<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>phishing | Octagon Technology</title>
	<atom:link href="https://www.octagontech.com/tag/phishing/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.octagontech.com</link>
	<description>01522 797520</description>
	<lastBuildDate>Mon, 07 Jul 2025 11:01:26 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.octagontech.com/wp-content/uploads/2020/06/cropped-Logo-32x32.png</url>
	<title>phishing | Octagon Technology</title>
	<link>https://www.octagontech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hack Me If You Can! What’s your excuse? </title>
		<link>https://www.octagontech.com/2025/07/07/hack-me-if-you-can-whats-your-excuse/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Mon, 07 Jul 2025 10:36:59 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AAA]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[authorisation]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=10374</guid>

					<description><![CDATA[<img width="1024" height="357" src="https://www.octagontech.com/wp-content/uploads/2025/06/Hack-me-if-you-can-1024x357.webp" class="attachment-large size-large wp-post-image" alt="Hack me if you can" style="float:left; margin:0 15px 15px 0;" decoding="async" fetchpriority="high" srcset="https://www.octagontech.com/wp-content/uploads/2025/06/Hack-me-if-you-can-1024x357.webp 1024w, https://www.octagontech.com/wp-content/uploads/2025/06/Hack-me-if-you-can-300x105.webp 300w, https://www.octagontech.com/wp-content/uploads/2025/06/Hack-me-if-you-can-1536x535.webp 1536w, https://www.octagontech.com/wp-content/uploads/2025/06/Hack-me-if-you-can.webp 1684w" sizes="(max-width: 1024px) 100vw, 1024px" /><p>“I am too busy for cyber security.”&#160; “It will never happen to me.”&#160; “My organisation is too small for the hackers to bother with.”&#160; “HMRC hacked for £42M because someone’s login was compromised.” FAKE NEWS!!!!&#160; “Cyber security is hard – when I remember, I will get someone else to fix it for us.”&#160; “We pay [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2025/07/07/hack-me-if-you-can-whats-your-excuse/">Hack Me If You Can! What’s your excuse? </a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>My Personal Delivery Scam</title>
		<link>https://www.octagontech.com/2025/04/01/my-personal-delivery-scam/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Tue, 01 Apr 2025 10:40:21 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Clive&#039;s Blog]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[Evri]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=10313</guid>

					<description><![CDATA[<img width="640" height="480" src="https://www.octagontech.com/wp-content/uploads/2025/04/evri-kettle.webp" class="attachment-large size-large wp-post-image" alt="delivery scam" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2025/04/evri-kettle.webp 640w, https://www.octagontech.com/wp-content/uploads/2025/04/evri-kettle-300x225.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>This article was previously published a part of &#8220;The Wednesday Bit&#8221; series on Smart Thinking Solutions. I was working at my desk the other day, thinking about stopping for lunch, when I got the following text message:&#160; Now I was waiting for a delivery, I had ordered a camping kettle from AliExpress, but the last [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2025/04/01/my-personal-delivery-scam/">My Personal Delivery Scam</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Copilot AI and the Phishing Email</title>
		<link>https://www.octagontech.com/2024/08/01/copilot-ai-and-the-phishing-email/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 05:01:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Copilot]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[email threat]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Word]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9917</guid>

					<description><![CDATA[<img width="1024" height="1024" src="https://www.octagontech.com/wp-content/uploads/2024/07/AI-on-holiday.webp" class="attachment-large size-large wp-post-image" alt="creat an image of AI on holiday on a beach in the sun with a cold beer and a Kindle" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2024/07/AI-on-holiday.webp 1024w, https://www.octagontech.com/wp-content/uploads/2024/07/AI-on-holiday-300x300.webp 300w, https://www.octagontech.com/wp-content/uploads/2024/07/AI-on-holiday-150x150.webp 150w" sizes="(max-width: 1024px) 100vw, 1024px" /><p>Martin and Ben are the Octagon Technology newsletter editors this month and they have chosen artificial intelligence (Copilot AI) as their theme. They asked me to write the first article. Copilot AI and Word I had thought to write about how I use Copilot in Microsoft Edge, to help me with parts of the articles [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/08/01/copilot-ai-and-the-phishing-email/">Copilot AI and the Phishing Email</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>The Cyber Security Fallout of CrowdStrike Global IT Outage</title>
		<link>https://www.octagontech.com/2024/07/23/the-cyber-security-fallout-of-crowdstrike-global-it-outage/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Tue, 23 Jul 2024 13:54:32 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[CrowdStrike]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Software Patches]]></category>
		<category><![CDATA[Updates]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9905</guid>

					<description><![CDATA[<img width="640" height="426" src="https://www.octagontech.com/wp-content/uploads/2024/07/pexels-padrinan-2882668.webp" class="attachment-large size-large wp-post-image" alt="CrowdSrike updates" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/07/pexels-padrinan-2882668.webp 640w, https://www.octagontech.com/wp-content/uploads/2024/07/pexels-padrinan-2882668-300x200.webp 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /><p>Before I get into some of the cyber security fallout from the CrowdStrike global IT outage, you can read some of my thoughts on the incident here: The Wednesday Bit on Monday – CrowdStrike Global IT Outage In this article I look at just a couple of the cyber security implications of an IT issue [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/07/23/the-cyber-security-fallout-of-crowdstrike-global-it-outage/">The Cyber Security Fallout of CrowdStrike Global IT Outage</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Nothing is true, everything is a scam (Email Phishing Primer pt.7)</title>
		<link>https://www.octagontech.com/2024/06/06/nothing-is-true-everything-is-a-scam/</link>
		
		<dc:creator><![CDATA[Ben]]></dc:creator>
		<pubDate>Thu, 06 Jun 2024 08:02:20 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber-attack]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[email threat]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9840</guid>

					<description><![CDATA[<img width="1024" height="1024" src="https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-1024x1024.jpg" class="attachment-large size-large wp-post-image" alt="Everything is a scam" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-1024x1024.jpg 1024w, https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-300x300.jpg 300w, https://www.octagontech.com/wp-content/uploads/2024/06/Picture1-150x150.jpg 150w, https://www.octagontech.com/wp-content/uploads/2024/06/Picture1.jpg 1149w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><p>Nothing is true, everything is a scam. While this is not terrible advice for the internet and life generally, in this case I am referring to electronic mail. Given the negligible cost of sending email and its ability to target millions, it is of course the perfect tool to trick, scam, steal and be downright [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/06/06/nothing-is-true-everything-is-a-scam/">Nothing is true, everything is a scam (Email Phishing Primer pt.7)</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Defence-in-depth – Your Move</title>
		<link>https://www.octagontech.com/2023/09/06/defence-in-depth-your-move/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Wed, 06 Sep 2023 07:32:36 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber-attack]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Defence In Depth]]></category>
		<category><![CDATA[Defence-In-Depth]]></category>
		<category><![CDATA[email threat]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Insider threat]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Remote Monitoring And Management]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Security Operations Centre]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[SOC-as-a-Service]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9360</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2023/09/pexels-tima-miroshnichenko-10625979.webp" class="attachment-large size-large wp-post-image" alt="defence-in-depth your move" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2023/09/pexels-tima-miroshnichenko-10625979.webp 640w, https://www.octagontech.com/wp-content/uploads/2023/09/pexels-tima-miroshnichenko-10625979-300x200.webp 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /><p>Yesterday I wrote the opening chapter of this defence-in-depth article – I looked at how anti-virus protection can be side-stepped by threat actors and that staff cyber awareness training is needed to provide another layer to your defences. That was a human addition to your defence-in-depth and today we are going to look at more [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2023/09/06/defence-in-depth-your-move/">Defence-in-depth – Your Move</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
