<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Supply My Business &#187; Cyber Crime</title>
	<atom:link href="https://supplymybusiness.co.uk/blog/tag/cyber-crime/feed/" rel="self" type="application/rss+xml" />
	<link>https://supplymybusiness.co.uk/blog</link>
	<description>Where businesses in Kent go to do business.</description>
	<lastBuildDate>Thu, 06 Oct 2022 14:12:46 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.2.38</generator>
	<item>
		<title>Cybersecurity at home and the potential threats businesses need to consider when employees work from home&#8230;</title>
		<link>https://supplymybusiness.co.uk/blog/cybersecurity-at-home-and-the-potential-threats-businesses-need-to-consider-when-employees-work-from-home/</link>
		<comments>https://supplymybusiness.co.uk/blog/cybersecurity-at-home-and-the-potential-threats-businesses-need-to-consider-when-employees-work-from-home/#comments</comments>
		<pubDate>Wed, 18 Mar 2020 15:42:19 +0000</pubDate>
		<dc:creator><![CDATA[Martin White]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Coronavirus Covid-19]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Remote Working]]></category>

		<guid isPermaLink="false">http://supplymybusiness.co.uk/blog/?p=2224</guid>
		<description><![CDATA[On the 12th March, the UK Government announced that the UK moved into the &#8216;Delay&#8217; phase of the current Pandemic outbreak. Much of this plan relies on the ability of organisations to allow its workforce to work remotely&#8230; It&#8217;s worth remembering that when you allow people to work remotely, you&#8217;re allowing them to work from &#8230; <a href="https://supplymybusiness.co.uk/blog/cybersecurity-at-home-and-the-potential-threats-businesses-need-to-consider-when-employees-work-from-home/" class="more-link">Continue reading <span class="screen-reader-text">Cybersecurity at home and the potential threats businesses need to consider when employees work from home&#8230;</span></a>]]></description>
		<wfw:commentRss>https://supplymybusiness.co.uk/blog/cybersecurity-at-home-and-the-potential-threats-businesses-need-to-consider-when-employees-work-from-home/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Have I been pwned? (Pronounced pawned)</title>
		<link>https://supplymybusiness.co.uk/blog/have-i-been-pwned-pronounced-pawned/</link>
		<comments>https://supplymybusiness.co.uk/blog/have-i-been-pwned-pronounced-pawned/#comments</comments>
		<pubDate>Thu, 27 Jun 2019 12:20:00 +0000</pubDate>
		<dc:creator><![CDATA[Martin White]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[cyber Security]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Pwned]]></category>
		<category><![CDATA[VoIP]]></category>

		<guid isPermaLink="false">http://supplymybusiness.co.uk/blog/?p=1759</guid>
		<description><![CDATA[Want a fright? Go to Have I Been Pwned and enter your email address. Click “pwned”? Take a deep breath and don’t panic because most, if not all, of your email addresses will result in, “Oh no — pwned!”, which means your email address has been compromised in a data breach at one time or &#8230; <a href="https://supplymybusiness.co.uk/blog/have-i-been-pwned-pronounced-pawned/" class="more-link">Continue reading <span class="screen-reader-text">Have I been pwned? (Pronounced pawned)</span></a>]]></description>
		<wfw:commentRss>https://supplymybusiness.co.uk/blog/have-i-been-pwned-pronounced-pawned/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber Security &#8211; Knowledge is Power!</title>
		<link>https://supplymybusiness.co.uk/blog/cyber-security-knowledge-is-power/</link>
		<comments>https://supplymybusiness.co.uk/blog/cyber-security-knowledge-is-power/#comments</comments>
		<pubDate>Tue, 25 Jul 2017 11:23:11 +0000</pubDate>
		<dc:creator><![CDATA[Martin White]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Anti Virus]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Password Protection]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spyware]]></category>

		<guid isPermaLink="false">http://supplymybusiness.co.uk/blog/?p=888</guid>
		<description><![CDATA[Cyber security has always been important, but has been thrown into the limelight by the recent high-profile attacks on the NHS and others. Interestingly it is only the attacks on big organisations that make it into the media, which has given some small Business owners the false sense of security that they are safe and &#8230; <a href="https://supplymybusiness.co.uk/blog/cyber-security-knowledge-is-power/" class="more-link">Continue reading <span class="screen-reader-text">Cyber Security &#8211; Knowledge is Power!</span></a>]]></description>
		<wfw:commentRss>https://supplymybusiness.co.uk/blog/cyber-security-knowledge-is-power/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
