<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Web Reputation Can Save You from Online Threats</title>
	<atom:link href="http://www.gfi.com/blog/web-reputation-save-online-threats/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/web-reputation-save-online-threats/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=web-reputation-save-online-threats</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Sarah Martin</title>
		<link>http://www.gfi.com/blog/web-reputation-save-online-threats/comment-page-1/#comment-30008</link>
		<dc:creator>Sarah Martin</dc:creator>
		<pubDate>Sun, 30 Oct 2011 06:35:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3504#comment-30008</guid>
		<description><![CDATA[This article starts a very interesting discussion. A company must be aware of this security aspect because a company&#039;s reputation is its most valuable asset and it is very unfortunate to ruin your reputation because of falling victim to malware. This adds insult to injury.]]></description>
		<content:encoded><![CDATA[<p>This article starts a very interesting discussion. A company must be aware of this security aspect because a company&#8217;s reputation is its most valuable asset and it is very unfortunate to ruin your reputation because of falling victim to malware. This adds insult to injury.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mr_Coffee_Lover</title>
		<link>http://www.gfi.com/blog/web-reputation-save-online-threats/comment-page-1/#comment-29920</link>
		<dc:creator>Mr_Coffee_Lover</dc:creator>
		<pubDate>Wed, 12 Oct 2011 12:38:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3504#comment-29920</guid>
		<description><![CDATA[These days it&#039;s so much easier to build and sabotage a reputation. You can use the power of social media to establish a more personal relationship with your existing and potential customers. It&#039;s more practical and real-time. 

However, social media can also destroy a business&#039; web reputation in an instant. 

Case Study: Olive Garden

This restaurant has thousands of fans in Facebook. The famous eatery used this tool to upgrade its client relationship. However, its fan page backfired when Olive Garden &quot;accidentally&quot; gave alcoholic drinks to children. The restaurant&#039;s web reputation was damaged in an instant when its Facebook fan page and some online forums were bombarded with complains and angry statements.]]></description>
		<content:encoded><![CDATA[<p>These days it&#8217;s so much easier to build and sabotage a reputation. You can use the power of social media to establish a more personal relationship with your existing and potential customers. It&#8217;s more practical and real-time. </p>
<p>However, social media can also destroy a business&#8217; web reputation in an instant. </p>
<p>Case Study: Olive Garden</p>
<p>This restaurant has thousands of fans in Facebook. The famous eatery used this tool to upgrade its client relationship. However, its fan page backfired when Olive Garden &#8220;accidentally&#8221; gave alcoholic drinks to children. The restaurant&#8217;s web reputation was damaged in an instant when its Facebook fan page and some online forums were bombarded with complains and angry statements.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: David Attard</title>
		<link>http://www.gfi.com/blog/web-reputation-save-online-threats/comment-page-1/#comment-29906</link>
		<dc:creator>David Attard</dc:creator>
		<pubDate>Tue, 11 Oct 2011 10:40:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3504#comment-29906</guid>
		<description><![CDATA[@William,
most browsers do implement some kind of malware blocking. However, with some websites, it is not simply a case of black or white. When you have a whole range of scores available at your disposal, you can take more granular decisions.

For example, you can say block High Risk Sites completely, block &quot;Unknown&quot; sites since these are highly likely to be malware or spam, allow tech-savvy users to access websites with a moderate web reputation and allow all users to access trustworthy websites...

@Kevin
there are many features which are used to determine the reputation score of a website, usually there are hundreds of variables which determine the score. Let&#039;s give a few examples:

1. Age of website - thousands of websites a day are created by malware authors to distribute malware - these have a very short lifetime, they are taken offline as soon as security engines find out about them. For the absolutely vast majority of new websites (95%), these are spam or malicious sites. As the age of website increases, its score increases.

2. Location of website - certain geographic regions, web hosting companies, ranges of IPs are known to be &quot;hacker&quot; friendly. Any websites in these regions is given a higher risk rating.

3. Threat History - websites which have been compromised in the past earn negative points. A site which has been compromised probably means a webmaster which is not careful enough, and thus may pose a risk in the future.

These and many other factors are used to give you a rating of not just the current risk a website poses, but most of all the likelihood that a website will host malware in the near future. 

This is the real difference with using web reputation for your web security. You will be taking actions to stop websites which can become a threat, before they become a threat. Although the risk may not always manifest itself, why take the risk?]]></description>
		<content:encoded><![CDATA[<p>@William,<br />
most browsers do implement some kind of malware blocking. However, with some websites, it is not simply a case of black or white. When you have a whole range of scores available at your disposal, you can take more granular decisions.</p>
<p>For example, you can say block High Risk Sites completely, block &#8220;Unknown&#8221; sites since these are highly likely to be malware or spam, allow tech-savvy users to access websites with a moderate web reputation and allow all users to access trustworthy websites&#8230;</p>
<p>@Kevin<br />
there are many features which are used to determine the reputation score of a website, usually there are hundreds of variables which determine the score. Let&#8217;s give a few examples:</p>
<p>1. Age of website &#8211; thousands of websites a day are created by malware authors to distribute malware &#8211; these have a very short lifetime, they are taken offline as soon as security engines find out about them. For the absolutely vast majority of new websites (95%), these are spam or malicious sites. As the age of website increases, its score increases.</p>
<p>2. Location of website &#8211; certain geographic regions, web hosting companies, ranges of IPs are known to be &#8220;hacker&#8221; friendly. Any websites in these regions is given a higher risk rating.</p>
<p>3. Threat History &#8211; websites which have been compromised in the past earn negative points. A site which has been compromised probably means a webmaster which is not careful enough, and thus may pose a risk in the future.</p>
<p>These and many other factors are used to give you a rating of not just the current risk a website poses, but most of all the likelihood that a website will host malware in the near future. </p>
<p>This is the real difference with using web reputation for your web security. You will be taking actions to stop websites which can become a threat, before they become a threat. Although the risk may not always manifest itself, why take the risk?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: William Tomas</title>
		<link>http://www.gfi.com/blog/web-reputation-save-online-threats/comment-page-1/#comment-29895</link>
		<dc:creator>William Tomas</dc:creator>
		<pubDate>Mon, 10 Oct 2011 11:52:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3504#comment-29895</guid>
		<description><![CDATA[I believe Web Reputation is already a built-in tool for most major search engines such as Yahoo and Google. In the latter, when you search for a certain keyword, it will label websites that are known to have malicious codes and / or infected with malwares. 

Firefox also has this feature. The web browser will not load or display the content of websites that are known to infect its visitors with sorts of viruses.  

You should protect your business&#039; online reputation. It&#039;s an investment for the future.]]></description>
		<content:encoded><![CDATA[<p>I believe Web Reputation is already a built-in tool for most major search engines such as Yahoo and Google. In the latter, when you search for a certain keyword, it will label websites that are known to have malicious codes and / or infected with malwares. </p>
<p>Firefox also has this feature. The web browser will not load or display the content of websites that are known to infect its visitors with sorts of viruses.  </p>
<p>You should protect your business&#8217; online reputation. It&#8217;s an investment for the future.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Kevin Love</title>
		<link>http://www.gfi.com/blog/web-reputation-save-online-threats/comment-page-1/#comment-29889</link>
		<dc:creator>Kevin Love</dc:creator>
		<pubDate>Fri, 07 Oct 2011 21:02:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3504#comment-29889</guid>
		<description><![CDATA[Certainly an interesting concept, but how exactly is the data discerned? Is there a group or an organization that monitors and rates these things, or is it simply plugged in whenever a threat is posed?  I&#039;d be interested in learning a lot more about how exactly this works.]]></description>
		<content:encoded><![CDATA[<p>Certainly an interesting concept, but how exactly is the data discerned? Is there a group or an organization that monitors and rates these things, or is it simply plugged in whenever a threat is posed?  I&#8217;d be interested in learning a lot more about how exactly this works.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:15:14 by W3 Total Cache --