<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>passwords | Octagon Technology</title>
	<atom:link href="https://www.octagontech.com/tag/passwords/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.octagontech.com</link>
	<description>01522 797520</description>
	<lastBuildDate>Wed, 17 Apr 2024 09:16:36 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.octagontech.com/wp-content/uploads/2020/06/cropped-Logo-32x32.png</url>
	<title>passwords | Octagon Technology</title>
	<link>https://www.octagontech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Keep It Simple… Encryption (pt. 3)</title>
		<link>https://www.octagontech.com/2024/04/11/keep-it-simple-encryption-pt-3/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Thu, 11 Apr 2024 08:59:44 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[BitLOcker]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Microsoft OneNote]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[OneDrive]]></category>
		<category><![CDATA[OneNote]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Secrecy]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9767</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2024/04/pexels-ivo-brasil-6310044.webp" class="attachment-large size-large wp-post-image" alt="device encryption" style="float:left; margin:0 15px 15px 0;" decoding="async" fetchpriority="high" srcset="https://www.octagontech.com/wp-content/uploads/2024/04/pexels-ivo-brasil-6310044.webp 640w, https://www.octagontech.com/wp-content/uploads/2024/04/pexels-ivo-brasil-6310044-300x200.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>Encryption is the process of encoding information, converting it from plaintext into ciphertext, to protect it from unauthorised access. This process ensures that only those with the appropriate decryption key can access the original information, thereby maintaining confidentiality. Modern encryption techniques utilise complex algorithms and keys, making unauthorised decryption extremely difficult without the correct key. [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/04/11/keep-it-simple-encryption-pt-3/">Keep It Simple… Encryption (pt. 3)</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Mobile Phone Security &#8211; Three Simple Steps for Best Practice</title>
		<link>https://www.octagontech.com/2023/07/28/mobile-phone-security-three-simple-steps-for-best-practice/</link>
		
		<dc:creator><![CDATA[Diana]]></dc:creator>
		<pubDate>Fri, 28 Jul 2023 07:51:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[mobile devices]]></category>
		<category><![CDATA[mobile phones]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9316</guid>

					<description><![CDATA[<img width="640" height="365" src="https://www.octagontech.com/wp-content/uploads/2023/07/pexels-pixabay-207589.webp" class="attachment-large size-large wp-post-image" alt="mobile phone security" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2023/07/pexels-pixabay-207589.webp 640w, https://www.octagontech.com/wp-content/uploads/2023/07/pexels-pixabay-207589-300x171.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>Mobile phone security is something that can just be taken for granted. We all carry our mobile phones with us everywhere and do everything on them &#8211; but when it comes to using those phones for business, they often drop out of the company&#8217;s IT support. They shouldn&#8217;t &#8211; that&#8217;s why you come to us [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2023/07/28/mobile-phone-security-three-simple-steps-for-best-practice/">Mobile Phone Security – Three Simple Steps for Best Practice</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
