<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>authorisation | Octagon Technology</title>
	<atom:link href="https://www.octagontech.com/tag/authorisation/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.octagontech.com</link>
	<description>01522 797520</description>
	<lastBuildDate>Mon, 29 Sep 2025 16:37:05 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.octagontech.com/wp-content/uploads/2020/06/cropped-Logo-32x32.png</url>
	<title>authorisation | Octagon Technology</title>
	<link>https://www.octagontech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hack Me If You Can! What’s your excuse? </title>
		<link>https://www.octagontech.com/2025/07/07/hack-me-if-you-can-whats-your-excuse/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Mon, 07 Jul 2025 10:36:59 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AAA]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[authorisation]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=10374</guid>

					<description><![CDATA[<img width="1024" height="357" src="https://www.octagontech.com/wp-content/uploads/2025/06/Hack-me-if-you-can-1024x357.webp" class="attachment-large size-large wp-post-image" alt="Hack me if you can" style="float:left; margin:0 15px 15px 0;" decoding="async" fetchpriority="high" srcset="https://www.octagontech.com/wp-content/uploads/2025/06/Hack-me-if-you-can-1024x357.webp 1024w, https://www.octagontech.com/wp-content/uploads/2025/06/Hack-me-if-you-can-300x105.webp 300w, https://www.octagontech.com/wp-content/uploads/2025/06/Hack-me-if-you-can-1536x535.webp 1536w, https://www.octagontech.com/wp-content/uploads/2025/06/Hack-me-if-you-can.webp 1684w" sizes="(max-width: 1024px) 100vw, 1024px" /><p>“I am too busy for cyber security.”&#160; “It will never happen to me.”&#160; “My organisation is too small for the hackers to bother with.”&#160; “HMRC hacked for £42M because someone’s login was compromised.” FAKE NEWS!!!!&#160; “Cyber security is hard – when I remember, I will get someone else to fix it for us.”&#160; “We pay [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2025/07/07/hack-me-if-you-can-whats-your-excuse/">Hack Me If You Can! What’s your excuse? </a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Accountability &#8211; It Shows You are Watching.</title>
		<link>https://www.octagontech.com/2023/06/09/accountability-it-shows-you-are-watching/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Fri, 09 Jun 2023 09:37:50 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[authorisation]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cyber security investigation]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[Security Operations Centre as a Service]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[SOC-as-a-Service]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9252</guid>

					<description><![CDATA[<img width="600" height="379" src="https://www.octagontech.com/wp-content/uploads/2023/06/identity-cycle.webp" class="attachment-large size-large wp-post-image" alt="Authentication, Authorisation and Accountability lifecycle diagram" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2023/06/identity-cycle.webp 600w, https://www.octagontech.com/wp-content/uploads/2023/06/identity-cycle-300x190.webp 300w" sizes="(max-width: 600px) 100vw, 600px" /><p>Authentication, Authorisation and Accountability. This is the third part of a three-part series looking at the basics of the cyber security principle of “AAA”. Day Three – Accountability Accountability is probably the least enforced part of our Triple A principle in most organisations. But if you do embrace it, it can have a powerful impact [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2023/06/09/accountability-it-shows-you-are-watching/">Accountability – It Shows You are Watching.</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Security, Compliance and “AAA” in Action</title>
		<link>https://www.octagontech.com/2021/04/26/microsoft-365-for-business-security-and-compliance-aaa/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 08:09:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AAA]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[authorisation]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Governance]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=5163</guid>

					<description><![CDATA[<img width="500" height="333" src="https://www.octagontech.com/wp-content/uploads/2021/04/security-compliance-500x333.jpg" class="attachment-large size-large wp-post-image" alt="Security and Compliance" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2021/04/security-compliance-500x333.jpg 500w, https://www.octagontech.com/wp-content/uploads/2021/04/security-compliance-300x200.jpg 300w, https://www.octagontech.com/wp-content/uploads/2021/04/security-compliance-1536x1024.jpg 1536w, https://www.octagontech.com/wp-content/uploads/2021/04/security-compliance-1200x800.jpg 1200w, https://www.octagontech.com/wp-content/uploads/2021/04/security-compliance.jpg 1980w" sizes="(max-width: 500px) 100vw, 500px" /><p>AAA = Authentication, Authorisation and Accountability AAA is a vital step in any cyber security strategy is: AAA, the first two As gives you the ability to control who has access to your information and what information they are able to see. The third A is accountability – without this the first two As are [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2021/04/26/microsoft-365-for-business-security-and-compliance-aaa/">Security, Compliance and “AAA” in Action</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
