<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How hard is it to get robbed?</title>
	<atom:link href="http://www.gfi.com/blog/how-to-get-robbed/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/how-to-get-robbed/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-get-robbed</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/how-to-get-robbed/comment-page-1/#comment-29435</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Mon, 01 Aug 2011 10:54:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3361#comment-29435</guid>
		<description><![CDATA[Tools are meant to help enforce policy. No tool is going to detect a con artist dealing with a sales person via the phone. 
However, let&#039;s say you have a policy that states no portable storage allowed, if you have software enforcing that policy and a con artist convinces someone with access to copy a confidential document for them, that software will stop the con artist.

There has to be a balance between the two.

But you&#039;re right, software alone will not do the trick - you need to think about the risks and use software as a means to secure that risk]]></description>
		<content:encoded><![CDATA[<p>Tools are meant to help enforce policy. No tool is going to detect a con artist dealing with a sales person via the phone.<br />
However, let&#8217;s say you have a policy that states no portable storage allowed, if you have software enforcing that policy and a con artist convinces someone with access to copy a confidential document for them, that software will stop the con artist.</p>
<p>There has to be a balance between the two.</p>
<p>But you&#8217;re right, software alone will not do the trick &#8211; you need to think about the risks and use software as a means to secure that risk</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Carter Rubens</title>
		<link>http://www.gfi.com/blog/how-to-get-robbed/comment-page-1/#comment-29422</link>
		<dc:creator>Carter Rubens</dc:creator>
		<pubDate>Fri, 29 Jul 2011 08:59:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3361#comment-29422</guid>
		<description><![CDATA[All these stories illustrate that even the most sophisticated software and hardware can&#039;t protect you against con artists - external and internal. Unfortunately, even the strictest and most precise business rules that are in place to prevent such misdeeds are easy to hack and hard to catch.]]></description>
		<content:encoded><![CDATA[<p>All these stories illustrate that even the most sophisticated software and hardware can&#8217;t protect you against con artists &#8211; external and internal. Unfortunately, even the strictest and most precise business rules that are in place to prevent such misdeeds are easy to hack and hard to catch.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Shawn@theEggIT</title>
		<link>http://www.gfi.com/blog/how-to-get-robbed/comment-page-1/#comment-29373</link>
		<dc:creator>Shawn@theEggIT</dc:creator>
		<pubDate>Thu, 14 Jul 2011 21:10:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3361#comment-29373</guid>
		<description><![CDATA[The issue here is not trust, it&#039;s security. We should keep them apart because the two don&#039;t apply to the same system. It does not mean that if you trust someone, your organization is safe. This is one of the biggest mistakes a company makes - completely disregarding security protocols because of trust.]]></description>
		<content:encoded><![CDATA[<p>The issue here is not trust, it&#8217;s security. We should keep them apart because the two don&#8217;t apply to the same system. It does not mean that if you trust someone, your organization is safe. This is one of the biggest mistakes a company makes &#8211; completely disregarding security protocols because of trust.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Aaron Shuck</title>
		<link>http://www.gfi.com/blog/how-to-get-robbed/comment-page-1/#comment-29365</link>
		<dc:creator>Aaron Shuck</dc:creator>
		<pubDate>Mon, 11 Jul 2011 20:04:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3361#comment-29365</guid>
		<description><![CDATA[That&#039;s why security tools should be user-friendly and have intuitive interfaces. The effectiveness of a software can be determined by how it complements with the users. But then again this is on &quot;as is&quot; basis. Large multinational corporations have different applied systems compared to  small and medium-sized enterprises. 

Usually, SMEs have so much trust with each other. That&#039;s why you seldom hear cases of company breach in small companies with less than 20 employees. This is not the case of big corporations. They have a very complex system and most of the time they&#039;re too bureaucratic.]]></description>
		<content:encoded><![CDATA[<p>That&#8217;s why security tools should be user-friendly and have intuitive interfaces. The effectiveness of a software can be determined by how it complements with the users. But then again this is on &#8220;as is&#8221; basis. Large multinational corporations have different applied systems compared to  small and medium-sized enterprises. </p>
<p>Usually, SMEs have so much trust with each other. That&#8217;s why you seldom hear cases of company breach in small companies with less than 20 employees. This is not the case of big corporations. They have a very complex system and most of the time they&#8217;re too bureaucratic.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Alex Wain</title>
		<link>http://www.gfi.com/blog/how-to-get-robbed/comment-page-1/#comment-29358</link>
		<dc:creator>Alex Wain</dc:creator>
		<pubDate>Mon, 11 Jul 2011 15:17:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3361#comment-29358</guid>
		<description><![CDATA[If people want something badly enough to try and take it, then they&#039;re capable of doing anything, moreso if they feel some kind of animosity toward their employer. It&#039;s important to trust the people you put in charge of financial operations, but it is just as important to audit company activity regularly to detect any kind of peculiar behavior. Most companies don&#039;t have to worry about people coming in with ski masks and guns demanding the petty cash, but somebody who processes transactions for the company has constant access to move money where they might see fit, and you don&#039;t want to get caught losing your money this way.]]></description>
		<content:encoded><![CDATA[<p>If people want something badly enough to try and take it, then they&#8217;re capable of doing anything, moreso if they feel some kind of animosity toward their employer. It&#8217;s important to trust the people you put in charge of financial operations, but it is just as important to audit company activity regularly to detect any kind of peculiar behavior. Most companies don&#8217;t have to worry about people coming in with ski masks and guns demanding the petty cash, but somebody who processes transactions for the company has constant access to move money where they might see fit, and you don&#8217;t want to get caught losing your money this way.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 16:10:56 by W3 Total Cache --