<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Interxect Services Limited</title>
	<atom:link href="https://www.interxect.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.interxect.com</link>
	<description>Helping You Use Information Technology Productively</description>
	<lastBuildDate>Mon, 27 Jun 2016 15:02:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.interxect.com/main/wp-content/uploads/2019/08/cropped-site_icon-32x32.png</url>
	<title>Interxect Services Limited</title>
	<link>https://www.interxect.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">113413426</site>	<item>
		<title>Technology Trends for 2016 3 technologies businesses should look out for in the new year</title>
		<link>https://www.interxect.com/technology-trends-for-2016/</link>
					<comments>https://www.interxect.com/technology-trends-for-2016/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Tue, 05 Jan 2016 01:00:04 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business IT]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Augmented Reality]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[trends]]></category>
		<category><![CDATA[Virtual Reality]]></category>
		<guid isPermaLink="false">http://www.interxect.com/?p=1148</guid>

					<description><![CDATA[What are the technology trends that businesses should look out for in 2016?]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" src="https://www.interxect.com/main/wp-content/uploads/2016/01/winding-road-snow-1-250x200.jpg" alt="winding-road-snow" width="250" height="200" class="alignleft size-post-image wp-image-1153" />Information technology is growing faster and faster every year. The past year was no different, and the upcoming year will continue the pattern, regardless of the economy.</p>
<p>Based on the progress that was made in 2015, There are a few great things that businesses could look forward to in the new year.</p>
<p>Here are what I consider the major technology trends to look at in 2016.<span id="more-1148"></span></p>
<h1>The Trends</h1>
<h3>The Internet of Things</h3>
<p>I predicted that 2015 was going to be a growth year for the IoT, and, sure enough, it has been.</p>
<p>Cisco suggests that in ten years there are going to be over 50 Billion devices connected to the Internet and the entire market will be worth US$14 Trillion. That&#8217;s no small figure.</p>
<p>And more so the security and privacy concerns, with <a href="http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/">cars being hacked</a>, and <a href="http://www.huffingtonpost.com/entry/hello-barbie-security-concerns_565c4921e4b072e9d1c24d22">Barbie dolls possibly being able to leak private information</a>.</p>
<p>I see no end to the hype, and I predict that this trend will continue. More and more &#8220;internet connected&#8221; devices will proliferate the market including wearables, along with more security concerns.</p>
<p>We may actually see some standards happening this year.</p>
<h3>Virtual and Augmented Reality</h3>
<p>Virtual reality is about creating and seeing virtual worlds. Augmented reality is about adding more information to the world that we live in.</p>
<p>And both is expected to take a pretty big leap this year.</p>
<p>While VR and AR have been around for decades (anyone remembers the movie, the Lawnmower Man?), with expected commercial releases this year of <a href="https://www.oculus.com/en-us/">Facebook&#8217;s Oculus Rift</a> and <a href="https://www.microsoft.com/microsoft-hololens/en-us">Microsoft&#8217;s HoloLens</a>, there is a greater chance of these technologies going mainstream.</p>
<p>While Google Glass didn&#8217;t fare too well, I do think that the releases by Facebook and Microsoft will help move the technology along. Besides, Google took a step back and brought you <a href="https://www.google.com/get/cardboard/">Google Cardboard</a>.</p>
<h3>Artificial Intelligence</h3>
<p>AI was a huge deal this year.</p>
<p>First <a href="http://www.wired.com/2015/11/google-open-sources-its-artificial-intelligence-engine/">Google open-sourced TensorFlow</a>, the software engine that it uses for its deep learning services. Then later, a group that includes Elon Musk and Sam Altman unveiled a <a href="http://www.wired.com/2015/12/elon-musks-billion-dollar-ai-plan-is-about-far-more-than-saving-the-world/">US$1 billion non-profit called OpenAI</a> that will share all of its AI research to the world.</p>
<p>Of course, Google and OpenAI aren&#8217;t the only players in the game, and other players such as IBM&#8217;s Watson has been around for quite some time. But these developments open AI to everyone, and will help push development along.</p>
<p>AI has been a touchy subject. <a href="http://www.newsweek.com/stephen-hawking-warns-artificial-intelligence-could-end-humanity-332082">Stephen Hawking</a>, <a href="http://www.bbc.com/news/31047780">Bill Gates</a>, <a href="http://www.theguardian.com/technology/2015/jul/27/musk-wozniak-hawking-ban-ai-autonomous-weapons">Elon Musk, and Steve Wozniak</a> have all sounded alarms over the rise of AI, including AI in warfare. This is one of the reasons that Musk put money behind OpenAI to begin with.</p>
<p>AI along with advances in robotics will make automation easier by creating intelligent robots. It means that routine manual labour, including dangerous tasks, may soon be able to be performed by robots. <a href="http://www.wired.com/brandlab/2015/04/rise-machines-future-lots-robots-jobs-humans/">This automation is causing concerns among some people</a>. Oxford University researchers have estimated that 47 percent of U.S. jobs could be automated within the next two decades.</p>
<p>I, on the other hand, see huge potential for both business and society as a whole.</p>
<h1>Trends that didn&#8217;t happen in 2015</h1>
<p>Before we go, let&#8217;s take a look at my 2015 predictions that didn&#8217;t quite pan out, but I still think might do well this year.</p>
<h3>Wider adoption of enterprise wireless networks</h3>
<p>The adoption rate has been slow for the newer IEEE 802.11ac standard, albeit growing. The slow adoption has been blamed for either the lack of endpoints that support the standard, as well as the cost of the access points. However, growth is expected to pick up this year as more end-points are released that support the AC standard, and the access points become cheaper.</p>
<h3>Software Defined Networking</h3>
<p>SDN in the data centre didn&#8217;t happen as I expected. While development of an SDN standard still continues, the adoption of SDN has been slow.</p>
<p>Slow growth in the data centre can be attributed to lack of readiness in both the infrastructure and the people, the cost of implementation, the cost of related hardware and software, and a lack of perceived value of such systems.</p>
<p>One area where it has grown though is in the Software Defined WAN. Quite a few providers have solutions to help manage WAN traffic such as Cisco&#8217;s Intelligent WAN. Carriers have also invested heavily into SDN and Network Functions Virtualisation (NFV).</p>
<p>At this point, I still expect growth of SDN in the data centre, but it will be slow.</p>
<h3>Greater IT security within organisations</h3>
<p>Against my hopes, the rash of breaches in 2014 didn&#8217;t quite stem the breaches in 2015. In fact, there seemed to have many more <a href="http://www.zdnet.com/pictures/biggest-hacks-security-data-breaches-2015/">high profile breaches</a>. The Ashley Madison hack was probably the most famous, and apparently <a href="http://www.bbc.com/news/technology-34106482">didn&#8217;t seem to stem the growth of users</a> allegedly looking for extra-marital affairs.</p>
<p>But the most serious hack, in my opinion, is the <a href="http://www.wired.com/2015/11/vtech-childrens-gadget-maker-hack-5-million-accounts/">VTech data breach</a>, where 5 million customer accounts and kids&#8217; user profiles were breached. Luckily, it appears as there was no ill-intent to the breach, however, it should make us wonder in this connected world, how great is the threat to our children.</p>
<p>I could only hope that 2016 would bring some sense to people to properly secure their data.</p>
<h1>More?</h1>
<p>Do you think there are any trends that I missed in my list? Or do you think I&#8217;m wrong about anything here?</p>
<p>Let me know in the comments section below.</p>
<p><strong>I take this opportunity to wish you a happy and prosperous 2016. Be safe out there.</strong></p>
<p>Original article: <a href="https://www.interxect.com/technology-trends-for-2016/" rel="bookmark" title="Permanent link to 'Technology Trends for 2016 <small class="subtitle">3 technologies businesses should look out for in the new year</small>'">Technology Trends for 2016 <small class="subtitle">3 technologies businesses should look out for in the new year</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/technology-trends-for-2016/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1148</post-id>	</item>
		<item>
		<title>Stupid people and data security Why we can&#039;t totally trust people with information security</title>
		<link>https://www.interxect.com/stupid-people-and-data-security/</link>
					<comments>https://www.interxect.com/stupid-people-and-data-security/#comments</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 29 Jan 2015 01:01:56 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=1097</guid>

					<description><![CDATA[Should you trust your data security to people? Let me tell you a story that has nothing to do with IT...]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" src="https://www.interxect.com/main/wp-content/uploads/2015/01/Stupid_people-250x200.jpg" alt="Simple PIN code" width="250" height="200" class="alignleft size-post-image wp-image-1098" />People are stupid!</p>
<p>Before you click away, let me tell you a story&#8230;<span id="more-1097"></span></p>
<p>I went to a conference recently and got a few pens and a couple of Hershey&#8217;s chocolate minis. I put it in my pocket and went my merry way.</p>
<p>When I reached home, I pulled out the pens from my pocket only to find some brown stuff on one. My immediate thought was that it was the chocolate melted and leaked out onto the pen.</p>
<p>To test this theory, I licked it, and&#8230; let&#8217;s leave it at that for now.</p>
<p>I could have just smelt it, or not bother and wipe it off, but I chose to taste it instead.</p>
<p>I say this not to gross you out, but to say, that no matter how smart you may think you are, you do some really stupid things sometimes.</p>
<p>The same thing happens with emails with seductive subject lines. Or links that promises something good if you click it. Things that lead to only bad things for users, and your data.</p>
<p>You would think that incidents such as these would never happen?</p>
<p>After all, you&#8217;ve spent loads of time training users. You&#8217;ve handed out lots of information about being safe on-line. You&#8217;ve shared instances of breaches due to human error.</p>
<p>But they do.</p>
<p>We should know better. It should be an automatic feeling that clicking that link or opening that attachment is a bad idea.</p>
<p>But we do it anyway.</p>
<p>That is why I say that awareness training is part of an arsenal that you have to stave off malicious attacks. But there&#8217;s bound to be some human error sometime, and you have to be ready for that.</p>
<p>So you have to have proper and updated anti-virus and anti-malware software. You need to put in that next generation firewall protection on the corporate network, and more firewall protection on PCs. You must have properly functioning backup systems in place to protect your data.</p>
<p>Technology needs to get better. Law enforcement needs to be stronger.</p>
<p>You still need security awareness training, and if the human being was perfect, then awareness training may be all that was required to protect your data.</p>
<p>But we are not.</p>
<p>As for that brown stuff&#8230; it was chocolate. But what if it wasn&#8217;t?&#8230; <em>EWWW!</em></p>
<p>Original article: <a href="https://www.interxect.com/stupid-people-and-data-security/" rel="bookmark" title="Permanent link to 'Stupid people and data security <small class="subtitle">Why we can't totally trust people with information security</small>'">Stupid people and data security <small class="subtitle">Why we can't totally trust people with information security</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/stupid-people-and-data-security/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1097</post-id>	</item>
		<item>
		<title>Protect your business from Ransomware 8 things you can do to protect yourself</title>
		<link>https://www.interxect.com/protect-your-business-from-ransomware/</link>
					<comments>https://www.interxect.com/protect-your-business-from-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Tue, 02 Dec 2014 00:07:48 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=1076</guid>

					<description><![CDATA[Ransomware can cripple your business. What is ransomware? And what can you do about it?]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-post-image wp-image-1077" src="https://www.interxect.com/main/wp-content/uploads/2014/12/Ransom-250x200.jpg" alt="Mobbing and stress at work" width="250" height="200" />Do viruses and other malware scare you?</p>
<p>I recently was called in by a non-profit saying that there was an issue with their file server, and they suspected malicious intent by somebody on the inside.</p>
<p>After a short investigation, I found the issue was the CryptoLocker ransomware. The malware encrypted all the files in the servers, which were shared via mapped drives.<span id="more-1076"></span></p>
<p>I explained that it was not sabotage by anyone, but an unfortunate mistake by one of their users.</p>
<p>There was little I could do as they took too long to seek help. The time to get the files decrypted had passed and they couldn&#8217;t pay the money. Their only option was to restore from backups.</p>
<h2>What is Ransomware</h2>
<p>Ransomware is malicious software that when executed proceeds to extort money from you in some way. Examples of ransomware include:</p>
<ul>
<li>Fake antivirus scanners that claim to have found malware on your PC and demands money from you to clean them up. If you don&#8217;t pay it annoys you with pop-ups or may even prevent you from using your PC.</li>
<li>Fake alerts that claim that your machine has been locked by federal police for illicit content on your PC and says that you need to pay a fine.</li>
<li>Encrypting ransomware is the worst of the bunch. It encrypts certain files like files in your documents folder and on mapped drives, and then demands payment to decrypt it. CryptoLocker demands a payment of anywhere from US$500 to US$1500 in Bitcoin to decrypt your files. The use of Bitcoin makes the transaction difficult to trace.</li>
</ul>
<p>You can remove the first two types using tools from reputable anti-virus makers and pose little risk other than a headache.</p>
<p>Encrypting ransomware like CryptoLocker, however, is the most dangerous. It uses public/private key encryption, which makes decryption impossible without the private key.</p>
<p>The ransomware scourge is truly frightening and I saw firsthand the effect it can have. Larger organisations may have the technology to reduce the risk, but how can smaller organisation do that?</p>
<p>Several organisations, when faced with the CryptoLocker malware, paid the ransom. This cost less than it would to restore from backups, which can takes days, and cost thousands more in downtime and overtime costs.</p>
<p>All authorities say that you should not pay the ransom, even for the CryptoLocker malware.</p>
<p><strong>I agree.</strong></p>
<p>Paying the ransom money only encourages these criminal organisations to continue their enterprise. It also goes towards financing the development of even worse tools.</p>
<h2>Protecting your Business</h2>
<p>So how can organisations protect themselves from this risk?</p>
<ol>
<li><strong>Use anti-virus software as a preliminary defence.</strong> AV software offers some level of protection from known attacks. Heuristic detection for unknown attacks is also getting better. But AV may still be ineffective against new versions of ransomware software, otherwise called zero-day software.</li>
<li><strong>Be cautious of email, even from known people, asking you to open files or run software to view something.</strong> Scrutinise grammar and salutations. For example, if someone you know consistently calls you John, but the email addresses you as Jonathon, or Mr Smith, that should raise red flags. As a default, you should not open any files unless you are expecting it, or you call the person first to verify that it is legit.</li>
<li><strong>Change your operating system preferences to show the entire file name, including extensions.</strong> This will help you determine if a file is an executable. Executable files have .exe or .com extensions. Malicious files often come with names such as document.pdf.exe, or spreadsheet.xls.com with icons that show up as a pdf or excel file. If you &#8220;hide extensions of known types&#8221; then the files will show up as document.pdf or spreadsheet.xls, making it difficult to identify it as a malicious file.</li>
<li><strong>Heed warnings of anti-virus software or operating systems whenever you try to open a file.</strong> With user access control (UAC) on Microsoft Windows enabled, users are prompted if they want to run a particular application. Or an AV firewall may ask if you want to allow a particular file or application to access the internet. If you didn&#8217;t intend to run a file or application, then click no.</li>
<li><strong>Configure your firewalls and antivirus to block email attachments with executable files if it is able to.</strong> There should be no reason for executable files to be sent to you via email. If someone has to send you an executable file, let them use ftp or a Dropbox link or similar, and then call the person to find out if they intended to send you those files.</li>
<li><strong>Train your users to recognise threats.</strong> I admit that this is becoming increasingly difficult to do. I&#8217;ve seen some examples of malicious sites that were hard to discover as such. And I&#8217;m a security expert, far less a chance for the typical computer user to figure that out. However, awareness training for users helps reduce risks of those sites that they can identify, so it&#8217;s still worth doing.</li>
<li><strong>Avoid mapped drives.</strong> This is hard for some organisations, but many malicious applications (not just Crypto Locker) scans all local drives, and will see the mapped drive as a local drive. If mapped drives are not used, then they can&#8217;t be attacked. This is not to say that another version of CryptoLocker won&#8217;t be released that will scan the network and enumerate files, but for now, eliminating mapped drives can mitigate the risk.</li>
<li><strong>Use the principle of least privilege.</strong> This means that users are given the privileges to only do what they are required to do, and no more. This involves the creation of &#8220;whitelists&#8221; of what applications they can run. So if they accidentally try to run a malware nothing will happen.</li>
</ol>
<p>Beyond these steps, there is little else any organisation can do. It’s up to the authorities to take down these criminal organisations, which are often on the other side of the globe.</p>
<p>The internet can be a dangerous place, but you can safely use it for personal and business benefit once you take the proper precautions.</p>
<p><strong>Be safe out there.</strong></p>
<p>Original article: <a href="https://www.interxect.com/protect-your-business-from-ransomware/" rel="bookmark" title="Permanent link to 'Protect your business from Ransomware <small class="subtitle">8 things you can do to protect yourself</small>'">Protect your business from Ransomware <small class="subtitle">8 things you can do to protect yourself</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/protect-your-business-from-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1076</post-id>	</item>
		<item>
		<title>The Heartbleed Bug: What is it and what to do about it Don&#039;t let it ruin your day</title>
		<link>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/</link>
					<comments>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Fri, 11 Apr 2014 02:30:18 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[heartbleed bug]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=964</guid>

					<description><![CDATA[The Heartbleed Bug announced on Monday 7th April has far reaching effects. See what it is about and what you can do about it.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-medium wp-image-965" alt="heartbleed" src="https://www.interxect.com/main/wp-content/uploads/2014/04/heartbleed-247x300.png" width="247" height="300" />There is a serious bug out there that can compromise your data and you probably wouldn&#8217;t know it.<span id="more-964"></span></p>
<h2>The Bleeding Heart Bug</h2>
<p>The Heartbleed bug (CVE-2014-0160) was <a href="https://www.openssl.org/news/secadv_20140407.txt" target="_blank">publicly disclosed on Monday</a> and affects specific versions of the OpenSSL application. OpenSSL is a generally used open-source implementation of the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) Cryptographic method and is used on about 66% of all public websites. The bug has been present in the software since December 2011.</p>
<p>The bug is not a weakness in SSL/TLS itself, but rather is bug in OpenSSL implementation of it that can potentially allow attackers to access the unencrypted data stored within a server&#8217;s memory. With enough data, an attacker can find out your server encryptions keys, your passwords and any other information passed over the communication. The attackers can then use the compromised keys to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.</p>
<h2>Who are vulnerable?</h2>
<p>Because of the widespread adoption of the OpenSSL software and the ability to be attacked without leaving a trace, it means that we are all vulnerable because you can&#8217;t tell if your data has been compromised.</p>
<p>Not only websites are vulnerable, as many hardware and software vendors implement use OpenSSL in their products. <a href="http://www.networkworld.com/news/2014/041014-heartbleed-cisco-juniper-280593.html" target="_blank">Cisco and Juniper has listed advisories warning of the bug in their products</a>.</p>
<h2>What should you do?</h2>
<p>All businesses, website owners and users of affected services should take action on this bug.</p>
<p><strong>Step 1: Determine if any of your servers may be affected.</strong></p>
<p>You can use the <a href="http://filippo.io/Heartbleed/" target="_blank">check script on Filippo Valsorda&#8217;s web site</a> to check your public services.</p>
<p>Check with vendors if any of your internal services may be affected.</p>
<p><a href="http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/" target="_blank">C|NET has a list of the top 100 sites around the web to determine if they have been patched or may be affected</a></p>
<p>Website owners with their sites on hosted services should check with their service provider if they have taken action on the bug and if they were ever vulnerable.</p>
<p><strong>Step 2: Patch services for which you are able to patch yourself.</strong></p>
<p>These include any owned servers or virtual servers that you use, or internal, private servers or devices.</p>
<p><strong>Step 3: Re-Key your SSL Certificates</strong></p>
<p>This involves regenerating and reinstalling the private keys on your servers. While the risk may be small, the fact that you will not know if your key was compromised, this is a recommended precautionary step.</p>
<p><strong>Step 4: Change your passwords</strong></p>
<p>It&#8217;s important that you change any passwords that you may have on any of the affected systems AFTER you have patched OpenSSL and re-keyed your certificates. Doing so before you performed the prior steps means that if your keys were compromised, an attacked would be able to discover your new passwords.</p>
<p>If you are a service user and don&#8217;t run any services yourself, find out from the provider if they were vulnerable and if they patched their services (or use the check script in Step 1).</p>
<h2>Don&#8217;t Panic</h2>
<p>While the bug is serious, it&#8217;s important to not panic. Keep a clear head and follow the steps.</p>
<p>For more information about the bug and to keep updated <a href="http://heartbleed.com/" target="_blank">check out heartbleed.com</a>.</p>
<p>Original article: <a href="https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/" rel="bookmark" title="Permanent link to 'The Heartbleed Bug: What is it and what to do about it <small class="subtitle">Don't let it ruin your day</small>'">The Heartbleed Bug: What is it and what to do about it <small class="subtitle">Don't let it ruin your day</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">964</post-id>	</item>
		<item>
		<title>Should you outsource your IT Security? There may be advantages to be had after all!</title>
		<link>https://www.interxect.com/should-you-outsource-your-it-security/</link>
					<comments>https://www.interxect.com/should-you-outsource-your-it-security/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 21 Nov 2013 00:00:23 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business IT]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[MSSP]]></category>
		<category><![CDATA[outsourcing]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[processes]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[service provider]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=873</guid>

					<description><![CDATA[More and more businesses are considering Managed Security Service Providers to fill the gaps in their IT security. While I am cautious of this, you will see that there are many advantages.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-874" alt="Outsource vs inhouse" src="https://www.interxect.com/main/wp-content/uploads/2013/11/outsource-inhouse-250x200.jpg" width="250" height="200" />There is a growing trend in businesses to outsource their IT Security to Managed Security Service Providers (MSSP). I&#8217;ll be upfront and state that I was not a big fan of this, as I believed that IT security is too important to pass off to a 3rd party, especially with the financial institutions who I mainly work with. But there is a growing body of research that finds that there are some areas where it may be worthwhile considering outsourcing.<span id="more-873"></span></p>
<h2>What does an MSSP do?</h2>
<p>MSSPs provide a variety of services, such as:</p>
<ul>
<li>Security monitoring – monitoring of firewalls, intrusion detection/prevention systems (IDS/IPS), system logs, etc.</li>
<li>Managed Spam Services – scanning of email for Spam and malicious content</li>
<li>Managed Storage Services – services such as backup/restore, archiving for compliance purposes, or disaster recovery services.</li>
<li>Threat Intelligent – aggregate warning system based on feedback from multiple end-users.</li>
<li>Compliance auditing – auditing for compliance with government or other regulations</li>
<li>Vulnerability assessments and Penetration testing – scanning and testing of systems for vulnerabilities</li>
<li>Managed Network Services – monitoring of networks for performance and outage issues</li>
<li>Identity and Access Management – services allowing authentication across heterogeneous systems, while maintaining compliance requirements</li>
</ul>
<p>MSSPs are growing, and Gartner believes that the <a href="http://www.gartner.com/newsroom/id/2616115" target="_blank">Managed Security Services (MSS) market will be worth US$2.1b in 2013, and projected to reach US$3.1b in 2013</a>.</p>
<h2>My concerns on IT Security Outsourcing</h2>
<p>Firstly, let me mention my concerns about outsourcing the IT security function.</p>
<ol>
<li>Accidental/Intentional leaking or theft of secret information by agents of the MSSP. This is my greatest concern, although it probably has the lowest chances of happening. Contrary to popular belief, few security professionals or agencies are willing to risk their reputations to steal or leak data, but it can happen (think of Edward Snowden). A MSSP may have access to a lot of systems and data, and does pose a risk. Capturing this risk can be difficult, as you can monitor for unauthorised access, but how do you monitor for access to data that the MSSP has to access to perform their duty?</li>
<li>The MSSP goes out of business. Don&#8217;t think that this can&#8217;t happen, because <a title="The Dark Side of the Cloud: IBM Partner Gives Folks Two Weeks to Move Data" href="http://www.wired.com/search?gs=The+Dark+Side+of+the+Cloud+IBM+Partner+Gives+Folks+Two+Weeks+to+Move+Data" target="_blank">it has happened before</a>, and it will happen again. What happens when your MSSP goes dark, do you have a contingency? Without the experience in-house, and the time it would take to find another MSSP, you will be placed in a very risky situation.</li>
<li>The MSSP fails to perform as expected. So you have a breach, and customer data is purloined, while your MSSP was supposed to be monitoring for intrusions. Who is held responsible? You can outsource your activities, but you can&#8217;t outsource your responsibilities; you are ultimately accountable for securing your systems.</li>
</ol>
<h2>Are there advantages?</h2>
<p>There are several advantages of MSSP.</p>
<ol>
<li>Lower cost. This is often the main advantage cited by enterprises for going with an MSSP, but, I warn you, should not be the only reason for outsourcing. Because of economies of scale, a MSSP can charge a fraction of what it would take to outfit your organisation – hardware, software and people – to provide the services provided by the MSSP.</li>
<li>Greater expertise. Because a MSSP may be specialised, they are more likely to have a higher calibre of security professional within their team. Additionally, because they are exposed to the systems of other organisations, they can develop best practices that they could then use for your organisation.</li>
<li>Greater intelligence. Again, the MSSP has data coming in from several organisations, and are in a position to capture events before they strike your enterprise. They could even develop new ways of analysing data to improve detection of threats.</li>
<li>Greater scalability. The service of an MSSP can be scaled up or down with little effort of the organisation.</li>
</ol>
<h2>Can you have your cake and eat it too?</h2>
<p>Now, you have to admit, those are pretty good advantages. So how can you get those advantages while addressing the risks?</p>
<p>Firstly, build your own capabilities. To discover possible leaks or attempts mean that you must have the skills necessary in-house to do that. This team does not have to be big – 1 or 2 persons – as the bulk of the operational work will be performed by the MSSP. The in-house team will be responsible for managing the IT security systems, and ensuring that the MSSP is on the up and up.</p>
<p>Secondly, keep your IT security management in-house. Outsource the monitoring and testing activities such as monitoring of system logs and IDS/IPS systems, and vulnerability and penetration testing, but keep the management and configuration of systems being monitored or testing with your in-house staff.</p>
<p>Thirdly, build a relationship with the MSSP and audit them regularly, to ensure that they have the proper policies in place and that they are following them. Also, check their audited financials to look out for red flags pointing to a failing business model.</p>
<p>Lastly, build your service level agreements and payment contracts based on performance. That is, that your MSSP must perform to a certain standard to get remunerated for their services. These standards must be SMART – Specific, Measurable, Attainable, Realistic and Time-Related – and reasonable. Remember, that when negotiating with an MSSP, that this is a partnership, not a battle; always aim for win-win.</p>
<h2>So&#8230;</h2>
<p>At first I was extremely wary of outsourcing IT security functions. I still take the position that if an organisation is able to, then it is preferable to have an in-house IT security team for all aspects of IT security. But the more that I look at the services that MSSPs provide, and the benefits that enterprises can obtain, there is a strong case for outsourcing some aspects that an organisation is unable to undertake.</p>
<p>Original article: <a href="https://www.interxect.com/should-you-outsource-your-it-security/" rel="bookmark" title="Permanent link to 'Should you outsource your IT Security? <small class="subtitle">There may be advantages to be had after all!</small>'">Should you outsource your IT Security? <small class="subtitle">There may be advantages to be had after all!</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/should-you-outsource-your-it-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">873</post-id>	</item>
		<item>
		<title>Have You Ever Had a Data Breach? Think hard before you answer that question.</title>
		<link>https://www.interxect.com/have-you-ever-had-a-data-breach/</link>
					<comments>https://www.interxect.com/have-you-ever-had-a-data-breach/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 14 Nov 2013 00:00:18 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[analytics]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=864</guid>

					<description><![CDATA[Breaches have now become an almost inevitable part of data networks. If you've never found a breach, it does not mean that you haven't been breached.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-867" alt="Breach" src="https://www.interxect.com/main/wp-content/uploads/2013/11/Fotolia_48723133_XS-250x200.jpg" width="250" height="200" />&#8220;Have you ever had a data security breach?&#8221;</p>
<p>Whenever I ask prospects this question and they tell me, &#8220;No!&#8221; – and most prospects do say no – I laugh heartily&#8230; in my head of course.</p>
<p>Breaches have now become an almost inevitable part of data networks. You can&#8217;t prove a negative, so you can&#8217;t say that you&#8217;ve never been breached, but that you&#8217;ve never discovered one&#8230; yet. Or perhaps they have conveniently defined what a data security breach is so that they don&#8217;t have to call a breach as one.<span id="more-864"></span></p>
<p>A data security breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an unauthorised individual. This unauthorised individual could be a malicious attacker, or an internal employee, and you should be monitoring for both.</p>
<p>You would find though, that many enterprises are not monitoring for internal breaches, and focus on external attacks. However, external breaches are becoming increasingly difficult to detect. The <a href="http://www2.trustwave.com/rs/trustwave/images/2013-Global-Security-Report.pdf" target="_blank">Trustwave 2013 Global Security Report</a> found that 64% of the attacks on those surveyed took more than three months to contain, with 14% taking up to 2 years, and 5% even longer. The <a href="http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf" target="_blank">Verizon 2013 Data Breach Investigations Report</a> found that the discovery of 66% of breaches of those surveyed, took months or more.</p>
<p>Targeted attacks are some of the most difficult, as the attackers are willing to invest both time and money for a much larger payoff. These attacks, often called Advanced Persistent Threats (APT), may take place over several days, weeks or even months and use evasive techniques to avoid detection with the aim to create a connection that they could continually siphon information from the infiltrated network. And don&#8217;t believe that these attacks cannot happen to you, as <a title="Zeus Malware Reboot | SMEs and Small Financial Institutions Beware" href="https://www.interxect.com/main/2013/06/zeus-malware-reboot/" target="_blank">SMEs are also being targeted</a>.</p>
<p>The problem is that current technology may not be enough to discover these attacks, because they take place over a long period of time, the traffic may seem benign, or for the most, a nuisance. Security Information and Event Management (SIEM) software was supposed to help with this, but it may not be enough. Security Analytics now offers the best promise for detecting these attacks as they analyse vast amounts of data to alert on possible security events, but it&#8217;s still a developing technology.</p>
<p>For now, your best protection is to follow standard security practices such as defence-in-depth, the principle of least privileges and keeping your systems updated and patched. Also train your users to practice safe computing.</p>
<p>So next time someone asks if your data has ever been breached, if you&#8217;ve never discovered one, say, &#8220;We&#8217;ve never found any evidence of a data breach!&#8221; To say otherwise would be lying.</p>
<p>Original article: <a href="https://www.interxect.com/have-you-ever-had-a-data-breach/" rel="bookmark" title="Permanent link to 'Have You Ever Had a Data Breach? <small class="subtitle">Think hard before you answer that question.</small>'">Have You Ever Had a Data Breach? <small class="subtitle">Think hard before you answer that question.</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/have-you-ever-had-a-data-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">864</post-id>	</item>
		<item>
		<title>The Evolution of the Firewall How firewalls are changing to fight against new threats</title>
		<link>https://www.interxect.com/the-evolution-of-the-firewall/</link>
					<comments>https://www.interxect.com/the-evolution-of-the-firewall/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 07 Nov 2013 00:00:33 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[firewalls]]></category>
		<category><![CDATA[Information technology]]></category>
		<category><![CDATA[NGFW]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[UTM]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=859</guid>

					<description><![CDATA[Where is that old stalwart of data network security - the firewall - heading?]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-860" alt="Robot Evolution" src="https://www.interxect.com/main/wp-content/uploads/2013/11/Robot_Evolution-250x200.jpg" width="250" height="200" />The network firewall was once the pillar of your data network security, protecting you from the evils of the outside world. It no longer seems as sexy.</p>
<p>A friend of mine recently quipped, &#8220;Do people still depend on firewalls for security?&#8221; I think he was alluding to the idea that the firewall plays a far lesser role in protecting your network as it once did. But it still does play a role.<span id="more-859"></span></p>
<p>The firewall is still your network&#8217;s first line of defence from outside threats. However, with security threats evolving, they are becoming harder to block at the firewall level. Even though a threat may not be advanced, it may be hard to discern from harmless activities. For example, how can a user determine a malicious PDF file from the harmless ones? The same goes for network traffic, how can a firewall determine malicious web traffic, from harmless ones? Intrusion detection and prevention systems (IDS/IPS) were developed to counter these attacks and were either additional devices or modules in firewalls.</p>
<p>But the IDS/IPS were always considered and configured separately from the firewall. Then enter the Next Generation Firewalls (NGFW). <a href="http://blogs.gartner.com/greg_young/2009/10/15/defining-the-next-generation-firewall-research-note-the-liner-notes/" target="_blank">The NGFW was coined by Gartner Research</a> and has a defining feature of the IDS/IPS features being integrated within the firewall and not as an add-on. Specifically, Gartner defines a NGFW as having the following minimum features:</p>
<ul>
<li>Standard first-generation firewall capabilities such as packet filtering, network address translation (NAT), stateful inspection, etc.</li>
<li>Integrated IPS rather than co-located services. Someone configuring rules on the firewall should also be able to configure the IPS at the same time without going to another module.</li>
<li>Application awareness and full stack visibility so that it&#8217;s able to discern the different services within an application regardless of the port that it operates on.</li>
<li>Security intelligence whereby it may use an external database to help make optimal blocking decisions.</li>
<li>Supports upgrade paths for new techniques to address future threats.</li>
</ul>
<p>I don&#8217;t know why they call it the next generation firewall. What would they call the generation that comes right after? The next next generation firewall? Or perhaps NGFW2? Anyway, that&#8217;s beside the point.</p>
<p>I also buy into this view that this is where firewalls should be evolving. NGFWs don&#8217;t only have the ability to simply threat protection, but also to speed up inspection due to its single pass nature (traffic is inspected once, not inspected by the firewall, then passed to the IPS for inspection).</p>
<p>I got into a heated discussion with a <a href="http://www.fortinet.com/" target="_blank">Fortinet</a> engineer about NGFW and UTMs (Unified Threat Management) devices. I said that while UTMs may have a place now, the NGFW is where enterprises should be heading. He said it sounds like I&#8217;ve been brainwashed by <a href="https://www.paloaltonetworks.com/" target="_blank">Palo Alto Networks</a>. I haven&#8217;t, but I like the direction that they are heading.</p>
<p>Palo Alto has the advantage of not having a legacy product and starting with a fairly blank slate. They are disadvantaged by a lack of maturity. But they are a new kid, and I think the technology has a lot of promise.</p>
<p>With threats constantly evolving, and with such a large attack space for internal networks, we need to re-evaluate the ways we protect our data networks. We shouldn&#8217;t get rid of the firewall, but we need to alter the way it functions all together to protect us from new threats. NGFWs gives us new hope for the firewall and for protecting our perimeter.</p>
<p>Seriously consider NGFWs for your next firewall upgrade.</p>
<p>Original article: <a href="https://www.interxect.com/the-evolution-of-the-firewall/" rel="bookmark" title="Permanent link to 'The Evolution of the Firewall <small class="subtitle">How firewalls are changing to fight against new threats</small>'">The Evolution of the Firewall <small class="subtitle">How firewalls are changing to fight against new threats</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/the-evolution-of-the-firewall/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">859</post-id>	</item>
		<item>
		<title>Humans are the Weakest Links in IT Security And you should not take them for granted!</title>
		<link>https://www.interxect.com/humans-are-the-weakest-links-in-it-security/</link>
					<comments>https://www.interxect.com/humans-are-the-weakest-links-in-it-security/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 17 Oct 2013 01:57:43 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business IT]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Information technology]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=838</guid>

					<description><![CDATA[Employees continue to be the greatest source of security breaches in enterprises according to a report from Forrester Research.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-671" alt="IT Security" src="https://www.interxect.com/main/wp-content/uploads/2013/02/Fotolia_40120476_XS-250x200.jpg" width="250" height="200" />Many businesses and enterprises focus on protecting their networks and data from external IT security threats, with little focus on internal threats, opting to ‘trust&#8217; the internal users. However, your employees can be more dangerous to your data, and cause the most data breaches.<span id="more-838"></span></p>
<p>The recently released <a href="http://www.forrester.com/Understand+The+State+Of+Data+Security+And+Privacy+2013+To+2014/fulltext/-/E-RES82021" target="_blank">&#8220;Understand the State of Data Security and Privacy&#8221; report</a> found that 36% of data breaches were caused by inadvertent misuse of data and 35% were caused by malicious internal users. Last year, those figures were 27% and 12% respectively.</p>
<p>I usually take all of these figures here with a pinch of salt, but I do know from experience that enterprises take a lax attitude when it comes to internal security. The main issue in this case seems to be a lack of training in security awareness and policies. The report stated that 42% of the respondents had received training on how to remain secure at work, and only 57% said that they were aware of the security policies of the company. Educating users on how to approach computer use and to protect themselves from cyber-threats is necessary.</p>
<p>There has been voices denouncing the effectiveness of training users in computer security, such as <a href="http://www.darkreading.com/hacked-off/on-security-awareness-training/240151108" target="_blank">here</a> and <a href="http://www.csoonline.com/article/711412/why-you-shouldn-t-train-employees-for-security-awareness" target="_blank">here</a>. But this is a fallacy and it supposes that the training is the be all and end all of IT security, but it&#8217;s really just intended to be another layer of defence. IT Security is about reducing risks, and that&#8217;s what user education is for.</p>
<p>Some advantages of user awareness education are:</p>
<ul>
<li>It helps users to be vigilant about computer use and possible security risks</li>
<li>It can be a low effort, high impact way of protecting your data</li>
<li>It may improve the relationship between users and IT if done right</li>
<li>It can be transformative as users take the lessons to other facets of the organisation or even their lives</li>
</ul>
<p>I won&#8217;t claim that user education is some sort of magic bullet, but it can be a useful weapon against data breaches.</p>
<p>There is another part of the Forrester report that is worth mentioning – that IT departments tend to think to tactical about IT security, choosing instead to focus on technology, such as anti-virus and data loss protection (DLP), to protect against inadvertent actions of users. Even security awareness training for users is a tactic all in itself. What companies need to have is a strategy for protecting their data.</p>
<p>The framework that Forrester defined seems like a good place to start, as it is similar to other frameworks I&#8217;ve seen and used. At a high level:</p>
<ol>
<li>Classify your data and define which ones you wish to protect.</li>
<li>Determine how data is being used and what mechanisms are available to protect it.</li>
<li>Implement the protections.</li>
</ol>
<p>Remember that your data is a valuable asset, if not the most valuable asset, to your organisation and you must protect it.</p>
<p>What do you think? Do you believe that your company will benefit from security awareness education, or do you think that money and effort is better spent elsewhere? Chime in below.</p>
<p>Original article: <a href="https://www.interxect.com/humans-are-the-weakest-links-in-it-security/" rel="bookmark" title="Permanent link to 'Humans are the Weakest Links in IT Security <small class="subtitle">And you should not take them for granted!</small>'">Humans are the Weakest Links in IT Security <small class="subtitle">And you should not take them for granted!</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/humans-are-the-weakest-links-in-it-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">838</post-id>	</item>
		<item>
		<title>Office Politics can hurt your IT Here&#039;s what you can do about it...</title>
		<link>https://www.interxect.com/office-politics-can-hurt-your-it/</link>
					<comments>https://www.interxect.com/office-politics-can-hurt-your-it/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Wed, 07 Aug 2013 02:27:18 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business IT]]></category>
		<category><![CDATA[Business Tips]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Information technology]]></category>
		<category><![CDATA[office]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Soft skills]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=804</guid>

					<description><![CDATA[Office politics are present in every organisation and in every instance, it has the power to poison the company from the inside out. When it happens within the IT department, not only can it demoralise staff, but it also puts your data and business at risk. Minimise the politics, and you increase the effectiveness of your IT department.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-808" alt="Office-Tug-of-War" src="https://www.interxect.com/main/wp-content/uploads/2013/08/Office-Tug-of-War-250x200.jpg" width="250" height="200" />Office politics are present in every organisation with more than one employee. And in every instance, it has the power to poison the company from the inside out, killing it slowly.</p>
<p>I&#8217;m sure you&#8217;ve also seen it happen at the department level – power plays between employees. I&#8217;ve seen it before where staff members will not do certain tasks, see issues but will not resolve it, or worst, sabotage efforts of another to make them seem incompetent.</p>
<p>Such negative activities reduce the capability and productivity of the department. And in the IT department, it can be hazardous for your data, which can become pawns in this dangerous game of chess play.</p>
<p>So what can you do about it?<span id="more-804"></span></p>
<h2>1. Do not get involved</h2>
<p>Often the manager or team supervisor will get involved with the gossip and negativity with the intention of being &#8220;friends&#8221;, but this just adds fuel to the flames. Don&#8217;t do that! Nothing demoralises a department or business more than the leadership getting involved in the politics, even if done behind closed doors.</p>
<p>So what to do instead?</p>
<h2>2. Listen and Be Open</h2>
<p>When there is conflict or negativity, listen carefully to your staff and team. Do not interject or offer advice, no matter how much you want to. Get the person talking about what is going on. Why do they feel the way they do? What do they think cause it? What do they want to happen? What would they like the environment to feel like?</p>
<p>Do not judge. Just listen and take notes (after asking if it is okay to do so first).</p>
<h2>3. Mirror and empathise</h2>
<p>This is a very tricky area here. You do not want to make light of anyone&#8217;s issues, but also you do not want to agree that they are right (unless for sure they are). Instead empathise with the way they feel saying something, &#8220;and this whole situation has you feeling&#8230; angry? Disappointed?&#8221; or &#8220;I understand that you may be feeling frustrated&#8221;. The idea here is to let the other person feel felt.</p>
<h2>4. Formulate an action plan</h2>
<p>Once the person is talking and is open to dialog, formulate an action plan as to what needs to happen next. It might be tempting to bring the other person in, but I suggest that you talk to the other person in private first to get them open to dialog as well. Once that happens, then you can have both in the room with you as a mediator. Mediation is another skill that I will address in another article, but for now, know that it is something that may be required.</p>
<p>Ensure to set deadlines to when certain things are to happen so that there is not another issue of unmet expectations.</p>
<h2>Issues addressed, what next?</h2>
<p>Once major issues have been addresses and things have settled down, it may be beneficial to do the following.</p>
<h3>Understand the informal organisational structure</h3>
<p>Not all power and influence comes from position and job title. Many people have influence outside of position or may have the ears of people in high positions. There may be cliques and groups, and others who seem dead set to put one against another. By understanding these linkages, you will be in a better position to head-off potential problems.</p>
<h3>Keep your ears to the ground</h3>
<p>Listen out for grumblings among employees and staff, and be ready to address any rumour circulating before they become uncontrollable. In the absence of open dialogue, presumptions run wild. Keep friendships with people who are always in tune to the grape vine; this is usually the receptionist, but could also be admin staff.</p>
<h3>Build relationships at all levels</h3>
<p>By building relationships at all levels of the business, you can have greater resources at your disposal to address issues that come along. You can also learn from others how best to approach certain issues so you can benefit from that knowledge and handle the politics more effectively.<br />
Learn to recognise and treat all peers and employees fairly.</p>
<p>&nbsp;</p>
<p>You may never be able to eliminate office politics from the work environment, but you can work to minimise the negative effects. And if you can minimise office politics within the IT department, you have one less thing affecting your data to worry about.</p>
<p>Do you have a story to share about how you handled your internal politics? Or how do you feel about the advice that I&#8217;ve given? Please leave your comments below.</p>
<p>Be sure to sign up for our e-mail list where we plan to send out regular tips on how you can improve IT and your business along with it.</p>
<p>Original article: <a href="https://www.interxect.com/office-politics-can-hurt-your-it/" rel="bookmark" title="Permanent link to 'Office Politics can hurt your IT <small class="subtitle">Here's what you can do about it...</small>'">Office Politics can hurt your IT <small class="subtitle">Here's what you can do about it...</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/office-politics-can-hurt-your-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">804</post-id>	</item>
		<item>
		<title>Cisco to Acquire Sourcefire, the Makers of Open Source Snort and Clam AV for $2.7B Hopes to Bolster Security Strategy</title>
		<link>https://www.interxect.com/cisco-to-acquire-sourcefire-the-makers-of-open-source-snort-and-clam-av-for-2-7b/</link>
					<comments>https://www.interxect.com/cisco-to-acquire-sourcefire-the-makers-of-open-source-snort-and-clam-av-for-2-7b/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Tue, 23 Jul 2013 13:02:12 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[acquisition]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Clam AV]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[Intrusion prevention system]]></category>
		<category><![CDATA[IPS]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[snort]]></category>
		<category><![CDATA[Sourcefire]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=797</guid>

					<description><![CDATA[Cisco Systems today announced an agreement to purchase Sourcefire, the makers of the open source intrusion detection/protection system, Snort. The deal is reported to be $2.7 billion in cash.]]></description>
										<content:encoded><![CDATA[<p><a href="http://thevarguy.com/open-source-application-software-companies/cisco-serving-open-source"><img loading="lazy" decoding="async" class="size-medium wp-image-798 alignleft" alt="cisco-logo" src="https://www.interxect.com/main/wp-content/uploads/2013/07/cisco-logo-300x199.jpg" width="300" height="199" srcset="https://www.interxect.com/main/wp-content/uploads/2013/07/cisco-logo-300x199.jpg 300w, https://www.interxect.com/main/wp-content/uploads/2013/07/cisco-logo-768x510.jpg 768w, https://www.interxect.com/main/wp-content/uploads/2013/07/cisco-logo-1024x680.jpg 1024w, https://www.interxect.com/main/wp-content/uploads/2013/07/cisco-logo.jpg 1600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>Cisco Systems today announced an agreement to purchase <a href="http://www.sourcefire.com/" target="_blank">Sourcefire</a>, the makers of the open source intrusion detection/protection system, Snort, and anti-virus, Clam AV. The deal is reported to be worth about US$2.7 billion in cash.<span id="more-797"></span></p>
<p>Sourcefire also has in its portfolio next-generation firewalls and advanced malware protection solutions.</p>
<p>Cisco hopes to improve it&#8217;s security solutions with the new acquisition, although I am not very clear as to how. At the moment, I am tending to believe that this is an acquihire, for Cisco to gain Sourcefire&#8217;s strong cadre of security experts.</p>
<p>My concern now is what will happen to the open source solutions that Sourcefire currently provides. Snort and Clam AV have proven very popular within the security industry. Snort especially is used in many solutions to provide excellent IDS/IPS to networks. Fortunately, because it&#8217;s open source software (OSS), it can be forked to create another product based on the code, but without the right support may just languish.</p>
<p>Cisco used to be very open contributing greatly to the open source community, and still continues to once it deals with open standards, but from my own observations, I see Cisco closing avenues where there is direct competition. On the plus side, Cisco may have some technologies that will improve their current security offerings, so customers who are into Cisco may benefit.</p>
<p>I&#8217;ll adopt a wait and see approach for now, but I expect stocks of Cisco to rise with this acquisition.</p>
<p>Read Cisco&#8217;s <a href="http://blogs.cisco.com/news/cisco-bolsters-security-strategy-with-agreement-to-acquire-sourcefire/" target="_blank">announcement of the acquisition here</a>.</p>
<p>Original article: <a href="https://www.interxect.com/cisco-to-acquire-sourcefire-the-makers-of-open-source-snort-and-clam-av-for-2-7b/" rel="bookmark" title="Permanent link to 'Cisco to Acquire Sourcefire, the Makers of Open Source Snort and Clam AV for $2.7B <small class="subtitle">Hopes to Bolster Security Strategy</small>'">Cisco to Acquire Sourcefire, the Makers of Open Source Snort and Clam AV for $2.7B <small class="subtitle">Hopes to Bolster Security Strategy</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/cisco-to-acquire-sourcefire-the-makers-of-open-source-snort-and-clam-av-for-2-7b/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">797</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Database Caching 2/59 queries in 0.054 seconds using Disk (Request-wide modification query)

Served from: www.interxect.com @ 2025-06-13 07:58:49 by W3 Total Cache
-->