<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - ITSMDaily.com</title>
	<atom:link href="https://www.itsmdaily.com/category/security/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Product news, reviews and know how for IT Professionals</description>
	<lastBuildDate>Thu, 15 Dec 2022 20:52:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.itsmdaily.com/wp-content/uploads/2016/12/cropped-ico-itsm-2-32x32.png</url>
	<title>Security Archives - ITSMDaily.com</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">56713891</site>	<item>
		<title>Cyber Security Report 2023: An In-Depth Analysis of the Microsoft 365 Threat Landscape</title>
		<link>https://www.itsmdaily.com/cyber-security-report-2023-an-in-depth-analysis-of-the-microsoft-365-threat-landscape/</link>
					<comments>https://www.itsmdaily.com/cyber-security-report-2023-an-in-depth-analysis-of-the-microsoft-365-threat-landscape/#respond</comments>
		
		<dc:creator><![CDATA[Erik Blum]]></dc:creator>
		<pubDate>Thu, 15 Dec 2022 20:51:56 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.itsmdaily.com/?p=15439</guid>

					<description><![CDATA[<p>Hornetsecurity recently published their free annual Cyber Security Report for 2023 which takes a deep dive into the current threat landscape, with an emphasis on emerging threats and M365 vulnerabilities which organizations must be aware of in order to protect their operations in 2023. Throughout 2022, Hornetsecurity&#8217;s in-house Security Lab examined over 25 billion emails [&#8230;]</p>
<p>The post <a href="https://www.itsmdaily.com/cyber-security-report-2023-an-in-depth-analysis-of-the-microsoft-365-threat-landscape/">Cyber Security Report 2023: An In-Depth Analysis of the Microsoft 365 Threat Landscape</a> appeared first on <a href="https://www.itsmdaily.com">ITSMDaily.com</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.itsmdaily.com/cyber-security-report-2023-an-in-depth-analysis-of-the-microsoft-365-threat-landscape/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15439</post-id>	</item>
		<item>
		<title>Preventing Cyber-Fraud Webinar: Tips &#038; Tricks for Protecting Communications in 2022</title>
		<link>https://www.itsmdaily.com/preventing-cyber-fraud-webinar-tips-tricks-for-protecting-communications-in-2022/</link>
					<comments>https://www.itsmdaily.com/preventing-cyber-fraud-webinar-tips-tricks-for-protecting-communications-in-2022/#respond</comments>
		
		<dc:creator><![CDATA[Erik Blum]]></dc:creator>
		<pubDate>Mon, 24 Oct 2022 20:39:27 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.itsmdaily.com/?p=15165</guid>

					<description><![CDATA[<p>Preventing Cyber-Fraud Webinar: Tips &#38; Tricks for Protecting Communications in 2022 Concerned about cyber-fraud and puzzled by the current cyber insurance market? Join experts from Hornetsecurity and Zurich Resilience Solutions on 27 October at 2 pm BST for their latest webinar: Preventing Cyber-Fraud: Tips and Tricks for Protecting Communications in 2022. Andy Syrewicze, Microsoft MVP and Technical Evangelist, Hornetsecurity, will discuss today&#8217;s email  threats as well as the various techniques and tools that can help you prevent cyber-fraud and protect  your organisation&#8217;s critical communications infrastructure.    [&#8230;]</p>
<p>The post <a href="https://www.itsmdaily.com/preventing-cyber-fraud-webinar-tips-tricks-for-protecting-communications-in-2022/">Preventing Cyber-Fraud Webinar: Tips &#038; Tricks for Protecting Communications in 2022</a> appeared first on <a href="https://www.itsmdaily.com">ITSMDaily.com</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.itsmdaily.com/preventing-cyber-fraud-webinar-tips-tricks-for-protecting-communications-in-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15165</post-id>	</item>
		<item>
		<title>Risk of Ransomware in SaaS Applications</title>
		<link>https://www.itsmdaily.com/risk-of-ransomware-in-saas-applications/</link>
					<comments>https://www.itsmdaily.com/risk-of-ransomware-in-saas-applications/#respond</comments>
		
		<dc:creator><![CDATA[Erik Blum]]></dc:creator>
		<pubDate>Mon, 28 Feb 2022 21:24:44 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.itsmdaily.com/?p=14317</guid>

					<description><![CDATA[<p>The risk of Ransomware in SaaS Applications is growing rapidly year over year. Sophos, a leader in cybersecurity, published a survey of 5,400 IT decision-makers across 30 countries. The survey was conducted in January and February 2021. The survey explores the prevalence of attacks, impact on victims with year-on-year trends. The survey also reveals actual [&#8230;]</p>
<p>The post <a href="https://www.itsmdaily.com/risk-of-ransomware-in-saas-applications/">Risk of Ransomware in SaaS Applications</a> appeared first on <a href="https://www.itsmdaily.com">ITSMDaily.com</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.itsmdaily.com/risk-of-ransomware-in-saas-applications/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14317</post-id>	</item>
		<item>
		<title>Hornetsecurity 365 Threat Monitor review</title>
		<link>https://www.itsmdaily.com/hornetsecurity-365-threat-monitor-review/</link>
					<comments>https://www.itsmdaily.com/hornetsecurity-365-threat-monitor-review/#respond</comments>
		
		<dc:creator><![CDATA[Erik Blum]]></dc:creator>
		<pubDate>Sun, 05 Sep 2021 17:32:39 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.itsmdaily.com/?p=13824</guid>

					<description><![CDATA[<p>Hornetsecurity 365 Threat Monitor is live email tracking and the scanning solution is a great security tool for Microsoft 365. Ransomware became a big business for bad actors. Attacks on organizations are increasing at an alarming rate. Office 365 users are also widely exposed. The attack is still mostly done through email phishing and malware [&#8230;]</p>
<p>The post <a href="https://www.itsmdaily.com/hornetsecurity-365-threat-monitor-review/">Hornetsecurity 365 Threat Monitor review</a> appeared first on <a href="https://www.itsmdaily.com">ITSMDaily.com</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.itsmdaily.com/hornetsecurity-365-threat-monitor-review/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13824</post-id>	</item>
		<item>
		<title>12 ways to protect your organization from ransomware</title>
		<link>https://www.itsmdaily.com/12-ways-to-protect-your-organization-from-ransomware/</link>
					<comments>https://www.itsmdaily.com/12-ways-to-protect-your-organization-from-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[Erik Blum]]></dc:creator>
		<pubDate>Thu, 26 Aug 2021 17:06:42 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.itsmdaily.com/?p=13793</guid>

					<description><![CDATA[<p>I was a witness when malware started spreading in a retail company not long ago. And let me tell you, the expression on people&#8217;s faces was chilling. Panic and fear quickly reached boiling point. CIO didn&#8217;t recover for days after his interview with the board. In the end, the story ended well. They were able [&#8230;]</p>
<p>The post <a href="https://www.itsmdaily.com/12-ways-to-protect-your-organization-from-ransomware/">12 ways to protect your organization from ransomware</a> appeared first on <a href="https://www.itsmdaily.com">ITSMDaily.com</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.itsmdaily.com/12-ways-to-protect-your-organization-from-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13793</post-id>	</item>
		<item>
		<title>Digital security in times of crisis</title>
		<link>https://www.itsmdaily.com/digital-security-in-times-of-crisis/</link>
					<comments>https://www.itsmdaily.com/digital-security-in-times-of-crisis/#respond</comments>
		
		<dc:creator><![CDATA[Erik Blum]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 20:26:07 +0000</pubDate>
				<category><![CDATA[backup]]></category>
		<category><![CDATA[Backup]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.itsmdaily.com/?p=12877</guid>

					<description><![CDATA[<p>The COVID-19 pandemic has forced national governments around the world to accept various measures to limit the spread of the outbreak. By doing so they set to support public health systems. Perhaps the most important aspect of all the measures is the hope to safeguard the economy and to ensure that the public is safe [&#8230;]</p>
<p>The post <a href="https://www.itsmdaily.com/digital-security-in-times-of-crisis/">Digital security in times of crisis</a> appeared first on <a href="https://www.itsmdaily.com">ITSMDaily.com</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.itsmdaily.com/digital-security-in-times-of-crisis/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12877</post-id>	</item>
		<item>
		<title>How to secure Synology NAS against exploits, Malware, Cryptolockers</title>
		<link>https://www.itsmdaily.com/how-to-secure-synology-nas-against-exploits-malware-cryptolockers/</link>
					<comments>https://www.itsmdaily.com/how-to-secure-synology-nas-against-exploits-malware-cryptolockers/#respond</comments>
		
		<dc:creator><![CDATA[Erik Blum]]></dc:creator>
		<pubDate>Wed, 25 Mar 2020 21:34:44 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.itsmdaily.com/?p=12187</guid>

					<description><![CDATA[<p>Synology NAS is the most versatile, easy to use, NAS system to date. You can replace expensive servers or even cloud services with a Synology NAS. If you are using in within the company, you can use it to store backups, replace an expensive backup appliance with a combination of NAS and Nakivo Backup &#38; [&#8230;]</p>
<p>The post <a href="https://www.itsmdaily.com/how-to-secure-synology-nas-against-exploits-malware-cryptolockers/">How to secure Synology NAS against exploits, Malware, Cryptolockers</a> appeared first on <a href="https://www.itsmdaily.com">ITSMDaily.com</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.itsmdaily.com/how-to-secure-synology-nas-against-exploits-malware-cryptolockers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12187</post-id>	</item>
		<item>
		<title>Pi Hole &#8211; Safe haven when online</title>
		<link>https://www.itsmdaily.com/pi-hole-safe-haven-when-online/</link>
					<comments>https://www.itsmdaily.com/pi-hole-safe-haven-when-online/#respond</comments>
		
		<dc:creator><![CDATA[Erik Blum]]></dc:creator>
		<pubDate>Tue, 07 May 2019 20:54:09 +0000</pubDate>
				<category><![CDATA[Free tools]]></category>
		<category><![CDATA[Review]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.itsmdaily.com/?p=10723</guid>

					<description><![CDATA[<p>You are missing something cool if you don&#8217;t know about Pi hole. I hope I can show you some benefits in this Pi Hole tutorial and expect to get you rolling in minutes. Pi Hole is a network-wide ad blocker. In a typical home environment, Pi hole can increase security and cut out almost all [&#8230;]</p>
<p>The post <a href="https://www.itsmdaily.com/pi-hole-safe-haven-when-online/">Pi Hole &#8211; Safe haven when online</a> appeared first on <a href="https://www.itsmdaily.com">ITSMDaily.com</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.itsmdaily.com/pi-hole-safe-haven-when-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10723</post-id>	</item>
		<item>
		<title>CloudBerry Remote Assistant</title>
		<link>https://www.itsmdaily.com/cloudberry-remote-assistant/</link>
					<comments>https://www.itsmdaily.com/cloudberry-remote-assistant/#respond</comments>
		
		<dc:creator><![CDATA[Erik Blum]]></dc:creator>
		<pubDate>Mon, 29 Oct 2018 20:28:18 +0000</pubDate>
				<category><![CDATA[Review]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tips & Tricks]]></category>
		<guid isPermaLink="false">https://www.itsmdaily.com/?p=10319</guid>

					<description><![CDATA[<p>Do you have kids? I do. I have two. A girl and a boy. From the moment the baby girl was born, she had Gastroesophageal reflux (GERD). What that means is that the acid can move up from the stomach and can inflict the burning pain from the stomach and even up to the throat. [&#8230;]</p>
<p>The post <a href="https://www.itsmdaily.com/cloudberry-remote-assistant/">CloudBerry Remote Assistant</a> appeared first on <a href="https://www.itsmdaily.com">ITSMDaily.com</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.itsmdaily.com/cloudberry-remote-assistant/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10319</post-id>	</item>
		<item>
		<title>Cisco CCNP Security SENSS 300-206 Certification is Your Ticket to Successful IT Career In CyberSecurity</title>
		<link>https://www.itsmdaily.com/cisco-ccnp-security-senss-300-206-certification-is-your-ticket-to-successful-it-career-in-cybersecurity/</link>
					<comments>https://www.itsmdaily.com/cisco-ccnp-security-senss-300-206-certification-is-your-ticket-to-successful-it-career-in-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Jean Serafim]]></dc:creator>
		<pubDate>Wed, 19 Sep 2018 07:37:46 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.itsmdaily.com/?p=10248</guid>

					<description><![CDATA[<p>The Cisco SENSS 300-206 certification exam focuses on testing the knowledge and skills of an experienced network security engineer needed for installing, configuring, and implementing different security compliance of various perimeter edge devices within a Cisco network, such as Cisco switch, Cisco hub, Cisco router, and Cisco firewall. This 90-minute exam can actually change a [&#8230;]</p>
<p>The post <a href="https://www.itsmdaily.com/cisco-ccnp-security-senss-300-206-certification-is-your-ticket-to-successful-it-career-in-cybersecurity/">Cisco CCNP Security SENSS 300-206 Certification is Your Ticket to Successful IT Career In CyberSecurity</a> appeared first on <a href="https://www.itsmdaily.com">ITSMDaily.com</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.itsmdaily.com/cisco-ccnp-security-senss-300-206-certification-is-your-ticket-to-successful-it-career-in-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10248</post-id>	</item>
	</channel>
</rss>
