<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: You’ve got All Your Security Technologies in Place… Now What?</title>
	<atom:link href="http://www.gfi.com/blog/you-have-all-your-security-technologies-in-place-now-what/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/you-have-all-your-security-technologies-in-place-now-what/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=you-have-all-your-security-technologies-in-place-now-what</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Ethel Camingue</title>
		<link>http://www.gfi.com/blog/you-have-all-your-security-technologies-in-place-now-what/comment-page-1/#comment-32463</link>
		<dc:creator>Ethel Camingue</dc:creator>
		<pubDate>Wed, 09 May 2012 01:26:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8397#comment-32463</guid>
		<description><![CDATA[I agree with Henry.  The HR Department should be tapped so if there is any mandate to follow certain security measures, enforcement won&#039;t be a problem. 

Additionally, they can provide insights on how the staff works.  As is often said, people still form 80% of any system.  The machines, the technology and everything else form only 20%.  Hence, user behavior should always be considered.

Consulting the different departments through their department heads would also be a good idea.  Any proposed system should be discussed first before deployment to condition the users and get their feedback and avoid any resentment or deployment resistance.]]></description>
		<content:encoded><![CDATA[<p>I agree with Henry.  The HR Department should be tapped so if there is any mandate to follow certain security measures, enforcement won&#8217;t be a problem. </p>
<p>Additionally, they can provide insights on how the staff works.  As is often said, people still form 80% of any system.  The machines, the technology and everything else form only 20%.  Hence, user behavior should always be considered.</p>
<p>Consulting the different departments through their department heads would also be a good idea.  Any proposed system should be discussed first before deployment to condition the users and get their feedback and avoid any resentment or deployment resistance.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sara James</title>
		<link>http://www.gfi.com/blog/you-have-all-your-security-technologies-in-place-now-what/comment-page-1/#comment-32083</link>
		<dc:creator>Sara James</dc:creator>
		<pubDate>Mon, 09 Apr 2012 03:28:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8397#comment-32083</guid>
		<description><![CDATA[To be able to define your user&#039;s behavior, proper and constant communication and coordination between the sys admin and other departments should be put into practice. I strongly believe that with this method observed in any given situation, there is a guarantee of lesser mistakes.

It is also an obligation for both sys admin and their users to observe their security policies with utmost supervision and understanding.No matter how we try to secure our networks, it is inevitable to encounter problems along the way.That is why it is best to be always on guard and diligent enough to monitor each other.]]></description>
		<content:encoded><![CDATA[<p>To be able to define your user&#8217;s behavior, proper and constant communication and coordination between the sys admin and other departments should be put into practice. I strongly believe that with this method observed in any given situation, there is a guarantee of lesser mistakes.</p>
<p>It is also an obligation for both sys admin and their users to observe their security policies with utmost supervision and understanding.No matter how we try to secure our networks, it is inevitable to encounter problems along the way.That is why it is best to be always on guard and diligent enough to monitor each other.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Henry Zachary</title>
		<link>http://www.gfi.com/blog/you-have-all-your-security-technologies-in-place-now-what/comment-page-1/#comment-32061</link>
		<dc:creator>Henry Zachary</dc:creator>
		<pubDate>Thu, 05 Apr 2012 14:34:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8397#comment-32061</guid>
		<description><![CDATA[If this seems out of your comfort zone as an admin, I always suggest cooperating with your HR department, as you can use your technical know-how and they can use concrete evidence of working with people to come up with a solution that is both a step forward in efficiency, and still keep security in mind and not overstep any boundaries.]]></description>
		<content:encoded><![CDATA[<p>If this seems out of your comfort zone as an admin, I always suggest cooperating with your HR department, as you can use your technical know-how and they can use concrete evidence of working with people to come up with a solution that is both a step forward in efficiency, and still keep security in mind and not overstep any boundaries.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:09:00 by W3 Total Cache --