<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How to secure your network the old fashioned way</title>
	<atom:link href="http://www.gfi.com/blog/how-to-secure-your-network-the-old-fashioned-way/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/how-to-secure-your-network-the-old-fashioned-way/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-secure-your-network-the-old-fashioned-way</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/how-to-secure-your-network-the-old-fashioned-way/comment-page-1/#comment-9250</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Wed, 18 Aug 2010 10:15:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2375#comment-9250</guid>
		<description><![CDATA[@Emily

Well we&#039;re essentially at a disadvantage, security needs to keep up with the latest threats but for anyone to be a security risk he can do anything in the list of bad security practices going back to the dawn of computers! It&#039;s also a time issue I guess when you have to spend a lot of time scanning and analysing logs and such tasks, so going around the office looking for post-it notes with passwords is unlikely to be high on one&#039;s to do list!

And the list is missing some &quot;older&quot; issues too such as ensuring that people do not throw away confidential data without shredding it. While dumpster diving is not that popular anymore, it doesn&#039;t mean that it doesn&#039;t still happen!]]></description>
		<content:encoded><![CDATA[<p>@Emily</p>
<p>Well we&#8217;re essentially at a disadvantage, security needs to keep up with the latest threats but for anyone to be a security risk he can do anything in the list of bad security practices going back to the dawn of computers! It&#8217;s also a time issue I guess when you have to spend a lot of time scanning and analysing logs and such tasks, so going around the office looking for post-it notes with passwords is unlikely to be high on one&#8217;s to do list!</p>
<p>And the list is missing some &#8220;older&#8221; issues too such as ensuring that people do not throw away confidential data without shredding it. While dumpster diving is not that popular anymore, it doesn&#8217;t mean that it doesn&#8217;t still happen!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emily White</title>
		<link>http://www.gfi.com/blog/how-to-secure-your-network-the-old-fashioned-way/comment-page-1/#comment-8985</link>
		<dc:creator>Emily White</dc:creator>
		<pubDate>Wed, 11 Aug 2010 12:21:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2375#comment-8985</guid>
		<description><![CDATA[This article is a blast from the past, I must say. I guess a lot of us are so stuck up with the high-tech nuances of office security that we’ve forgotten the most basic of practices to protect our physical belongings and data. 

You won’t believe how many times our own IT dept has found the randomly neglected post-it with the latest password to our main. We haven’t gotten to the next catastrophe past that, but I hope we don’t have to.]]></description>
		<content:encoded><![CDATA[<p>This article is a blast from the past, I must say. I guess a lot of us are so stuck up with the high-tech nuances of office security that we’ve forgotten the most basic of practices to protect our physical belongings and data. </p>
<p>You won’t believe how many times our own IT dept has found the randomly neglected post-it with the latest password to our main. We haven’t gotten to the next catastrophe past that, but I hope we don’t have to.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/how-to-secure-your-network-the-old-fashioned-way/comment-page-1/#comment-8695</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Tue, 03 Aug 2010 15:22:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2375#comment-8695</guid>
		<description><![CDATA[Hi Harriet, 

Very sorry to hear about your friend. May I point out that if your friend is simply using a 16 character password to log into her system she is not really protected; should her laptop be stolen again anyone can boot from an alternative OS (using live cds) or simply disconnect the hard drive and connect it to a system that the perpetrators have access to and still get full access to the hard drive. 

If she really wants to protect her private data on her hard drive she also needs to enable encryption in addition to using strong login passwords. On Windows this can simply be done by going in the folder properties of the folder one wishes to protect if NTFS is used as the file system. 

If she decides to do this it is also a good idea to read a bit on the subject before implementing it and follow the recommendation on backing up the keys used for encryption in the event that she will ever need to reinstall the system, or else she might lose the encrypted content. 

There are also 3rd party tools that can help with protecting hard drive content.]]></description>
		<content:encoded><![CDATA[<p>Hi Harriet, </p>
<p>Very sorry to hear about your friend. May I point out that if your friend is simply using a 16 character password to log into her system she is not really protected; should her laptop be stolen again anyone can boot from an alternative OS (using live cds) or simply disconnect the hard drive and connect it to a system that the perpetrators have access to and still get full access to the hard drive. </p>
<p>If she really wants to protect her private data on her hard drive she also needs to enable encryption in addition to using strong login passwords. On Windows this can simply be done by going in the folder properties of the folder one wishes to protect if NTFS is used as the file system. </p>
<p>If she decides to do this it is also a good idea to read a bit on the subject before implementing it and follow the recommendation on backing up the keys used for encryption in the event that she will ever need to reinstall the system, or else she might lose the encrypted content. </p>
<p>There are also 3rd party tools that can help with protecting hard drive content.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Harriet</title>
		<link>http://www.gfi.com/blog/how-to-secure-your-network-the-old-fashioned-way/comment-page-1/#comment-8557</link>
		<dc:creator>Harriet</dc:creator>
		<pubDate>Sat, 31 Jul 2010 00:54:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2375#comment-8557</guid>
		<description><![CDATA[I have a friend who was too lazy to password protect her laptop. She had let&#039;s just say &quot;very private&quot; photos and videos of herself on that laptop and when it got stolen, she completely freaked out. That was over a year ago, and even up to now, she still constantly fears her private photos and videos have leaked on the internet.

Now her laptop is protected with a 16-character password with letter, numbers and characters. LOL]]></description>
		<content:encoded><![CDATA[<p>I have a friend who was too lazy to password protect her laptop. She had let&#8217;s just say &#8220;very private&#8221; photos and videos of herself on that laptop and when it got stolen, she completely freaked out. That was over a year ago, and even up to now, she still constantly fears her private photos and videos have leaked on the internet.</p>
<p>Now her laptop is protected with a 16-character password with letter, numbers and characters. LOL</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sue Walsh</title>
		<link>http://www.gfi.com/blog/how-to-secure-your-network-the-old-fashioned-way/comment-page-1/#comment-8435</link>
		<dc:creator>Sue Walsh</dc:creator>
		<pubDate>Thu, 29 Jul 2010 05:48:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2375#comment-8435</guid>
		<description><![CDATA[My mother is actually guilty of one of these. She used her laptop at home to log into the network at her company-using an unsecured router and access point! No harm came as a result but her devices are secured now!]]></description>
		<content:encoded><![CDATA[<p>My mother is actually guilty of one of these. She used her laptop at home to log into the network at her company-using an unsecured router and access point! No harm came as a result but her devices are secured now!</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 06:20:43 by W3 Total Cache --