<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 11:58:51 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@idmdatasecurity/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[The Future of Data Protection]]></title><description><![CDATA[As we create and store more digital data, it is no wonder that data protection is something that is getting more attention than ever before. Many of us no longer keep hard copies of important information]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/the-future-of-data-protection</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/the-future-of-data-protection</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Wed, 11 Jul 2018 13:07:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm3sWQK3HKkuAMedF1JSX7yKgEqYjnyTKPwrcseWSPEPawfPa25VyhpHYktM2CZxCu22FmpeuoWYGwc9ec5QNzdiXbfuvp2RnnNenQtCjtLG9UAUcMF2GJWEKgsZERm8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Data Protection in 2018]]></title><description><![CDATA[In today's day and age of digital dominance, data protection is a critical grading point for any user or organization. 2018 has witnessed a number of new trends that your current data protection plan might]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/data-protection-in-2018</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/data-protection-in-2018</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Mon, 09 Jul 2018 10:17:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/vM1pGHgNcyCXUWJECrZbvn1NMPj1oFGUo3gYfF3NNPRD9bRibpPgYBYSCTk5xy7uJ6hSChj6fCfQovgyB8hZPotDKuRGPhj6jE1xFNkRAinQ53Hr5j3tYtCxxnboUH9JuawcNBx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Information Security in 2018]]></title><description><![CDATA[2018 is halfway through and information security is something that remains important as we see more data being stored online, hackers getting craftier, and threats becoming more severe. At the beginning]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/information-security-in-2018</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/information-security-in-2018</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Fri, 06 Jul 2018 08:52:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/9vWp6aU4y8kwSZ9Gw15LFL3aMdhmgmBBFMpDJregpdP329aBjRZC6GjxwHzUdCakqQkVHsfVqwH37bm76vMcSChokmsLVVSgXm41HWMjGuYX8E2SVZerovBf1AgD9KiSon9U2rXyTjGt6ryug?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Our unique service is ready to use. Try the demo version of our product today!]]></title><description><![CDATA[IDM is a cloud data storage solution that provides the best protection for your information this is available. This unique service is powered by patented SIZE technology which features safety, security,]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/our-unique-service-is-ready-to-use-try-the-demo-version-of-our-product-today</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/our-unique-service-is-ready-to-use-try-the-demo-version-of-our-product-today</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Fri, 22 Jun 2018 15:11:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/4HFqJv9qRjVeVQzX3gvDHytNF793bg88B7fESPieLQ8dxHoULT5XEztrttL2vfda72XyU4VSdCAk75wUZQ9LdRHq5Tj65ccPGGgthcP9XsMp8yZD93v7GDwB6uNQhKqBZTQ6SRAS2L7bJKSgbdiuye2WwgzYnoy7zeJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Targeted Surveillance Spyware Hits Google Play]]></title><description><![CDATA[Spyware can get hold of your passwords as well as bank and credit card information and send this over the Internet to people and organizations that can use it for fraud. Hopefully you have a good antivirus]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/targeted-surveillance-spyware-hits-google-play</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/targeted-surveillance-spyware-hits-google-play</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Thu, 21 Jun 2018 16:08:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/Gr7d242AAPKdHsv38E62dikXDSFLLH7S1ZjNruB7UYasXM2QurBD8FRahERzBk3S6MvcCuZ66mmSQPhNPSqskpAMdjuJ11pPjw9UwJZqvEWknZLrRsMTTHUiGZneAeX4b5GMQkKckKoi1C5SCpHioBqYkHz3ErY4oYX2TXviwcchQnr53jC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why to Invest in Data Security Based on Blockchain Technology]]></title><description><![CDATA[As we continue our time in the computer age, it is becoming clear how important data security is. Vulnerabilities leave us open to having information stolen or compromised and this is why it is critical]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/why-to-invest-in-data-security-based-on-blockchain-technology</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/why-to-invest-in-data-security-based-on-blockchain-technology</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Tue, 19 Jun 2018 16:53:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/2xVmzkbNCvpwrGAp476Ci7TQrTSdeJo5CKB7AH6MwGdMXp7ALRS18faRThpSXegXDm2vyK8bDHv1VHxzLyBA4KyDuez36ud9uXuGDenXx7uokUQSg376XdhK3CFMe7vm3NHsNNPMMVo6gUBft1m8J5b3SDsseYTdUbr7RkcCE6n9VQPwhjmPPyw1VMBw6ZMoGdwQNn5t?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[IDM Token Sale is LIVE!]]></title><description><![CDATA[Cloud data storage with the strongest protection available is the product offered by IDM. Enhanced with patented SIZE technology, IDM is basically a storage solution based on future vulnerabilities that]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/idm-token-sale-is-live</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/idm-token-sale-is-live</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Mon, 18 Jun 2018 11:16:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/3jpR3paJ37V8JxyWvtbhvcm5k3roJwHBR4WTALx7XaoRovpVNkax4JBTuNGGhhALFqpZW5mMA5w7fwTPMS3y159AYY43QaTspReqAfukM8c2MkTZ2udVXktcCtCvVPFbyYaWS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why You Should Be Using a Good Password]]></title><description><![CDATA[Email, social media, banking, and even gym membership accounts require passwords. We are living in the online age and that means having to remember countless logins and passwords to get into the digital]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/why-you-should-be-using-a-good-password</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/why-you-should-be-using-a-good-password</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Thu, 14 Jun 2018 20:28:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8gG2NWUBL8wUVbdrSwVWpp6CGkP99ZhsyZYd1jJST6Qw8DXaZ8WXzFnx6fcJpyG7tzQmt8zisLrXeZFAtJQWx1HyX5KPTwgjKKLLzkEGeeyMKmuAqVavyfrfZitxuiq8Wo6QRrnzBYCK7YPpcF3xpv5Ve8bXAgrA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Your Printer Could be a Hacker Target!]]></title><description><![CDATA[It seems like every time we turn around hackers have come up with some new way to compromise our data. If passwords and email links and public Wi-Fi connections weren’t enough to be worried about, now]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/your-printer-could-be-a-hacker-target</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/your-printer-could-be-a-hacker-target</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Wed, 13 Jun 2018 09:06:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/NTy4GV6ooFRkjTArCrebYc2WCCmX2KY4SfTbUDpHWg6ZYF9RNFunqM8Xbd7cyHKW5gWrPNe3q2UWFcqodbX7chFiStRJtAaGnPP8JtdpvqWahUA8z74gcRvUqLV4uCjTNrKPgutS9e3tw54BYGhhznAwZZozdhjuvEJVMy2E?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How Our Tokens are Distributed]]></title><description><![CDATA[IDM is a cloud data storage service that is going to ICO! We want to offer the world a product that is unlike anything else on the market as well as an opportunity for investors to be a part of this project.]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/how-our-tokens-are-distributed</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/how-our-tokens-are-distributed</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Mon, 11 Jun 2018 19:18:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zNbcrMx63MjNfGTCj3awaa7hytARqqDDxERvWYR5hFhiiC9AW1g5EHUkxzoijfPFHBZrTucnjN47hvs7pYASqbvVqqeLsPBDrqzZVzd6tx2imxiqC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Threats from Hackers on the Rise]]></title><description><![CDATA[If you think that hacking methods and techniques are getting stronger and cleverer, you’re right. Hackers have a reputation for finding all sorts of ways to gain access to our personal information. It’s]]></description><link>http://direct.ecency.com/innovativeminerals/@idmdatasecurity/threats-from-hackers-on-the-rise</link><guid isPermaLink="true">http://direct.ecency.com/innovativeminerals/@idmdatasecurity/threats-from-hackers-on-the-rise</guid><category><![CDATA[innovativeminerals]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Thu, 07 Jun 2018 19:50:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/AmRc67RgYaWTCbCd1L4AQP82AFWYYzZC15DpSZWeSYgzVNRsYgc35Q3uJFSnF5AMoqBfw7u31ia5CnZfXQ8bkpzKNE7sqWeiXr2vqdyJ7kKgBxfznjBXSietja6gM5raXG1QJn4EkZvKnTvKi4PuVxbkGS2YxuPt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[IDM: A New Era of Secure Data Storage]]></title><description><![CDATA[IDM is a cloud data storage service that is going to change the way that we upload, store, share, and transfer files online. This service, enhanced by its patented post-quantum SIZE protection, is bringing]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/idm-a-new-era-of-secure-data-storage</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/idm-a-new-era-of-secure-data-storage</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Wed, 06 Jun 2018 17:19:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/6KincH1mMRDELmKnnjdU4UHt2fC2WfFZBpGeMyg4QTCSizjGQeLHgNbMeRMh4WLfgaa4LrL8LF9p7eQEZRmqqAhQVpaJpkpXfiVfeyjzaAUcTD8oaGRMYSHE4122fVpmCH3rEZfgMDtjBh3aNcqWzvXzBq28yRgJf9sZGht2WQXPLDCLZsbcu4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How We Provide Complete Protection from Quantum Supremacy]]></title><description><![CDATA[We live in a time that is witnessing the advancement of technology surpassing levels in many cases never even dreamed of. While technology gets stronger, so, too, do the vulnerabilities that we are faced]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/how-we-provide-complete-protection-from-quantum-supremacy</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/how-we-provide-complete-protection-from-quantum-supremacy</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Tue, 05 Jun 2018 16:46:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/JLypLpqVPBaKaRaouqJKpK1JreX63Cyei6SL51PK9fWosw5YJGYDDUCAD4fUBG3ZxF2sa6L3MQTF9F9oqmrabAuHNz2C8PA3Q31tGqzSLfDdsKB9zPnTU5NWw2hTCwwA4EqyjCgNy4oSqYktk9GUfA1VW7WZ3KMXxXLPDfyuZ4UD9CCJ4bFGQatBW9VvnF4YiA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[IDM’s Expert Coin Rating]]></title><description><![CDATA[IDM is going to ICO! This kind of fundraising is a great way for startups to raise money for innovative new projects that can really change the world. There have been a number of ICO success stories, but]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/idm-s-expert-coin-rating</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/idm-s-expert-coin-rating</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Mon, 04 Jun 2018 16:40:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/5ShzsKnKF7vppGeV6VN3m3GSDcLoRruAhMmifZtFSDkYScUm9ssK9dAZ9mwCwuqf5rg3dLtBKkSsaqc1jFxyAqrfJbHQkXLZtyrWMA9bHRzUXd5eZpFRF1bAWgVSDDLXVB3fMiTRayRYzjdpEugpq4jg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Existing Cloud Technology Doesn’t Keep Data Safe Enough]]></title><description><![CDATA[Cloud storage solutions have changed the way that we manage our digital files. This technology enables us to keep our data stored online instead of having to carry around disks that can get lost or need]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/existing-cloud-technology-doesn-t-keep-data-safe-enough</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/existing-cloud-technology-doesn-t-keep-data-safe-enough</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Sun, 03 Jun 2018 16:43:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/JLypLpqVPBaKaRaouqJKpK1JreX63Cyei6SL51PK9fWosvgeH38xuck9L47D1Gq9pLT4JAGf7MuQQjMhWMZZFEwFnQDfDKX2YZpCuHmzpgw4yt4TcWHyg48sRxfgUneHkqPgSeWaarEmKyjULSZwss3M8MBeUD3ZuBFkX2Tu1JiBFPfkDTUyKLJAqwMPhvT1Ga?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to Prevent Common Types of Data Loss]]></title><description><![CDATA[Data loss is one of the biggest threats to our digital information. We often worry about hack attacks, which can also cause significant damage, but data loss can be overlooked as it is something that typically]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/how-to-prevent-common-types-of-data-loss</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/how-to-prevent-common-types-of-data-loss</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Thu, 31 May 2018 12:38:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/8DAuGnTQCLptHK3w4xbU3SMDsfFVWre2qvkWUixoMRzeeZe4Eh4pPs3gdeBArT3Lhv7gvDnuWNQuKoTBfRgVrDEa2BFhTMimhtaKaZgcT9LFwf24rKE3L7CAoKtffnFuHqDh5E6Pr1d8Y8M451PgqyNTpX8SvedP56mDNgV1gRU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Passwords of 2017: The Bad, The Funny, And The Insecure]]></title><description><![CDATA[It seems like every time we turn around there is some new service we are using that requires a password. It can be hard to keep track of all of these alphanumeric combinations (that sometimes need symbols,]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/passwords-of-2017-the-bad-the-funny-and-the-insecure</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/passwords-of-2017-the-bad-the-funny-and-the-insecure</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Wed, 30 May 2018 08:51:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2N61tyyncFaFVtpM8rCsJzDgecVMtkz4jpzBsszXjhqan9qLCTAQbEnoDdMgvQoUxT4CL21jhQMvjJTNGQ64E2xe2Rp92DfVuCyAR9qVWABydUgcJE2WoNWLUp1q2awT8QCqX7PGf6er?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[IDM: Data Security Available to Everyone]]></title><description><![CDATA[Data security is one of the pressing issues of our time. As we store more and more information online, it is important for this data to be kept safe from potential threats. These threats manifest themselves]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/idm-data-security-available-to-everyone</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/idm-data-security-available-to-everyone</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Mon, 28 May 2018 09:54:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2N61tyyncFaFVtpM8rCsJzDgecVMtkz4jpzBsszXjhqan9iMP9U3V1fjPmYs2hHF2CjDPNFsK2VFeKEgHrtJ3MmuS5aSr4NbGkBXHxTLfyTo845LnFcZPwp94W7RsgxZfTEPdEkiMAdk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Blockchain to Solve Internet Data Privacy Issues]]></title><description><![CDATA[Blockchain technology is providing new solutions for many of the new issues that have arisen as a result of the digital age that is upon us. Users these days are demanding safe and secure services when]]></description><link>http://direct.ecency.com/idm/@idmdatasecurity/blockchain-to-solve-internet-data-privacy-issues</link><guid isPermaLink="true">http://direct.ecency.com/idm/@idmdatasecurity/blockchain-to-solve-internet-data-privacy-issues</guid><category><![CDATA[idm]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Sun, 13 May 2018 20:17:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pQYiuVvgYiUBP16WHGGN7UNn1BCdGeA4zyXUdFWNuW4eFenA3mAqTFgbDFxD2vEgjAW8Y8neuyZwK9HZvzaXEi2K8LDWAwwCuXkotcUhkZEqhp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How Data Breaches Threaten Us All]]></title><description><![CDATA[Data breaches are something threatening us all when records are hacked into. Businesses and individuals alike can suffer from these break-ins and research shows that there have been over 8,600 data breaches]]></description><link>http://direct.ecency.com/innovativeminerals/@idmdatasecurity/how-data-breaches-threaten-us-all</link><guid isPermaLink="true">http://direct.ecency.com/innovativeminerals/@idmdatasecurity/how-data-breaches-threaten-us-all</guid><category><![CDATA[innovativeminerals]]></category><dc:creator><![CDATA[idmdatasecurity]]></dc:creator><pubDate>Fri, 11 May 2018 16:11:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJb4ARrxQxCjX4jizub4U5CAK3WwB89oR5WZ2PGVY3qCdP72YWB72BbsbcwzVNYY8qakxNMfngMkJf4iz6Qg1GdX1PExev7hpVYof5A4og?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>