<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Network Internet Control – Managing Risk the Right Way</title>
	<atom:link href="http://www.gfi.com/blog/network-internet-control/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/network-internet-control/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=network-internet-control</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Peter Jackson</title>
		<link>http://www.gfi.com/blog/network-internet-control/comment-page-1/#comment-30015</link>
		<dc:creator>Peter Jackson</dc:creator>
		<pubDate>Sun, 30 Oct 2011 07:46:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3495#comment-30015</guid>
		<description><![CDATA[This whole internet monitoring stuff reminds me more and more of the control of double use stuff - you need it to make a nuclear station but also a nuclear bomb. No matter how precise the control mechanism is, it will never reach 100 per cent accuracy. The problem is how to make it at least 90 per cent accurate.]]></description>
		<content:encoded><![CDATA[<p>This whole internet monitoring stuff reminds me more and more of the control of double use stuff &#8211; you need it to make a nuclear station but also a nuclear bomb. No matter how precise the control mechanism is, it will never reach 100 per cent accuracy. The problem is how to make it at least 90 per cent accurate.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Kevin Love</title>
		<link>http://www.gfi.com/blog/network-internet-control/comment-page-1/#comment-29886</link>
		<dc:creator>Kevin Love</dc:creator>
		<pubDate>Fri, 07 Oct 2011 13:42:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3495#comment-29886</guid>
		<description><![CDATA[Network Internet control is crucial, but at the same time consider the many studies performed that talk about an increase in productivity when employees are granted a certain degree of wiggle room each day to check their social networks, share content, and so on. Obviously, you would want this to be done in a way that would have no malicious effects on the workstations, so it needs to be handled safely and securely, but outright blocking and banning from services and sites (within reason) is a good way to end up with the opposite of the desired effect.]]></description>
		<content:encoded><![CDATA[<p>Network Internet control is crucial, but at the same time consider the many studies performed that talk about an increase in productivity when employees are granted a certain degree of wiggle room each day to check their social networks, share content, and so on. Obviously, you would want this to be done in a way that would have no malicious effects on the workstations, so it needs to be handled safely and securely, but outright blocking and banning from services and sites (within reason) is a good way to end up with the opposite of the desired effect.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anonymouse_Cat</title>
		<link>http://www.gfi.com/blog/network-internet-control/comment-page-1/#comment-29885</link>
		<dc:creator>Anonymouse_Cat</dc:creator>
		<pubDate>Fri, 07 Oct 2011 11:49:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3495#comment-29885</guid>
		<description><![CDATA[Risk management creates value to an entity - in this context to network Internet control. I agree with William&#039;s statement that managing risk, especially with this scope, needs some support. 

Accessing and using the Internet in a workplace is so essential especially in this day and age where almost all enterprises use the World Wide Web to function properly. 

It is in this regard that Internet control should be done in a way that it should be a win-win solution to both the business and the employees.]]></description>
		<content:encoded><![CDATA[<p>Risk management creates value to an entity &#8211; in this context to network Internet control. I agree with William&#8217;s statement that managing risk, especially with this scope, needs some support. </p>
<p>Accessing and using the Internet in a workplace is so essential especially in this day and age where almost all enterprises use the World Wide Web to function properly. </p>
<p>It is in this regard that Internet control should be done in a way that it should be a win-win solution to both the business and the employees.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/network-internet-control/comment-page-1/#comment-29883</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Fri, 07 Oct 2011 09:08:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3495#comment-29883</guid>
		<description><![CDATA[Hi Perry and Willian, 

I agree with both of your points, restricting access is ultimately a tradeoff between security and convenience and therefore one needs to be sure to strike the correct balance.

I also agree that there are many stake holders to this, and when designing the Internet access policy, all of these stake holders need to be involved.]]></description>
		<content:encoded><![CDATA[<p>Hi Perry and Willian, </p>
<p>I agree with both of your points, restricting access is ultimately a tradeoff between security and convenience and therefore one needs to be sure to strike the correct balance.</p>
<p>I also agree that there are many stake holders to this, and when designing the Internet access policy, all of these stake holders need to be involved.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: William Tomas</title>
		<link>http://www.gfi.com/blog/network-internet-control/comment-page-1/#comment-29881</link>
		<dc:creator>William Tomas</dc:creator>
		<pubDate>Thu, 06 Oct 2011 12:47:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3495#comment-29881</guid>
		<description><![CDATA[Hmmm... Managing risk the right way is not only a job of a single entity. A CTO, IT Manager, or a Tech Admin can&#039;t do this alone. He or she also needs some sort of support, especially if the said manager or admin has more than 50 employees to his or her hands.

Controlling the Internet (both in a large and small case environment) is not an easy job. You have to deal with a lot of issues - such as user privacy, right, etc. Bureaucratic processes are also present. So be aware.

I completely agree with having a network Internet control policy, and a set of solutions once trouble comes in. Put it in your company manual and introduce it to your employees.]]></description>
		<content:encoded><![CDATA[<p>Hmmm&#8230; Managing risk the right way is not only a job of a single entity. A CTO, IT Manager, or a Tech Admin can&#8217;t do this alone. He or she also needs some sort of support, especially if the said manager or admin has more than 50 employees to his or her hands.</p>
<p>Controlling the Internet (both in a large and small case environment) is not an easy job. You have to deal with a lot of issues &#8211; such as user privacy, right, etc. Bureaucratic processes are also present. So be aware.</p>
<p>I completely agree with having a network Internet control policy, and a set of solutions once trouble comes in. Put it in your company manual and introduce it to your employees.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Perry B.</title>
		<link>http://www.gfi.com/blog/network-internet-control/comment-page-1/#comment-29872</link>
		<dc:creator>Perry B.</dc:creator>
		<pubDate>Wed, 05 Oct 2011 19:58:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3495#comment-29872</guid>
		<description><![CDATA[Every form of technology has its good side and bad side. I mean everything - including email, IMs, and Internet (in general). Controlling access and use of the World Wide Web can have several side effects. Depending on the environment where the restriction is being implemented, the consequences can be beneficial or disadvantageous (or both).

And this is where the job of a CTO, IT Manager, or a Tech Admin comes in handy. He or she has to decide what&#039;s good or bad for the organization - tech-wise. But then again, most of the time, it still depends on the company&#039;s situation. It&#039;s  a case-to-case basis.]]></description>
		<content:encoded><![CDATA[<p>Every form of technology has its good side and bad side. I mean everything &#8211; including email, IMs, and Internet (in general). Controlling access and use of the World Wide Web can have several side effects. Depending on the environment where the restriction is being implemented, the consequences can be beneficial or disadvantageous (or both).</p>
<p>And this is where the job of a CTO, IT Manager, or a Tech Admin comes in handy. He or she has to decide what&#8217;s good or bad for the organization &#8211; tech-wise. But then again, most of the time, it still depends on the company&#8217;s situation. It&#8217;s  a case-to-case basis.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 15:58:38 by W3 Total Cache --