<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security | Octagon Technology</title>
	<atom:link href="http://jeremycatton.co.uk/tag/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>http://jeremycatton.co.uk</link>
	<description>01522 797520</description>
	<lastBuildDate>Wed, 09 Aug 2023 11:03:36 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.3.5</generator>

<image>
	<url>http://jeremycatton.co.uk/wp-content/uploads/2020/06/cropped-Logo-32x32.png</url>
	<title>Cyber Security | Octagon Technology</title>
	<link>http://jeremycatton.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Security Operations Centre &#8211; SOC</title>
		<link>http://jeremycatton.co.uk/2023/08/08/security-operations-centre-soc/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Tue, 08 Aug 2023 08:46:32 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Security Operations Centre as a Service]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[SOC-as-a-Service]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9322</guid>

					<description><![CDATA[<img width="640" height="309" src="http://jeremycatton.co.uk/wp-content/uploads/2023/08/glasses.webp" class="attachment-large size-large wp-post-image" alt="Watching your accounts" decoding="async" style="float:left; margin:0 15px 15px 0;" fetchpriority="high" srcset="http://jeremycatton.co.uk/wp-content/uploads/2023/08/glasses.webp 640w, http://jeremycatton.co.uk/wp-content/uploads/2023/08/glasses-300x145.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>Imagine someone logging in to your account in the middle of the night then stealing all your information or accessing your email. What could they get into? Maybe they could use your email to break in to another account by way of a forgotten password link. The possibilities for damage and trouble are endless. This &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2023/08/08/security-operations-centre-soc/"> <span class="screen-reader-text">Security Operations Centre &#8211; SOC</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2023/08/08/security-operations-centre-soc/">Security Operations Centre – SOC</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Mobile Phone Security &#8211; Three Simple Steps for Best Practice</title>
		<link>http://jeremycatton.co.uk/2023/07/28/mobile-phone-security-three-simple-steps-for-best-practice/</link>
		
		<dc:creator><![CDATA[Diana]]></dc:creator>
		<pubDate>Fri, 28 Jul 2023 07:51:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[mobile devices]]></category>
		<category><![CDATA[mobile phones]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9316</guid>

					<description><![CDATA[<img width="640" height="365" src="http://jeremycatton.co.uk/wp-content/uploads/2023/07/pexels-pixabay-207589.webp" class="attachment-large size-large wp-post-image" alt="mobile phone security" decoding="async" style="float:left; margin:0 15px 15px 0;" srcset="http://jeremycatton.co.uk/wp-content/uploads/2023/07/pexels-pixabay-207589.webp 640w, http://jeremycatton.co.uk/wp-content/uploads/2023/07/pexels-pixabay-207589-300x171.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>Mobile phone security is something that can just be taken for granted. We all carry our mobile phones with us everywhere and do everything on them &#8211; but when it comes to using those phones for business, they often drop out of the company&#8217;s IT support. They shouldn&#8217;t &#8211; that&#8217;s why you come to us &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2023/07/28/mobile-phone-security-three-simple-steps-for-best-practice/"> <span class="screen-reader-text">Mobile Phone Security &#8211; Three Simple Steps for Best Practice</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2023/07/28/mobile-phone-security-three-simple-steps-for-best-practice/">Mobile Phone Security – Three Simple Steps for Best Practice</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Essentials and hardware</title>
		<link>http://jeremycatton.co.uk/2023/06/14/cyber-essentials-and-hardware/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 15:26:03 +0000</pubDate>
				<category><![CDATA[IT Support]]></category>
		<category><![CDATA[Cyber Essentials]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[hardware]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9263</guid>

					<description><![CDATA[<img width="640" height="427" src="http://jeremycatton.co.uk/wp-content/uploads/2023/06/pexels-sergei-starostin-6466141.webp" class="attachment-large size-large wp-post-image" alt="Cyber Essentials and hardware" decoding="async" style="float:left; margin:0 15px 15px 0;" srcset="http://jeremycatton.co.uk/wp-content/uploads/2023/06/pexels-sergei-starostin-6466141.webp 640w, http://jeremycatton.co.uk/wp-content/uploads/2023/06/pexels-sergei-starostin-6466141-300x200.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>Cyber Essentials is a scheme that helps organisations protect themselves from common cyber attacks. It covers five key areas of cyber security: secure configuration, boundary firewalls and internet gateways, access control, patch management and malware protection. In this blog post, we will explain why hardware is important for cyber essentials and how to choose the &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2023/06/14/cyber-essentials-and-hardware/"> <span class="screen-reader-text">Cyber Essentials and hardware</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2023/06/14/cyber-essentials-and-hardware/">Cyber Essentials and hardware</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Accountability &#8211; It Shows You are Watching.</title>
		<link>http://jeremycatton.co.uk/2023/06/09/accountability-it-shows-you-are-watching/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Fri, 09 Jun 2023 09:37:50 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[authorisation]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cyber security investigation]]></category>
		<category><![CDATA[CyberAwake]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[Security Operations Centre as a Service]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<category><![CDATA[SOC-as-a-Service]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9252</guid>

					<description><![CDATA[<img width="600" height="379" src="http://jeremycatton.co.uk/wp-content/uploads/2023/06/identity-cycle.webp" class="attachment-large size-large wp-post-image" alt="Authentication, Authorisation and Accountability lifecycle diagram" decoding="async" style="float:left; margin:0 15px 15px 0;" loading="lazy" srcset="http://jeremycatton.co.uk/wp-content/uploads/2023/06/identity-cycle.webp 600w, http://jeremycatton.co.uk/wp-content/uploads/2023/06/identity-cycle-300x190.webp 300w" sizes="(max-width: 600px) 100vw, 600px" /><p>Authentication, Authorisation and Accountability. This is the third part of a three-part series looking at the basics of the cyber security principle of “AAA”. Day Three – Accountability Accountability is probably the least enforced part of our Triple A principle in most organisations. But if you do embrace it, it can have a powerful impact &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2023/06/09/accountability-it-shows-you-are-watching/"> <span class="screen-reader-text">Accountability &#8211; It Shows You are Watching.</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2023/06/09/accountability-it-shows-you-are-watching/">Accountability – It Shows You are Watching.</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Attacks &#8211; What defences do you have?  </title>
		<link>http://jeremycatton.co.uk/2023/05/10/cyber-attacks-what-defences-do-you-have/</link>
		
		<dc:creator><![CDATA[Michael]]></dc:creator>
		<pubDate>Wed, 10 May 2023 08:37:02 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Monitoring]]></category>
		<category><![CDATA[patches]]></category>
		<category><![CDATA[Remote Monitoring And Management]]></category>
		<category><![CDATA[RMM]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9198</guid>

					<description><![CDATA[<img width="600" height="549" src="http://jeremycatton.co.uk/wp-content/uploads/2023/05/soc-as-a-service.webp" class="attachment-large size-large wp-post-image" alt="soc-as-a-service" decoding="async" style="float:left; margin:0 15px 15px 0;" loading="lazy" srcset="http://jeremycatton.co.uk/wp-content/uploads/2023/05/soc-as-a-service.webp 600w, http://jeremycatton.co.uk/wp-content/uploads/2023/05/soc-as-a-service-300x275.webp 300w" sizes="(max-width: 600px) 100vw, 600px" /><p>The best strategy for combating cyber attacks, is to adopt automation and 24/7 monitoring. In addition to the comprehensive monitoring capabilities of our software, we employ several other defences to protect against cyber threats. One crucial aspect of our strategy is the adoption of advanced automation techniques. We can swiftly respond to threats and minimise &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2023/05/10/cyber-attacks-what-defences-do-you-have/"> <span class="screen-reader-text">Cyber Attacks &#8211; What defences do you have?  </span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2023/05/10/cyber-attacks-what-defences-do-you-have/">Cyber Attacks – What defences do you have?  </a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>IT Monitoring &#8211; Who Watches What?</title>
		<link>http://jeremycatton.co.uk/2023/04/12/it-monitoring-who-watches-what/</link>
		
		<dc:creator><![CDATA[Martin]]></dc:creator>
		<pubDate>Wed, 12 Apr 2023 11:22:55 +0000</pubDate>
				<category><![CDATA[IT Support]]></category>
		<category><![CDATA[advanced threat protection]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Monitoring]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Remote Monitoring And Management]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9137</guid>

					<description><![CDATA[<img width="640" height="427" src="http://jeremycatton.co.uk/wp-content/uploads/2023/04/pexels-victor-freitas-865711.webp" class="attachment-large size-large wp-post-image" alt="watching" decoding="async" style="float:left; margin:0 15px 15px 0;" loading="lazy" srcset="http://jeremycatton.co.uk/wp-content/uploads/2023/04/pexels-victor-freitas-865711.webp 640w, http://jeremycatton.co.uk/wp-content/uploads/2023/04/pexels-victor-freitas-865711-300x200.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>I thought I would let you all know about some of the tools we use for IT monitoring to keep an eye on your systems. Below are a couple of technologies that we recommend to our clients. They just give you that extra peace of mind to know that we can monitor what is going &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2023/04/12/it-monitoring-who-watches-what/"> <span class="screen-reader-text">IT Monitoring &#8211; Who Watches What?</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2023/04/12/it-monitoring-who-watches-what/">IT Monitoring – Who Watches What?</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Will Robots Rule the World?</title>
		<link>http://jeremycatton.co.uk/2023/04/05/will-robots-rule-the-world/</link>
		
		<dc:creator><![CDATA[Diana]]></dc:creator>
		<pubDate>Wed, 05 Apr 2023 10:53:23 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Speaking Event]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9123</guid>

					<description><![CDATA[<img width="602" height="451" src="http://jeremycatton.co.uk/wp-content/uploads/2023/04/meeting.webp" class="attachment-large size-large wp-post-image" alt="Online Meeting" decoding="async" style="float:left; margin:0 15px 15px 0;" loading="lazy" srcset="http://jeremycatton.co.uk/wp-content/uploads/2023/04/meeting.webp 602w, http://jeremycatton.co.uk/wp-content/uploads/2023/04/meeting-300x225.webp 300w" sizes="(max-width: 602px) 100vw, 602px" /><p>Robots? Clive did not know for sure but he gave a good answer&#8230; A couple of weeks ago we were invited to speak to a Zoom meeting and this was basically a Question and Answer session. After reassuring the group that no question was too silly to ask, just that nobody had been brave enough &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2023/04/05/will-robots-rule-the-world/"> <span class="screen-reader-text">Will Robots Rule the World?</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2023/04/05/will-robots-rule-the-world/">Will Robots Rule the World?</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Linux for Business (Part I)</title>
		<link>http://jeremycatton.co.uk/2023/03/15/linux-for-business-part-i/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Wed, 15 Mar 2023 11:25:49 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9089</guid>

					<description><![CDATA[<img width="507" height="364" src="http://jeremycatton.co.uk/wp-content/uploads/2023/03/linux-mint.webp" class="attachment-large size-large wp-post-image" alt="linux mint" decoding="async" style="float:left; margin:0 15px 15px 0;" loading="lazy" srcset="http://jeremycatton.co.uk/wp-content/uploads/2023/03/linux-mint.webp 507w, http://jeremycatton.co.uk/wp-content/uploads/2023/03/linux-mint-300x215.webp 300w" sizes="(max-width: 507px) 100vw, 507px" /><p>Most of us use a computer running Microsoft Windows for work – I do – some of us use an Apple Mac or a Chromebook and an even smaller number use a computer not running one of those mainstream operating systems &#8211; Linux. Linux has a major advantage when it comes to using it in &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2023/03/15/linux-for-business-part-i/"> <span class="screen-reader-text">Linux for Business (Part I)</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2023/03/15/linux-for-business-part-i/">Linux for Business (Part I)</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Ransomware: Is it a Threat? &#8211; Part 1</title>
		<link>http://jeremycatton.co.uk/2023/02/02/ransomware-part-1/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Thu, 02 Feb 2023 12:04:31 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Back-ups]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=8990</guid>

					<description><![CDATA[<img width="618" height="369" src="http://jeremycatton.co.uk/wp-content/uploads/2015/12/Better-safe-than-sorry-press-release.jpg" class="attachment-large size-large wp-post-image" alt="" decoding="async" style="float:left; margin:0 15px 15px 0;" loading="lazy" srcset="http://jeremycatton.co.uk/wp-content/uploads/2015/12/Better-safe-than-sorry-press-release.jpg 618w, http://jeremycatton.co.uk/wp-content/uploads/2015/12/Better-safe-than-sorry-press-release-300x179.jpg 300w" sizes="(max-width: 618px) 100vw, 618px" /><p>Ransomware is still a threat to you Without a doubt ransomware is one of the most serious cyber security issues an organisation faces (UK Government. 2022). Here is a recent story from the tech press, showing how organised and determined the gangs that operate these types of cyber attack are. The Unrelenting Menace of the &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2023/02/02/ransomware-part-1/"> <span class="screen-reader-text">Ransomware: Is it a Threat? &#8211; Part 1</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2023/02/02/ransomware-part-1/">Ransomware: Is it a Threat? – Part 1</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
