system</a> and its applications, in addition to patching Windows operating systems, Windows applications and other third party applications such as Adobe, Firefox and Safari. <a href="http://www.gfi.com/network-security-vulnerability-scanner?adv=13558&amp;loc=9">Check it out</a> – it will make your life as a SysAdmin easier, boost the security of your network and help to keep you compliant.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/keeping-software-updated-in-a-multi-platform-environment/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Addressing the Exponential Growth in Network Vulnerabilities</title>
		<link>http://www.gfi.com/blog/addressing-the-exponential-growth-in-network-vulnerabilities/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=addressing-the-exponential-growth-in-network-vulnerabilities</link>
		<comments>http://www.gfi.com/blog/addressing-the-exponential-growth-in-network-vulnerabilities/#comments</comments>
		<pubDate>Wed, 01 Aug 2012 14:37:52 +0000</pubDate>
		<dc:creator>Leigh Dworkin</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[network auditing]]></category>
		<category><![CDATA[network vulnerabilities]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[vulnerability assessment]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9136</guid>
		<description><![CDATA[The two most common actions after companies had a security incident are patching of vulnerable software (62.3%) and the patching or remediation of vulnerable hardware or infrastructure (49.3%), according to the CSI Computer Crime and Security Survey. Would-be exploiters rely &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/08/Network-Vulnerabilities.jpg"><img class="alignright  wp-image-9148" style="border: 0px solid black; margin: 10px;" title="Network Vulnerabilities" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2012/08/Network-Vulnerabilities.jpg" width="324" height="215" /></a>The two most common actions after companies had a security incident are patching of vulnerable software (62.3%) and the patching or remediation of vulnerable hardware or infrastructure (49.3%), according to the <a href="http://gocsi.com/survey">CSI Computer Crime and Security Survey</a>. Would-be exploiters rely on the fact that there is a window of opportunity between the time the patch is created by the developer and the time the patch is deployed by system administrators; indeed some vulnerabilities remain unpatched for up to two years.<span id="more-9136"></span></p>
<p>Every month the number of vulnerabilities discovered grows, and the risk of not applying a patch in time grows correspondingly.</p>
<p>There was a time where on-demand network scans for vulnerabilities in all the computers on the network could be managed serially from a central console.</p>
<p>However as the complexity of the scan grew, there was no longer enough time to complete the entire network scan, even when run overnight. Consequently it became essential to offload the scanning load onto the target computers by installing a small agent that communicates with the central console.</p>
<p>This effectively parallelized the task, leading to dramatic performance improvements in getting the entire network scan completed.</p>
<p>It also brought other benefits, such as being able to run when the target computers were not on the network, as is commonly the case with laptops, and then communicating results back to the console when the laptop returned to the network.</p>
<p>However, there is more to network security than simply scanning for vulnerabilities. Remediation is essential, especially through patch management and deployment to the machines where the vulnerabilities have been detected.</p>
<p>Typically, remediation takes place from a centralized patch repository, where the service packs, critical security update patches and less critical non-security update patches are stored.</p>
<p>On large networks, and geographically diverse networks – which are typical in multi-site organizations, it can take a long time to remediate vulnerabilities to all machines in the network.</p>
<p>Deploying patches machine by machine from the centralized patch repository across the WAN link uses too much network bandwidth and takes too long.</p>
<p>Instead, it becomes necessary to use a caching solution to offload the remediation load – analogous to the agent solution described above to offload the scanning load.</p>
<p>By designating one of the target machines with an agent installed as a “relay”, patches are copied once from the centralized patch repository over the WAN and then served up many times to local machines that the relay is responsible for, across the local LAN.</p>
<p>Even when a WAN connection is not involved, on very large networks with thousands of workstations, laptops and servers, it can be very beneficial to designate a set of relay agents to speed the deployment of patches when remediating.</p>
<p>The number of types of devices with vulnerabilities which can be exploited is also growing. First servers and workstations, then laptops; next not just PCs but also Macs and Linux computers; now even devices such as printers, switches and routers need to be checked for vulnerabilities in their firmware.</p>
<p>You need a solution that can address all these types of devices, and offer efficient parallelized scanning and remediation through patch deployment.</p>
<p>If only such a solution existed…</p>
<p>It does! GFI LanGuard 2012, which has just been launched, acts as a virtual security consultant by incorporating three vital security tools: patch management, vulnerability assessment and network auditing. It includes agent technology for scanning and relay agent technology for remediation. It includes support for both security and non-security patches from Microsoft operating systems and applications and other third party applications. Finally it scans for vulnerabilities in servers, workstations and laptops; PCs, Macs and Linux computers; printers, switches and routers.</p>
<p>&nbsp;</p>
<p><em><strong>Learn more about</strong></em><strong> </strong><strong><em><a href="http://www.gfi.com/network-security-vulnerability-scanner?adv=13558&amp;loc=9">GFI LanGuard 2012</a> <em>or start your</em></em></strong><strong> </strong><em><strong><a href="http://landlanss.gfi.com/network-scan-sm/?adv=13558&amp;loc=23"><em>30-day trial</em></a></strong></em><em><strong> </strong></em><em><strong>today!</strong></em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/addressing-the-exponential-growth-in-network-vulnerabilities/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 10:29:22 by W3 Total Cache --