<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>mobile phones | Octagon Technology</title>
	<atom:link href="http://jeremycatton.co.uk/tag/mobile-phones/feed/" rel="self" type="application/rss+xml" />
	<link>http://jeremycatton.co.uk</link>
	<description>01522 797520</description>
	<lastBuildDate>Fri, 28 Jul 2023 08:01:53 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.3.5</generator>

<image>
	<url>http://jeremycatton.co.uk/wp-content/uploads/2020/06/cropped-Logo-32x32.png</url>
	<title>mobile phones | Octagon Technology</title>
	<link>http://jeremycatton.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mobile Phone Security &#8211; Three Simple Steps for Best Practice</title>
		<link>http://jeremycatton.co.uk/2023/07/28/mobile-phone-security-three-simple-steps-for-best-practice/</link>
		
		<dc:creator><![CDATA[Diana]]></dc:creator>
		<pubDate>Fri, 28 Jul 2023 07:51:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[mobile devices]]></category>
		<category><![CDATA[mobile phones]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[Smart Thinking Solutions]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=9316</guid>

					<description><![CDATA[<img width="640" height="365" src="http://jeremycatton.co.uk/wp-content/uploads/2023/07/pexels-pixabay-207589.webp" class="attachment-large size-large wp-post-image" alt="mobile phone security" decoding="async" style="float:left; margin:0 15px 15px 0;" fetchpriority="high" srcset="http://jeremycatton.co.uk/wp-content/uploads/2023/07/pexels-pixabay-207589.webp 640w, http://jeremycatton.co.uk/wp-content/uploads/2023/07/pexels-pixabay-207589-300x171.webp 300w" sizes="(max-width: 640px) 100vw, 640px" /><p>Mobile phone security is something that can just be taken for granted. We all carry our mobile phones with us everywhere and do everything on them &#8211; but when it comes to using those phones for business, they often drop out of the company&#8217;s IT support. They shouldn&#8217;t &#8211; that&#8217;s why you come to us &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2023/07/28/mobile-phone-security-three-simple-steps-for-best-practice/"> <span class="screen-reader-text">Mobile Phone Security &#8211; Three Simple Steps for Best Practice</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2023/07/28/mobile-phone-security-three-simple-steps-for-best-practice/">Mobile Phone Security – Three Simple Steps for Best Practice</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft OneNote Tips</title>
		<link>http://jeremycatton.co.uk/2016/04/17/onenote-tips/</link>
		
		<dc:creator><![CDATA[Clive]]></dc:creator>
		<pubDate>Sun, 17 Apr 2016 18:10:00 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Solutions]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[cloud solutions]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[innovative products]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[iPod]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[mobile phones]]></category>
		<category><![CDATA[OneNote]]></category>
		<category><![CDATA[PCs]]></category>
		<category><![CDATA[Software]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=2675</guid>

					<description><![CDATA[<img width="500" height="375" src="http://jeremycatton.co.uk/wp-content/uploads/2016/04/Microsoft-OneNote-500x375.jpg" class="attachment-large size-large wp-post-image" alt="Microsoft OneNote" decoding="async" style="float:left; margin:0 15px 15px 0;" srcset="http://jeremycatton.co.uk/wp-content/uploads/2016/04/Microsoft-OneNote-500x375.jpg 500w, http://jeremycatton.co.uk/wp-content/uploads/2016/04/Microsoft-OneNote-300x225.jpg 300w, http://jeremycatton.co.uk/wp-content/uploads/2016/04/Microsoft-OneNote-830x623.jpg 830w, http://jeremycatton.co.uk/wp-content/uploads/2016/04/Microsoft-OneNote-230x173.jpg 230w, http://jeremycatton.co.uk/wp-content/uploads/2016/04/Microsoft-OneNote-350x263.jpg 350w, http://jeremycatton.co.uk/wp-content/uploads/2016/04/Microsoft-OneNote.jpg 1600w" sizes="(max-width: 500px) 100vw, 500px" /><p>Microsoft OneNote Tips Five Microsoft OneNote Tips to convince you to use OneNote. Is OneNote the best software Microsoft has ever produced? A bold question, but I truly think that a cross-platform app that is the perfect companion to your tablet or smartphone and then seamlessly syncs that information back to desktop software and a web &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2016/04/17/onenote-tips/"> <span class="screen-reader-text">Microsoft OneNote Tips</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2016/04/17/onenote-tips/">Microsoft OneNote Tips</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Insider Threat</title>
		<link>http://jeremycatton.co.uk/2012/05/31/insider-threat/</link>
		
		<dc:creator><![CDATA[Diana]]></dc:creator>
		<pubDate>Thu, 31 May 2012 20:41:05 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[advice]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[Back-ups]]></category>
		<category><![CDATA[client database]]></category>
		<category><![CDATA[company’s systems]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[disgruntled employee]]></category>
		<category><![CDATA[employees’ own equipment]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[firewalls]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[highly confidential and sensitive data to protect]]></category>
		<category><![CDATA[information worth stealing]]></category>
		<category><![CDATA[Insider threat]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[legitimate access]]></category>
		<category><![CDATA[malicious insider]]></category>
		<category><![CDATA[manage the risk]]></category>
		<category><![CDATA[mission-critical]]></category>
		<category><![CDATA[mobile phones]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[price list]]></category>
		<category><![CDATA[protecting your data]]></category>
		<category><![CDATA[sabotage]]></category>
		<category><![CDATA[Technology without Tears]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[very competitive sector]]></category>
		<category><![CDATA[virus protection]]></category>
		<guid isPermaLink="false">https://www.octagontech.com/?p=333</guid>

					<description><![CDATA[<p>We bang on and on about protecting your data by backing it up securely, installing firewalls and virus protection, using passwords and encryption and so on. But many companies completely forget about the risks posed by their own staff – what we call insider threat. And those outsiders interested in your data will find it &#8230;</p>
<p class="read-more"> <a class="" href="http://jeremycatton.co.uk/2012/05/31/insider-threat/"> <span class="screen-reader-text">Insider Threat</span> Read More »</a></p>
<p>The post <a href="http://jeremycatton.co.uk/2012/05/31/insider-threat/">Insider Threat</a> first appeared on <a href="http://jeremycatton.co.uk">Octagon Technology</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
