<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Five reasons to implement Internet monitoring in your organization</title>
	<atom:link href="http://www.gfi.com/blog/five-reasons-to-implement-internet-monitoring-in-your-organization/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/five-reasons-to-implement-internet-monitoring-in-your-organization/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=five-reasons-to-implement-internet-monitoring-in-your-organization</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: harry</title>
		<link>http://www.gfi.com/blog/five-reasons-to-implement-internet-monitoring-in-your-organization/comment-page-1/#comment-9103</link>
		<dc:creator>harry</dc:creator>
		<pubDate>Sat, 14 Aug 2010 05:29:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1694#comment-9103</guid>
		<description><![CDATA[I can’t emphasize how much I agree on these points. I’ve recently been bringing up the idea of monitored internet access within the company, but a lot of the managers are too backward to think that “self-policing” doesn’t cut it anymore. 

I’ve actually been criticized (though jokingly, I hope) that I’ve turned into some internet communist. It’s easy to let that kind of humor go, but if the company is at stake, it’s a lot to simply gamble on the staff’s “good will”.]]></description>
		<content:encoded><![CDATA[<p>I can’t emphasize how much I agree on these points. I’ve recently been bringing up the idea of monitored internet access within the company, but a lot of the managers are too backward to think that “self-policing” doesn’t cut it anymore. </p>
<p>I’ve actually been criticized (though jokingly, I hope) that I’ve turned into some internet communist. It’s easy to let that kind of humor go, but if the company is at stake, it’s a lot to simply gamble on the staff’s “good will”.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/five-reasons-to-implement-internet-monitoring-in-your-organization/comment-page-1/#comment-771</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Wed, 09 Dec 2009 09:10:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1694#comment-771</guid>
		<description><![CDATA[They go hand in hand. I agree with Leandro in that monitoring by itself will create friction with the employees and can in some cases not be good enough. Some people will find a way to circumvent the system in place and if they don&#039;t know that what they&#039;re doing is wrong they will keep doing it. 

Same thing goes for education, even knowing why something is bad some users will still keep doing it, either out of habit or maybe they think that their company is being too paranoid.

Monitoring and Education form a net. Some fish might get through the net but at least it will be a lot less than if you remove 50% of the net itself.]]></description>
		<content:encoded><![CDATA[<p>They go hand in hand. I agree with Leandro in that monitoring by itself will create friction with the employees and can in some cases not be good enough. Some people will find a way to circumvent the system in place and if they don&#8217;t know that what they&#8217;re doing is wrong they will keep doing it. </p>
<p>Same thing goes for education, even knowing why something is bad some users will still keep doing it, either out of habit or maybe they think that their company is being too paranoid.</p>
<p>Monitoring and Education form a net. Some fish might get through the net but at least it will be a lot less than if you remove 50% of the net itself.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Leandro Amore</title>
		<link>http://www.gfi.com/blog/five-reasons-to-implement-internet-monitoring-in-your-organization/comment-page-1/#comment-741</link>
		<dc:creator>Leandro Amore</dc:creator>
		<pubDate>Tue, 08 Dec 2009 15:29:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1694#comment-741</guid>
		<description><![CDATA[It&#039;s a fact that we need to restrict access so that we can avoid corporate resources misuse. But, we also know that the users always find creative ways to access these resources bypassing our protections. So really the best way to protect our company is through education. The users need to understand these threats and the related dangers so that they really understand the reason for the IT guys to block access to this kind of resources. If they don’t really get this point, we as administrators always are the “bad guys”, having fun of user’s restrictions.
By this I don’t mean that we should not use content protection systems as GFI, because there are many scams that even the trained user cannot detect, and there is where technology really helps.
Even in a low budget environment we can implement a good security perimeter using free monitoring products as GFI freeware monitoring, which can help us audit our internet activity and users trends and take corrective actions with them.
]]></description>
		<content:encoded><![CDATA[<p>It&#8217;s a fact that we need to restrict access so that we can avoid corporate resources misuse. But, we also know that the users always find creative ways to access these resources bypassing our protections. So really the best way to protect our company is through education. The users need to understand these threats and the related dangers so that they really understand the reason for the IT guys to block access to this kind of resources. If they don’t really get this point, we as administrators always are the “bad guys”, having fun of user’s restrictions.<br />
By this I don’t mean that we should not use content protection systems as GFI, because there are many scams that even the trained user cannot detect, and there is where technology really helps.<br />
Even in a low budget environment we can implement a good security perimeter using free monitoring products as GFI freeware monitoring, which can help us audit our internet activity and users trends and take corrective actions with them.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 15:39:23 by W3 Total Cache --