<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>policies and procedures | Octagon Technology</title>
	<atom:link href="https://www.octagontech.com/tag/policies-and-procedures/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.octagontech.com</link>
	<description>01522 797520</description>
	<lastBuildDate>Tue, 01 Apr 2025 10:41:17 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.octagontech.com/wp-content/uploads/2020/06/cropped-Logo-32x32.png</url>
	<title>policies and procedures | Octagon Technology</title>
	<link>https://www.octagontech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>My Personal Delivery Scam</title>
		<link>https://www.octagontech.com/2025/04/01/my-personal-delivery-scam/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Tue, 01 Apr 2025 10:40:21 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Clive&#039;s Blog]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[Evri]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=10313</guid>

					<description><![CDATA[<img width="640" height="480" src="https://www.octagontech.com/wp-content/uploads/2025/04/evri-kettle.webp" class="attachment-large size-large wp-post-image" alt="delivery scam" style="float:left; margin:0 15px 15px 0;" decoding="async" fetchpriority="high" srcset="https://www.octagontech.com/wp-content/uploads/2025/04/evri-kettle.webp 640w, https://www.octagontech.com/wp-content/uploads/2025/04/evri-kettle-300x225.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>This article was previously published a part of &#8220;The Wednesday Bit&#8221; series on Smart Thinking Solutions. I was working at my desk the other day, thinking about stopping for lunch, when I got the following text message:&#160; Now I was waiting for a delivery, I had ordered a camping kettle from AliExpress, but the last [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2025/04/01/my-personal-delivery-scam/">My Personal Delivery Scam</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Keep It Simple… Encryption (pt. 3)</title>
		<link>https://www.octagontech.com/2024/04/11/keep-it-simple-encryption-pt-3/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Thu, 11 Apr 2024 08:59:44 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[BitLOcker]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Microsoft OneNote]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[OneDrive]]></category>
		<category><![CDATA[OneNote]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Secrecy]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9767</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2024/04/pexels-ivo-brasil-6310044.webp" class="attachment-large size-large wp-post-image" alt="device encryption" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2024/04/pexels-ivo-brasil-6310044.webp 640w, https://www.octagontech.com/wp-content/uploads/2024/04/pexels-ivo-brasil-6310044-300x200.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>Encryption is the process of encoding information, converting it from plaintext into ciphertext, to protect it from unauthorised access. This process ensures that only those with the appropriate decryption key can access the original information, thereby maintaining confidentiality. Modern encryption techniques utilise complex algorithms and keys, making unauthorised decryption extremely difficult without the correct key. [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/04/11/keep-it-simple-encryption-pt-3/">Keep It Simple… Encryption (pt. 3)</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Mobile Phone Security &#8211; Three Simple Steps for Best Practice</title>
		<link>https://www.octagontech.com/2023/07/28/mobile-phone-security-three-simple-steps-for-best-practice/</link>
		
		<dc:creator><![CDATA[Diana]]></dc:creator>
		<pubDate>Fri, 28 Jul 2023 07:51:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[mobile devices]]></category>
		<category><![CDATA[mobile phones]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9316</guid>

					<description><![CDATA[<img width="640" height="365" src="https://www.octagontech.com/wp-content/uploads/2023/07/pexels-pixabay-207589.webp" class="attachment-large size-large wp-post-image" alt="mobile phone security" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2023/07/pexels-pixabay-207589.webp 640w, https://www.octagontech.com/wp-content/uploads/2023/07/pexels-pixabay-207589-300x171.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>Mobile phone security is something that can just be taken for granted. We all carry our mobile phones with us everywhere and do everything on them &#8211; but when it comes to using those phones for business, they often drop out of the company&#8217;s IT support. They shouldn&#8217;t &#8211; that&#8217;s why you come to us [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2023/07/28/mobile-phone-security-three-simple-steps-for-best-practice/">Mobile Phone Security – Three Simple Steps for Best Practice</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
