<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: The Ultimate Network Security Checklist</title>
	<atom:link href="http://www.gfi.com/blog/the-ultimate-network-security-checklist/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/the-ultimate-network-security-checklist/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-ultimate-network-security-checklist</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Tue, 06 Aug 2013 14:24:30 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Crunchy</title>
		<link>http://www.gfi.com/blog/the-ultimate-network-security-checklist/comment-page-1/#comment-37926</link>
		<dc:creator>Crunchy</dc:creator>
		<pubDate>Thu, 26 Jul 2012 13:14:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8160#comment-37926</guid>
		<description><![CDATA[It&#039;s a text file, it could contain code that executes when it is open. If you&#039;re familiar with coding you could just edit the .srt file to see if there is anything crazy on it]]></description>
		<content:encoded><![CDATA[<p>It&#8217;s a text file, it could contain code that executes when it is open. If you&#8217;re familiar with coding you could just edit the .srt file to see if there is anything crazy on it</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Stephen</title>
		<link>http://www.gfi.com/blog/the-ultimate-network-security-checklist/comment-page-1/#comment-37832</link>
		<dc:creator>Stephen</dc:creator>
		<pubDate>Fri, 20 Jul 2012 10:27:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8160#comment-37832</guid>
		<description><![CDATA[Kevin, I understood that a .srt file is just text.  Please could you explain how this can be a threat?  Thanks.]]></description>
		<content:encoded><![CDATA[<p>Kevin, I understood that a .srt file is just text.  Please could you explain how this can be a threat?  Thanks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Gill Langston</title>
		<link>http://www.gfi.com/blog/the-ultimate-network-security-checklist/comment-page-1/#comment-31846</link>
		<dc:creator>Gill Langston</dc:creator>
		<pubDate>Tue, 13 Mar 2012 22:06:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8160#comment-31846</guid>
		<description><![CDATA[Torrents are bad news for so many reasons.. besides the fact that a user in a corporate environment can infect the entire network just because they wanted to download a song or movie, they could leave the company legally liable for copyright infringement.  Especially when the torrent client is sharing files to others.  That means the company network is now hosting pirated content.]]></description>
		<content:encoded><![CDATA[<p>Torrents are bad news for so many reasons.. besides the fact that a user in a corporate environment can infect the entire network just because they wanted to download a song or movie, they could leave the company legally liable for copyright infringement.  Especially when the torrent client is sharing files to others.  That means the company network is now hosting pirated content.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Christina Goggi</title>
		<link>http://www.gfi.com/blog/the-ultimate-network-security-checklist/comment-page-1/#comment-31753</link>
		<dc:creator>Christina Goggi</dc:creator>
		<pubDate>Mon, 05 Mar 2012 10:13:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8160#comment-31753</guid>
		<description><![CDATA[Thanks Remco! Everyone has their own method; the most common approach is probably keeping a cheat sheet (which is just a concise list of the items you think apply to you). Then update it gradually – things that become second nature can be removed and new things you encounter should get added.]]></description>
		<content:encoded><![CDATA[<p>Thanks Remco! Everyone has their own method; the most common approach is probably keeping a cheat sheet (which is just a concise list of the items you think apply to you). Then update it gradually – things that become second nature can be removed and new things you encounter should get added.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Kevin Fraseir</title>
		<link>http://www.gfi.com/blog/the-ultimate-network-security-checklist/comment-page-1/#comment-31697</link>
		<dc:creator>Kevin Fraseir</dc:creator>
		<pubDate>Wed, 29 Feb 2012 05:33:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8160#comment-31697</guid>
		<description><![CDATA[STAY AWAY FROM TORRENT-BASED WEBSITES. As an experienced senior network administrator for more than eight years, I&#039;ve encountered some of the toughest network security risks there is. Name it and I know them down to their source codes. From these threats, the toughest for me are torrent-based infections and attacks.

It&#039;s a bad idea to download files (mp3s, videos, games, etc) from websites that host torrents. Some downloaded torrent have extra and unnecessary files attached to them. These files can be used to infect your computers and spread viruses. Be extra careful about downloading pirated DVD screener movies especially if it contains subtitles (usually it has a .srt file extension). Subtitle files are sometimes encoded with malicious codes.]]></description>
		<content:encoded><![CDATA[<p>STAY AWAY FROM TORRENT-BASED WEBSITES. As an experienced senior network administrator for more than eight years, I&#8217;ve encountered some of the toughest network security risks there is. Name it and I know them down to their source codes. From these threats, the toughest for me are torrent-based infections and attacks.</p>
<p>It&#8217;s a bad idea to download files (mp3s, videos, games, etc) from websites that host torrents. Some downloaded torrent have extra and unnecessary files attached to them. These files can be used to infect your computers and spread viruses. Be extra careful about downloading pirated DVD screener movies especially if it contains subtitles (usually it has a .srt file extension). Subtitle files are sometimes encoded with malicious codes.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Remco</title>
		<link>http://www.gfi.com/blog/the-ultimate-network-security-checklist/comment-page-1/#comment-31691</link>
		<dc:creator>Remco</dc:creator>
		<pubDate>Tue, 28 Feb 2012 19:39:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8160#comment-31691</guid>
		<description><![CDATA[A great list indeed! What i really would like to see is a tool or an excel sheet as an example of documenting these information, because i keep strugling wich data is important and how to save them efficient. Any suggestions?]]></description>
		<content:encoded><![CDATA[<p>A great list indeed! What i really would like to see is a tool or an excel sheet as an example of documenting these information, because i keep strugling wich data is important and how to save them efficient. Any suggestions?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Thomas Macadams</title>
		<link>http://www.gfi.com/blog/the-ultimate-network-security-checklist/comment-page-1/#comment-31667</link>
		<dc:creator>Thomas Macadams</dc:creator>
		<pubDate>Tue, 28 Feb 2012 01:51:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8160#comment-31667</guid>
		<description><![CDATA[Backup backup backup. If there&#039;s one GREAT thing I learned way back in college - that is to backup all network programs and systems. When all backups are in place, network security and protection will be a breeze. And with Cloud Computing on the steady rise, automatic backups of your workstations and server will be both practical and easier to do. If you are a competent network administrator or an IT manager, backup / restore should be one of the top in your checklist.]]></description>
		<content:encoded><![CDATA[<p>Backup backup backup. If there&#8217;s one GREAT thing I learned way back in college &#8211; that is to backup all network programs and systems. When all backups are in place, network security and protection will be a breeze. And with Cloud Computing on the steady rise, automatic backups of your workstations and server will be both practical and easier to do. If you are a competent network administrator or an IT manager, backup / restore should be one of the top in your checklist.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Roger Willson</title>
		<link>http://www.gfi.com/blog/the-ultimate-network-security-checklist/comment-page-1/#comment-31659</link>
		<dc:creator>Roger Willson</dc:creator>
		<pubDate>Mon, 27 Feb 2012 08:15:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8160#comment-31659</guid>
		<description><![CDATA[A great list! It is really a concise representation of all the points that need to be secured. I think this list can be used as a basis for security for companies of all sizes. For a small company it can be used verbatim, while for a large one there might need to be some additions but all in all, awesome work, thank you!]]></description>
		<content:encoded><![CDATA[<p>A great list! It is really a concise representation of all the points that need to be secured. I think this list can be used as a basis for security for companies of all sizes. For a small company it can be used verbatim, while for a large one there might need to be some additions but all in all, awesome work, thank you!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Adam Loveland</title>
		<link>http://www.gfi.com/blog/the-ultimate-network-security-checklist/comment-page-1/#comment-31644</link>
		<dc:creator>Adam Loveland</dc:creator>
		<pubDate>Sat, 25 Feb 2012 12:31:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8160#comment-31644</guid>
		<description><![CDATA[Quite an exhaustive list, but that&#039;s the kind of thorough attention to detail that is necessary when reviewing network security. One hole in any one of these spots can effectively bring most of the others down. You may not need this much consideration for a smaller business, but if you have an intention to grow it is ALWAYS a better idea to have the infrastructure in place first and grow to fit it.]]></description>
		<content:encoded><![CDATA[<p>Quite an exhaustive list, but that&#8217;s the kind of thorough attention to detail that is necessary when reviewing network security. One hole in any one of these spots can effectively bring most of the others down. You may not need this much consideration for a smaller business, but if you have an intention to grow it is ALWAYS a better idea to have the infrastructure in place first and grow to fit it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Xerxes Cumming</title>
		<link>http://www.gfi.com/blog/the-ultimate-network-security-checklist/comment-page-1/#comment-31641</link>
		<dc:creator>Xerxes Cumming</dc:creator>
		<pubDate>Sat, 25 Feb 2012 08:11:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8160#comment-31641</guid>
		<description><![CDATA[For me, making sure workstations are in good shape (secured, updated and physically in excellent condition) should be the top-most concern rather than the server itself. I also would like to add that vulnerability scan and patch management should go hand in hand. You should not do or apply only one. I&#039;ve been a white hacker for several years now and these two network security methodologies are a must for both the server and the workstations. Organizations and enterprises with more than 50 employees and a hundred computer units should have these two in place.]]></description>
		<content:encoded><![CDATA[<p>For me, making sure workstations are in good shape (secured, updated and physically in excellent condition) should be the top-most concern rather than the server itself. I also would like to add that vulnerability scan and patch management should go hand in hand. You should not do or apply only one. I&#8217;ve been a white hacker for several years now and these two network security methodologies are a must for both the server and the workstations. Organizations and enterprises with more than 50 employees and a hundred computer units should have these two in place.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 08:14:37 by W3 Total Cache --