<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: When You Become the Enemy</title>
	<atom:link href="http://www.gfi.com/blog/when-you-become-the-enemy/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/when-you-become-the-enemy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=when-you-become-the-enemy</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Dante Soriano</title>
		<link>http://www.gfi.com/blog/when-you-become-the-enemy/comment-page-1/#comment-33301</link>
		<dc:creator>Dante Soriano</dc:creator>
		<pubDate>Mon, 28 May 2012 14:07:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8623#comment-33301</guid>
		<description><![CDATA[No one would want to be &quot;unreputable&quot;, especially if you&#039;re a big company with a respected brand.

IT administrators are brand keepers, as well.  They should be in constant watch if any of the company email users, or the company website has been compromised.  Being a marketing manager, I know the perils of doing &quot;damage control.&quot;  Prevention is still the key.  That&#039;s why I also keep a close watch over not just with how our site looks and what it says but also if in any way, it can be hacked and be made an instrument of malicious attacks.

But, so often, the crises managers are the one who gets the hero&#039;s prize, not those who prevented a crisis in the first place.  Oh, well.]]></description>
		<content:encoded><![CDATA[<p>No one would want to be &#8220;unreputable&#8221;, especially if you&#8217;re a big company with a respected brand.</p>
<p>IT administrators are brand keepers, as well.  They should be in constant watch if any of the company email users, or the company website has been compromised.  Being a marketing manager, I know the perils of doing &#8220;damage control.&#8221;  Prevention is still the key.  That&#8217;s why I also keep a close watch over not just with how our site looks and what it says but also if in any way, it can be hacked and be made an instrument of malicious attacks.</p>
<p>But, so often, the crises managers are the one who gets the hero&#8217;s prize, not those who prevented a crisis in the first place.  Oh, well.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/when-you-become-the-enemy/comment-page-1/#comment-32532</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Fri, 18 May 2012 13:29:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8623#comment-32532</guid>
		<description><![CDATA[It&#039;s a bit hard to take sides on this to be honest. True, people who are security minded are likely to understand that a breach cannot be 100% prevented by anyone.

Problem is you&#039;re very likely to have customers that arent security minded and all they will see is that if they give you their details they might end up with their details compromised because if a hacker could do it once, they can likely do it again.

Of course on the other hand it will look worse if it becomes apparent that you&#039;re trying to hide it or if it is obvious you&#039;re trying to down play the situation.]]></description>
		<content:encoded><![CDATA[<p>It&#8217;s a bit hard to take sides on this to be honest. True, people who are security minded are likely to understand that a breach cannot be 100% prevented by anyone.</p>
<p>Problem is you&#8217;re very likely to have customers that arent security minded and all they will see is that if they give you their details they might end up with their details compromised because if a hacker could do it once, they can likely do it again.</p>
<p>Of course on the other hand it will look worse if it becomes apparent that you&#8217;re trying to hide it or if it is obvious you&#8217;re trying to down play the situation.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ian Davis</title>
		<link>http://www.gfi.com/blog/when-you-become-the-enemy/comment-page-1/#comment-32530</link>
		<dc:creator>Ian Davis</dc:creator>
		<pubDate>Fri, 18 May 2012 12:45:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8623#comment-32530</guid>
		<description><![CDATA[I agree with Ryan that the way you handle this in PR terms is also very important. Many security breaches go unreported, unless hackers themselves brag about them because many companies will not admit for dear life that they have been hacked. Probably they are afraid that when they admit it, this will make them look incompetent but everybody who has even a vague idea of security knows no matter how good you are, you can never be sure you are 100 per cent hacker-proof.]]></description>
		<content:encoded><![CDATA[<p>I agree with Ryan that the way you handle this in PR terms is also very important. Many security breaches go unreported, unless hackers themselves brag about them because many companies will not admit for dear life that they have been hacked. Probably they are afraid that when they admit it, this will make them look incompetent but everybody who has even a vague idea of security knows no matter how good you are, you can never be sure you are 100 per cent hacker-proof.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ryan Hemke</title>
		<link>http://www.gfi.com/blog/when-you-become-the-enemy/comment-page-1/#comment-32524</link>
		<dc:creator>Ryan Hemke</dc:creator>
		<pubDate>Thu, 17 May 2012 19:38:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8623#comment-32524</guid>
		<description><![CDATA[It&#039;s also important to remember that the way you express this information to the public is equally important. More damaging than the files being distributed to users through a malicious attack is the damage your reputation and brand can face if you can&#039;t face the press and tell them why it happened, how fast the response was, and why it won&#039;t happen again.]]></description>
		<content:encoded><![CDATA[<p>It&#8217;s also important to remember that the way you express this information to the public is equally important. More damaging than the files being distributed to users through a malicious attack is the damage your reputation and brand can face if you can&#8217;t face the press and tell them why it happened, how fast the response was, and why it won&#8217;t happen again.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:08:16 by W3 Total Cache --