<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Employees are prepared to steal company data!</title>
	<atom:link href="http://www.gfi.com/blog/employees-prepared-steal-company-data/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/employees-prepared-steal-company-data/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=employees-prepared-steal-company-data</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: David Kelleher</title>
		<link>http://www.gfi.com/blog/employees-prepared-steal-company-data/comment-page-1/#comment-30026</link>
		<dc:creator>David Kelleher</dc:creator>
		<pubDate>Mon, 31 Oct 2011 09:38:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1616#comment-30026</guid>
		<description><![CDATA[Hi Rafael. Every organization should seek legal advice if a data breach occurs. Depending on the severity of the breach, whether the culprits have been identified, and so on, a number of external sources may become involved - eg. the police, insurance companies. There are many laws and regulations that protect a company&#039;s interests and the organization&#039;s legal team would be aware of them and can advise how to proceed should data be stolen.]]></description>
		<content:encoded><![CDATA[<p>Hi Rafael. Every organization should seek legal advice if a data breach occurs. Depending on the severity of the breach, whether the culprits have been identified, and so on, a number of external sources may become involved &#8211; eg. the police, insurance companies. There are many laws and regulations that protect a company&#8217;s interests and the organization&#8217;s legal team would be aware of them and can advise how to proceed should data be stolen.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Rafael</title>
		<link>http://www.gfi.com/blog/employees-prepared-steal-company-data/comment-page-1/#comment-30004</link>
		<dc:creator>Rafael</dc:creator>
		<pubDate>Fri, 28 Oct 2011 22:10:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1616#comment-30004</guid>
		<description><![CDATA[any law to protect us once the employee has done it?]]></description>
		<content:encoded><![CDATA[<p>any law to protect us once the employee has done it?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Leandro Amore</title>
		<link>http://www.gfi.com/blog/employees-prepared-steal-company-data/comment-page-1/#comment-452</link>
		<dc:creator>Leandro Amore</dc:creator>
		<pubDate>Sun, 29 Nov 2009 21:09:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1616#comment-452</guid>
		<description><![CDATA[Data theft is really a problem that can be avoided using technology. Some methods are difficult to implement and quite expensive, but a lot of them really accessible. Every enterprise should be aware of this and put in place the restrictions that are at their reach. For example, if you have windows vista or above it’s quite simple to control USB ports which are one of the most common methods for data theft.
Information is today’s most valuable asset and in the IT department is the key to protect it. So we can not only help the business, but we can also place the department as a strategic part of it.]]></description>
		<content:encoded><![CDATA[<p>Data theft is really a problem that can be avoided using technology. Some methods are difficult to implement and quite expensive, but a lot of them really accessible. Every enterprise should be aware of this and put in place the restrictions that are at their reach. For example, if you have windows vista or above it’s quite simple to control USB ports which are one of the most common methods for data theft.<br />
Information is today’s most valuable asset and in the IT department is the key to protect it. So we can not only help the business, but we can also place the department as a strategic part of it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: John Mello</title>
		<link>http://www.gfi.com/blog/employees-prepared-steal-company-data/comment-page-1/#comment-448</link>
		<dc:creator>John Mello</dc:creator>
		<pubDate>Sun, 29 Nov 2009 17:57:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1616#comment-448</guid>
		<description><![CDATA[While the erosion of employee ethics in the workplace is lamentable in these times, one must wonder how much companies contibute to the sorry state of affairs. Is it any wonder that workers behave the way they do when they observe coworkers, sometimes in a matter of hours, turned from trusted colleagues into so-called security threats who must be escorted from their cubicles by a pair of no-neck rent-a-cops? Expectation is a curious thing. If employees are treated like crooks, then chances are they&#039;ll act like crooks. In one of the recent studies (http://datacenterjournal.com/component/option,com_content/task,view/id,3376/), one of the findings was that 57 percent of the respondents said it was easy to nick sensitive data from under their bosses&#039;s noses. Only 29 percent said that last year. With the increased attention companies are giving to security concerns, that finding should make managers wonder whether ripping off proprietary information is getting easier, or it has always been easy and employees are now just noticing how easy it is.]]></description>
		<content:encoded><![CDATA[<p>While the erosion of employee ethics in the workplace is lamentable in these times, one must wonder how much companies contibute to the sorry state of affairs. Is it any wonder that workers behave the way they do when they observe coworkers, sometimes in a matter of hours, turned from trusted colleagues into so-called security threats who must be escorted from their cubicles by a pair of no-neck rent-a-cops? Expectation is a curious thing. If employees are treated like crooks, then chances are they&#8217;ll act like crooks. In one of the recent studies (<a href="http://datacenterjournal.com/component/option,com_content/task,view/id,3376/" rel="nofollow">http://datacenterjournal.com/component/option,com_content/task,view/id,3376/</a>), one of the findings was that 57 percent of the respondents said it was easy to nick sensitive data from under their bosses&#8217;s noses. Only 29 percent said that last year. With the increased attention companies are giving to security concerns, that finding should make managers wonder whether ripping off proprietary information is getting easier, or it has always been easy and employees are now just noticing how easy it is.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Paul</title>
		<link>http://www.gfi.com/blog/employees-prepared-steal-company-data/comment-page-1/#comment-439</link>
		<dc:creator>Paul</dc:creator>
		<pubDate>Thu, 26 Nov 2009 23:10:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1616#comment-439</guid>
		<description><![CDATA[One of things I often find is that attention is paid to data leaks when it is too late to do anything about it.

Asking your IT team &quot;We just fired Person X, how do we stop him stealing the customer list?&quot; is far too late.

The solutions need to be put in place before the problems actually happen, which is a difficult business case to make.]]></description>
		<content:encoded><![CDATA[<p>One of things I often find is that attention is paid to data leaks when it is too late to do anything about it.</p>
<p>Asking your IT team &#8220;We just fired Person X, how do we stop him stealing the customer list?&#8221; is far too late.</p>
<p>The solutions need to be put in place before the problems actually happen, which is a difficult business case to make.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 15:40:07 by W3 Total Cache --