<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Web Security</title>
	<atom:link href="http://www.gfi.com/blog/category/videos/web-security-videos/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Maintaining web security in a connected world</title>
		<link>http://www.gfi.com/blog/maintaining-web-security-in-a-connected-world/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=maintaining-web-security-in-a-connected-world</link>
		<comments>http://www.gfi.com/blog/maintaining-web-security-in-a-connected-world/#comments</comments>
		<pubDate>Thu, 06 Jun 2013 10:11:06 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[business internet]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[internet use in business]]></category>
		<category><![CDATA[web security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10555</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=_qMdcLu947Q As a manager or business owner, you&#8217;re probably more aware than most of the risks posed by the Internet. But there is no reason to be afraid of it or avoid it altogether. You just need a little help. A &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.youtube.com/watch?v=_qMdcLu947Q">http://www.youtube.com/watch?v=_qMdcLu947Q</a></p>
<p>As a manager or business owner, you&#8217;re probably more aware than most of the risks posed by the Internet. But there is no reason to be afraid of it or avoid it altogether. You just need a little help.</p>
<p>A solution to monitor Internet use, block infected websites, recognize malicious programs and protect you from the worst. By implementing a solid monitoring solution and educating your employees about the dangers that lurk online, your business will benefit from much safer, more effective Internet use.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/maintaining-web-security-in-a-connected-world/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Plugging the Bandwidth Drain</title>
		<link>http://www.gfi.com/blog/plugging-the-bandwidth-drain/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=plugging-the-bandwidth-drain</link>
		<comments>http://www.gfi.com/blog/plugging-the-bandwidth-drain/#comments</comments>
		<pubDate>Thu, 28 Mar 2013 14:56:40 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[bandwidth]]></category>
		<category><![CDATA[bandwidth consumption]]></category>
		<category><![CDATA[Bandwidth Hogging]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10413</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=JZ7jbBFsiCY Managing your resources as effectively as possible is the key to profitability. Network bandwidth is one such resource and yet it is often squandered while employees are wasting time on the network. There are many ways to use up &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.youtube.com/watch?v=JZ7jbBFsiCY">http://www.youtube.com/watch?v=JZ7jbBFsiCY</a></p>
<p>Managing your resources as effectively as possible is the key to profitability. Network bandwidth is one such resource and yet it is often squandered while employees are wasting time on the network. There are many ways to use up your bandwidth &#8212; watch our quick vid to find out more and to discover how you can manage your bandwidth with minimal effort!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/plugging-the-bandwidth-drain/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Top 5 Online Security Traps and how to Avoid Them</title>
		<link>http://www.gfi.com/blog/top-5-online-security-traps-and-how-to-avoid-them/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-5-online-security-traps-and-how-to-avoid-them</link>
		<comments>http://www.gfi.com/blog/top-5-online-security-traps-and-how-to-avoid-them/#comments</comments>
		<pubDate>Wed, 25 Apr 2012 14:26:34 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[business security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[online security threats]]></category>
		<category><![CDATA[online threats]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8486</guid>
		<description><![CDATA[It only takes one malicious link, infected download or data breach to compromise the security of your business. The first level of defense against these threats is employee education. To help you get started, here’s some advice for you to &#8230;]]></description>
				<content:encoded><![CDATA[<p>It only takes one malicious link, infected download or data breach to compromise the security of your business. The first level of defense against these threats is employee education. To help you get started, here’s some advice for you to share with your network users on five common online security traps.</p>
<p><a href="http://www.youtube.com/watch?v=lWAZI7XwDMk" target="_blank">http://www.youtube.com/watch?v=lWAZI7XwDMk</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-5-online-security-traps-and-how-to-avoid-them/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>The Hidden Threats Behind Web Banners</title>
		<link>http://www.gfi.com/blog/the-hidden-threats-behind-web-banners/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-hidden-threats-behind-web-banners</link>
		<comments>http://www.gfi.com/blog/the-hidden-threats-behind-web-banners/#comments</comments>
		<pubDate>Thu, 05 Apr 2012 07:25:11 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[dangerous web banners]]></category>
		<category><![CDATA[malicious web banners]]></category>
		<category><![CDATA[malvertising]]></category>
		<category><![CDATA[web threats]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8394</guid>
		<description><![CDATA[What is &#8216;malvertising&#8217; and why is it dangerous? Watch this video to learn more about the perils posed by malicious web banners and what you can do to protect your network and your users against their harmful payload. http://www.youtube.com/watch?v=pao3dJKgGWA]]></description>
				<content:encoded><![CDATA[<p>What is &#8216;malvertising&#8217; and why is it dangerous? Watch this video to learn more about the perils posed by malicious web banners and what you can do to protect your network and your users against their harmful payload.</p>
<p><a href="http://www.youtube.com/watch?v=pao3dJKgGWA">http://www.youtube.com/watch?v=pao3dJKgGWA</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-hidden-threats-behind-web-banners/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>How to Set Up an Internet Usage Policy</title>
		<link>http://www.gfi.com/blog/how-to-set-up-an-internet-usage-policy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-set-up-an-internet-usage-policy</link>
		<comments>http://www.gfi.com/blog/how-to-set-up-an-internet-usage-policy/#comments</comments>
		<pubDate>Tue, 10 Jan 2012 12:17:09 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Internet monitoring software]]></category>
		<category><![CDATA[internet usage monitor]]></category>
		<category><![CDATA[web security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3546</guid>
		<description><![CDATA[Some 40% of the time spent on the Internet at work has nothing to do with work, according to research. Controlling access to the Internet at work is really important, but how do you go about it? This quick video &#8230;]]></description>
				<content:encoded><![CDATA[<p>Some 40% of the time spent on the Internet at work has nothing to do with work, according to research. Controlling access to the Internet at work is really important, but how do you go about it? This quick video provides valuable advice on how companies can protect themselves and their overall productivity with a firm-but-fair internet usage policy.</p>
<p><a href="http://www.youtube.com/watch?v=PsJlwOwyzlU">http://www.youtube.com/watch?v=PsJlwOwyzlU</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/how-to-set-up-an-internet-usage-policy/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Top 5 Web Security Issues</title>
		<link>http://www.gfi.com/blog/top-5-web-security-issues/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-5-web-security-issues</link>
		<comments>http://www.gfi.com/blog/top-5-web-security-issues/#comments</comments>
		<pubDate>Mon, 24 Oct 2011 11:22:11 +0000</pubDate>
		<dc:creator>Jesmond Darmanin</dc:creator>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[web security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3549</guid>
		<description><![CDATA[Cyber criminals have always posed a threat. But now their strategy has changed &#8212; and the results can prove devastating. This video examines five key methods of attack and suggests the best way you can respond. http://www.youtube.com/watch?v=GhchH_Arh8U]]></description>
				<content:encoded><![CDATA[<p>Cyber criminals have always posed a threat. But now their strategy has changed &#8212; and the results can prove devastating. This video examines five key methods of attack and suggests the best way you can respond.</p>
<p><a href="http://www.youtube.com/watch?v=GhchH_Arh8U">http://www.youtube.com/watch?v=GhchH_Arh8U</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/top-5-web-security-issues/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 08:08:45 by W3 Total Cache --