<?xml version="1.0" encoding="utf-8"?>
<!-- generator="Joomla! - Open Source Content Management" -->
<?xml-stylesheet href="/media/com_hwdmediashare/assets/css/hwd.css" type="text/css"?>
<?xml-stylesheet href="/media/com_hwdmediashare/assets/css/lite.css" type="text/css"?>
<?xml-stylesheet href="/media/com_hwdmediashare/assets/css/joomla.css" type="text/css"?>
<?xml-stylesheet href="/media/com_hwdmediashare/assets/css/aspect.css" type="text/css"?>
<?xml-stylesheet href="/plugins/system/jce/css/content.css?badb4208be409b1335b815dde676300e" type="text/css"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Security | TechAgeis | The IT Solutions &amp; Tech Support Experts</title>
		<description><![CDATA[All blog entries tagged as Security]]></description>
		<link>https://www.techageis.com/blog/tags/security</link>
		<lastBuildDate>Wed, 17 Aug 2022 06:13:44 -0500</lastBuildDate>
		<generator>Joomla! - Open Source Content Management</generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.techageis.com/blog/tags/security?format=feed&amp;type=rss"/>
		<language>en-gb</language>
		<item>
			<title>How to Avoid Becoming the Next Data Security Cautionary Tale</title>
			<link>https://www.techageis.com/blog/how-to-avoid-becoming-the-next-data-security-cautionary-tale</link>
			<guid isPermaLink="true">https://www.techageis.com/blog/how-to-avoid-becoming-the-next-data-security-cautionary-tale</guid>
			<description><![CDATA[<p>Data security isn’t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are far too many simple ways to correct common security issues - enough that it’s foolish not to do so. We’ll review a few ways to fix security issues, after discussing one of, if not the, most egregious security failings in modern history.</p>
]]></description>
			<category>TechAgeis Blog</category>
			<pubDate>Thu, 13 Jan 2022 09:30:28 -0600</pubDate>
			<enclosure url="https://www.techageis.com/images/easyblog_articles/94/security_cautionary_tale.jpg" length="24234" type="image/jpeg"/>
		</item>
		<item>
			<title>When it Comes to Security, Two Factors are Better Than One</title>
			<link>https://www.techageis.com/blog/when-it-comes-to-security-two-factors-are-better-than-one</link>
			<guid isPermaLink="true">https://www.techageis.com/blog/when-it-comes-to-security-two-factors-are-better-than-one</guid>
			<description><![CDATA[<p>The password isn’t nearly as secure as it used to be. Hackers have begun to take advantage of extremely powerful solutions designed to brute force their way into accounts by using software to rapidly guessing thousands of passwords per second, making it extraordinarily difficult to prepare yourself for them.</p>
<p>What’s the best way to guarantee that passwords aren’t going to be the downfall of your company? A great start is by taking a close look at password best practices and two-factor authentication.</p>
]]></description>
			<category>TechAgeis Blog</category>
			<pubDate>Wed, 12 Jan 2022 09:39:55 -0600</pubDate>
			<enclosure url="https://www.techageis.com/images/easyblog_articles/95/step_authentication.jpg" length="13223" type="image/jpeg"/>
		</item>
		<item>
			<title>Knowing, and Planning For, Your Organization’s Compliance Burden</title>
			<link>https://www.techageis.com/blog/knowing-and-planning-for-your-organizations-compliance-burden</link>
			<guid isPermaLink="true">https://www.techageis.com/blog/knowing-and-planning-for-your-organizations-compliance-burden</guid>
			<description><![CDATA[<p>Despite what detractors say, regulations are in place for good reason. They typically protect individuals from organizational malfeasance. Many of these regulations are actual laws passed by a governing body and cover the entire spectrum of the issue, not just the data involved. The ones that have data protection regulations written into them mostly deal with the handling and protection of sensitive information. For organizations that work in industries covered by these regulations there are very visible costs that go into compliance. Today, we look at the costs incurred by these organizations as a result of these regulations, and how to ascertain how they affect your business.</p>
]]></description>
			<category>TechAgeis Blog</category>
			<pubDate>Mon, 10 Jan 2022 03:00:36 -0600</pubDate>
			<enclosure url="https://www.techageis.com/images/easyblog_articles/97/compliance_burden.jpg" length="34179" type="image/jpeg"/>
		</item>
	</channel>
</rss>
