<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>threats | Octagon Technology</title>
	<atom:link href="https://www.octagontech.com/tag/threats/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.octagontech.com</link>
	<description>01522 797520</description>
	<lastBuildDate>Fri, 14 Mar 2025 12:51:57 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.octagontech.com/wp-content/uploads/2020/06/cropped-Logo-32x32.png</url>
	<title>threats | Octagon Technology</title>
	<link>https://www.octagontech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What We Do – Part 1</title>
		<link>https://www.octagontech.com/2025/03/14/what-we-do-part-1/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Fri, 14 Mar 2025 12:51:55 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Governance and Compliance]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=10285</guid>

					<description><![CDATA[<img width="465" height="465" src="https://www.octagontech.com/wp-content/uploads/2025/03/image.jpeg" class="attachment-large size-large wp-post-image" alt="SOC" style="float:left; margin:0 15px 15px 0;" decoding="async" fetchpriority="high" srcset="https://www.octagontech.com/wp-content/uploads/2025/03/image.jpeg 465w, https://www.octagontech.com/wp-content/uploads/2025/03/image-300x300.jpeg 300w, https://www.octagontech.com/wp-content/uploads/2025/03/image-150x150.jpeg 150w" sizes="(max-width: 465px) 100vw, 465px" /><p>At Octagon we are often asked what we do. Over the next few weeks we hope to explain in a little detail the systems we look after and what they are used for. What we do for a client with 40 people Below is a list of services and what we do for a particular [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2025/03/14/what-we-do-part-1/">What We Do – Part 1</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Flipping Your Cyber Security: Lessons from Pancakes</title>
		<link>https://www.octagontech.com/2025/02/28/flipping-your-cyber-security-lessons-from-pancakes/</link>
		
		<dc:creator><![CDATA[Diana]]></dc:creator>
		<pubDate>Fri, 28 Feb 2025 09:37:48 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Governance and Compliance]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=10254</guid>

					<description><![CDATA[<img width="1024" height="682" src="https://www.octagontech.com/wp-content/uploads/2025/02/Layers-of-pancakes-1024x682.jpg" class="attachment-large size-large wp-post-image" alt="pancakes and cyber security" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2025/02/Layers-of-pancakes-1024x682.jpg 1024w, https://www.octagontech.com/wp-content/uploads/2025/02/Layers-of-pancakes-300x200.jpg 300w, https://www.octagontech.com/wp-content/uploads/2025/02/Layers-of-pancakes.jpg 1379w" sizes="(max-width: 1024px) 100vw, 1024px" /><p>So, what can pancakes teach us about flipping your cyber security? Just like making the perfect pancake, keeping your business secure requires the right ingredients, careful preparation, and a well-timed and successful flip. Start with a Strong Base when Flipping your Cyber Security A pancake is only as good as its batter, and cyber security [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2025/02/28/flipping-your-cyber-security-lessons-from-pancakes/">Flipping Your Cyber Security: Lessons from Pancakes</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Half Term &#038; Your Work Computer</title>
		<link>https://www.octagontech.com/2025/02/24/half-term-your-work-computer/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 10:42:07 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Solutions]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=10247</guid>

					<description><![CDATA[<img width="1024" height="1024" src="https://www.octagontech.com/wp-content/uploads/2025/02/LaptopGameDownload.jpg" class="attachment-large size-large wp-post-image" alt="Laptop young person" style="float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.octagontech.com/wp-content/uploads/2025/02/LaptopGameDownload.jpg 1024w, https://www.octagontech.com/wp-content/uploads/2025/02/LaptopGameDownload-300x300.jpg 300w, https://www.octagontech.com/wp-content/uploads/2025/02/LaptopGameDownload-150x150.jpg 150w" sizes="(max-width: 1024px) 100vw, 1024px" /><p>To go along with our special days and events month I thought I would use this space to ensure that everyone is aware of the risks of sharing your work laptop with other members of the family in Half Term or when needed. Did your children use your work laptop to play games on in [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2025/02/24/half-term-your-work-computer/">Half Term & Your Work Computer</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>New Year Resolution: Review your insurance</title>
		<link>https://www.octagontech.com/2024/12/11/new-year-resolution-review-your-insurance/</link>
		
		<dc:creator><![CDATA[Diana]]></dc:creator>
		<pubDate>Wed, 11 Dec 2024 17:42:12 +0000</pubDate>
				<category><![CDATA[Governance and Compliance]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=10097</guid>

					<description><![CDATA[<img width="602" height="465" src="https://www.octagontech.com/wp-content/uploads/2024/12/Picture2.png" class="attachment-large size-large wp-post-image" alt="" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/12/Picture2.png 602w, https://www.octagontech.com/wp-content/uploads/2024/12/Picture2-300x232.png 300w" sizes="auto, (max-width: 602px) 100vw, 602px" /><p>I know we haven’t had Christmas yet, but many business owners use part of December to make plans for the new year, so it’s the perfect time to set meaningful resolutions for your business. Here’s a vital one: make 2025 the year you take a serious look at your cyber security. Specifically, it’s time to [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/12/11/new-year-resolution-review-your-insurance/">New Year Resolution: Review your insurance</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Anti-Virus is like golf</title>
		<link>https://www.octagontech.com/2024/11/26/anti-virus-is-like-golf/</link>
		
		<dc:creator><![CDATA[Ben]]></dc:creator>
		<pubDate>Tue, 26 Nov 2024 17:33:42 +0000</pubDate>
				<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Anti-virus]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=10065</guid>

					<description><![CDATA[<img width="601" height="601" src="https://www.octagontech.com/wp-content/uploads/2024/11/Golf.jpg" class="attachment-large size-large wp-post-image" alt="Anti-virus is like golf" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/11/Golf.jpg 601w, https://www.octagontech.com/wp-content/uploads/2024/11/Golf-300x300.jpg 300w, https://www.octagontech.com/wp-content/uploads/2024/11/Golf-150x150.jpg 150w" sizes="auto, (max-width: 601px) 100vw, 601px" /><p>An oversimplification of the sport of Golf would be to say that the aim of golf is to play as little golf as possible while attaining the goal, fewer hits are preferable and the ultimate would be a hole in one. In this sense computer anti-virus software is similar, you want to stay protected from [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/11/26/anti-virus-is-like-golf/">Anti-Virus is like golf</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Technological Singularity</title>
		<link>https://www.octagontech.com/2024/08/14/technological-singularity/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Wed, 14 Aug 2024 13:51:18 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[A.I.]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9957</guid>

					<description><![CDATA[<img width="1024" height="1024" src="https://www.octagontech.com/wp-content/uploads/2024/08/aimachine1.jpg" class="attachment-large size-large wp-post-image" alt="technological singularity" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/08/aimachine1.jpg 1024w, https://www.octagontech.com/wp-content/uploads/2024/08/aimachine1-300x300.jpg 300w, https://www.octagontech.com/wp-content/uploads/2024/08/aimachine1-150x150.jpg 150w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><p>The concept of the technological singularity – a point where artificial intelligence surpasses human intelligence – is a topic of both excitement and concern in the tech community. As we advance towards increasingly sophisticated AI, the possibility of reaching a singularity becomes more tangible. This hypothetical moment in time is often seen as a turning [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/08/14/technological-singularity/">Technological Singularity</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Patch Tuesday and Updates</title>
		<link>https://www.octagontech.com/2024/07/11/patch-tuesday-and-updates/</link>
		
		<dc:creator><![CDATA[Ben]]></dc:creator>
		<pubDate>Thu, 11 Jul 2024 14:16:47 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Solutions]]></category>
		<category><![CDATA[CrowdStrike]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[Upadtes]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9912</guid>

					<description><![CDATA[<img width="802" height="452" src="https://www.octagontech.com/wp-content/uploads/2024/07/patching.webp" class="attachment-large size-large wp-post-image" alt="patches and updates" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/07/patching.webp 802w, https://www.octagontech.com/wp-content/uploads/2024/07/patching-300x169.webp 300w" sizes="auto, (max-width: 802px) 100vw, 802px" /><p>Patch Tuesday, also known as Update Tuesday refers to the established policy set by Microsoft and several other large software providers to push quality and security updates and fixes to their applications and programs. Since 2003 Microsoft have been releasing important updates on the second Tuesday of every month in order to address issues. Very [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/07/11/patch-tuesday-and-updates/">Patch Tuesday and Updates</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>What is involved in an IT and Cyber Security Audit?</title>
		<link>https://www.octagontech.com/2024/06/28/what-is-involved-in-a-cyber-security-audit/</link>
		
		<dc:creator><![CDATA[Diana]]></dc:creator>
		<pubDate>Fri, 28 Jun 2024 09:44:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Governance and Compliance]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Octagon Technology]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Solutions]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9880</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2024/06/pexels-olly-941555.webp" class="attachment-large size-large wp-post-image" alt="do not just think about an IT and Cyber Security Audit call us now" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/06/pexels-olly-941555.webp 640w, https://www.octagontech.com/wp-content/uploads/2024/06/pexels-olly-941555-300x200.webp 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /><p>We recommend all our clients to have an IT and Cyber Security Audit, but many business people are not sure what that involves or whether it is even necessary, particularly if the business is very small. In times of economic uncertainty, it is logical that business owners will look for value for money and an [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/06/28/what-is-involved-in-a-cyber-security-audit/">What is involved in an IT and Cyber Security Audit?</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>SOC-Backed AV</title>
		<link>https://www.octagontech.com/2024/06/18/soc-backed-av/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Tue, 18 Jun 2024 08:14:09 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Governance and Compliance]]></category>
		<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9860</guid>

					<description><![CDATA[<img width="640" height="427" src="https://www.octagontech.com/wp-content/uploads/2024/06/pexels-roger-brown-3435524-5149756.jpg" class="attachment-large size-large wp-post-image" alt="SOC-Backed AV" style="float:left; margin:0 15px 15px 0;" decoding="async" loading="lazy" srcset="https://www.octagontech.com/wp-content/uploads/2024/06/pexels-roger-brown-3435524-5149756.jpg 640w, https://www.octagontech.com/wp-content/uploads/2024/06/pexels-roger-brown-3435524-5149756-300x200.jpg 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /><p>In the intricate web of cybersecurity, a Security Operations Center (SOC) serves as the nerve center, orchestrating the defense mechanisms against cyber threats. The integration of Antivirus (AV) solutions within a SOC framework elevates an organisation&#8217;s security posture to new heights. A SOC-backed AV system is not just about detecting and removing malicious software; it&#8217;s [&#8230;]</p>
<p>The post <a href="https://www.octagontech.com/2024/06/18/soc-backed-av/">SOC-Backed AV</a> first appeared on <a href="https://www.octagontech.com">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
