<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
>

<channel>
	<title>Tech Tech Goose</title>
	<atom:link href="https://tech-tech-goose.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://tech-tech-goose.com</link>
	<description>The Golden Egg of Technology Blogs</description>
	<lastBuildDate>Mon, 02 Apr 2018 17:00:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2017/04/cropped-Goose_Silhouette_PNG_Clip_Art_Image.png?fit=32%2C32&#038;ssl=1</url>
	<title>Tech Tech Goose</title>
	<link>https://tech-tech-goose.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">125827172</site>	<item>
		<title>Cutting IT Corners Can Cost Small Businesses Big Bucks</title>
		<link>https://tech-tech-goose.com/cutting-it-corners-can-cost-small-businesses-big-bucks/</link>
				<pubDate>Mon, 02 Apr 2018 16:48:42 +0000</pubDate>
		<dc:creator><![CDATA[Joe Svoboda]]></dc:creator>
				<category><![CDATA[Budgeting]]></category>
		<category><![CDATA[Latest News]]></category>
		<category><![CDATA[Outsourcing]]></category>

		<guid isPermaLink="false">https://tech-tech-goose.com/?p=10343</guid>
				<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/04/dollar-2931882_1920.png?fit=300%2C202&ssl=1" width="300" height="202" title="" alt="" /></div>
<div>We get it. You&#8217;re a go-getting, take-charge business owner/leader who appreciates saving money because small businesses have thin margins and lean operations. You&#8217;ve built your business&#8217; success on not over-spending. You&#8217;ve had to DIY a lot of roles in your company and IT is one of those. But, unfortunately, technology is one area where DIY [&#8230;]</div>
<p>The post <a rel="nofollow" href="https://tech-tech-goose.com/cutting-it-corners-can-cost-small-businesses-big-bucks/">Cutting IT Corners Can Cost Small Businesses Big Bucks</a> appeared first on <a rel="nofollow" href="https://tech-tech-goose.com">Tech Tech Goose</a>.</p>
]]></description>
								<enclosure url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/04/dollar-2931882_1920.png?fit=1920%2C1294&#038;ssl=1" length="4774791" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/04/dollar-2931882_1920.png?fit=300%2C202&#038;ssl=1" width="300" height="202" medium="image" type="image/jpeg">
	<media:copyright>Tech Tech Goose</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/04/dollar-2931882_1920.png?resize=150%2C150&#038;ssl=1" width="150" height="150" />
<post-id xmlns="com-wordpress:feed-additions:1">10343</post-id>	</item>
		<item>
		<title>How Closely Do You Read Your Mail? Domain Name Scam Targets Businesses</title>
		<link>https://tech-tech-goose.com/how-closely-do-you-read-your-mail-domain-name-scam-targets-businesses/</link>
				<pubDate>Wed, 31 Jan 2018 21:29:31 +0000</pubDate>
		<dc:creator><![CDATA[Joe Svoboda]]></dc:creator>
				<category><![CDATA[Latest News]]></category>
		<category><![CDATA[Security & Privacy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Tools and Tips]]></category>
		<category><![CDATA[Websites]]></category>

		<guid isPermaLink="false">https://tech-tech-goose.com/?p=10308</guid>
				<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/01/Scam-Sign.jpg?fit=300%2C212&ssl=1" width="300" height="212" title="" alt="" /></div>
<div></div>
<p>The post <a rel="nofollow" href="https://tech-tech-goose.com/how-closely-do-you-read-your-mail-domain-name-scam-targets-businesses/">How Closely Do You Read Your Mail? Domain Name Scam Targets Businesses</a> appeared first on <a rel="nofollow" href="https://tech-tech-goose.com">Tech Tech Goose</a>.</p>
]]></description>
								<enclosure url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/01/Scam-Sign.jpg?fit=960%2C678&#038;ssl=1" length="233061" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/01/Scam-Sign.jpg?fit=300%2C212&#038;ssl=1" width="300" height="212" medium="image" type="image/jpeg">
	<media:copyright>Tech Tech Goose</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/01/Scam-Sign.jpg?resize=150%2C150&#038;ssl=1" width="150" height="150" />
<post-id xmlns="com-wordpress:feed-additions:1">10308</post-id>	</item>
		<item>
		<title>Two Newly Discovered Security Flaws Affect Ninety Percent of the World&#8217;s Computers</title>
		<link>https://tech-tech-goose.com/two-newly-discovered-security-flaws-affect-ninety-percent-of-the-worlds-computers/</link>
				<pubDate>Fri, 05 Jan 2018 21:18:05 +0000</pubDate>
		<dc:creator><![CDATA[Joe Svoboda]]></dc:creator>
				<category><![CDATA[Computers]]></category>
		<category><![CDATA[Latest News]]></category>
		<category><![CDATA[Network Infrastructure]]></category>
		<category><![CDATA[Security & Privacy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Tools and Tips]]></category>

		<guid isPermaLink="false">https://tech-tech-goose.com/?p=10286</guid>
				<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/01/hacker-2883632_1280.jpg?fit=300%2C200&ssl=1" width="300" height="200" title="" alt="" /></div>
<div>Security experts have recently found two significant flaws in the microprocessing systems (sometimes called CPUs or chips) of almost all the world&#8217;s computers. The two issues, fondly named Meltdown and Spectre, could be used to hijack the memory of a device running in a &#8220;cloud&#8221; environment. This includes computers, mobile phones and servers. Unlike most [&#8230;]</div>
<p>The post <a rel="nofollow" href="https://tech-tech-goose.com/two-newly-discovered-security-flaws-affect-ninety-percent-of-the-worlds-computers/">Two Newly Discovered Security Flaws Affect Ninety Percent of the World&#8217;s Computers</a> appeared first on <a rel="nofollow" href="https://tech-tech-goose.com">Tech Tech Goose</a>.</p>
]]></description>
								<enclosure url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/01/hacker-2883632_1280.jpg?fit=1280%2C853&#038;ssl=1" length="335376" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/01/hacker-2883632_1280.jpg?fit=300%2C200&#038;ssl=1" width="300" height="200" medium="image" type="image/jpeg">
	<media:copyright>Tech Tech Goose</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2018/01/hacker-2883632_1280.jpg?resize=150%2C150&#038;ssl=1" width="150" height="150" />
<post-id xmlns="com-wordpress:feed-additions:1">10286</post-id>	</item>
		<item>
		<title>Next year could spell trouble if your website isn&#8217;t mobile, fast and secure to Google&#8217;s standards.</title>
		<link>https://tech-tech-goose.com/next-year-spell-trouble-website-isnt-mobile-fast-secure-googles-standards/</link>
				<pubDate>Tue, 05 Dec 2017 17:57:27 +0000</pubDate>
		<dc:creator><![CDATA[Joe Svoboda]]></dc:creator>
				<category><![CDATA[Latest News]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Security & Privacy]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[mobile-responsive]]></category>
		<category><![CDATA[SSL]]></category>

		<guid isPermaLink="false">https://tech-tech-goose.com/?p=10252</guid>
				<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://i2.wp.com/tech-tech-goose.com/wp-content/uploads/2017/12/google-king.jpg?fit=300%2C151&ssl=1" width="300" height="151" title="" alt="" /></div>
<div></div>
<p>The post <a rel="nofollow" href="https://tech-tech-goose.com/next-year-spell-trouble-website-isnt-mobile-fast-secure-googles-standards/">Next year could spell trouble if your website isn&#8217;t mobile, fast and secure to Google&#8217;s standards.</a> appeared first on <a rel="nofollow" href="https://tech-tech-goose.com">Tech Tech Goose</a>.</p>
]]></description>
								<enclosure url="https://i2.wp.com/tech-tech-goose.com/wp-content/uploads/2017/12/google-king.jpg?fit=1170%2C590&#038;ssl=1" length="43982" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://i2.wp.com/tech-tech-goose.com/wp-content/uploads/2017/12/google-king.jpg?fit=300%2C151&#038;ssl=1" width="300" height="151" medium="image" type="image/jpeg">
	<media:copyright>Tech Tech Goose</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://i2.wp.com/tech-tech-goose.com/wp-content/uploads/2017/12/google-king.jpg?resize=150%2C150&#038;ssl=1" width="150" height="150" />
<post-id xmlns="com-wordpress:feed-additions:1">10252</post-id>	</item>
		<item>
		<title>5 Ways Your Employees Might Be Putting Your Business at Risk</title>
		<link>https://tech-tech-goose.com/5-ways-employees-might-putting-business-risk/</link>
				<pubDate>Wed, 25 Oct 2017 17:46:30 +0000</pubDate>
		<dc:creator><![CDATA[Joe Svoboda]]></dc:creator>
				<category><![CDATA[Latest News]]></category>
		<category><![CDATA[Security & Privacy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[Tools and Tips]]></category>

		<guid isPermaLink="false">http://www.themillergroup.com/?p=8688</guid>
				<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2016/09/Employee-flight-risk.jpg?fit=300%2C212&ssl=1" width="300" height="212" title="Employee Risk" alt="Employee Risk" /></div>
<div>Employees can be your most valuable asset — and your biggest security nightmare. Often, then unknowingly engage in risky behaviors setting your company up for scammers. Taking work home, for example, might seem innocent enough, but it can put holes in your security defenses. Here are five ways that your employees might be putting your [&#8230;]</div>
<p>The post <a rel="nofollow" href="https://tech-tech-goose.com/5-ways-employees-might-putting-business-risk/">5 Ways Your Employees Might Be Putting Your Business at Risk</a> appeared first on <a rel="nofollow" href="https://tech-tech-goose.com">Tech Tech Goose</a>.</p>
]]></description>
								<enclosure url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2016/09/Employee-flight-risk.jpg?fit=1024%2C724&#038;ssl=1" length="221342" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2016/09/Employee-flight-risk.jpg?fit=300%2C212&#038;ssl=1" width="300" height="212" medium="image" type="image/jpeg">
	<media:copyright>Tech Tech Goose</media:copyright>
	<media:title>Employee Risk</media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2016/09/Employee-flight-risk.jpg?resize=150%2C150&#038;ssl=1" width="150" height="150" />
<post-id xmlns="com-wordpress:feed-additions:1">8688</post-id>	</item>
		<item>
		<title>WPA2 and Your Wifi&#8217;s Security &#8211; Protect Your Business From KRACK</title>
		<link>https://tech-tech-goose.com/wpa2-and-wifis-security-protect-business-from-krack/</link>
				<pubDate>Tue, 17 Oct 2017 16:41:49 +0000</pubDate>
		<dc:creator><![CDATA[Joe Svoboda]]></dc:creator>
				<category><![CDATA[Latest News]]></category>
		<category><![CDATA[Network Infrastructure]]></category>
		<category><![CDATA[Security & Privacy]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[Tools and Tips]]></category>

		<guid isPermaLink="false">http://tech-tech-goose.com/?p=10218</guid>
				<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://i0.wp.com/tech-tech-goose.com/wp-content/uploads/2017/10/wpa2-wi-fi-vulnerability-to-krack-attacks_1508220430.jpeg?fit=300%2C139&ssl=1" width="300" height="139" title="" alt="" /></div>
<div>Yesterday, security researchers in Belgium alerted the public of a vulnerability (KRACK) in WPA2, today&#8217;s standard for encrypting data over wi-fi networks. WPA2 (WiFi Protected Access 2) has been the most secure option to deter eavesdroppers since 2004. Networks using WPA2 are everywhere and is likely what type of network you connect to everyday in [&#8230;]</div>
<p>The post <a rel="nofollow" href="https://tech-tech-goose.com/wpa2-and-wifis-security-protect-business-from-krack/">WPA2 and Your Wifi&#8217;s Security &#8211; Protect Your Business From KRACK</a> appeared first on <a rel="nofollow" href="https://tech-tech-goose.com">Tech Tech Goose</a>.</p>
]]></description>
								<enclosure url="https://i0.wp.com/tech-tech-goose.com/wp-content/uploads/2017/10/wpa2-wi-fi-vulnerability-to-krack-attacks_1508220430.jpeg?fit=990%2C460&#038;ssl=1" length="99943" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://i0.wp.com/tech-tech-goose.com/wp-content/uploads/2017/10/wpa2-wi-fi-vulnerability-to-krack-attacks_1508220430.jpeg?fit=300%2C139&#038;ssl=1" width="300" height="139" medium="image" type="image/jpeg">
	<media:copyright>Tech Tech Goose</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://i0.wp.com/tech-tech-goose.com/wp-content/uploads/2017/10/wpa2-wi-fi-vulnerability-to-krack-attacks_1508220430.jpeg?resize=150%2C150&#038;ssl=1" width="150" height="150" />
<post-id xmlns="com-wordpress:feed-additions:1">10218</post-id>	</item>
		<item>
		<title>We&#8217;re A Managed Services Provider -Why Is That Different From Other IT Companies?</title>
		<link>https://tech-tech-goose.com/managed-services-provider-different-companies/</link>
				<pubDate>Wed, 11 Oct 2017 16:30:02 +0000</pubDate>
		<dc:creator><![CDATA[Joe Svoboda]]></dc:creator>
				<category><![CDATA[Latest News]]></category>

		<guid isPermaLink="false">http://tech-tech-goose.com/?p=10197</guid>
				<description><![CDATA[<div>For the last 2 years, The Miller Group has been known as something called a &#8220;managed service provider&#8221; or MSP. In the IT industry, this is a label used most often by technology companies who offer clients services based on a monthly subscription model. Wikipedia says &#8220;Managed services is the practice of outsourcing, on a proactive basis, [&#8230;]</div>
<p>The post <a rel="nofollow" href="https://tech-tech-goose.com/managed-services-provider-different-companies/">We&#8217;re A Managed Services Provider -Why Is That Different From Other IT Companies?</a> appeared first on <a rel="nofollow" href="https://tech-tech-goose.com">Tech Tech Goose</a>.</p>
]]></description>
								<post-id xmlns="com-wordpress:feed-additions:1">10197</post-id>	</item>
		<item>
		<title>Twice in A Week: The Miller Group Sees Scams Too</title>
		<link>https://tech-tech-goose.com/twice-in-a-week-the-miller-group-sees-scams-too/</link>
				<pubDate>Fri, 22 Sep 2017 16:36:52 +0000</pubDate>
		<dc:creator><![CDATA[Joe Svoboda]]></dc:creator>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Latest News]]></category>
		<category><![CDATA[Security & Privacy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[Tools and Tips]]></category>

		<guid isPermaLink="false">http://tech-tech-goose.com/?p=10165</guid>
				<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://i0.wp.com/tech-tech-goose.com/wp-content/uploads/2017/09/shutterstock_363752051-e1506100802905.jpg?fit=300%2C186&ssl=1" width="300" height="186" title="" alt="" /></div>
<div>Scams come in all shapes and sizes. Every business is a susceptible target for these ever-improving criminals who try to profit from you or your employees mistakes. Case in point, within the last week, The Miller Group received two scam attempt of different types. Luckily, our staff thwarted the efforts but some businesses might not [&#8230;]</div>
<p>The post <a rel="nofollow" href="https://tech-tech-goose.com/twice-in-a-week-the-miller-group-sees-scams-too/">Twice in A Week: The Miller Group Sees Scams Too</a> appeared first on <a rel="nofollow" href="https://tech-tech-goose.com">Tech Tech Goose</a>.</p>
]]></description>
								<enclosure url="https://i0.wp.com/tech-tech-goose.com/wp-content/uploads/2017/09/shutterstock_363752051-e1506100802905.jpg?fit=600%2C371&#038;ssl=1" length="27034" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://i0.wp.com/tech-tech-goose.com/wp-content/uploads/2017/09/shutterstock_363752051-e1506100802905.jpg?fit=300%2C186&#038;ssl=1" width="300" height="186" medium="image" type="image/jpeg">
	<media:copyright>Tech Tech Goose</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://i0.wp.com/tech-tech-goose.com/wp-content/uploads/2017/09/shutterstock_363752051-e1506100802905.jpg?resize=150%2C150&#038;ssl=1" width="150" height="150" />
<post-id xmlns="com-wordpress:feed-additions:1">10165</post-id>	</item>
		<item>
		<title>Equifax Data Breach: Your Identity Is At Risk</title>
		<link>https://tech-tech-goose.com/equifax-data-breach-your-identity-at-risk/</link>
				<pubDate>Mon, 11 Sep 2017 18:08:04 +0000</pubDate>
		<dc:creator><![CDATA[Joe Svoboda]]></dc:creator>
				<category><![CDATA[Latest News]]></category>
		<category><![CDATA[Security & Privacy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://tech-tech-goose.com/?p=10104</guid>
				<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2017/09/equifax-data-breach-credit-report-hack.png?fit=300%2C157&ssl=1" width="300" height="157" title="" alt="" /></div>
<div>If you&#8217;ve ever opened a credit card, taken out a loan or have bills in your name, you&#8217;ve got a credit report. It also means you&#8217;re likely affected by the latest data breach. 143 million Americans had their personally identifiable information stolen from Equifax between May and July of this year. That&#8217;s nearly half the U.S. [&#8230;]</div>
<p>The post <a rel="nofollow" href="https://tech-tech-goose.com/equifax-data-breach-your-identity-at-risk/">Equifax Data Breach: Your Identity Is At Risk</a> appeared first on <a rel="nofollow" href="https://tech-tech-goose.com">Tech Tech Goose</a>.</p>
]]></description>
								<enclosure url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2017/09/equifax-data-breach-credit-report-hack.png?fit=728%2C380&#038;ssl=1" length="7111" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2017/09/equifax-data-breach-credit-report-hack.png?fit=300%2C157&#038;ssl=1" width="300" height="157" medium="image" type="image/jpeg">
	<media:copyright>Tech Tech Goose</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2017/09/equifax-data-breach-credit-report-hack.png?resize=150%2C150&#038;ssl=1" width="150" height="150" />
<post-id xmlns="com-wordpress:feed-additions:1">10104</post-id>	</item>
		<item>
		<title>How To Set Up a VPN in Windows 10</title>
		<link>https://tech-tech-goose.com/setup-vpn-windows-10/</link>
				<pubDate>Mon, 28 Aug 2017 20:49:01 +0000</pubDate>
		<dc:creator><![CDATA[Michael McCool]]></dc:creator>
				<category><![CDATA[Latest News]]></category>
		<category><![CDATA[Tools and Tips]]></category>

		<guid isPermaLink="false">http://tech-tech-goose.com/?p=10078</guid>
				<description><![CDATA[<div style="margin: 5px 5% 10px 5%;"><img src="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2017/08/best-vpn.jpg?fit=300%2C193&ssl=1" width="300" height="193" title="" alt="" /></div>
<div>As your company grows, you might branch out to multiple offices or shops across a given area. In order to stay efficient, the employees working in those locations need a secure, reliable, fast way to share information across their computer networks. Also, if you have traveling personnel such as a sales team, they need an [&#8230;]</div>
<p>The post <a rel="nofollow" href="https://tech-tech-goose.com/setup-vpn-windows-10/">How To Set Up a VPN in Windows 10</a> appeared first on <a rel="nofollow" href="https://tech-tech-goose.com">Tech Tech Goose</a>.</p>
]]></description>
								<enclosure url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2017/08/best-vpn.jpg?fit=700%2C450&#038;ssl=1" length="70105" type="image/jpg" />
<media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2017/08/best-vpn.jpg?fit=300%2C193&#038;ssl=1" width="300" height="193" medium="image" type="image/jpeg">
	<media:copyright>Tech Tech Goose</media:copyright>
	<media:title></media:title>
	<media:description type="html"><![CDATA[]]></media:description>
</media:content>
<media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://i1.wp.com/tech-tech-goose.com/wp-content/uploads/2017/08/best-vpn.jpg?resize=150%2C150&#038;ssl=1" width="150" height="150" />
<post-id xmlns="com-wordpress:feed-additions:1">10078</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.w3-edge.com/products/

Page Caching using disk: enhanced (Page is feed) 
Minified using disk

Served from: tech-tech-goose.com @ 2019-05-24 06:40:08 by W3 Total Cache
-->