<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>News | GOAHEAD NETWORKS</title>
	<atom:link href="https://goahead.co.nz/category/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://goahead.co.nz</link>
	<description></description>
	<lastBuildDate>Tue, 04 Oct 2022 15:15:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>2022-10 Cyber security</title>
		<link>https://goahead.co.nz/news/2022-10-cyber-security/</link>
					<comments>https://goahead.co.nz/news/2022-10-cyber-security/#respond</comments>
		
		<dc:creator><![CDATA[Jeffrey Stevens]]></dc:creator>
		<pubDate>Tue, 04 Oct 2022 15:15:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://goahead.co.nz/?p=369</guid>

					<description><![CDATA[<p>Never share personal, financial, or medical information via email, chat, or other online methods. One of the most nefarious ways that social engineering operates is by warming up to users and breaking down their natural defenses so that they recklessly share sensitive information. If a colleague or contact requests protected information like passwords, birthdays, or... <a class="moretag" href="https://goahead.co.nz/news/2022-10-cyber-security/">(read more)</a></p>
The post <a href="https://goahead.co.nz/news/2022-10-cyber-security/">2022-10 Cyber security</a> first appeared on <a href="https://goahead.co.nz">GOAHEAD NETWORKS</a>.]]></description>
										<content:encoded><![CDATA[<p>Never share personal, financial, or medical information via email, chat, or other online methods.<br />
One of the most nefarious ways that social engineering operates is by warming up to users and breaking down their natural defenses so that they recklessly share sensitive information.<br />
If a colleague or contact requests protected information like passwords, birthdays, or account numbers via email, text, or online chat, double-check the legitimacy of that request with a face-to-face meeting or live phone call.</p>
<p>Don’t open suspicious email attachments or click on embedded links.<br />
Although the Uber hack recently occurred via a slightly more informal channel like Slack, hackers still try every day to trick users into opening infected PDFs, Word documents, or voice mail files.<br />
NEVER open an attachment unless it’s a specific file you’re expecting from a trusted co-worker. The same goes for clicking unfamiliar URLs that urge you to take action.<br />
Always check to see whether the URL written in a message matches its destination by right clicking the link and verifying it against the sender’s email domain (for instance, a message purportedly from Amazon.com should only include links that point to Amazon.com). If you see long strings of nonsensical numbers or letters, DO NOT CLICK the link.</p>The post <a href="https://goahead.co.nz/news/2022-10-cyber-security/">2022-10 Cyber security</a> first appeared on <a href="https://goahead.co.nz">GOAHEAD NETWORKS</a>.]]></content:encoded>
					
					<wfw:commentRss>https://goahead.co.nz/news/2022-10-cyber-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2022-08   Cyber security</title>
		<link>https://goahead.co.nz/news/2022-08-cyber-security/</link>
					<comments>https://goahead.co.nz/news/2022-08-cyber-security/#respond</comments>
		
		<dc:creator><![CDATA[Jeffrey Stevens]]></dc:creator>
		<pubDate>Tue, 02 Aug 2022 00:18:19 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://goahead.co.nz/?p=360</guid>

					<description><![CDATA[<p>The I.T world changes daily, if not hourly. Cyber criminals find new ways of attacking people. Mobiles devices are being used as weapons to attack businesses networks from within&#8230;after all who puts antivirus on their mobiles&#8230;until it is too late. A lot of email phishing is occurring. It&#8217;s now looking the same as a genuine... <a class="moretag" href="https://goahead.co.nz/news/2022-08-cyber-security/">(read more)</a></p>
The post <a href="https://goahead.co.nz/news/2022-08-cyber-security/">2022-08   Cyber security</a> first appeared on <a href="https://goahead.co.nz">GOAHEAD NETWORKS</a>.]]></description>
										<content:encoded><![CDATA[<p>The I.T world changes daily, if not hourly.<br />
Cyber criminals find new ways of attacking people.<br />
Mobiles devices are being used as weapons to attack businesses networks from within&#8230;after all who puts antivirus on their mobiles&#8230;until it is too late.<br />
A lot of email phishing is occurring. It&#8217;s now looking the same as a genuine email. When will the time come, when you &#8216;click&#8217; too fast.<br />
Employees are using the work network for personal BYOD or surfing use, therefore compromising the security of many networks.<br />
Business wireless is being used carelessly, so the business mobiles use it, the employees own phones use it, the employees children use it. public use it. .. This is just plain wrong and asking for trouble.<br />
Often businesses just use the telco supplied modems. This isn&#8217;t strong enough to protect you in today&#8217;s Cyber criminal world.<br />
What about cameras&#8230;.are you plugging them into your business network alongside the computers. How do you know if your camera is a banned one, due to hardware security flaws.</p>
<p>We are all about being proactive, before disaster gets a chance to strike.<br />
So call and have a chat :))</p>The post <a href="https://goahead.co.nz/news/2022-08-cyber-security/">2022-08   Cyber security</a> first appeared on <a href="https://goahead.co.nz">GOAHEAD NETWORKS</a>.]]></content:encoded>
					
					<wfw:commentRss>https://goahead.co.nz/news/2022-08-cyber-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
