<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Why You Need to Run a Vulnerability Assessment</title>
	<atom:link href="http://www.gfi.com/blog/vulnerability-assessment/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/vulnerability-assessment/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=vulnerability-assessment</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/vulnerability-assessment/comment-page-1/#comment-29371</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Thu, 14 Jul 2011 11:05:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3297#comment-29371</guid>
		<description><![CDATA[Hi Artie, 

When you need to give remote access to remote workers, depending on the circumstances you have a number of options:

If the employees can be provided with a static IP then connections can be limited to that IP alone.

VPN can help reduce the surface area, especially together with a staging area. For example, if you want to give employees access to a web server and an SQL server it would be better if employees logged into a staging area thats only accepting VPN connections and then connect to those services from there. In such a scenario, only the staging area would be reachable from the outside.

Ensure stronger authentication when connecting from the outside by using a two factor authentication system.

If your employees will be connecting from public places again ensure there is a VPN and I would suggest the use of one time passwords.]]></description>
		<content:encoded><![CDATA[<p>Hi Artie, </p>
<p>When you need to give remote access to remote workers, depending on the circumstances you have a number of options:</p>
<p>If the employees can be provided with a static IP then connections can be limited to that IP alone.</p>
<p>VPN can help reduce the surface area, especially together with a staging area. For example, if you want to give employees access to a web server and an SQL server it would be better if employees logged into a staging area thats only accepting VPN connections and then connect to those services from there. In such a scenario, only the staging area would be reachable from the outside.</p>
<p>Ensure stronger authentication when connecting from the outside by using a two factor authentication system.</p>
<p>If your employees will be connecting from public places again ensure there is a VPN and I would suggest the use of one time passwords.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Artie</title>
		<link>http://www.gfi.com/blog/vulnerability-assessment/comment-page-1/#comment-29353</link>
		<dc:creator>Artie</dc:creator>
		<pubDate>Sun, 10 Jul 2011 18:16:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3297#comment-29353</guid>
		<description><![CDATA[You should also check legit remote access and the potential ways to abuse it. If you have remote workers, then you have no choice but to give them remote access and this can turn into a huge backdoor.]]></description>
		<content:encoded><![CDATA[<p>You should also check legit remote access and the potential ways to abuse it. If you have remote workers, then you have no choice but to give them remote access and this can turn into a huge backdoor.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/vulnerability-assessment/comment-page-1/#comment-29299</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Tue, 28 Jun 2011 08:39:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3297#comment-29299</guid>
		<description><![CDATA[I agree with Rita,

Its always important to keep in mind that all a hacker needs is to find one weakness to compromise a system. As such it is all about you finding that vulnerability before an attacker does. At the end of the day it is that simple.]]></description>
		<content:encoded><![CDATA[<p>I agree with Rita,</p>
<p>Its always important to keep in mind that all a hacker needs is to find one weakness to compromise a system. As such it is all about you finding that vulnerability before an attacker does. At the end of the day it is that simple.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Rita</title>
		<link>http://www.gfi.com/blog/vulnerability-assessment/comment-page-1/#comment-29295</link>
		<dc:creator>Rita</dc:creator>
		<pubDate>Mon, 27 Jun 2011 09:19:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3297#comment-29295</guid>
		<description><![CDATA[Securing a network is an endless battle - one little distraction, and all your security is blown to pieces. I agree that vulnerability assessments, or even better - a self-hack test at the end is just the top of the iceberg. These tasks take so much time but without them a network is exposed to all kinds of dangers.]]></description>
		<content:encoded><![CDATA[<p>Securing a network is an endless battle &#8211; one little distraction, and all your security is blown to pieces. I agree that vulnerability assessments, or even better &#8211; a self-hack test at the end is just the top of the iceberg. These tasks take so much time but without them a network is exposed to all kinds of dangers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: GeoMechs</title>
		<link>http://www.gfi.com/blog/vulnerability-assessment/comment-page-1/#comment-29248</link>
		<dc:creator>GeoMechs</dc:creator>
		<pubDate>Tue, 14 Jun 2011 07:15:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3297#comment-29248</guid>
		<description><![CDATA[Vulnerability assessment is as important as the main protection itself. Just like doctors said &quot;prevention is better than cure&quot;. And in a corporate setting vulnerability assessment can make or break a company&#039;s overall performance. 

I agree with Luke&#039;s statement. All organizations should have some kind of vulnerability assessment in place especially these days where malwares are spreading and wrecking havoc everywhere. No one is excused.]]></description>
		<content:encoded><![CDATA[<p>Vulnerability assessment is as important as the main protection itself. Just like doctors said &#8220;prevention is better than cure&#8221;. And in a corporate setting vulnerability assessment can make or break a company&#8217;s overall performance. </p>
<p>I agree with Luke&#8217;s statement. All organizations should have some kind of vulnerability assessment in place especially these days where malwares are spreading and wrecking havoc everywhere. No one is excused.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/vulnerability-assessment/comment-page-1/#comment-29231</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Wed, 08 Jun 2011 09:13:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3297#comment-29231</guid>
		<description><![CDATA[@James

I agree that many admins set servers up and then forget about them, however I believe this is mainly because of lack of faith in themselves rather than any other reason. Some admins are afraid of touching a working system because they fear any changes might cause downtime and subsequently get them into trouble.

What they don&#039;t realize is that by leaving such systems unattended and not installing any security fixes issued since release they are equally risking downtime or even worse consequences in the event of an intrusion!]]></description>
		<content:encoded><![CDATA[<p>@James</p>
<p>I agree that many admins set servers up and then forget about them, however I believe this is mainly because of lack of faith in themselves rather than any other reason. Some admins are afraid of touching a working system because they fear any changes might cause downtime and subsequently get them into trouble.</p>
<p>What they don&#8217;t realize is that by leaving such systems unattended and not installing any security fixes issued since release they are equally risking downtime or even worse consequences in the event of an intrusion!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Luke Ian</title>
		<link>http://www.gfi.com/blog/vulnerability-assessment/comment-page-1/#comment-29226</link>
		<dc:creator>Luke Ian</dc:creator>
		<pubDate>Mon, 06 Jun 2011 02:15:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3297#comment-29226</guid>
		<description><![CDATA[With so many malwares, viruses, spywares, and scarewares running around the Internet these days (even Mac PCs are targeted and infiltrated), it&#039;s not only a must to run a vulnerability assessment, it&#039;s also a corporate responsibility (a big hint to Sony PlayStation and Sony Pictures). 

In the past, having a vulnerability assessment in place is required only to big multi-national corporations. Today, even small and medium size businesses are following suit. This just proves that when it comes to IT security, size does not matter.]]></description>
		<content:encoded><![CDATA[<p>With so many malwares, viruses, spywares, and scarewares running around the Internet these days (even Mac PCs are targeted and infiltrated), it&#8217;s not only a must to run a vulnerability assessment, it&#8217;s also a corporate responsibility (a big hint to Sony PlayStation and Sony Pictures). </p>
<p>In the past, having a vulnerability assessment in place is required only to big multi-national corporations. Today, even small and medium size businesses are following suit. This just proves that when it comes to IT security, size does not matter.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: James</title>
		<link>http://www.gfi.com/blog/vulnerability-assessment/comment-page-1/#comment-29220</link>
		<dc:creator>James</dc:creator>
		<pubDate>Sat, 04 Jun 2011 04:35:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3297#comment-29220</guid>
		<description><![CDATA[One of the more irritating things that novice sysadmins do is the whole &quot;set it and forget it&quot; method of administration...they think they can just set up a server and it&#039;ll manage itself, and that it just needs to be secured while it&#039;s being set up. It&#039;s important to realize that vulnerability assessments need to be done on a regular basis.]]></description>
		<content:encoded><![CDATA[<p>One of the more irritating things that novice sysadmins do is the whole &#8220;set it and forget it&#8221; method of administration&#8230;they think they can just set up a server and it&#8217;ll manage itself, and that it just needs to be secured while it&#8217;s being set up. It&#8217;s important to realize that vulnerability assessments need to be done on a regular basis.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/vulnerability-assessment/comment-page-1/#comment-29210</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Thu, 02 Jun 2011 07:40:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3297#comment-29210</guid>
		<description><![CDATA[Hi Tom, 

You&#039;re right, its always important to keep in mind that a hacker doesn&#039;t need to get through ALL of your security but only the WEAKEST part. This makes it essential to cover all bases security wise or at least as much as possible depending on your cost, benefit ratio.]]></description>
		<content:encoded><![CDATA[<p>Hi Tom, </p>
<p>You&#8217;re right, its always important to keep in mind that a hacker doesn&#8217;t need to get through ALL of your security but only the WEAKEST part. This makes it essential to cover all bases security wise or at least as much as possible depending on your cost, benefit ratio.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tom Callahan</title>
		<link>http://www.gfi.com/blog/vulnerability-assessment/comment-page-1/#comment-29205</link>
		<dc:creator>Tom Callahan</dc:creator>
		<pubDate>Wed, 01 Jun 2011 15:22:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3297#comment-29205</guid>
		<description><![CDATA[All of these back doors into a &quot;secure&quot; system really make you realize just how many moving parts there are in every network. If you don&#039;t have total security, you may very well not have any in the hands of those who have the skills and know-how to get in. Especially with all these high profile hacks being perpetrated by &quot;LulzSec,&quot; now is probably the best time to re-evaluate your entire network security setup.]]></description>
		<content:encoded><![CDATA[<p>All of these back doors into a &#8220;secure&#8221; system really make you realize just how many moving parts there are in every network. If you don&#8217;t have total security, you may very well not have any in the hands of those who have the skills and know-how to get in. Especially with all these high profile hacks being perpetrated by &#8220;LulzSec,&#8221; now is probably the best time to re-evaluate your entire network security setup.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:21:39 by W3 Total Cache --