<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Network Security</title>
	<atom:link href="http://www.gfi.com/blog/category/videos/network-security-videos/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Mac Malware</title>
		<link>http://www.gfi.com/blog/mac-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mac-malware</link>
		<comments>http://www.gfi.com/blog/mac-malware/#comments</comments>
		<pubDate>Wed, 27 Jun 2012 14:27:16 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[mac antivirus]]></category>
		<category><![CDATA[mac malware]]></category>
		<category><![CDATA[mac virus]]></category>
		<category><![CDATA[mac viruses]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8880</guid>
		<description><![CDATA[In the past, few viruses have targeted Apple operating systems &#8212; but this is gradually changing. The increased popularity of Apple smart devices has led some cybercriminals to exploit a traditionally ignored audience. IT admins needs to educate their users &#8230;]]></description>
				<content:encoded><![CDATA[<p>In the past, few viruses have targeted Apple operating systems &#8212; but this is gradually changing. The increased popularity of Apple smart devices has led some cybercriminals to exploit a traditionally ignored audience. IT admins needs to educate their users about this growing threat and implement a business antivirus solution for Macs as they do for PCs.</p>
<p><a href="http://www.youtube.com/watch?v=MOflZBB4qGc" target="_blank">http://www.youtube.com/watch?v=MOflZBB4qGc</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/mac-malware/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Ten things administrators should never do</title>
		<link>http://www.gfi.com/blog/ten-things-administrators-should-never-do/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ten-things-administrators-should-never-do</link>
		<comments>http://www.gfi.com/blog/ten-things-administrators-should-never-do/#comments</comments>
		<pubDate>Wed, 06 Jun 2012 12:56:30 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[network administrators]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[security mistakes]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8744</guid>
		<description><![CDATA[Being a system administrator is a great job if you love juggling conflicting priorities, managing infinite to-do lists, annoying users and facing ever-changing technologies. In a busy environment, there are corners you can cut and those you really shouldn’t. There &#8230;]]></description>
				<content:encoded><![CDATA[<p>Being a system administrator is a great job if you love juggling conflicting priorities, managing infinite to-do lists, annoying users and facing ever-changing technologies. In a busy environment, there are corners you can cut and those you really shouldn’t. There are many efficiencies you can achieve without causing trouble; this is a list of things that are definitely not in that category.</p>
<p><a href="http://www.youtube.com/watch?v=FzKSlsOgt5Q">http://www.youtube.com/watch?v=FzKSlsOgt5Q</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/ten-things-administrators-should-never-do/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The Four Main Benefits of Automatic Patch Management</title>
		<link>http://www.gfi.com/blog/the-four-main-benefits-of-automatic-patch-management/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-four-main-benefits-of-automatic-patch-management</link>
		<comments>http://www.gfi.com/blog/the-four-main-benefits-of-automatic-patch-management/#comments</comments>
		<pubDate>Wed, 30 May 2012 14:44:50 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[automatic patch management]]></category>
		<category><![CDATA[business network security]]></category>
		<category><![CDATA[corporate network security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[server security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8714</guid>
		<description><![CDATA[Imagine having fully patched, fully protected computers without the days of planning, hours of downtime and the onerous job of applying them by hand. Imagine a place where you could automate the download and installation of patches across an entire &#8230;]]></description>
				<content:encoded><![CDATA[<p>Imagine having fully patched, fully protected computers without the days of planning, hours of downtime and the onerous job of applying them by hand. Imagine a place where you could automate the download and installation of patches across an entire network. That could all be a reality, as there is software available that can do all that and more. You&#8217;d still need to test and evaluate those patches, but you&#8217;d no longer need to worry about broadcasting and installing everything.</p>
<p><a href="http://www.youtube.com/watch?v=Au7bMNU1ffI">http://www.youtube.com/watch?v=Au7bMNU1ffI</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-four-main-benefits-of-automatic-patch-management/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>The Perils of Public Wireless Networks</title>
		<link>http://www.gfi.com/blog/the-perils-of-public-wireless-networks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-perils-of-public-wireless-networks</link>
		<comments>http://www.gfi.com/blog/the-perils-of-public-wireless-networks/#comments</comments>
		<pubDate>Wed, 18 Apr 2012 15:12:41 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[danger wireless networks]]></category>
		<category><![CDATA[public wireless network]]></category>
		<category><![CDATA[Wi-Fi hotspots]]></category>
		<category><![CDATA[wireless hotspots]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8447</guid>
		<description><![CDATA[We access Wi-Fi hotspots both for work and for play &#8212; but how much thought do we give security? Are administrators &#8212; and their users &#8212; fully aware of the risks of surfing openly on a public wireless network? This &#8230;]]></description>
				<content:encoded><![CDATA[<p id="eow-description">We access Wi-Fi hotspots both for work and for play &#8212; but how much thought do we give security? Are administrators &#8212; and their users &#8212; fully aware of the risks of surfing openly on a public wireless network? This video sheds more light on those risks and shares some useful tips on how to mitigate them.</p>
<p><a href="http://www.youtube.com/watch?v=mqUGjZZuwJk" target="_blank">http://www.youtube.com/watch?v=mqUGjZZuwJk</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-perils-of-public-wireless-networks/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Why you Need to run a Vulnerability Assessment</title>
		<link>http://www.gfi.com/blog/why-you-need-to-run-a-vulnerability-assessment/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-you-need-to-run-a-vulnerability-assessment</link>
		<comments>http://www.gfi.com/blog/why-you-need-to-run-a-vulnerability-assessment/#comments</comments>
		<pubDate>Wed, 11 Apr 2012 15:25:03 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[network vulnerabilities]]></category>
		<category><![CDATA[vulnerability assessment]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8408</guid>
		<description><![CDATA[The old saying, “prevention is better than cure”, is as true today as it ever was – and it definitely applies to information security. But to protect against actual and potential network vulnerabilities, you first need to know what they &#8230;]]></description>
				<content:encoded><![CDATA[<p>The old saying, “prevention is better than cure”, is as true today as it ever was – and it definitely applies to information security. But to protect against actual and potential network vulnerabilities, you first need to know what they are. That’s were a vulnerability assessment comes in – find out more in this video.</p>
<p><a href="http://www.youtube.com/watch?v=EXyl0re1MZs">http://www.youtube.com/watch?v=EXyl0re1MZs</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/why-you-need-to-run-a-vulnerability-assessment/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>10 Free Tools for Network Administrators</title>
		<link>http://www.gfi.com/blog/10-free-tools-for-network-administrators/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=10-free-tools-for-network-administrators</link>
		<comments>http://www.gfi.com/blog/10-free-tools-for-network-administrators/#comments</comments>
		<pubDate>Wed, 21 Mar 2012 15:18:08 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[network administrator tools]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[network tools]]></category>
		<category><![CDATA[software tools]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8322</guid>
		<description><![CDATA[Are you an administrator who wishes to reduce and facilitate your daily workload? If so, this video&#8217;s for you: It contains a list of free software tools that will be of tremendous assistance to the typical SMB (small and medium-size &#8230;]]></description>
				<content:encoded><![CDATA[<p>Are you an administrator who wishes to reduce and facilitate your daily workload? If so, this video&#8217;s for you: It contains a list of free software tools that will be of tremendous assistance to the typical SMB (small and medium-size business) administrator!</p>
<p><a href="http://www.youtube.com/watch?v=HBluuo4Bj1c">http://www.youtube.com/watch?v=HBluuo4Bj1c</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/10-free-tools-for-network-administrators/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Are you being sniffed?</title>
		<link>http://www.gfi.com/blog/are-you-being-sniffed/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-you-being-sniffed</link>
		<comments>http://www.gfi.com/blog/are-you-being-sniffed/#comments</comments>
		<pubDate>Wed, 14 Mar 2012 14:44:11 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[packet sniffing]]></category>
		<category><![CDATA[port sniffing]]></category>
		<category><![CDATA[security threats]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8283</guid>
		<description><![CDATA[Packet sniffing is the hacker’s technology of choice to probe networks. In this video, we explain how you can be watched or ‘sniffed’ and, more importantly, how to protect your network against this security threat. http://www.youtube.com/watch?v=gbSJT6a0JVo]]></description>
				<content:encoded><![CDATA[<p>Packet sniffing is the hacker’s technology of choice to probe networks. In this video, we explain how you can be watched or ‘sniffed’ and, more importantly, how to protect your network against this security threat.</p>
<p><a href="http://www.youtube.com/watch?v=gbSJT6a0JVo">http://www.youtube.com/watch?v=gbSJT6a0JVo</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/are-you-being-sniffed/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>5 Security Mistakes SMBs Make and Their Simple Solutions</title>
		<link>http://www.gfi.com/blog/5-security-mistakes-smbs-make-and-their-simple-solutions/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-security-mistakes-smbs-make-and-their-simple-solutions</link>
		<comments>http://www.gfi.com/blog/5-security-mistakes-smbs-make-and-their-simple-solutions/#comments</comments>
		<pubDate>Thu, 08 Mar 2012 16:02:07 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[business security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[network security solutions]]></category>
		<category><![CDATA[smb network security]]></category>
		<category><![CDATA[web security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8263</guid>
		<description><![CDATA[What are the top five security errors that small and medium-size businesses (SMBs) commonly make? And how can you avoid them? Watch this video for some simple but solid advice and practical tips to increase your organization&#8217;s network security. http://www.youtube.com/watch?v=TqwEdOnAFEw]]></description>
				<content:encoded><![CDATA[<p>What are the top five security errors that small and medium-size businesses (SMBs) commonly make? And how can you avoid them? Watch this video for some simple but solid advice and practical tips to increase your organization&#8217;s network security.</p>
<p><a href="http://www.youtube.com/watch?v=TqwEdOnAFEw">http://www.youtube.com/watch?v=TqwEdOnAFEw</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/5-security-mistakes-smbs-make-and-their-simple-solutions/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Top 10 Vulnerable Applications on Your Network</title>
		<link>http://www.gfi.com/blog/top-10-vulnerable-applications-on-your-network/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-10-vulnerable-applications-on-your-network</link>
		<comments>http://www.gfi.com/blog/top-10-vulnerable-applications-on-your-network/#comments</comments>
		<pubDate>Mon, 24 Oct 2011 10:14:43 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[network scanner]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[vulnerability scanner]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3542</guid>
		<description><![CDATA[If software is not kept updated across your IT estate, then your security could be at risk. This video identifies the Top 10 most targeted applications &#8212; and suggests how you can strengthen security and reliability despite the ever-increasing number &#8230;]]></description>
				<content:encoded><![CDATA[<p>If software is not kept updated across your IT estate, then your security could be at risk. This video identifies the Top 10 most targeted applications &#8212; and suggests how you can strengthen security and reliability despite the ever-increasing number of vulnerabilities on your network.</p>
<p><a href="http://www.youtube.com/watch?v=O901fuUagic">http://www.youtube.com/watch?v=O901fuUagic</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-10-vulnerable-applications-on-your-network/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-14 22:01:52 by W3 Total Cache --