<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; SMB Zone</title>
	<atom:link href="http://www.gfi.com/blog/category/tttm/smb-zone/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Keeping Your IT Department Agile with Cloud Services</title>
		<link>http://www.gfi.com/blog/keeping-your-it-department-agile-with-cloud-services/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=keeping-your-it-department-agile-with-cloud-services</link>
		<comments>http://www.gfi.com/blog/keeping-your-it-department-agile-with-cloud-services/#comments</comments>
		<pubDate>Fri, 09 Aug 2013 17:06:10 +0000</pubDate>
		<dc:creator>Jackie Wake</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Services]]></category>
		<category><![CDATA[GFI Cloud]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10769</guid>
		<description><![CDATA[Despite occasional snippets of good news and glimpses of recovery, it’s still fair to say that businesses are working through tough times. Sadly, if you run an IT department, you’re probably used to IT being a reducible cost when budgets &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/08/go-cloud.jpg"><img class="alignright  wp-image-10770" style="border: 0px solid black; margin: 10px;" alt="go-cloud" src="http://www.gfi.com/blog/wp-content/uploads/2013/08/go-cloud-300x249.jpg" width="240" height="199" /></a>Despite occasional snippets of good news and glimpses of recovery, it’s still fair to say that businesses are working through tough times.</p>
<p>Sadly, if you run an IT department, you’re probably used to IT being a reducible cost when budgets get tight, and with not much light visible at the end of the economic tunnel; this is unlikely to change any time soon.<span id="more-10769"></span></p>
<p>With this in mind, it makes sense to take steps to make agility a priority for your IT infrastructure.</p>
<p>Although some “old school” IT managers remain stubbornly resistant to the attractions of cloud services, these individuals are becoming increasingly isolated. A recent survey from North Bridge Venture Partners, in association with GigaOM Research, revealed that 75% of respondents are now using some form of cloud service within their IT infrastructure.</p>
<p>One reason for the continuing march towards the cloud is the obvious and high profile push from major vendors. The past year has seen two great examples of this:</p>
<ol>
<li>Microsoft discontinuing Small Business Server, the backbone of a vast number of SMB networks, in a move to push the sector towards the cloud.</li>
<li>Adobe making all future releases of their industry-leading Creative Suite products available exclusively “as a service” via Adobe Creative Cloud.</li>
</ol>
<p>The good news for your IT department is that in reality you are far better served by the new generation of cloud services than you were by the old way of doing things.</p>
<p>Consider the rollout of a new system: Previously, you would have to base license counts and storage capacities on vague predictions. While this may have worked during boom times, it’s not a great model when times are hard and every penny counts. Now, you can roll out the same functionality with a cloud service but pay only for what you need right now. If demand for the system increases, cloud services bring inherent scalability. This is clearly preferable to the risk of disaster if you didn’t get the server specifications quite right.</p>
<p>If you’ve not been keeping track of the cloud-based alternatives to some of the things you do internally, it’s well worth having another look at the marketplace. Cloud service providers have been very responsive to customer needs and have done much to eliminate the doubts of all but the most traditional IT people!</p>
<p>At the same time, the focus of products has undergone some change. The very fact that businesses are now <i>buying a service</i> has not gone unnoticed; something illustrated by the fact that in-depth reporting for the business is almost a “given” on the features list of industry-leading cloud products.</p>
<p>Meanwhile, the datacenter infrastructures supporting these cloud systems have developed to use advanced multi-tenancy technology, which keeps prices low as well as ensuring clients’ data are compartmentalized and secure.</p>
<p>There’s no longer any IT service that can’t be handled from the cloud, from core user-facing systems that handle all the file, print and authentication that used to require “on premise” systems, to all of the back-end stuff that the IT department needs but the business always resents paying for: antivirus, patch management and monitoring being just three. It makes sense for the business to pay only for what it needs right now, rather than predict needs too far ahead, and cloud services exist that allow this to be the reality.</p>
<p>So, in conclusion, however long you’ve been in the industry, try not to fight progress. Cloud services are now very much “up to standard”, and provide you with the tools you need to provide a first class, agile IT service that management is sure to appreciate.</p>
<p><i>Want to learn more? </i><a href="http://www.gficloud.com/?adv=13558&amp;loc=44"><i>Visit our website</i></a><i> to find how GFI Cloud can keep your IT department agile with antivirus, patch management, monitoring and asset tracking all managed from the cloud.  </i><a href="http://www.gficloud.com/land/gfi-cloud-unified/?adv=13558&amp;loc=44"><i>Start a free trial</i></a><i> and </i><i>give cloud services a go!</i></p>
<p><i> </i></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/keeping-your-it-department-agile-with-cloud-services/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI MailEssentials® Wins Its Second VBSpam+ Award</title>
		<link>http://www.gfi.com/blog/gfi-mailessentials-wins-its-second-vbspam-award/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-mailessentials-wins-its-second-vbspam-award</link>
		<comments>http://www.gfi.com/blog/gfi-mailessentials-wins-its-second-vbspam-award/#comments</comments>
		<pubDate>Thu, 08 Aug 2013 14:42:37 +0000</pubDate>
		<dc:creator>Marguerite Mifsud Magrin</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[anti-spam]]></category>
		<category><![CDATA[anti-spam security]]></category>
		<category><![CDATA[anti-spam solution]]></category>
		<category><![CDATA[anti-spam solutions]]></category>
		<category><![CDATA[false positives]]></category>
		<category><![CDATA[GFI MailEssentials]]></category>
		<category><![CDATA[legitimate emails]]></category>
		<category><![CDATA[MailEssentials]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[VBSpam+]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10765</guid>
		<description><![CDATA[We are very pleased to announce GFI MailEssentials has recently earned its second VBSpam+ award this year. GFI MailEssentials had a spam catch rate of more than 99% and 0 (zero) false positives. The VBSpam comparative testing is a regular &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/08/vbspam-plus-0713.gif"><img class="alignright size-full wp-image-10766" style="border: 0px solid black; margin: 10px;" alt="vbspam-plus-0713" src="http://www.gfi.com/blog/wp-content/uploads/2013/08/vbspam-plus-0713.gif" width="129" height="193" /></a>We are very pleased to announce GFI MailEssentials has recently earned its second VBSpam+ award this year. GFI MailEssentials had a spam catch rate of more than 99% and 0 (zero) false positives.<span id="more-10765"></span></p>
<p>The VBSpam comparative testing is a regular independent comparison of anti-spam solutions which offers its readers the best impartial advice about anti-spam security and products on offer. The certification is awarded to products that exceed a predefined threshold based on a combination of criteria relating to the products&#8217; spam catch and false positive rates.</p>
<p>GFI MailEssentials met the VBSpam+ criteria in blocking a large percentage of emails in a live spam stream and identifying all but a very small percentage of emails in a live stream of legitimate emails.</p>
<p><b><i>Want to learn more about this product? Check out <a href="http://www.gfi.com/products-and-solutions/email-and-messaging-solutions/gfi-mailessentials?adv=13558&amp;loc=46 ">GFI MailEssentials</a>, or register for a <a href="http://www.gfi.com/products-and-solutions/email-and-messaging-solutions/gfi-mailessentials/download?adv=13558&amp;loc=47 ">free 30-day trial</a> and give it a spin today! </i></b></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-mailessentials-wins-its-second-vbspam-award/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>July Webcast Line-Up</title>
		<link>http://www.gfi.com/blog/july-webcast-line-up-3/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=july-webcast-line-up-3</link>
		<comments>http://www.gfi.com/blog/july-webcast-line-up-3/#comments</comments>
		<pubDate>Wed, 07 Aug 2013 16:13:51 +0000</pubDate>
		<dc:creator>Andrea Martin</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[August webcasts]]></category>
		<category><![CDATA[GFI Webcasts]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[IT Service Providers]]></category>
		<category><![CDATA[IT solutions]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Secure your network]]></category>
		<category><![CDATA[webcast]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10763</guid>
		<description><![CDATA[Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs! IT solutions that save money and reduce financial risk Date: &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg"><img class="alignright  wp-image-10258" style="border: 0px solid black; margin: 10px;" alt="GFI webcasts" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg" width="240" height="225" /></a>Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!<span id="more-10763"></span></p>
<h2>IT solutions that save money and reduce financial risk</h2>
<p><b>Date:</b> <b>August 22, 2013 – Time: 5 p.m. BST / 6 p.m. CEST – US: 9 a.m. PDT / 12 p.m. EDT</b></p>
<p>For most businesses email is the biggest, most critical source of company information. How are you managing this constant flow of information and addressing issues such as archiving, compliance, spam and network protection?</p>
<p>In this webcast Mary Watkins, ex FT reporter, shares some real life stories about companies who have learned about financial risk the hard way. We will also take a look at how organizations can create cost savings and limit risks significantly by having the right messaging and archiving systems in place.</p>
<p><a href="http://bit.ly/18OYzYZ">Register now</a><b></b></p>
<h2>Secure your network in minutes. Don’t let the bad guys win…</h2>
<p><b>Date:</b> <b>August 27, 2013 – Time: 4 p.m. BST / 5 p.m. CEST – US: 8 a.m. PDT / 11 a.m. EDT</b></p>
<p>Security is paramount at Central Bank &amp; Trust; more so, since a virus got in and did damage. Travis Homi, IT Manager at the bank shares his experiences around keeping the network secure; the challenges he faced, the solution he put in place and what he learned along the way. Join Travis, in our live webcast, hosted by Barclay Rae, an independent ITSM consultant and put your own questions to Travis during the live Q&amp;A.</p>
<p><a href="http://bit.ly/13y2u84">Register now</a><b></b></p>
<h2>Securing your IT Infrastructure: Vigilance is the Watchword</h2>
<p><b>Date:</b> <b>August 29, 2013 – Time: 5 p.m. BST / 6 p.m. CEST – US: 9 a.m. PDT / 12 p.m. EDT</b></p>
<p>The role of an IT administrator does not end when the network is set up and the necessary security measures are in place. The ongoing health and security of the network is also dependent on the business satisfying a number of laws and regulations which the IT administrator must be aware of. Furthermore, the admin must also monitor the network continuously for faults as well as suspicious/malicious activity.</p>
<p>In this webcast we will show you how to use log data analysis and other techniques to proactively address hardware faults, malicious intrusions and other unwelcomed issues in real time. As a result, you can avoid having to react after the incident has occurred when, often, the damage has already been done.</p>
<p><a href="http://bit.ly/14Harar">Register now</a></p>
<h2>The Metrics That Matter: An Intelligent Approach for IT Service Providers</h2>
<p><b>Date: August 29, 2013 – Time: 11:00 AM US EDT</b></p>
<p>Your business data may be the most powerful tool in your toolbox and if you&#8217;re not leveraging it you&#8217;re likely missing opportunities for optimization and growth. According to a recent survey that polled hundreds of IT Service providers around the world, best-in-class ITSPs are taking a data-driven approach to decision making. Please join us for a special webinar to review the findings of the 2013 IT Service Provider Benchmarking Study and hear what your peers had to say about:</p>
<ul>
<li>Essential metrics for running a successful business</li>
<li>Identifying and measuring business efficiency, staff utilization, profitability, and client satisfaction</li>
<li>Best practices</li>
</ul>
<p>Our guest will be Leonard DiCostanzo, Senior Vice President of Community and Business Development of Autotask.</p>
<p><a href="https://www3.gotomeeting.com/register/329668614">Register now</a><b></b></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/july-webcast-line-up-3/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The GFI Cloud Survey: An Insight into Modern IT Management</title>
		<link>http://www.gfi.com/blog/the-gfi-cloud-survey-an-insight-into-modern-it-management/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-gfi-cloud-survey-an-insight-into-modern-it-management</link>
		<comments>http://www.gfi.com/blog/the-gfi-cloud-survey-an-insight-into-modern-it-management/#comments</comments>
		<pubDate>Tue, 06 Aug 2013 17:41:31 +0000</pubDate>
		<dc:creator>Jackie Wake</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[Centralized device management]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloud survey]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[GFI survey]]></category>
		<category><![CDATA[IT admins]]></category>
		<category><![CDATA[IT Management]]></category>
		<category><![CDATA[Managing remote devices]]></category>
		<category><![CDATA[remote devices]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10760</guid>
		<description><![CDATA[IT departments are moving away from using individual software tools, to carry out their day-to-day operations, and towards service-based cloud products, according to an internal GFI survey. The results are based on a survey of more than 170 customers who &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/08/Modern-IT-Management.jpg"><img class="alignright  wp-image-10761" style="margin: 10px; border: 0px solid black;" alt="Modern IT Management" src="http://www.gfi.com/blog/wp-content/uploads/2013/08/Modern-IT-Management-300x200.jpg" width="240" height="160" /></a>IT departments are moving away from using individual software tools, to carry out their day-to-day operations, and towards service-based cloud products, according to an internal GFI survey.</p>
<p>The results are based on a survey of more than 170 customers who use the GFI Cloud platform.</p>
<p>Functionality, ease-of-use and price were the three main reasons why the respondents chose the GFI Cloud solution, the survey shows.<span id="more-10760"></span></p>
<h2><b>Key Findings</b></h2>
<p>The IT professionals who participated in the GFI survey revealed the following interesting facts:</p>
<h3><b>1.     </b><b>Centralized device management is crucial</b></h3>
<p>50% of the IT professionals surveyed stated that the lack of a central view of devices and issues was a strong motivator in purchasing GFI Cloud.</p>
<p>This central view is particularly important given the increased mobility of the modern workforce, as is well illustrated by the next point.</p>
<h3><b>2.     </b><b>Managing remote devices is a headache for IT admins</b></h3>
<p>38% of respondents complained about the difficulty of managing remote devices, such as laptops, and 32% worried about keeping them secure. This is perhaps an unsurprising reflection of how employees expect modern IT to be inherently more mobile.</p>
<p>The survey responses showed positive signs that GFI Cloud implementation is an effective way to make things easier for the IT team: 61% specifically highlighted that centralized management was easier post-implementation.</p>
<h3><b>3.     </b><b>Security is enhanced with the right solution</b></h3>
<p>40% of the professionals questioned reported that they had experienced fewer security breaches due to antivirus and patch management since they implemented GFI Cloud.</p>
<p>38% also reported a more stable IT environment, with less unplanned downtime.</p>
<h3> <b>4.     </b><b>GFI Cloud saves money</b></h3>
<p>While centralized IT admin and the desire to save <i>time</i> were both reported as strong motivators for the initial purchase of GFI Cloud, the survey results seem to imply that users of the product have also experienced unexpected cost savings.</p>
<p>41% of respondents reported that using GFI Cloud had reduced their costs, and 39% said that they were able to complete more tasks using fewer resources.</p>
<p>In totality, the survey responses present a clear picture of IT departments that are now able to enjoy a greater level of control over their infrastructures. Furthermore, the biggest “headaches” reported by respondents prior to implementation (lack of a central view, and managing and securing remote devices) are soundly addressed by the functionality of the GFI Cloud software.</p>
<p>The most significant finding from the survey is great news, both for GFI and for the customers who have selected the GFI Cloud package for their business:</p>
<blockquote><p><strong><i>Over 86% of respondents said that they would definitely recommend the product to others.</i></strong></p></blockquote>
<p>Finally, and worthy of a special mention, is the fact that 22% of respondents felt that implementing GFI Cloud had helped the IT department be seen as more of a business enabler than a “break / fix” team. In an age where IT is becoming so much more service-driven, it’s pleasing to see that such a change in perception can be born of the use of just one product.</p>
<p><i>Do you want to learn more about this product? </i><a href="http://www.gficloud.com/?adv=13558&amp;loc=43"><i>Visit our website</i></a><i> to find how GFI Cloud simplifies IT management with one centralized view of antivirus, workstation and server monitoring, patch management and asset tracking across all your servers, PCs and laptops on the move! See for yourself, with a</i><i> </i><i><a href="https://www.gficloud.com/land/gfi-cloud-unified/?adv=13558&amp;loc=43">free 30-day trial of GFI Cloud™</a>.</i></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-gfi-cloud-survey-an-insight-into-modern-it-management/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The 31 Worst Face-Palm Moments in IT</title>
		<link>http://www.gfi.com/blog/the-31-worst-face-palm-moments-in-it/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-31-worst-face-palm-moments-in-it</link>
		<comments>http://www.gfi.com/blog/the-31-worst-face-palm-moments-in-it/#comments</comments>
		<pubDate>Fri, 02 Aug 2013 10:13:54 +0000</pubDate>
		<dc:creator>Casper Manes</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[face-palm moments in IT]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[IT face-palm moments]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10758</guid>
		<description><![CDATA[You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/08/face-palm.jpg"><img class="alignright size-medium wp-image-10759" style="border: 0px solid black; margin: 10px;" alt="face-palm" src="http://www.gfi.com/blog/wp-content/uploads/2013/08/face-palm-300x215.jpg" width="300" height="215" /></a>You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and I’ve seen a lot of strange things in IT at my various customers. Some were shocking, some were scary, and some were so out of whack with common sense that I just wanted to face-palm and walk away.</p>
<p>Here are some of these stories I witnessed as an independent consultant: I present the 31 worst face-palm moments in IT.<span id="more-10758"></span></p>
<p><strong>1.</strong> On a project where I was a consultant, security declared a system in violation of security policy several weeks into the project. They had been advised of the overall plan before it began. When I asked to see the security policy, the security guru said the policy was confidential and couldn&#8217;t be shown to any non-employee. 95% of IT were contractors.</p>
<p><strong>2.</strong> The project lead on another client engagement read an article about Java saying it was the next big thing. He declared that the project should switch to Java. What he didn&#8217;t understand was that Java was being shown as the next big thing…for security exploits!</p>
<p><strong>3.</strong> Another customer’s PMO scheduled an all-hands meeting to go over the project plan. It was mandatory attendance for all team members on the project. The room they scheduled was too small by half, and had no projector. Picture if you can 12 people looking over someone&#8217;s shoulder at MS Project on a 14&#8243; laptop screen.</p>
<p><strong>4.</strong> I once saw management at another customer approve a mid-day DNS change because they were told it was zero risk. The DNS admin made the change to the zone, but forgot the trailing dot. As a result, it took down email for 20,000 people. It was the last mid-day change ever approved at that company.</p>
<p><strong>5.</strong> Another customer’s ISP had a major outage which took down their entire office. My contact asked me why their office was down, so I explained that because they had opted not to provision a backup circuit from another provider, they were down until the ISP got things fixed. His first request was that I call the second provider I had recommended and get them to install a new circuit that day. The second was to see if they could borrow some bandwidth from my company’s connection. My office was across town. The Internet –it&#8217;s like a cup of sugar.</p>
<p><strong>6.</strong> Here&#8217;s one for the Netware folks. I once was called in to a client to figure out why their server crashed and no one could access any data. It turns out that a junior admin saw that Z:, Y:, and X: all had exactly the same content. EXACTLY. THE. SAME. To save space on the file server, he went into X: and deleted everything there. He then switched to Y: only to see that it was now empty too. He probably would have then looked in Z: except that suddenly everyone starting complaining that their systems crashed.</p>
<p><strong>7.</strong> Here’s another one for the Netware folks. I was called in to try to help figure out why Internet access suddenly stopped for one of the two offices this customer had. It turns out this is what happened. They built a Netware 4.11 server in one office. They configured IP and IPX, got everything the way they wanted it, and then drove it to the other office and plugged it in. They configured IPX for the new location, assigned it an ip.addr for that datacenter, and thought they were done. Suddenly, no one in the office could reach the original site, or the Internet. Packets kept coming back destination unreachable. The server might have had a new ip.addr, but it was running RIP, and considered that it was directly connected to the original network. Since that was also the default route to the Internet, it effectively took down an entire office until I finally figured out it was the new server as the source of the destination unreachable messages.</p>
<p><strong>8.</strong> At another customer, an admin who wanted to experiment with P2V virtualized a physical host, pulled the network cable out of the back of the original and brought up the guest on a new VMware server. All went well for a couple of weeks until he went on vacation. As it turns out, he never licensed the VMware server, so it stopped functioning at the 30-day mark. Since none of his co-workers knew about his little experiment, all they knew was that a critical server went down. They rushed to the server room to find that the network cable had been pulled. It was quick to fix, but of course, this new server was now a month out of date for all data/changes to the application. A two-fold inquisition commenced to review the access logs and video to find who entered the server room to pull the cable out that morning, and also to find who restored a month old backup to this server. Three days later the original admin got back and sheepishly confessed all.</p>
<p><strong>9.</strong> I once was working with a client that deployed a full rack of servers in datacenter A, for eventual deployment in datacenter B. When it came time to move them, I urged them to unrack the servers before transport. The shipping company assured my client it was going to be okay, so they loaded up the rack and sent it on its way. They got the rack to the datacenter B, started to lower the rack on the truck&#8217;s tail lift, when the whole thing overbalanced and dropped six feet to the pavement. Only two 1U servers survived to boot up.</p>
<p><strong>10.</strong> This one is probably one many of you can relate to. A client had a new datacenter going in, and the cabling vendor was giving the orientation tour of what they had done. As they all leaned inwards to see a particular area, one of the admins started to lose his balance and reached out for the wall to support himself. Of course, as you can imagine, his hand came down right on top of the emergency actuator for the fire suppression system. I was in my client’s office at the time, heard the “BANG” of the actuation charge, and spun around to see them coming running out of the datacenter with a bank of fog rolling out behind them. That cover that should have been over the emergency fire actuator? It was on backorder and due to arrive the following week.</p>
<p><strong>11.</strong> A similar story was relayed to me by another customer. A vendor was running some new fiber in the datacenter. As the two techs were laying out the fiber run, and one was slowly backing up as they unspooled and laid out the fiber, he backed right into the emergency power off switch for the datacenter. Again, there was no cover protecting the EPO from accidents.</p>
<p><strong>12.</strong> Several years ago I was consulting with another customer on a video conferencing pilot. The team needed new hardware so we submitted a requisition to purchasing to obtain 20 new laptops for the video conferencing project. We provided the specific model number and the breakdown of all components, and explained it was for the video conferencing project in the justification paragraph. They placed the order, but when the laptops arrived, none of them had the built-in webcams that were specified. My client assumed the vendor screwed up and went to tell purchasing they needed to get it fixed, only to have them proudly tell him they saved the project $50 per laptop by not ordering webcams, since the business didn&#8217;t have any video conferencing deployed and there wasn&#8217;t a need for webcams.</p>
<p><strong>13.</strong> I once consulted for a company that wanted to put in Cisco Telepresence into a new office. The vendor came in to do all their physical and sound measurements and certification criteria, and finally signed off on the room. The next team arrived a week later to do the install, only to declare the room unsatisfactory. Apparently, the first guy measured sound while the office was essentially empty. Before the second team arrived, the cooling units for the new datacenter were installed and turned on, and the hum of that system was too loud for Telepresence.</p>
<p><strong>14.</strong> At the same company, and with the same Telepresence setup. For the very first conference between this office and HQ, one of the senior leadership could not make it, and wanted to dial in. Back then, Telepresence was a completely closed system. They had to steal a speaker phone from another room, quickly make a 60 foot Ethernet cable, and run it down the hall from the closest Ethernet drop so this remote VP could listen in.</p>
<p><strong>15.</strong> I once was a consultant at a company that had dozens and dozens of conference rooms. Every one of them had a projector. None of them had a screen. They were glass boxes in the middle of the floor, with windows all around all four walls. They were called fish bowls for a reason. They used to have to take large pieces of easel paper and tape them to the windows to create a projection surface.</p>
<p><strong>16.</strong> At another company I consulted with, their IT team wanted to manage all their DMZ servers using Active Directory, but didn&#8217;t trust traffic coming into the internal network from the DMZ. So they moved a domain controller out to the DMZ. Because that&#8217;s more secure.</p>
<p><strong>17.</strong> I once consulted for another company that was in the process of deploying Lotus Notes. They couldn&#8217;t figure out how to get the client to work correctly, so they made everyone a domain admin. Every. Single. User. Domain Admin.</p>
<p><strong>18.</strong> Another company I worked with needed to move their entire datacenter, essentially in a weekend, in what these days we call a forklift operation. Rather than planning out the required connectivity and security, management made the decision to just permit IP ANY between the DMZ, the database servers network, and the internal network, planning to &#8220;clean it all up later.&#8221; Later took over two years to finally arrive.</p>
<p><strong>19.</strong> I once was a consultant for a company that was trying to adopt Oracle across all seven of its business units. They literally had over 100 consultants in a giant war room for over two years trying to get it all working. One CIO change later, the entire lot were sent home and the effort was abandoned. It&#8217;s not the choice to give up that was the face palm… that should have happened ages prior. It was that two years x 100 consultants x $$$ that was wasted because the previous CIO just couldn&#8217;t admit he had made a mistake.</p>
<p><strong>20.</strong> An admin with too much power deleted a user account from Active Directory by mistake. In an attempt to &#8220;fix it&#8221; this admin chose to do an authoritative restore of AD from a one month old system state backup. For those of you who aren&#8217;t AD savvy, this had the effect of restoring the entire forest back to the state it was in a month ago. In a company of 30,000 users, you can imagine how much fun that was.</p>
<p><strong>21.</strong> That same admin once configured restricted groups in AD, because he read that it helped with security. He added domain admins and enterprise admins to that list, but didn&#8217;t put any users into the Member Of tab.</p>
<p><strong>22.</strong> I once saw a company implement a GPO to provide one user with rights to use RDP to connect to a server, with the unintended consequence of locking every other admin in the company out of every single server in the domain. It was a simple edit, to the Default Domain Policy.</p>
<p><strong>23.</strong> I once provided some security consulting to a company that refused to implement any kind of proxy server, web content filtering, or anything else that would help control outbound Internet access. However, every year the CIO would demand that the security team found a way to block access to the Final Four basketball tournament.</p>
<p><strong>24.</strong> Fireproof safes are fireproof, not heat proof. A business down the street from where I once worked found that out the hard way when, following a fire in the office, they found their backup tapes so much melted slag.</p>
<p><strong>25.</strong> I understand why end users want to turn off antivirus software when their machines seem slow, but why oh why would an admin do that? The worst virus outbreak I ever saw came about at a customer I regularly worked with, because the SQL team had disabled a/v on all their servers because it &#8220;slowed them down.&#8221; Then SQL Slammer hit. Slow got redefined that day.</p>
<p><strong>26.</strong> I once had to help a client clean up the devastation caused when a user created a print ready PDF to send to a distribution list of around 10,000 users. That print ready PDF was about 48 MB, and their mail system had neither attachment size limits, nor recipient count limits. We&#8217;re still not sure how many got out before the entire mail system came to a halt, but we spent the next 8 hours watching the inbound servers dying from all the NDRs, purging the queues, restarting, and waiting for the next wave to come crashing in. The worst part of it? Once the mess was finally cleaned up, we took the print ready PDF and saved it for web publishing. It came in at just under 800 KB!</p>
<p><strong>27.</strong> At another customer, I once saw their shiny new fiber-optic switches stacked, one atop the next, on the floor in the corner. There was no rack, no cooling, and no support. Just 48U of switches freely standing, powered up and running, without even air handling to help keep them cool.</p>
<p><strong>28.</strong> In this same datacenter, the &#8220;doorbell&#8221; you had to ring to gain access was literally two low voltage wires sticking out of the wall in the corner. You pressed them together to ring the bell, and separated them to silence the bell. There&#8217;s nothing like a 50 volt jolt to make you ask yourself if you really want to go in.</p>
<p><strong>29.</strong> And again in the same datacenter, to that same stack of fiber switches, the trunk fiber to connect the stack to the main network was zip-tied up the wall and across the ceiling. Some zip ties were so loose the fiber was swinging in the breeze, while other zip ties were so tight it must have been fracturing the cores.</p>
<p><strong>30.</strong> At another organization I used to work with, they had central IT for seven different companies all tied together by the parent&#8217;s ownership. All change requests had to be approved by unanimous vote. It took the company almost a year to replace a failed switch because it would cause an outage (in the middle of the night, during a weekend change window) because one org kept vetoing in case it caused them problems during their testing.</p>
<p><strong>31.</strong> A company I consulted for had outsourced their IT to a major provider about a year before. I discovered that not a single patch had been applied to any of the 100+ servers in that entire time, because the outsource provider didn&#8217;t think patching was a part of server maintenance and support.</p>
<p>While these face-palm moments were all personally experienced by me, I bet you have some you’d like to share. Leave a comment and let us know the best (or the worst) face-palm moment you’ve ever experienced. We’d love to hear about them!</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-31-worst-face-palm-moments-in-it/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Is IT too Important to Be Trusted to IT Pros?</title>
		<link>http://www.gfi.com/blog/is-it-too-important-to-be-trusted-to-it-pros/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=is-it-too-important-to-be-trusted-to-it-pros</link>
		<comments>http://www.gfi.com/blog/is-it-too-important-to-be-trusted-to-it-pros/#comments</comments>
		<pubDate>Thu, 01 Aug 2013 16:52:20 +0000</pubDate>
		<dc:creator>Debra Littlejohn Shinder</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[computer networking]]></category>
		<category><![CDATA[IT industry]]></category>
		<category><![CDATA[network admin]]></category>
		<category><![CDATA[Software Vendors]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10755</guid>
		<description><![CDATA[You didn’t always have to go to medical school and get a license from the state to practice medicine. The first licensing laws in the U.S. were passed in the 1800s but then repealed in most states, and many states &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/08/why-cloud.jpg"><img class="alignright size-medium wp-image-10756" style="border: 0px solid black; margin: 10px;" alt="cloud question mark " src="http://www.gfi.com/blog/wp-content/uploads/2013/08/why-cloud-190x300.jpg" width="190" height="300" /></a>You didn’t always have to go to medical school and get a license from the state to practice medicine. The first licensing laws in the U.S. were passed in the 1800s but then repealed in most states, and many states had never passed licensure laws by 1850. Aspiring physicians could apprentice with practicing doctors until they were deemed ready (or deemed themselves ready) to hang out their shingles.  Attorneys got their training in much the same way. Today, of course, practicing medicine or law without a license is a serious criminal offense, and obtaining a license requires not just passing exams to demonstrate knowledge of the subject matter but meeting stringent educational prerequisites before even being allowed to take the tests.<span id="more-10755"></span></p>
<p>One could argue that the IT profession today is where the medical and legal professions were two centuries ago. There’s no formal training, testing or governmental approval required to become an IT practitioner.  Some believe it’s time for that to change. They postulate that in a world where all networks are connected to one another through the global Internet, an incompetent network admin can be responsible for grave damage to companies, individuals and national infrastructures.</p>
<p>Does the current move toward the cloud provide an opportunity to rethink the qualifications for IT positions? What are the pros and cons of going to a “licensed professional” model?</p>
<p>Licensing isn’t reserved for just those “high end” professions mentioned above. From amusement ride inspectors to well diggers, plumbers to hairdressers, the state and/or professional organizations regulate occupations of all sorts at all levels of income. Some states license dog breeders, palm readers, boxers, egg handlers and other unlikely occupations. <a href="http://www.labor.ny.gov/stats/lstrain.shtm">New York State licenses 126 occupations</a>. The rationale is protection of the public and those individuals or companies who utilize the services, although of course there is almost always a monetary cost to the licensee, which may or may not cover or exceed the actual cost of administering the licensing program.</p>
<p>Licensees are usually required to complete a certain amount of continuing education in their fields in order to renew their licenses on a specified regular basis (which of course means additional on-going costs). A disadvantage (to the public) of licensing is that it can drive up the cost of the services performed by the licensed personnel, both by imposing costs on them that must be recouped and by creating an artificial shortage of qualified personnel. Of course, this is beneficial to those who are licensed professionals.</p>
<p>Some argue that licensing requirements stifle competition by imposing extra cost and sometimes irrelevant educational prerequisites on those who want to practice an occupation or profession, and that issuance is sometimes based on subjective criteria, which can allow those within the profession to exclude others they deem “undesirable” for reasons that have nothing to do with job abilities. In addition, licensing boards are usually made up of political appointees who may have their own agendas.</p>
<p>The closest thing to licensing that the IT industry has had, for a long time, is certification. <a href="http://www.itcertificationmaster.com/list-of-all-it-certifications/">There are hundreds of different IT certs available.</a> Software vendors operate programs to train and test IT pros in the use of their products and issue certifications such as the MCSE (Microsoft), IBM DBA (IBM) or CCIE (Cisco) in recognition of demonstration of competency according to their standards. Vendor-independent organizations such as CompTIA and SANS also provide testing and certification in network administration and security that are not tied to particular product lines.</p>
<p>The big difference between licensing and certification is that the latter isn’t mandatory in order to get a job in the profession, although <a href="http://www.networkworld.com/news/2010/031010-microsoft-cisco-salaries.html">certified professionals may command higher pay and find it easier to get a job</a>. Companies can set hiring policies that require certification, but they’re free to hire uncertified IT pros if they want. Generally, performing the duties of a licensed professional without a license can carry heavy penalties, such as fines or even imprisonment under the criminal laws, and/or civil lawsuits.</p>
<p>Those who favor the licensing model for IT pros point out that the complexity of computer networking approaches that of law and medicine, and that the ramifications of mistakes on the part of IT professionals can have similar negative impact. Those who are not in favor of licensing argue that the standards for legal and medical professionals, as well as those for most other licensed occupations, are much more established and grew out of centuries of evolution of those occupations.</p>
<p>Computer networking has only been around since the 1950s and widespread Internet connectivity for businesses and individuals didn’t come about until the 1990s, less than half a century ago. Thus those standards are much less absolute. Creating licensing exams that truly measure a candidate’s ability to do the job would be a challenge. Certification exams tend to be very specific, focusing on a particular vendor’s product(s) or on a specialty area (such as security) or be overly broad and high level to the point where the cert doesn’t guarantee any real in-depth knowledge of the subject matter. There is also the issue that some people who can do a job well don’t perform well on written exams, and hands-on exams (such as the CCIE) are very time-consuming and expensive to administer.</p>
<p>For the IT pros themselves, there would be both benefits and drawbacks to a licensing mandate. Those who made the cut might enjoy increased compensation and greater status – but entering the profession would be considerably more difficult. Am I in favor of licensing IT pros? No. Do I believe it’s inevitable, sooner or later? Probably.</p>
<p><strong><em>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/is-it-too-important-to-be-trusted-to-it-pros/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>The Problem with Patching Is – Not Patching!</title>
		<link>http://www.gfi.com/blog/the-problem-with-patching-is-not-patching/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-problem-with-patching-is-not-patching</link>
		<comments>http://www.gfi.com/blog/the-problem-with-patching-is-not-patching/#comments</comments>
		<pubDate>Tue, 30 Jul 2013 15:54:57 +0000</pubDate>
		<dc:creator>Jackie Wake</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[Patching]]></category>
		<category><![CDATA[Patching Microsoft]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10753</guid>
		<description><![CDATA[Patching is not something that the IT department really enjoys doing. It is complicated and ongoing. It takes forever and it doesn’t add any actual business value. Meanwhile you have myriad systems to patch, and endless patches to test and &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/02/running-patch-management.jpg"><img class=" wp-image-10344 alignright" style="border: 0px solid black; margin: 10px;" alt="running patch management" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/running-patch-management-300x200.jpg" width="240" height="160" /></a>Patching is not something that the IT department really enjoys doing. It is complicated and ongoing. It takes forever and it doesn’t add any actual business value.</p>
<p>Meanwhile you have myriad systems to patch, and endless patches to test and then install. Then you have to do it all over again. And again. And again.<span id="more-10753"></span></p>
<p>No wonder a recent study by the UK-based Federation of Small Business shows that little more than a third (36%) of small shops patch regularly. Then these shops wonder why they got compromised, or blame their software vendors, especially Microsoft® – a common security punching bag!</p>
<p>Patching, well, patching properly, solves the majority of security problems. In fact 90% of successful exploits are against unpatched systems.</p>
<p>Even environments that should presumably be highly secure too often fail to patch. Last year an audit at the U.S. Department of Energy found that some 60% of their desktops lacked important patches.</p>
<p>Unpatched systems are so vulnerable because most hackers are lazy. Script kiddies are one the laziest – they take existing exploits and maybe tweak a few lines and release it as their own creation. And because the script worked before, chances are it will again. Most tech savvy people these days can become successful hackers if proper defenses – like patching – aren’t mounted.</p>
<p>Patches offer another shortcut, and a main artery right into the heart of your computers. There are two ways this works. The worst is when some security researcher looking for a headline finds and then blabs about an exploit that the software maker is then forced to quickly patch. This is an alarm for hackers to devise and mount attacks against this vulnerability.</p>
<p>The second is a patch that is released to fix a hole that only the vendor really knows about.</p>
<p>Either way the patch defines the hole and acts as a blueprint for a hack attack. Even though the hole is presumably fixed by the patch, it is only fixed for those that install the patch.</p>
<p>Unfortunately many never patch (that crazy 36% again) and even those that do don’t always fix holes immediately due to time constraints and the need to test patches for conflicts.</p>
<p><strong>Patching Microsoft Isn’t Enough</strong></p>
<p>Microsoft, for all the knocks it takes, is pretty darn good at handling patches, and actually a bit of a role model. The company is open about its problems, and the second Tuesday of every month, Patch Tuesday, publicly releases its fixes. It even gives a heads up as to what’s coming.</p>
<p>And it has a decent free tool, Window Server Update Services (WSUS), to install these patches – think of this as Windows Update on steroids. That’s why Microsoft patches are the most commonly and regularly installed.</p>
<p>But when was the last time you came across an all Microsoft shop? These days FireFox, Adobe Web tools, and even Oracle® all have more patches than a pair of old hippy pants. In June alone Oracle released fixes for 40 holes in Java. And most of these holes allow attacks that bypass user names and passwords. In April Oracle fixed 128 holes in its applications, middleware and database. Still think Microsoft is all you have to worry about?</p>
<p>Gartner is all worked up about this problem:</p>
<blockquote><p>“In the darkest woods of IT, patching 3rd party application on a desktop remains a significant challenge for many organizations. Patching server OSs (Windows and Linux/UNIX) and 3rd party server applications also remains challenging due to fragility of many server environments. Add virtualization to the mix – and you have a full-blown slow-cooking disaster. And then you have Java…a security disaster in a league of its own,” wrote Gartner analyst Anton Chuvakin in a recent <a href="http://blogs.gartner.com/anton-chuvakin/2013/05/06/patch-management-not-a-solved-problem/">blog</a>. “Java, Adobe Reader and Flash, Firefox, Oracle fat clients as well as many vertical and business-specific applications are often patched MUCH later than Windows and Office.”</p></blockquote>
<p>BYOD only makes this all worse. These days you have to patch anything and everything. And fix these holes before the hackers jump in!</p>
<p>If patches are the hackers’ best roadmap, shouldn’t patching be a top priority?</p>
<p>WSUS is not enough. You need a broader tool that embraces multiple platforms and automates as much as possible patch testing and deployment.</p>
<p>With today’s world of distributed enterprises, mobile workers, BYOD and telecommuting you need to keep remote off network machines patched. You simply can’t have IT travel to update all these devices or ask end users to patch the machines themselves. Here a cloud patch management tool is the perfect answer.</p>
<p>See for yourself how easy it is to keep your servers, PCs and laptops up-to-date, with a <a href="http://www.gficloud.com/land/simple-patch-management/?adv=13558&amp;loc=39">free 30-day trial of GFI Cloud™</a>. Whether your users are in the office, on the road or working from home, GFI Cloud is the easy way to keep their devices patched, secure and running efficiently, from one central console.  <a href="http://www.gficloud.com/patch-management?adv=13558&amp;loc=42 ">Learn more</a></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-problem-with-patching-is-not-patching/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The Endpoint Is a Moving Target</title>
		<link>http://www.gfi.com/blog/endpoint-is-a-moving-target/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=endpoint-is-a-moving-target</link>
		<comments>http://www.gfi.com/blog/endpoint-is-a-moving-target/#comments</comments>
		<pubDate>Wed, 17 Jul 2013 17:44:31 +0000</pubDate>
		<dc:creator>Debra Littlejohn Shinder</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[data loss]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[endpoint]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[leakage sources]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10668</guid>
		<description><![CDATA[Once upon a time, when we talked about securing our networks from edge to endpoint, both ends of that route were pretty easy to define. Now not only has the perimeter blurred and blended so that it’s hard to determine &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/THE-ENDPOINT-IS-A-MOVING-TARGET.jpg"><img class=" wp-image-10669 alignright" style="margin: 10px; border: 0px solid black;" alt="THE ENDPOINT IS A MOVING TARGET" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/THE-ENDPOINT-IS-A-MOVING-TARGET.jpg" width="288" height="184" /></a>Once upon a time, when we talked about securing our networks from edge to endpoint, both ends of that route were pretty easy to define. Now not only has the perimeter blurred and blended so that it’s hard to determine where the local network begins, but the endpoint, too, has changed in nature. It’s no longer a fixed workstation, sitting somewhere on corporate premises, tethered to the rest of the internal network by Ethernet cables. Now it’s just as likely to be a laptop, tablet or smart phone that moves from place to place and connects to your network only intermittently. Securing these devices is a challenge – but it must be done; otherwise the security game is over before it begins.  <span id="more-10668"></span></p>
<p>About 10 years ago, I got my first precursor to the modern “smart phone” – an HP iPAQ running Microsoft’s Pocket PC operating system. At that time, I never could have dreamed that one day the phone in my pocket would have more RAM and a more powerful processor than the desktop computer I was using back then. Today’s smart phones are handheld computers in every sense of the word, and workers are using them that way, both for personal and work-related tasks.</p>
<p>Mobile technology is a great convenience for users and the BYOD trend has saved companies money, but security got substantially more difficult when all those roaming endpoints came into the picture. It’s far easier to control on-premises workstations that stay put; with smart phones, tablets and laptops, you never know where they’ve been and what their users/owners have been doing with them prior to connecting them to your company network.</p>
<p>The proliferation of mobile devices greatly increases the risk of data leakage – the unauthorized transfer of internal data to persons or places outside the company. This could be company financial information, trade secrets, intellectual property, personal information about clients or employees, or any other type of data that should remain confidential. Mobile devices facilitate both intentional and unintentional leakage. Most studies show that a very large percentage of data leakage is unintentional, but that makes it no less damaging.</p>
<p>Data leakage can take place through many different vectors, including traditional email, web mail, instant messaging, malicious web pages, theft or loss of devices to which company information has been downloaded or on which it has been created and saved, and more.</p>
<p>In a world where so many of the endpoint devices on our networks are located physically outside of the perimeter, the importance of edge-based firewalls has faded into the background and securing the endpoint has become the logical focus of our new security paradigm. The endpoint has also become the favorite target of hackers and attackers, who see it as an easy way into the network.</p>
<p>Just as retailers and other businesses that maintain product inventory institute loss prevention programs to prevent theft of tangible goods, IT departments now recognize that data loss prevention measures play a vital role in protecting the company from the consequences of data leakage.</p>
<p>This means you need to be able to control what information travels to and from the mobile endpoints, and identify potential leakage sources. Mobile devices need to be monitored just as closely as stationary desktops are – or even more so, due to the heightened risk. You want to know when new devices connect to the network and you want to know what they’re doing after they connect. A good endpoint security solution will give you the ability to see into the activities of the mobile devices on your network and even track the specific files that are transferred to and from those devices.</p>
<p>However, protecting the endpoint – and protecting the network from the endpoint – needs to go further than that. With real-time alerts, you can take action when suspicious activity occurs. Even so, there may be times when data leakage occurs. Thus you want to ensure any data that gets into the wrong hands is rendered indecipherable. That can be accomplished by encrypting data on the devices and using encrypted, secure connections to transmit data between the endpoints and the company network.</p>
<p>In the past, endpoint security consisted primarily of antivirus software and maybe a host firewall. Today, with the perimeter walls figuratively falling down as the local network changes from a stable and geographically contained entity to a fluid one where devices move in, out and through, that’s no longer sufficient. The endpoints, particularly mobile endpoints, are the weakest link in the security chain. If your security strategy is aimed primarily at protecting your servers, it’s time to take a look at the endpoints.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/endpoint-is-a-moving-target/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>When Good Devices Go Bad</title>
		<link>http://www.gfi.com/blog/when-good-devices-go-bad/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=when-good-devices-go-bad</link>
		<comments>http://www.gfi.com/blog/when-good-devices-go-bad/#comments</comments>
		<pubDate>Thu, 11 Jul 2013 14:00:28 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[data loss]]></category>
		<category><![CDATA[data-loss prevention]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Endpoint security solutions]]></category>
		<category><![CDATA[GHS]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[USB flash drives]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10650</guid>
		<description><![CDATA[Unless you’ve been sleeping under a rock for the past month or so, you must have heard about the National Security Agency (NSA) contractor that allegedly leaked data from the NSA regarding surveillance programs being conducted by the agency. Edward &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ESECPrime.jpg"><img class="alignright  wp-image-10651" style="border: 0px solid black; margin: 10px;" alt="Endpoint security" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ESECPrime.jpg" width="269" height="184" /></a>Unless you’ve been sleeping under a rock for the past month or so, you must have heard about the National Security Agency (NSA) contractor that allegedly leaked data from the NSA regarding surveillance programs being conducted by the agency. Edward Snowden may be considered by some to be a hero, others to be a traitor, but what we can be sure of is that he was an authorized administrator who had access to confidential information, and he breached that trust. What you may have missed is how he did it.<span id="more-10650"></span></p>
<p>According to the <i>Los Angeles Times</i> citing anonymous sources familiar with the official investigation, Snowden used a USB drive to remove the data from the NSA. Apparently he simply made a copy of files to which he had access, and then just walked them out the door. While the NSA, like so many corporations today, has a policy against using USB drives, authorized administrators can use them when necessary. We all know that there are many tools available for download that work from USB, admins might use a thumb drive to apply firmware updates or to install new drivers, and any one of hundreds of other valid reasons for an admin to use such a flash drive. Apparently the NSA needs a little more than just a written policy. But they are far from alone in this.</p>
<p>According to a study by the Ponemon Institute published about two years ago that surveyed over 700 IT pros, 70% of businesses that lost sensitive or confidential data could attribute that loss in at least some fashion to the use of USB flash drives. While more than half were attributed to malware introduced onto systems from flash drives, 45% of the incidents came from lost, stolen, or misappropriated devices. Of the same study, while about half of the respondents indicated that their company had a policy regarding USB flash drives, less than half of those who do have technical means to enforce policy.</p>
<p>USB flash drives have also been implicated in security incidents at two US power plants last year. <a href="http://www.dailytech.com/Two+US+Power+Plants+Infected+With+USB+Malware+Last+Year/article29682.htm">ISC-CERT reported</a> that in two separate incidents, a USB flash drive containing malware was connected to a computer within a power plant, which then spread to other systems. In the more extreme case, the plant restart was delayed by almost three weeks as a result of the malware infection.</p>
<p>Earlier this year, <a href="https://www.privacyassociation.org/publications/2013_01_17_utah_health_usb_stick_lost_breach_costs_processor_94_million">a USB flash drive containing NPI for some 6000 citizens in Utah was lost</a>. While Social Security numbers were not included in the lost data, the State still needs to undertake measures to protect the affected individuals. This loss of data by a third party contractor comes on the heels of a previous breach that led to the resignation of the State’s CIO, and appears to portend serious legal issues for the contractor as the State plans to pursue “whatever financial or contractual remedies are available in order to ensure GHS [Gold Health Systems] is held accountable for this serious mistake.”</p>
<p>These anecdotes all have a common theme – USB flash drives are dangerous. While they are great tools in the right hands and used for the right purposes, the risks they present to critical systems and sensitive data cannot be ignored. A government’s secrets were made public. Critical infrastructure systems were compromised. Individuals’ personal information has been stolen. The risks outweigh the benefits of these devices, and permitting their unrestricted use is just too dangerous. Loss of data, serious downtime, legal actions, and loss of jobs are all common themes. Written policies are required, but do not go far enough to protect companies from the threats.</p>
<p>What companies need is endpoint security. There are a number of technical measures that endpoint security solutions can employ to protect businesses from the risks presented by USB flash drives, while still enabling their legitimate use. No one wants to completely ban them from any and all uses, considering how beneficial they can be. Endpoint security allows you to use USB drives, just in a safe and secure manner. Endpoint security solutions first and foremost can enforce encryption for all portable devices. That way, if a flash drive is ever lost or stolen, the data stored on the device is safe from prying eyes.</p>
<p>There’s far more to endpoint security than just encryption though. Endpoint security can log and audit all uses of portable media, and enforce data-loss prevention (DLP) measures that can scan data for things like Social Security numbers or credit card numbers to ensure that sensitive data is not moved to portable media, or that it can only be moved to secure media by authorized personnel. That way, just because a user can access the data on the network, they cannot transport that data away unless specifically allowed to do so. And if they are authorized, you have an audit log that tells you exactly what files were copied to the portable media.</p>
<p>Endpoint security can also provide real-time status monitoring of all the systems on your network, automatically enabling protection to new machines that join your domain.</p>
<p>Now that you are aware of, and no doubt very interested in, endpoint security, make sure you look at products that are compatible with all your operating systems, including Windows 8 and Server 2012, and that can apply policy based on your existing Active Directory so that you can leverage and protect your existing investments.</p>
<p>USB flash drives are extremely useful, valuable tools when used properly. <a href="http://www.gfi.com/products-and-solutions/network-security-solutions/gfi-endpointsecurity?adv=13558&amp;loc=40">Endpoint security solutions</a> can help to make sure that your written policies around the safe and secure use of these devices is enforced technically to keep your data safe, and your company off the front page news. Endpoint security is the right way to secure your company against the threats USB flash drives present, while still enabling you to use them.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/when-good-devices-go-bad/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>July Webcast Line-Up</title>
		<link>http://www.gfi.com/blog/july-webcast-line-up-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=july-webcast-line-up-2</link>
		<comments>http://www.gfi.com/blog/july-webcast-line-up-2/#comments</comments>
		<pubDate>Wed, 10 Jul 2013 15:26:25 +0000</pubDate>
		<dc:creator>Andrea Martin</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10644</guid>
		<description><![CDATA[Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs! Don’t get stuck in the technology trap How to take &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg"><img class="alignright  wp-image-10258" style="border: 0px solid black; margin: 10px;" alt="GFI webcasts" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg" width="240" height="225" /></a>Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!<span id="more-10644"></span></p>
<h2>Don’t get stuck in the technology trap</h2>
<p><b><i>How to take control of your technology and business strategy</i></b></p>
<p><b>Date: July 18, 2013 – Time: 8:00 a.m. PST / 11:00 a.m. EDT / 4:00 p.m. BST / 5:00 p.m. CET<br />
<a href="https://www.brighttalk.com/webcast/9843/80459">Register now</a></b></p>
<p><b>APAC Date: July 18, 2013 – Time: 10:30 a.m. IST / 1:00 p.m. CST / 3:00 p.m. AEST / 5:00 p.m. NZST<br />
<a href="https://www1.gotomeeting.com/register/739094792">Register now</a></b></p>
<p>Learn how you can take control of your technology and business strategy with cloud-based software services. In this webcast we will discuss the challenges of technology, experts, costs and upgrades that are not just time-consuming, but which impact and limit business development and strategy. We will look at the advantages of SaaS (Software as a Service) and how GFI® has solved the problem with GFI Cloud™.</p>
<h2>5 Ways to claw back lost time and improve efficiency</h2>
<p><b>Date: July 25, 2013 – Time: 9:00 a.m. PST / 12:00 p.m. EDT / 5:00 p.m. BST / 6:00 p.m. CET<br />
<a href="https://www.brighttalk.com/webcast/9845/80753">Register now</a> </b></p>
<p><b>APAC Date: July 31, 2013 – Time: 9:30 a.m. IST / 12:00 p.m. CST / 2:00 p.m. AEST / 4:00 p.m. NZST<br />
<a href="https://www1.gotomeeting.com/register/135111232">Register now</a></b></p>
<p>In this webcast we will look at five common areas where a company potentially claws back valuable time and resources so that that they can focus on the important business of making money.  With just a few simple IT focused solutions that help to automate manual processes and improve efficiency, managers and employees are able to get more out of their working day.</p>
<h2>Securing your IT Infrastructure: It’s a Jungle Out There</h2>
<p><b>Date: July 30, 2013 – Time: 9:00 a.m. PST / 12:00 p.m. EDT / 5:00 p.m. BST / 6:00 p.m. CET<br />
<a href="https://www.brighttalk.com/webcast/9827/80749">Register now</a></b></p>
<p><b>APAC Date: August 2, 2013 – Time: 9:30 a.m. IST / 12:00 p.m. CST / 2:00 p.m. AEST / 4:00 p.m. NZST<br />
<a href="https://www1.gotomeeting.com/register/389999369">Register now</a></b></p>
<p>The data on computer systems are an enterprise’s single most valuable resource. Data loss can be very costly, particularly for organizations in the small and mid-sized business market where the difference between survival and closure can be razor thin.  A network without proper security is an invitation to economic ruination, public humiliation, customer loss of trust and in some cases legal action.</p>
<p>In this webcast we will review and examine the threats facing networks today; including internal threats, malware, Internet-based and cyber-attacks. The basic methodology of each threat, and how to mount effective counter measures, will be examined and reviewed.</p>
<p><strong><em>Seats fill up fast, so be sure to register today!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/july-webcast-line-up-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 07:01:50 by W3 Total Cache --