<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy | Octagon Technology</title>
	<atom:link href="https://www.octagontech.com/our-blog/octagon-technology/privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.octagontech.com</link>
	<description>01522 797520</description>
	<lastBuildDate>Thu, 05 Feb 2026 12:41:03 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.octagontech.com/wp-content/uploads/2020/06/cropped-Logo-32x32.png</url>
	<title>Privacy | Octagon Technology</title>
	<link>https://www.octagontech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Are we really secure? </title>
		<link>https://www.octagontech.com/2026/02/16/are-we-really-secure/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Mon, 16 Feb 2026 09:00:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Technology Solutions]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=10406</guid>

					<description><![CDATA[<img width="1024" height="684" src="https://www.octagontech.com/wp-content/uploads/2026/02/image-1024x684.png" class="attachment-large size-large wp-post-image" alt="Blank Postit!" style="float:left; margin:0 15px 15px 0;" decoding="async" fetchpriority="high" srcset="https://www.octagontech.com/wp-content/uploads/2026/02/image-1024x684.png 1024w, https://www.octagontech.com/wp-content/uploads/2026/02/image-300x200.png 300w, https://www.octagontech.com/wp-content/uploads/2026/02/image.png 1047w" sizes="(max-width: 1024px) 100vw, 1024px" /><p>Most people would say yes, I have&#160;antivirus that comes with Windows, but what about your&#160;MS365 business platform, Is that secure also?&#160; Here’s&#160;a scenario:&#160; I login to my laptop as normal in the morning.&#160;Then for some reason someone logs in to my account from another country 10 seconds later. You are not likely to know this [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2026/02/16/are-we-really-secure/">Are we really secure? </a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Organising your Files</title>
		<link>https://www.octagontech.com/2025/01/17/organising-your-files/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Fri, 17 Jan 2025 11:33:40 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Technology Solutions]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Organising Files]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=10119</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2025/01/pexels-anete-lusina-4792285.jpg" class="attachment-large size-large wp-post-image" alt="Organising Files" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2025/01/pexels-anete-lusina-4792285.jpg 640w, https://www.octagontech.com/wp-content/uploads/2025/01/pexels-anete-lusina-4792285-300x200.jpg 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>Ever thought about organising your files and in what order? In this day and age things need to be organised and as part of January’s theme I thought I would share some insights about Sharepoint with you. It is always good to have a set order of files and folders which have specific permissions on [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2025/01/17/organising-your-files/">Organising your Files</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Technological Singularity</title>
		<link>https://www.octagontech.com/2024/08/14/technological-singularity/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Wed, 14 Aug 2024 13:51:18 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[A.I.]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9957</guid>

					<description><![CDATA[<img width="1024" height="1024" src="https://www.octagontech.com/wp-content/uploads/2024/08/aimachine1.jpg" class="attachment-large size-large wp-post-image" alt="technological singularity" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2024/08/aimachine1.jpg 1024w, https://www.octagontech.com/wp-content/uploads/2024/08/aimachine1-300x300.jpg 300w, https://www.octagontech.com/wp-content/uploads/2024/08/aimachine1-150x150.jpg 150w" sizes="(max-width: 1024px) 100vw, 1024px" /><p>The concept of the technological singularity – a point where artificial intelligence surpasses human intelligence – is a topic of both excitement and concern in the tech community. As we advance towards increasingly sophisticated AI, the possibility of reaching a singularity becomes more tangible. This hypothetical moment in time is often seen as a turning [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/08/14/technological-singularity/">Technological Singularity</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>SOC-Backed AV</title>
		<link>https://www.octagontech.com/2024/06/18/soc-backed-av/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Tue, 18 Jun 2024 08:14:09 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Governance and Compliance]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9860</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2024/06/pexels-roger-brown-3435524-5149756.jpg" class="attachment-large size-large wp-post-image" alt="SOC-Backed AV" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/06/pexels-roger-brown-3435524-5149756.jpg 640w, https://www.octagontech.com/wp-content/uploads/2024/06/pexels-roger-brown-3435524-5149756-300x200.jpg 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /><p>In the intricate web of cybersecurity, a Security Operations Center (SOC) serves as the nerve center, orchestrating the defense mechanisms against cyber threats. The integration of Antivirus (AV) solutions within a SOC framework elevates an organisation&#8217;s security posture to new heights. A SOC-backed AV system is not just about detecting and removing malicious software; it&#8217;s [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/06/18/soc-backed-av/">SOC-Backed AV</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Sender Policy Framework &#8211; Phishing Email Primer (pt.10)</title>
		<link>https://www.octagontech.com/2024/06/11/sender-policy-framework/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Tue, 11 Jun 2024 14:14:16 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Governance and Compliance]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[email threat]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9835</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2024/06/pexels-mike-van-schoonderwalt-1884800-5503875.jpg" class="attachment-large size-large wp-post-image" alt="Sender Policy Framwork" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/06/pexels-mike-van-schoonderwalt-1884800-5503875.jpg 640w, https://www.octagontech.com/wp-content/uploads/2024/06/pexels-mike-van-schoonderwalt-1884800-5503875-300x200.jpg 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /><p>In the digital age, where business communication is predominantly conducted via email, the security and authenticity of these communications cannot be overstated. A correct business email setup, including Sender Policy Framework (SPF) records, is not just a technical detail but a fundamental aspect of a company&#8217;s online presence and reputation. SPF records are a type [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/06/11/sender-policy-framework/">Sender Policy Framework – Phishing Email Primer (pt.10)</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Security Policy</title>
		<link>https://www.octagontech.com/2024/04/02/cyber-security-policy/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Tue, 02 Apr 2024 10:06:28 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Governance and Compliance]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9747</guid>

					<description><![CDATA[<img width="1024" height="683" src="https://www.octagontech.com/wp-content/uploads/2024/03/pexels-thisisengineering-3861969-1024x683.jpg" class="attachment-large size-large wp-post-image" alt="Cyber Security and Humans" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/03/pexels-thisisengineering-3861969-1024x683.jpg 1024w, https://www.octagontech.com/wp-content/uploads/2024/03/pexels-thisisengineering-3861969-300x200.jpg 300w, https://www.octagontech.com/wp-content/uploads/2024/03/pexels-thisisengineering-3861969-1536x1024.jpg 1536w, https://www.octagontech.com/wp-content/uploads/2024/03/pexels-thisisengineering-3861969-2048x1366.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><p>In today&#8217;s digital landscape, the significance of implementing a robust cyber security policy cannot be overstated, particularly for companies operating within the UK. Such a policy serves as the cornerstone of an organisation&#8217;s defence against the ever-evolving threats posed by cybercriminals. A comprehensive cyber security policy should encompass a clear outline of employee responsibilities, data [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/04/02/cyber-security-policy/">Cyber Security Policy</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>What is Multi-Factor Authentication?</title>
		<link>https://www.octagontech.com/2024/02/22/what-is-multi-factor-authentication/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Thu, 22 Feb 2024 10:18:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Governance and Compliance]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9714</guid>

					<description><![CDATA[<img width="615" height="544" src="https://www.octagontech.com/wp-content/uploads/2024/02/2fa.jpg" class="attachment-large size-large wp-post-image" alt="" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/02/2fa.jpg 615w, https://www.octagontech.com/wp-content/uploads/2024/02/2fa-300x265.jpg 300w" sizes="auto, (max-width: 615px) 100vw, 615px" /><p>Multi-Factor Authentication (MFA), also known as Two-Factor Authentication (2FA), is a method of authorising a login using multiple pieces of authentication. The pieces are usually defined as something the user has and something the user knows. For example, withdrawing money from a cash machine requires your valid credit or debit card (what you have) and [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/02/22/what-is-multi-factor-authentication/">What is Multi-Factor Authentication?</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Defence in Depth Part 4 Overview</title>
		<link>https://www.octagontech.com/2024/02/13/defence-in-depth-part-4-overview/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Tue, 13 Feb 2024 10:50:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9692</guid>

					<description><![CDATA[<img width="366" height="327" src="https://www.octagontech.com/wp-content/uploads/2024/02/Onion.jpg" class="attachment-large size-large wp-post-image" alt="Defence in Depth" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/02/Onion.jpg 366w, https://www.octagontech.com/wp-content/uploads/2024/02/Onion-300x268.jpg 300w" sizes="auto, (max-width: 366px) 100vw, 366px" /><p>If you have been following our posts on Defence in Depth you will be gaining an understanding of some of the products and services we can provide. This article is about the layers that need to be addressed in order to meet your Cyber Security goals. At the bottom of the article there are links [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/02/13/defence-in-depth-part-4-overview/">Defence in Depth Part 4 Overview</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Defence in Depth Part 2</title>
		<link>https://www.octagontech.com/2024/01/15/defence-in-depth-part-2/</link>
		
		<dc:creator><![CDATA[Ben]]></dc:creator>
		<pubDate>Mon, 15 Jan 2024 10:30:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9665</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2024/01/pexels-pixabay-274886.jpg" class="attachment-large size-large wp-post-image" alt="Defence in Depth" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/01/pexels-pixabay-274886.jpg 640w, https://www.octagontech.com/wp-content/uploads/2024/01/pexels-pixabay-274886-300x200.jpg 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /><p>Welcome back! If you haven’t read part 1 about “Defence in Depth” please check it out, otherwise let&#8217;s look at the next stage of defence in the cyber security theatre of war. Remote Monitoring and Management (RMM) RMM is a toolbox of programs, a swiss army package, taking care of lots of tasks which historically [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/01/15/defence-in-depth-part-2/">Defence in Depth Part 2</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
