<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How a simple USB stick can threaten your corporate network</title>
	<atom:link href="http://www.gfi.com/blog/simple-usb-stick-threaten-corporate-network/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/simple-usb-stick-threaten-corporate-network/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=simple-usb-stick-threaten-corporate-network</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Gerry</title>
		<link>http://www.gfi.com/blog/simple-usb-stick-threaten-corporate-network/comment-page-1/#comment-17568</link>
		<dc:creator>Gerry</dc:creator>
		<pubDate>Wed, 05 Jan 2011 04:24:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2967#comment-17568</guid>
		<description><![CDATA[I was just wondering if the article was posted as a complete piece. Although it seems to read like a finished article, on my browser I see unfilled bullet points underneath the posting. Being quite interested on the subject matter of USB based security vulnerabilities, I was wondering if maybe some additional points were meant to be included in the article which were not included in the final blog post.]]></description>
		<content:encoded><![CDATA[<p>I was just wondering if the article was posted as a complete piece. Although it seems to read like a finished article, on my browser I see unfilled bullet points underneath the posting. Being quite interested on the subject matter of USB based security vulnerabilities, I was wondering if maybe some additional points were meant to be included in the article which were not included in the final blog post.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Donna</title>
		<link>http://www.gfi.com/blog/simple-usb-stick-threaten-corporate-network/comment-page-1/#comment-17565</link>
		<dc:creator>Donna</dc:creator>
		<pubDate>Wed, 05 Jan 2011 04:15:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2967#comment-17565</guid>
		<description><![CDATA[A lot of my co-workers have begun utilizing password protected USB drives to prevent from remote tampering of the device itself. Management in our company has deemed it to be so effective, that password protected USB drives are being given out for free as company property for staff use. Password protected USB drives may not be better than not misplacing the drive itself, but it’s at least an additional security measure.]]></description>
		<content:encoded><![CDATA[<p>A lot of my co-workers have begun utilizing password protected USB drives to prevent from remote tampering of the device itself. Management in our company has deemed it to be so effective, that password protected USB drives are being given out for free as company property for staff use. Password protected USB drives may not be better than not misplacing the drive itself, but it’s at least an additional security measure.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ray</title>
		<link>http://www.gfi.com/blog/simple-usb-stick-threaten-corporate-network/comment-page-1/#comment-17127</link>
		<dc:creator>Ray</dc:creator>
		<pubDate>Wed, 29 Dec 2010 05:57:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2967#comment-17127</guid>
		<description><![CDATA[Because of threats like this, a lot of managers have considered shutting out USB functionality altogether. But I firmly believe that this is a counter productive approach towards security. By shutting out your staff from using another means of making them more productive and more efficient would be much like any other virus or malware shutting it down itself. Although most security specialists believe that cutting off the head of a snake is the best way to kill it, maybe that analogy doesn’t necessarily apply here.]]></description>
		<content:encoded><![CDATA[<p>Because of threats like this, a lot of managers have considered shutting out USB functionality altogether. But I firmly believe that this is a counter productive approach towards security. By shutting out your staff from using another means of making them more productive and more efficient would be much like any other virus or malware shutting it down itself. Although most security specialists believe that cutting off the head of a snake is the best way to kill it, maybe that analogy doesn’t necessarily apply here.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Elmer</title>
		<link>http://www.gfi.com/blog/simple-usb-stick-threaten-corporate-network/comment-page-1/#comment-17125</link>
		<dc:creator>Elmer</dc:creator>
		<pubDate>Wed, 29 Dec 2010 05:40:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2967#comment-17125</guid>
		<description><![CDATA[A friend of mine who’s been working in advertising told me this crazy story about how some conniving companies use freebies to pilfer confidential information from their clients and customers. As a supposedly “harmless” give away, the company thought of giving out custom-print USB drives to their valued customers.  What they didn’t mention, however, was that these drives came pre-loaded with software designed to transmit purchasing habits of their customers. Though my friend wasn’t willing to divulge the name of the company behind it, he was keen on mentioning that they were in an industry where their customers weren&#039;t expected to be tech savvy at all, and not be suspicious of activity like this.]]></description>
		<content:encoded><![CDATA[<p>A friend of mine who’s been working in advertising told me this crazy story about how some conniving companies use freebies to pilfer confidential information from their clients and customers. As a supposedly “harmless” give away, the company thought of giving out custom-print USB drives to their valued customers.  What they didn’t mention, however, was that these drives came pre-loaded with software designed to transmit purchasing habits of their customers. Though my friend wasn’t willing to divulge the name of the company behind it, he was keen on mentioning that they were in an industry where their customers weren&#8217;t expected to be tech savvy at all, and not be suspicious of activity like this.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: June</title>
		<link>http://www.gfi.com/blog/simple-usb-stick-threaten-corporate-network/comment-page-1/#comment-17123</link>
		<dc:creator>June</dc:creator>
		<pubDate>Wed, 29 Dec 2010 05:28:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2967#comment-17123</guid>
		<description><![CDATA[@Harrison

I’d think you were absolutely bonkers if I didn’t work in retail marketing for over three years before moving into software. A close co-worker of mine, out of the blue, was called into the office of an executive and left with his bags packing. I only later found out that he was photocopying sensitive corporate strategies and selling them off to our competitors. True story. Having thought I had known the man pretty well, but it does feel lifted out of a spy film when you realize that you don’t really know what the people you’re working with are capable of.]]></description>
		<content:encoded><![CDATA[<p>@Harrison</p>
<p>I’d think you were absolutely bonkers if I didn’t work in retail marketing for over three years before moving into software. A close co-worker of mine, out of the blue, was called into the office of an executive and left with his bags packing. I only later found out that he was photocopying sensitive corporate strategies and selling them off to our competitors. True story. Having thought I had known the man pretty well, but it does feel lifted out of a spy film when you realize that you don’t really know what the people you’re working with are capable of.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Harrison Wright</title>
		<link>http://www.gfi.com/blog/simple-usb-stick-threaten-corporate-network/comment-page-1/#comment-16148</link>
		<dc:creator>Harrison Wright</dc:creator>
		<pubDate>Wed, 15 Dec 2010 15:52:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2967#comment-16148</guid>
		<description><![CDATA[I think that the &quot;innocent&quot; business manager might have actually dodged a bullet. It would&#039;ve been a completely different story if the malware contained in that USB was designed to transmit confidential information. In the grand scheme of things, compromised files of a single laptop are peanuts compared to losing trade secrets to competitors. It may sound like something straight out of a spy film, but corporate espionage has gotten to a point where people don&#039;t think twice about profiting from pilfered data.]]></description>
		<content:encoded><![CDATA[<p>I think that the &#8220;innocent&#8221; business manager might have actually dodged a bullet. It would&#8217;ve been a completely different story if the malware contained in that USB was designed to transmit confidential information. In the grand scheme of things, compromised files of a single laptop are peanuts compared to losing trade secrets to competitors. It may sound like something straight out of a spy film, but corporate espionage has gotten to a point where people don&#8217;t think twice about profiting from pilfered data.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Samuel</title>
		<link>http://www.gfi.com/blog/simple-usb-stick-threaten-corporate-network/comment-page-1/#comment-11986</link>
		<dc:creator>Samuel</dc:creator>
		<pubDate>Fri, 29 Oct 2010 10:16:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2967#comment-11986</guid>
		<description><![CDATA[Well to say, the GFI End point Security software worked well when i used it trial. So i thinks it handles issues like this properly............]]></description>
		<content:encoded><![CDATA[<p>Well to say, the GFI End point Security software worked well when i used it trial. So i thinks it handles issues like this properly&#8230;&#8230;&#8230;&#8230;</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 07:01:36 by W3 Total Cache --