<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>email threat | Octagon Technology</title>
	<atom:link href="https://www.octagontech.com/tag/email-threat/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.octagontech.com</link>
	<description>01522 797520</description>
	<lastBuildDate>Thu, 01 Aug 2024 11:11:29 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.octagontech.com/wp-content/uploads/2020/06/cropped-Logo-32x32.png</url>
	<title>email threat | Octagon Technology</title>
	<link>https://www.octagontech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Copilot AI and the Phishing Email</title>
		<link>https://www.octagontech.com/2024/08/01/copilot-ai-and-the-phishing-email/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 05:01:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Copilot]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[email threat]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Word]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9917</guid>

					<description><![CDATA[<img width="1024" height="1024" src="https://www.octagontech.com/wp-content/uploads/2024/07/AI-on-holiday.webp" class="attachment-large size-large wp-post-image" alt="creat an image of AI on holiday on a beach in the sun with a cold beer and a Kindle" style="float:left; margin:0 15px 15px 0;" decoding="async" fetchpriority="high" srcset="https://www.octagontech.com/wp-content/uploads/2024/07/AI-on-holiday.webp 1024w, https://www.octagontech.com/wp-content/uploads/2024/07/AI-on-holiday-300x300.webp 300w, https://www.octagontech.com/wp-content/uploads/2024/07/AI-on-holiday-150x150.webp 150w" sizes="(max-width: 1024px) 100vw, 1024px" /><p>Martin and Ben are the Octagon Technology newsletter editors this month and they have chosen artificial intelligence (Copilot AI) as their theme. They asked me to write the first article. Copilot AI and Word I had thought to write about how I use Copilot in Microsoft Edge, to help me with parts of the articles [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/08/01/copilot-ai-and-the-phishing-email/">Copilot AI and the Phishing Email</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Sender Policy Framework &#8211; Phishing Email Primer (pt.10)</title>
		<link>https://www.octagontech.com/2024/06/11/sender-policy-framework/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Tue, 11 Jun 2024 14:14:16 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Governance and Compliance]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[email threat]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9835</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2024/06/pexels-mike-van-schoonderwalt-1884800-5503875.jpg" class="attachment-large size-large wp-post-image" alt="Sender Policy Framwork" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2024/06/pexels-mike-van-schoonderwalt-1884800-5503875.jpg 640w, https://www.octagontech.com/wp-content/uploads/2024/06/pexels-mike-van-schoonderwalt-1884800-5503875-300x200.jpg 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>In the digital age, where business communication is predominantly conducted via email, the security and authenticity of these communications cannot be overstated. A correct business email setup, including Sender Policy Framework (SPF) records, is not just a technical detail but a fundamental aspect of a company&#8217;s online presence and reputation. SPF records are a type [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/06/11/sender-policy-framework/">Sender Policy Framework – Phishing Email Primer (pt.10)</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Nothing is true, everything is a scam (Email Phishing Primer pt.7)</title>
		<link>https://www.octagontech.com/2024/06/06/nothing-is-true-everything-is-a-scam/</link>
		
		<dc:creator><![CDATA[Ben]]></dc:creator>
		<pubDate>Thu, 06 Jun 2024 08:02:20 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber-attack]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[email threat]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9840</guid>

					<description><![CDATA[<img width="1024" height="1024" src="https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-1024x1024.jpg" class="attachment-large size-large wp-post-image" alt="Everything is a scam" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-1024x1024.jpg 1024w, https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-300x300.jpg 300w, https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-150x150.jpg 150w, https://www.octagontech.com/wp-content/uploads/2024/06/Picture1.jpg 1149w" sizes="(max-width: 1024px) 100vw, 1024px" /><p>Nothing is true, everything is a scam. While this is not terrible advice for the internet and life generally, in this case I am referring to electronic mail. Given the negligible cost of sending email and its ability to target millions, it is of course the perfect tool to trick, scam, steal and be downright [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/06/06/nothing-is-true-everything-is-a-scam/">Nothing is true, everything is a scam (Email Phishing Primer pt.7)</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Defence-in-depth – Your Move</title>
		<link>https://www.octagontech.com/2023/09/06/defence-in-depth-your-move/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Wed, 06 Sep 2023 07:32:36 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber-attack]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Defence In Depth]]></category>
		<category><![CDATA[Defence-In-Depth]]></category>
		<category><![CDATA[email threat]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Insider threat]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Remote Monitoring And Management]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Security Operations Centre]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[SOC-as-a-Service]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9360</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2023/09/pexels-tima-miroshnichenko-10625979.webp" class="attachment-large size-large wp-post-image" alt="defence-in-depth your move" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2023/09/pexels-tima-miroshnichenko-10625979.webp 640w, https://www.octagontech.com/wp-content/uploads/2023/09/pexels-tima-miroshnichenko-10625979-300x200.webp 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /><p>Yesterday I wrote the opening chapter of this defence-in-depth article – I looked at how anti-virus protection can be side-stepped by threat actors and that staff cyber awareness training is needed to provide another layer to your defences. That was a human addition to your defence-in-depth and today we are going to look at more [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2023/09/06/defence-in-depth-your-move/">Defence-in-depth – Your Move</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
