<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Top 5 Threats in B2B Social Media Usage: What Every Employer Should Know</title>
	<atom:link href="http://www.gfi.com/blog/top-5-threats-b2b-social-media-usage-employer/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/top-5-threats-b2b-social-media-usage-employer/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-5-threats-b2b-social-media-usage-employer</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Gordon</title>
		<link>http://www.gfi.com/blog/top-5-threats-b2b-social-media-usage-employer/comment-page-1/#comment-17128</link>
		<dc:creator>Gordon</dc:creator>
		<pubDate>Wed, 29 Dec 2010 06:02:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2897#comment-17128</guid>
		<description><![CDATA[Out of all the pro-active steps towards safe and secure B2B social media usage, I have to say that I agree on your last few points the most. Setting up an internet usage policy is not only the right direction to take, but it’s a critical one making sure that company staff is well aware on the regulations and policies of the company with regards to internet use. Having them sign off on paper will give the company protection from misguided use of the internet by their staff; much like how a EULA works with customers and software users.]]></description>
		<content:encoded><![CDATA[<p>Out of all the pro-active steps towards safe and secure B2B social media usage, I have to say that I agree on your last few points the most. Setting up an internet usage policy is not only the right direction to take, but it’s a critical one making sure that company staff is well aware on the regulations and policies of the company with regards to internet use. Having them sign off on paper will give the company protection from misguided use of the internet by their staff; much like how a EULA works with customers and software users.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Simon</title>
		<link>http://www.gfi.com/blog/top-5-threats-b2b-social-media-usage-employer/comment-page-1/#comment-17126</link>
		<dc:creator>Simon</dc:creator>
		<pubDate>Wed, 29 Dec 2010 05:51:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2897#comment-17126</guid>
		<description><![CDATA[Over the past couple of years, a lot of companies have been looking into social networking and media sites as an alternative (or sometimes main) avenue of marketing. However, I think a company should be able to outline what exactly they’re looking to achieve by gaining online presence via social networking and weigh it out against the possible cons. A lot of marketing firms are blindlessly treading into social media territory without realizing the ramifications of telling their staff that “it’s okay to Facebook on office hours”.]]></description>
		<content:encoded><![CDATA[<p>Over the past couple of years, a lot of companies have been looking into social networking and media sites as an alternative (or sometimes main) avenue of marketing. However, I think a company should be able to outline what exactly they’re looking to achieve by gaining online presence via social networking and weigh it out against the possible cons. A lot of marketing firms are blindlessly treading into social media territory without realizing the ramifications of telling their staff that “it’s okay to Facebook on office hours”.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sue Walsh</title>
		<link>http://www.gfi.com/blog/top-5-threats-b2b-social-media-usage-employer/comment-page-1/#comment-10433</link>
		<dc:creator>Sue Walsh</dc:creator>
		<pubDate>Mon, 27 Sep 2010 04:44:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2897#comment-10433</guid>
		<description><![CDATA[Facebook is full of phishing scams,spam,and some malware but it still can be a valuable tool if you take the time to separate the wheat from the chaff, and especially if you take the time to learn about all the security and privacy tools the site offers. I use it to network with other business owners and it&#039;s been invaluable. 

I think web monitoring and other tools are very important but what is most important is to be honest with your employees and don&#039;t make them feel like they aren&#039;t trustworthy. They should realize such tools are there to protect them just as much as they are the company!]]></description>
		<content:encoded><![CDATA[<p>Facebook is full of phishing scams,spam,and some malware but it still can be a valuable tool if you take the time to separate the wheat from the chaff, and especially if you take the time to learn about all the security and privacy tools the site offers. I use it to network with other business owners and it&#8217;s been invaluable. </p>
<p>I think web monitoring and other tools are very important but what is most important is to be honest with your employees and don&#8217;t make them feel like they aren&#8217;t trustworthy. They should realize such tools are there to protect them just as much as they are the company!</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 02:02:57 by W3 Total Cache --