<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: A Look into Insidious Threats – The Logical Bomb</title>
	<atom:link href="http://www.gfi.com/blog/insidious-threats-logical-bomb/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/insidious-threats-logical-bomb/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=insidious-threats-logical-bomb</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/insidious-threats-logical-bomb/comment-page-1/#comment-16019</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Tue, 14 Dec 2010 18:55:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2906#comment-16019</guid>
		<description><![CDATA[You&#039;re right Mary K. It&#039;s quite difficult to defend your systems against insider threats. Access Control, Division of labour, Monitoring, Patch management, Penetration testing and Security Policies might mitigate the problem a bit but it&#039;s definitely no silver bullet. 

Insider threats are always the most insidious!]]></description>
		<content:encoded><![CDATA[<p>You&#8217;re right Mary K. It&#8217;s quite difficult to defend your systems against insider threats. Access Control, Division of labour, Monitoring, Patch management, Penetration testing and Security Policies might mitigate the problem a bit but it&#8217;s definitely no silver bullet. </p>
<p>Insider threats are always the most insidious!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mary K.</title>
		<link>http://www.gfi.com/blog/insidious-threats-logical-bomb/comment-page-1/#comment-15715</link>
		<dc:creator>Mary K.</dc:creator>
		<pubDate>Sun, 12 Dec 2010 17:09:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2906#comment-15715</guid>
		<description><![CDATA[@sue walsh

Good point. I guess, despite all our discussions against external and third party threats to our systems, the most vulnerable access point would be the remote users themselves. No matter how secure we make our servers, our systems, or our workstations. How do you defend your own system against the people who are supposedly using it? The person who is employed to be building your security may very well be the biggest threat to it in the future.]]></description>
		<content:encoded><![CDATA[<p>@sue walsh</p>
<p>Good point. I guess, despite all our discussions against external and third party threats to our systems, the most vulnerable access point would be the remote users themselves. No matter how secure we make our servers, our systems, or our workstations. How do you defend your own system against the people who are supposedly using it? The person who is employed to be building your security may very well be the biggest threat to it in the future.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/insidious-threats-logical-bomb/comment-page-1/#comment-11762</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Mon, 25 Oct 2010 16:03:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2906#comment-11762</guid>
		<description><![CDATA[Indeed, security can be a tricky business. It is understandable that sometimes businesses decide to take the risk instead of mitigating because they think it is unlikely that such an event will happen to them. Of course unlikely doesn&#039;t mean safe and if they&#039;re hit then they decide that it&#039;s time to act. 

I think this is the point when one should realize that their previous choice was the wrong one. If you&#039;re hit it doesn&#039;t mean the odds have suddenly become worse for your business, if anything the odds may have somewhat lowered a bit (lighting doesn&#039;t strike twice in the same spot kind of thinking) yet now the added security justifies the cost. To me that simply means that security justified the cost even previously; however, the business went with the unfortunate frame of mind that the specific risk couldn&#039;t possibly happen to it.

Of course I am not saying that every single risk should be mitigated either. There is a line where the cost doesn&#039;t justify the benefit; however, the &#039;this can never happen to me&#039; frame of mind is dangerous when deciding where to draw that line.]]></description>
		<content:encoded><![CDATA[<p>Indeed, security can be a tricky business. It is understandable that sometimes businesses decide to take the risk instead of mitigating because they think it is unlikely that such an event will happen to them. Of course unlikely doesn&#8217;t mean safe and if they&#8217;re hit then they decide that it&#8217;s time to act. </p>
<p>I think this is the point when one should realize that their previous choice was the wrong one. If you&#8217;re hit it doesn&#8217;t mean the odds have suddenly become worse for your business, if anything the odds may have somewhat lowered a bit (lighting doesn&#8217;t strike twice in the same spot kind of thinking) yet now the added security justifies the cost. To me that simply means that security justified the cost even previously; however, the business went with the unfortunate frame of mind that the specific risk couldn&#8217;t possibly happen to it.</p>
<p>Of course I am not saying that every single risk should be mitigated either. There is a line where the cost doesn&#8217;t justify the benefit; however, the &#8216;this can never happen to me&#8217; frame of mind is dangerous when deciding where to draw that line.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sue Walsh</title>
		<link>http://www.gfi.com/blog/insidious-threats-logical-bomb/comment-page-1/#comment-10431</link>
		<dc:creator>Sue Walsh</dc:creator>
		<pubDate>Mon, 27 Sep 2010 04:33:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2906#comment-10431</guid>
		<description><![CDATA[Disgruntled employees can be a huge security nightmare. There was just a case in Baltimore where a disgruntled employee installed a keylogger to steal his co-workers login info and programmed his bosses&#039;s computer to replace a Powerpoint presentation with pornographic images-during a big meeting! It wasn&#039;t until after that happened that the company decided they needed to put some security solutions in place. Kind of closing the barn door after the horses have escaped, don&#039;t you think?]]></description>
		<content:encoded><![CDATA[<p>Disgruntled employees can be a huge security nightmare. There was just a case in Baltimore where a disgruntled employee installed a keylogger to steal his co-workers login info and programmed his bosses&#8217;s computer to replace a Powerpoint presentation with pornographic images-during a big meeting! It wasn&#8217;t until after that happened that the company decided they needed to put some security solutions in place. Kind of closing the barn door after the horses have escaped, don&#8217;t you think?</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 06:15:24 by W3 Total Cache --