<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: I spy with my little eye&#8230;</title>
	<atom:link href="http://www.gfi.com/blog/spy-eye/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/spy-eye/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=spy-eye</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Joana</title>
		<link>http://www.gfi.com/blog/spy-eye/comment-page-1/#comment-9097</link>
		<dc:creator>Joana</dc:creator>
		<pubDate>Sat, 14 Aug 2010 02:58:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2178#comment-9097</guid>
		<description><![CDATA[I decided to follow the link to Peter Cochrane’s blog. It’s quite a disturbing read indeed, and at the same time quite ridiculous. Half of me wanted to have those three get what they deserved, but then again, I realized I’ve been a culprit of some of those mistakes as well.

When you’re on the clock to meet about sensitive information in a public space, sometimes you just rationalize that no one around you either cares or is in the same industry as you. We try to use codenames (I’m serious) to talk about confidential info, but sometimes, it&#039;s just so tasking to remember those things we end up letting it all out to speed the meetings up.]]></description>
		<content:encoded><![CDATA[<p>I decided to follow the link to Peter Cochrane’s blog. It’s quite a disturbing read indeed, and at the same time quite ridiculous. Half of me wanted to have those three get what they deserved, but then again, I realized I’ve been a culprit of some of those mistakes as well.</p>
<p>When you’re on the clock to meet about sensitive information in a public space, sometimes you just rationalize that no one around you either cares or is in the same industry as you. We try to use codenames (I’m serious) to talk about confidential info, but sometimes, it&#8217;s just so tasking to remember those things we end up letting it all out to speed the meetings up.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: dale</title>
		<link>http://www.gfi.com/blog/spy-eye/comment-page-1/#comment-9096</link>
		<dc:creator>dale</dc:creator>
		<pubDate>Sat, 14 Aug 2010 02:49:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2178#comment-9096</guid>
		<description><![CDATA[In that case, I guess employee monitoring goes both ways. You create stricter monitoring policies to keep an eye on your staff inside the office, and yet give them the freedom (or the responsibility) to work outside of it. 

From a managerial stand point, people are the weakest link. But now I’m wondering if awareness would be a simpler solution to these concerns.  You can invest in encryption, certainly, but it might also help to simply conduct a (maybe in a half a day) seminar outlining to your staff the dos and don’ts of working outside the office. We may be the weakest link, but we might also be the cheapest (not easiest) to fix.]]></description>
		<content:encoded><![CDATA[<p>In that case, I guess employee monitoring goes both ways. You create stricter monitoring policies to keep an eye on your staff inside the office, and yet give them the freedom (or the responsibility) to work outside of it. </p>
<p>From a managerial stand point, people are the weakest link. But now I’m wondering if awareness would be a simpler solution to these concerns.  You can invest in encryption, certainly, but it might also help to simply conduct a (maybe in a half a day) seminar outlining to your staff the dos and don’ts of working outside the office. We may be the weakest link, but we might also be the cheapest (not easiest) to fix.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: David Kelleher</title>
		<link>http://www.gfi.com/blog/spy-eye/comment-page-1/#comment-5484</link>
		<dc:creator>David Kelleher</dc:creator>
		<pubDate>Thu, 29 Apr 2010 13:06:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2178#comment-5484</guid>
		<description><![CDATA[Hi John

Valid point, although I think that the quality and volume of data being exposed is much greater too. You can read parts of a spreadsheet on a plane or train, but you are somewhat limited to the information therein. However, if you&#039;re attentive enough to follow the keystrokes when they are inputing their username/password, the level of risk has increased exponentially. I also think that more people, thanks to technology, are mobile and work on the road today than before. But I do agree that we should not always blame the technology.]]></description>
		<content:encoded><![CDATA[<p>Hi John</p>
<p>Valid point, although I think that the quality and volume of data being exposed is much greater too. You can read parts of a spreadsheet on a plane or train, but you are somewhat limited to the information therein. However, if you&#8217;re attentive enough to follow the keystrokes when they are inputing their username/password, the level of risk has increased exponentially. I also think that more people, thanks to technology, are mobile and work on the road today than before. But I do agree that we should not always blame the technology.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: John Mello</title>
		<link>http://www.gfi.com/blog/spy-eye/comment-page-1/#comment-5455</link>
		<dc:creator>John Mello</dc:creator>
		<pubDate>Wed, 28 Apr 2010 16:14:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2178#comment-5455</guid>
		<description><![CDATA[While your concern is well founded, is there any difference between peeking at someone&#039;s laptop screen and glancing at a printout of a spreadsheet they&#039;re reading while sitting next to them on a train or plane? As you said, employees are a weak link in security, but they were that way before mobile technology. I think we may lose sight of that too often and lay the blame on technologies we can&#039;t exercise as tight control over as those bound to the office.]]></description>
		<content:encoded><![CDATA[<p>While your concern is well founded, is there any difference between peeking at someone&#8217;s laptop screen and glancing at a printout of a spreadsheet they&#8217;re reading while sitting next to them on a train or plane? As you said, employees are a weak link in security, but they were that way before mobile technology. I think we may lose sight of that too often and lay the blame on technologies we can&#8217;t exercise as tight control over as those bound to the office.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 05:44:36 by W3 Total Cache --