<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>TBG Security Blog - IT Security</title>
	<atom:link href="https://tbgsecurity.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://tbgsecurity.com/</link>
	<description>IT Security news and trends by it security professionals. Data Breach, Identity Theft Prevention, Incident Response, Computer Forensics are some of the IT security services we provide.</description>
	<lastBuildDate>Wed, 24 Aug 2022 16:35:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Kaseya and REvil: two sides of the supply-chain risk story</title>
		<link>https://tbgsecurity.com/kaseya-and-revil-two-sides-of-the-supply-chain-risk-story/</link>
					<comments>https://tbgsecurity.com/kaseya-and-revil-two-sides-of-the-supply-chain-risk-story/#respond</comments>
		
		<dc:creator><![CDATA[tbgsecurity]]></dc:creator>
		<pubDate>Thu, 30 Jun 2022 03:52:12 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://tbgsecurity.com/?p=139</guid>

					<description><![CDATA[<p>The ransomware problem has escalated at a steady pace over the last few years, with that upward slope punctuated by a few larger spikes as major incidents hit the headlines.</p>
<p>The post <a href="https://tbgsecurity.com/kaseya-and-revil-two-sides-of-the-supply-chain-risk-story/">Kaseya and REvil: two sides of the supply-chain risk story</a> appeared first on <a href="https://tbgsecurity.com">TBG Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://tbgsecurity.com/kaseya-and-revil-two-sides-of-the-supply-chain-risk-story/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IoT device makers wanting to better security standards</title>
		<link>https://tbgsecurity.com/iot-device-makers-wanting-to-better-security-standards/</link>
					<comments>https://tbgsecurity.com/iot-device-makers-wanting-to-better-security-standards/#respond</comments>
		
		<dc:creator><![CDATA[tbgsecurity]]></dc:creator>
		<pubDate>Tue, 27 Apr 2021 07:59:00 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Comprehensive Compliance Solutions]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<category><![CDATA[dangers]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[ioXt Alliance]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://tbgsecurity.com/?p=1250</guid>

					<description><![CDATA[<p>The Internet of Things is moving ever closer to an Internet of Everything, with more devices and dinguses connected to, and controlled via, our worldwide network of networks. </p>
<p>The post <a href="https://tbgsecurity.com/iot-device-makers-wanting-to-better-security-standards/">IoT device makers wanting to better security standards</a> appeared first on <a href="https://tbgsecurity.com">TBG Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://tbgsecurity.com/iot-device-makers-wanting-to-better-security-standards/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hafnium and SolarWinds shake up attitudes to supply chain risk management</title>
		<link>https://tbgsecurity.com/hafnium-and-solarwinds-shake-up-attitudes-to-supply-chain-risk-management/</link>
					<comments>https://tbgsecurity.com/hafnium-and-solarwinds-shake-up-attitudes-to-supply-chain-risk-management/#respond</comments>
		
		<dc:creator><![CDATA[Carole Theriault]]></dc:creator>
		<pubDate>Tue, 23 Mar 2021 17:39:00 +0000</pubDate>
				<category><![CDATA[Cyber Criminals]]></category>
		<category><![CDATA[cyber-security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Internet Explorer Security Flaw]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[assessment]]></category>
		<category><![CDATA[Microsoft Exchange server]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Solarwinds]]></category>
		<category><![CDATA[zero day]]></category>
		<guid isPermaLink="false">https://tbgsecurity.com/?p=1607</guid>

					<description><![CDATA[<p>That’s the big question facing companies around the world in recent months. In the wake of a wave of epic vulnerabilities, and equally massive compromises, affecting businesses and government institutions across the US and pretty much everywhere else, the reliability of our suppliers and providers has come into sharp focus.</p>
<p>The post <a href="https://tbgsecurity.com/hafnium-and-solarwinds-shake-up-attitudes-to-supply-chain-risk-management/">Hafnium and SolarWinds shake up attitudes to supply chain risk management</a> appeared first on <a href="https://tbgsecurity.com">TBG Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://tbgsecurity.com/hafnium-and-solarwinds-shake-up-attitudes-to-supply-chain-risk-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Takeaways from the British Mensa Security Drama</title>
		<link>https://tbgsecurity.com/takeaways-from-the-british-mensa-security-drama/</link>
					<comments>https://tbgsecurity.com/takeaways-from-the-british-mensa-security-drama/#respond</comments>
		
		<dc:creator><![CDATA[Carole Theriault]]></dc:creator>
		<pubDate>Tue, 09 Feb 2021 14:03:00 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://tbgsecurity.com/?p=1744</guid>

					<description><![CDATA[<p>Sometimes, you hear of security issues that baffle the mind. Worse they could have been easily avoided, and also handled much better in the security incident aftermath.</p>
<p>The post <a href="https://tbgsecurity.com/takeaways-from-the-british-mensa-security-drama/">Takeaways from the British Mensa Security Drama</a> appeared first on <a href="https://tbgsecurity.com">TBG Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://tbgsecurity.com/takeaways-from-the-british-mensa-security-drama/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Remember Online Scams Target Businesses Too</title>
		<link>https://tbgsecurity.com/remember-online-scams-target-businesses-too/</link>
					<comments>https://tbgsecurity.com/remember-online-scams-target-businesses-too/#respond</comments>
		
		<dc:creator><![CDATA[tbgsecurity]]></dc:creator>
		<pubDate>Fri, 22 Jan 2021 08:38:00 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Ransomeware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[downloads]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[spoof]]></category>
		<category><![CDATA[statistics]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">https://tbgsecurity.com/?p=1280</guid>

					<description><![CDATA[<p>It’s online scam a go-go out there. It seems that no one is safe. Not the widower looking for love; not the person looking for information on covid, not the home user who accidentally visits an infected site, not the worker bee who clicks on a dodgy email link. </p>
<p>The post <a href="https://tbgsecurity.com/remember-online-scams-target-businesses-too/">Remember Online Scams Target Businesses Too</a> appeared first on <a href="https://tbgsecurity.com">TBG Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://tbgsecurity.com/remember-online-scams-target-businesses-too/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2020 Holiday Infosecurity advice for the people in your life</title>
		<link>https://tbgsecurity.com/2020-holiday-infosecurity-advice-for-the-people-in-your-life/</link>
					<comments>https://tbgsecurity.com/2020-holiday-infosecurity-advice-for-the-people-in-your-life/#respond</comments>
		
		<dc:creator><![CDATA[Carole Theriault]]></dc:creator>
		<pubDate>Tue, 08 Dec 2020 09:06:00 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Ransomeware]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[2020]]></category>
		<category><![CDATA[advice]]></category>
		<category><![CDATA[christmas]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[holiday]]></category>
		<category><![CDATA[safer holidayy]]></category>
		<category><![CDATA[tips]]></category>
		<guid isPermaLink="false">https://tbgsecurity.com/?p=1342</guid>

					<description><![CDATA[<p>Sure, if you are reading this post, it’s pretty likely that you are into information security. Perhaps you even do it as a job.</p>
<p>The post <a href="https://tbgsecurity.com/2020-holiday-infosecurity-advice-for-the-people-in-your-life/">2020 Holiday Infosecurity advice for the people in your life</a> appeared first on <a href="https://tbgsecurity.com">TBG Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://tbgsecurity.com/2020-holiday-infosecurity-advice-for-the-people-in-your-life/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Information Security Policies: Knowing Who and How to Trust</title>
		<link>https://tbgsecurity.com/information-security-policies-knowing-who-and-how-to-trust/</link>
					<comments>https://tbgsecurity.com/information-security-policies-knowing-who-and-how-to-trust/#respond</comments>
		
		<dc:creator><![CDATA[Carole Theriault]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 08:44:00 +0000</pubDate>
				<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[authorization]]></category>
		<category><![CDATA[confidentiality]]></category>
		<category><![CDATA[integrity]]></category>
		<category><![CDATA[policies]]></category>
		<category><![CDATA[procedures]]></category>
		<category><![CDATA[Profiles]]></category>
		<category><![CDATA[trust]]></category>
		<guid isPermaLink="false">https://tbgsecurity.com/?p=1290</guid>

					<description><![CDATA[<p>After reading my previous post, you may think that greedy/evil/incompetent co-workers are a few steps away from causing data-breach related havoc. </p>
<p>The post <a href="https://tbgsecurity.com/information-security-policies-knowing-who-and-how-to-trust/">Information Security Policies: Knowing Who and How to Trust</a> appeared first on <a href="https://tbgsecurity.com">TBG Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://tbgsecurity.com/information-security-policies-knowing-who-and-how-to-trust/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Are Your IT Security Insides Troubling You?</title>
		<link>https://tbgsecurity.com/are-your-it-security-insides-troubling-you/</link>
					<comments>https://tbgsecurity.com/are-your-it-security-insides-troubling-you/#respond</comments>
		
		<dc:creator><![CDATA[Carole Theriault]]></dc:creator>
		<pubDate>Tue, 10 Nov 2020 16:12:00 +0000</pubDate>
				<category><![CDATA[Cyber Criminals]]></category>
		<category><![CDATA[cyber-security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[insider threats]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://tbgsecurity.com/?p=1545</guid>

					<description><![CDATA[<p>This post is going to ask you to take a seat and consider something you’ve probably suspected but didn’t want to admit: The biggest security threat to your company’s data might not come from those hoodie-wearing hackers but from the people within the company; your smiling, innocent-looking colleagues.</p>
<p>The post <a href="https://tbgsecurity.com/are-your-it-security-insides-troubling-you/">Are Your IT Security Insides Troubling You?</a> appeared first on <a href="https://tbgsecurity.com">TBG Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://tbgsecurity.com/are-your-it-security-insides-troubling-you/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Making Vendor Risk Management Part of Your Security Strategy</title>
		<link>https://tbgsecurity.com/making-vendor-risk-management-part-of-your-security-strategy/</link>
					<comments>https://tbgsecurity.com/making-vendor-risk-management-part-of-your-security-strategy/#respond</comments>
		
		<dc:creator><![CDATA[tbgsecurity]]></dc:creator>
		<pubDate>Wed, 21 Oct 2020 09:07:00 +0000</pubDate>
				<category><![CDATA[CISO on Demand]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Comprehensive Compliance Solutions]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Regulatory Compliance]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<category><![CDATA[Remote management]]></category>
		<category><![CDATA[requirements]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[third parties]]></category>
		<category><![CDATA[tips]]></category>
		<category><![CDATA[vendor]]></category>
		<category><![CDATA[VRM]]></category>
		<guid isPermaLink="false">https://tbgsecurity.com/?p=1346</guid>

					<description><![CDATA[<p>When we think of Vendor Risk Management (VRM), there’s usually a policy or a procedure, possibly even a process to follow – and for good reason. </p>
<p>The post <a href="https://tbgsecurity.com/making-vendor-risk-management-part-of-your-security-strategy/">Making Vendor Risk Management Part of Your Security Strategy</a> appeared first on <a href="https://tbgsecurity.com">TBG Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://tbgsecurity.com/making-vendor-risk-management-part-of-your-security-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How the pandemic changed everything and nothing</title>
		<link>https://tbgsecurity.com/how-the-pandemic-changed-everything-and-nothing/</link>
					<comments>https://tbgsecurity.com/how-the-pandemic-changed-everything-and-nothing/#respond</comments>
		
		<dc:creator><![CDATA[Carole Theriault]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 08:58:00 +0000</pubDate>
				<category><![CDATA[CISO on Demand]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[2020]]></category>
		<category><![CDATA[changes]]></category>
		<category><![CDATA[Corona]]></category>
		<category><![CDATA[Covid]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[pandemic]]></category>
		<category><![CDATA[reports]]></category>
		<category><![CDATA[statistics]]></category>
		<guid isPermaLink="false">https://tbgsecurity.com/?p=1330</guid>

					<description><![CDATA[<p>This is a quick look back over the last six months or so: what’s changed in the world of work and cybersecurity and how businesses have responded. </p>
<p>The post <a href="https://tbgsecurity.com/how-the-pandemic-changed-everything-and-nothing/">How the pandemic changed everything and nothing</a> appeared first on <a href="https://tbgsecurity.com">TBG Security</a>.</p>
]]></description>
		
					<wfw:commentRss>https://tbgsecurity.com/how-the-pandemic-changed-everything-and-nothing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>