<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CyberAwake | Octagon Technology</title>
	<atom:link href="https://www.octagontech.com/tag/cyberawake/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.octagontech.com</link>
	<description>01522 797520</description>
	<lastBuildDate>Thu, 30 Jan 2025 14:54:24 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.octagontech.com/wp-content/uploads/2020/06/cropped-Logo-32x32.png</url>
	<title>CyberAwake | Octagon Technology</title>
	<link>https://www.octagontech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Nothing is true, everything is a scam (Email Phishing Primer pt.7)</title>
		<link>https://www.octagontech.com/2024/06/06/nothing-is-true-everything-is-a-scam/</link>
		
		<dc:creator><![CDATA[Ben]]></dc:creator>
		<pubDate>Thu, 06 Jun 2024 08:02:20 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber-attack]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[email threat]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9840</guid>

					<description><![CDATA[<img width="1024" height="1024" src="https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-1024x1024.jpg" class="attachment-large size-large wp-post-image" alt="Everything is a scam" style="float:left; margin:0 15px 15px 0;" decoding="async" fetchpriority="high" srcset="https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-1024x1024.jpg 1024w, https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-300x300.jpg 300w, https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-150x150.jpg 150w, https://www.octagontech.com/wp-content/uploads/2024/06/Picture1.jpg 1149w" sizes="(max-width: 1024px) 100vw, 1024px" /><p>Nothing is true, everything is a scam. While this is not terrible advice for the internet and life generally, in this case I am referring to electronic mail. Given the negligible cost of sending email and its ability to target millions, it is of course the perfect tool to trick, scam, steal and be downright [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/06/06/nothing-is-true-everything-is-a-scam/">Nothing is true, everything is a scam (Email Phishing Primer pt.7)</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Keep It Simple… Encryption (pt. 3)</title>
		<link>https://www.octagontech.com/2024/04/11/keep-it-simple-encryption-pt-3/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Thu, 11 Apr 2024 08:59:44 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[BitLOcker]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Microsoft OneNote]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[OneDrive]]></category>
		<category><![CDATA[OneNote]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Secrecy]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9767</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2024/04/pexels-ivo-brasil-6310044.webp" class="attachment-large size-large wp-post-image" alt="device encryption" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2024/04/pexels-ivo-brasil-6310044.webp 640w, https://www.octagontech.com/wp-content/uploads/2024/04/pexels-ivo-brasil-6310044-300x200.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>Encryption is the process of encoding information, converting it from plaintext into ciphertext, to protect it from unauthorised access. This process ensures that only those with the appropriate decryption key can access the original information, thereby maintaining confidentiality. Modern encryption techniques utilise complex algorithms and keys, making unauthorised decryption extremely difficult without the correct key. [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/04/11/keep-it-simple-encryption-pt-3/">Keep It Simple… Encryption (pt. 3)</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Let’s Talk About Your VPN</title>
		<link>https://www.octagontech.com/2024/01/18/lets-talk-about-your-vpn/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Thu, 18 Jan 2024 10:57:10 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[The Wednesday Bit]]></category>
		<category><![CDATA[Travelling]]></category>
		<category><![CDATA[virtual private network]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[Work Anywhere]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9686</guid>

					<description><![CDATA[<img width="800" height="600" src="https://www.octagontech.com/wp-content/uploads/2024/01/Pine-Lake-Resort-portable-office-with-a-VPN.webp" class="attachment-large size-large wp-post-image" alt="Pine Lake Resort portable office with a VPN" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2024/01/Pine-Lake-Resort-portable-office-with-a-VPN.webp 800w, https://www.octagontech.com/wp-content/uploads/2024/01/Pine-Lake-Resort-portable-office-with-a-VPN-300x225.webp 300w" sizes="(max-width: 800px) 100vw, 800px" /><p>I am on holiday for the next two weeks – some cold weather walking in the Lake District and the Cairngorms, whilst Diana stays back in the warm office – so it must be time to discuss VPN usage again. The photo above is the view whilst I write this article. A VPN &#8211; your [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/01/18/lets-talk-about-your-vpn/">Let’s Talk About Your VPN</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Defence-in-depth – Your Move</title>
		<link>https://www.octagontech.com/2023/09/06/defence-in-depth-your-move/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Wed, 06 Sep 2023 07:32:36 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber-attack]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Defence In Depth]]></category>
		<category><![CDATA[Defence-In-Depth]]></category>
		<category><![CDATA[email threat]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Insider threat]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Remote Monitoring And Management]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Security Operations Centre]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[SOC-as-a-Service]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9360</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2023/09/pexels-tima-miroshnichenko-10625979.webp" class="attachment-large size-large wp-post-image" alt="defence-in-depth your move" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2023/09/pexels-tima-miroshnichenko-10625979.webp 640w, https://www.octagontech.com/wp-content/uploads/2023/09/pexels-tima-miroshnichenko-10625979-300x200.webp 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /><p>Yesterday I wrote the opening chapter of this defence-in-depth article – I looked at how anti-virus protection can be side-stepped by threat actors and that staff cyber awareness training is needed to provide another layer to your defences. That was a human addition to your defence-in-depth and today we are going to look at more [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2023/09/06/defence-in-depth-your-move/">Defence-in-depth – Your Move</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Accountability &#8211; It Shows You are Watching.</title>
		<link>https://www.octagontech.com/2023/06/09/accountability-it-shows-you-are-watching/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Fri, 09 Jun 2023 09:37:50 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[authorisation]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cyber security investigation]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[Security Operations Centre as a Service]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[SOC-as-a-Service]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9252</guid>

					<description><![CDATA[<img width="600" height="379" src="https://www.octagontech.com/wp-content/uploads/2023/06/identity-cycle.webp" class="attachment-large size-large wp-post-image" alt="Authentication, Authorisation and Accountability lifecycle diagram" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2023/06/identity-cycle.webp 600w, https://www.octagontech.com/wp-content/uploads/2023/06/identity-cycle-300x190.webp 300w" sizes="auto, (max-width: 600px) 100vw, 600px" /><p>Authentication, Authorisation and Accountability. This is the third part of a three-part series looking at the basics of the cyber security principle of “AAA”. Day Three – Accountability Accountability is probably the least enforced part of our Triple A principle in most organisations. But if you do embrace it, it can have a powerful impact [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2023/06/09/accountability-it-shows-you-are-watching/">Accountability – It Shows You are Watching.</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Incident Response &#8211; Talk about bad timing!</title>
		<link>https://www.octagontech.com/2023/04/24/incident-response-talk-about-bad-timing/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Mon, 24 Apr 2023 07:00:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Smart Thinking]]></category>
		<category><![CDATA[Support]]></category>
		<category><![CDATA[Timing]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9165</guid>

					<description><![CDATA[<img width="640" height="959" src="https://www.octagontech.com/wp-content/uploads/2023/04/pexels-leeloo-thefirst-7873575.webp" class="attachment-large size-large wp-post-image" alt="Incident Response Training" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2023/04/pexels-leeloo-thefirst-7873575.webp 640w, https://www.octagontech.com/wp-content/uploads/2023/04/pexels-leeloo-thefirst-7873575-200x300.webp 200w" sizes="auto, (max-width: 640px) 100vw, 640px" /><p>In response to Clive’s Blog on Smart Thinking about incident response – he couldn’t have picked a worse time. Right in the middle of putting together and planning some of the largest projects we have in the pipeline and organising the day-to-day support work &#8211; I did not want to play! (Clive said he wouldn’t [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2023/04/24/incident-response-talk-about-bad-timing/">Incident Response – Talk about bad timing!</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Don’t Skip That Restart</title>
		<link>https://www.octagontech.com/2023/01/12/dont-skip-that-restart/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Thu, 12 Jan 2023 07:06:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Software Patches]]></category>
		<category><![CDATA[Updates]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=8965</guid>

					<description><![CDATA[<img width="698" height="523" src="https://www.octagontech.com/wp-content/uploads/2023/01/restart.webp" class="attachment-large size-large wp-post-image" alt="restart" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2023/01/restart.webp 698w, https://www.octagontech.com/wp-content/uploads/2023/01/restart-300x225.webp 300w" sizes="auto, (max-width: 698px) 100vw, 698px" /><p>Restarting&#160; &#8211; Welcome to our new blog Our blog is changing &#8211; more of our team, including our excellent support team, will be regularly contributing articles. Sharing their IT support advice and technology stories with you. However, the support team (and everyone else it seems) are busy this week moving a large office and launching [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2023/01/12/dont-skip-that-restart/">Don’t Skip That Restart</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
