<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Can Companies Defend Against Targeted Attacks? (Part 1)</title>
	<atom:link href="http://www.gfi.com/blog/companies-defend-targeted-attacks-part-1/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/companies-defend-targeted-attacks-part-1/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=companies-defend-targeted-attacks-part-1</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Chevy Z.</title>
		<link>http://www.gfi.com/blog/companies-defend-targeted-attacks-part-1/comment-page-1/#comment-24599</link>
		<dc:creator>Chevy Z.</dc:creator>
		<pubDate>Thu, 10 Mar 2011 02:34:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3151#comment-24599</guid>
		<description><![CDATA[I agree with you George.

Internal targeted attacks toward businesses should be the main priority of companies. 

First, an inside job attack can do more damage. Information and all sorts of data can be stolen and sold to competing ventures or a third party vendor.

Second, an internal attack  could lead to industry instability. The targeted company will shut down its operations, employees will lose their jobs, people will be in great debt, and so on and so forth.]]></description>
		<content:encoded><![CDATA[<p>I agree with you George.</p>
<p>Internal targeted attacks toward businesses should be the main priority of companies. </p>
<p>First, an inside job attack can do more damage. Information and all sorts of data can be stolen and sold to competing ventures or a third party vendor.</p>
<p>Second, an internal attack  could lead to industry instability. The targeted company will shut down its operations, employees will lose their jobs, people will be in great debt, and so on and so forth.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: George Wilsons</title>
		<link>http://www.gfi.com/blog/companies-defend-targeted-attacks-part-1/comment-page-1/#comment-22637</link>
		<dc:creator>George Wilsons</dc:creator>
		<pubDate>Sun, 27 Feb 2011 11:38:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3151#comment-22637</guid>
		<description><![CDATA[Companies should not only defend itself against external attacks. They should also protect their resources from within. 

Remember when the ESPN website was hacked in 2009? The hack was not dangerous in any way. The website&#039;s design was replaced by rainbows and a unicorn.

Most security experts and bloggers(and people from within) believed said that the hacker(s) might be an employee of ESPN. It&#039;s an inside job.

This situation should be focused both by the HR and IT departments of any company.]]></description>
		<content:encoded><![CDATA[<p>Companies should not only defend itself against external attacks. They should also protect their resources from within. </p>
<p>Remember when the ESPN website was hacked in 2009? The hack was not dangerous in any way. The website&#8217;s design was replaced by rainbows and a unicorn.</p>
<p>Most security experts and bloggers(and people from within) believed said that the hacker(s) might be an employee of ESPN. It&#8217;s an inside job.</p>
<p>This situation should be focused both by the HR and IT departments of any company.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Bruce Roberts</title>
		<link>http://www.gfi.com/blog/companies-defend-targeted-attacks-part-1/comment-page-1/#comment-22439</link>
		<dc:creator>Bruce Roberts</dc:creator>
		<pubDate>Fri, 25 Feb 2011 20:13:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3151#comment-22439</guid>
		<description><![CDATA[These guys got a real-life test of their security. You can never be sure that your network and system is hacker-proof but such attacks prove how vulnerable the system of a SECURITY company is. A targeted attack done by pros leaves a company no chance to defend itself. What the company can do is minimize the damage - that&#039;s all!]]></description>
		<content:encoded><![CDATA[<p>These guys got a real-life test of their security. You can never be sure that your network and system is hacker-proof but such attacks prove how vulnerable the system of a SECURITY company is. A targeted attack done by pros leaves a company no chance to defend itself. What the company can do is minimize the damage &#8211; that&#8217;s all!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Chris O'Brien</title>
		<link>http://www.gfi.com/blog/companies-defend-targeted-attacks-part-1/comment-page-1/#comment-22360</link>
		<dc:creator>Chris O'Brien</dc:creator>
		<pubDate>Thu, 24 Feb 2011 21:14:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3151#comment-22360</guid>
		<description><![CDATA[I think it&#039;s funny how it seems the safest thing to do with your documents these days is to have physical copies only of any memos or communications. At least getting at those would take a physical break-in, accidental internal leak, or a subpoena. 

The efforts of HBGary and other security firms against groups like anonymous always remind me of those Spy Vs. Spy cartoons from MAD Magazine. When two groups dabbling in security and secrets butt heads, it always ends with somebody holding the bomb when it goes off.]]></description>
		<content:encoded><![CDATA[<p>I think it&#8217;s funny how it seems the safest thing to do with your documents these days is to have physical copies only of any memos or communications. At least getting at those would take a physical break-in, accidental internal leak, or a subpoena. </p>
<p>The efforts of HBGary and other security firms against groups like anonymous always remind me of those Spy Vs. Spy cartoons from MAD Magazine. When two groups dabbling in security and secrets butt heads, it always ends with somebody holding the bomb when it goes off.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:32:50 by W3 Total Cache --