<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Is Your Deception Defense Strong?</title>
	<atom:link href="http://www.gfi.com/blog/is-your-deception-defense-strong/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/is-your-deception-defense-strong/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=is-your-deception-defense-strong</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Cristopher Hawkson</title>
		<link>http://www.gfi.com/blog/is-your-deception-defense-strong/comment-page-1/#comment-32451</link>
		<dc:creator>Cristopher Hawkson</dc:creator>
		<pubDate>Mon, 07 May 2012 21:21:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8535#comment-32451</guid>
		<description><![CDATA[New employees can be risky for the reasons you outlined above, but &quot;old veterans&quot; can be just as problematic. They tend to be very complacent and comfortable in their environments, and use their experience as a means to not second guess themselves in situations like the ones listed above. Making sure they understand and more importantly adhere to policy changes is vital in protecting your company&#039;s security.]]></description>
		<content:encoded><![CDATA[<p>New employees can be risky for the reasons you outlined above, but &#8220;old veterans&#8221; can be just as problematic. They tend to be very complacent and comfortable in their environments, and use their experience as a means to not second guess themselves in situations like the ones listed above. Making sure they understand and more importantly adhere to policy changes is vital in protecting your company&#8217;s security.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Gerald Faustino</title>
		<link>http://www.gfi.com/blog/is-your-deception-defense-strong/comment-page-1/#comment-32429</link>
		<dc:creator>Gerald Faustino</dc:creator>
		<pubDate>Sat, 05 May 2012 13:47:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8535#comment-32429</guid>
		<description><![CDATA[Most of what you wrote here seems to be taken from a few pages of a good spy novel.  They sound improbable to some people.  That&#039;s why oftentimes, people also think they&#039;re less likely to be targets.

This is a good article as it narrates all the varying scenarios that a company can be attacked.  We can use this in our employee security orientation.  But, wouldn&#039;t we look too paranoid?

But, I say.  Better paranoid than sorry.]]></description>
		<content:encoded><![CDATA[<p>Most of what you wrote here seems to be taken from a few pages of a good spy novel.  They sound improbable to some people.  That&#8217;s why oftentimes, people also think they&#8217;re less likely to be targets.</p>
<p>This is a good article as it narrates all the varying scenarios that a company can be attacked.  We can use this in our employee security orientation.  But, wouldn&#8217;t we look too paranoid?</p>
<p>But, I say.  Better paranoid than sorry.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 13:46:38 by W3 Total Cache --