<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 18:37:23 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/securityservice/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Cyber security best practices for employees in enterprise organisations]]></title><description><![CDATA[Protecting personal and organisational information is fundamental in preventing cyber threats, phishing awareness training Enterprise organisations usually have a larger, and more diverse workforce - This]]></description><link>http://direct.ecency.com/cybersecurity/@phriendlyphishau/cyber-security-best-practices-for</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@phriendlyphishau/cyber-security-best-practices-for</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[phriendlyphishau]]></dc:creator><pubDate>Wed, 31 Jul 2024 04:27:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/3uGGCvyenqJmh44FbHKAFYHpBYzyvHnzMwrvVPHQgmtwryhAb37jBsnZotZmxjgsYZTUGp7PTsQX1BErtDLebwo5SGvFLjeDmt4dZYCV4UDizMhdBcA6QqQsoPgGdA4NjB9pa9B2et3vVGfDhhny6CMHm8HhENtdvAsjedZpuPnitg4yGUQViKZBfeNEQwcYY7sHs8i4Nrxv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[HubSpot Implementation Services For Businesses & Agencies]]></title><description><![CDATA[Supercharge your growth with custom implementation The level of customizability we offer shoots through the roof! That’s how we help you get the best outcomes with HubSpot implementations. Don’t miss out]]></description><link>http://direct.ecency.com/cybersecurity/@hypeinsight/hubspot-implementation-services-for-businesses</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@hypeinsight/hubspot-implementation-services-for-businesses</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[hypeinsight]]></dc:creator><pubDate>Thu, 13 Jun 2024 16:30:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjW4PvRk9nXBzqrPWMsMTjNrXDPFFf11LoY7ty44cX9BB8rcmW9moABrvyRYzW9dbri7445zbGgfa5jNGxjBUSb28K7c1f4GGjB6xHVUnzGpE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Privacy and Online Security Myths | Cyber security ]]></title><description><![CDATA[Ideally, we all want to keep our data and identities safe online, but there's a lot of confusion about what online privacy means in the real world. You might think you’re doing everything right, following]]></description><link>http://direct.ecency.com/cybersecurity/@phriendlyphishau/privacy-and-online-security-myths</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@phriendlyphishau/privacy-and-online-security-myths</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[phriendlyphishau]]></dc:creator><pubDate>Tue, 11 Jun 2024 01:49:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/5ShzsKnKF7vqASPAqXGPakzgncLgnonBpRauPEjcNekK9t4CHPbtsSkmaDSFHkBWxwDnoFTgTqYWispKNkKJvKo4MkTeptB7LsptEGbp7yeyRskFFtJqpG9hEVduFAiHMTBWeyXiLGbMTpo8D58m1U7Y?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber Security Awarness Training For Business  ]]></title><description><![CDATA[When it comes to cyber security, employees are often the weakest link. Without an understanding of how to identify and respond to common threats, your employees are easy targets to exploit. However it]]></description><link>http://direct.ecency.com/cybersecurity/@phriendlyphishau/cyber-security-awarness-training-for</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@phriendlyphishau/cyber-security-awarness-training-for</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[phriendlyphishau]]></dc:creator><pubDate>Wed, 15 May 2024 01:36:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NUjnoD8Yrh1Cy7awRojZWHzB7mii5CjDwpwwnq91fgEiSJ3vq49SWdxGaESpx8h1ciZxxa8N3eoqJmmipr9bEhYrm9vFma1CwE48nQ2wgQ3qmN3nXrAqqpfcnmthEwYpk359xyE2Z1FNyHt7FjZQVLjkVUZEgRtJHmUi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Enterprise Security Awareness Training Courses And Solutions]]></title><description><![CDATA[For enterprise security that’s anchored in your culture, train your workforce so that people no longer think about security. They just do it. Teach staff to use office devices responsibly at work Encourage]]></description><link>http://direct.ecency.com/cybersecurity/@phriendlyphishau/enterprise-security-awareness-training-courses</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@phriendlyphishau/enterprise-security-awareness-training-courses</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[phriendlyphishau]]></dc:creator><pubDate>Thu, 25 Apr 2024 02:35:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NUjnoD8Yrh1Cy7awRojZWHzB7mii5CjvGFzxU3ejB5fwjADnBGNCLwan2fh3jyb26azoZ1AzVoAA7R5wJPDRLmmEdLikL8s6NQp5xEWgVYgFk7HAWXvkPbwgZHcsJXrF4dMVxLE1DH7uYKTqGsAPxStRVXW1aqPR2enS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Phishing Awareness Training Solutions And Simulations]]></title><description><![CDATA[Condition your employees to resist cyber criminals. With world-class phishing awareness & simulation training and mock attacks, they’ll less likely fall for a dodgy line that could entangle your business]]></description><link>http://direct.ecency.com/cybersecurity/@phriendlyphishau/phishing-awareness-training-solutions-and</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@phriendlyphishau/phishing-awareness-training-solutions-and</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[phriendlyphishau]]></dc:creator><pubDate>Tue, 05 Mar 2024 03:45:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/3DLAmCsuTe3bf3YJfXXmyAh7VWik7LRgWLXMEsfcXc6Lx5uGRkFs7Cuw2ekRNDfN89geFbVesGYJHVXjrNEBjW7qEjmcqNtuVpEHdJRENwFbmVf4dKmvewWHdt1Je2tWXg7BS2UAJoU422zL43KHRSkNKRXngJi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Global Managed Security Service Market Research Report for 2018 Explored in Latest Research]]></title><description><![CDATA[Definition: In registering, Managed security administrations (MSS) are organize security benefits that have been outsourced to a specialist organization. An organization giving such an administration is]]></description><link>http://direct.ecency.com/securityservice/@tessa13/global-managed-security-service-market-research-report-for-2018-explored-in-latest-research</link><guid isPermaLink="true">http://direct.ecency.com/securityservice/@tessa13/global-managed-security-service-market-research-report-for-2018-explored-in-latest-research</guid><category><![CDATA[securityservice]]></category><dc:creator><![CDATA[tessa13]]></dc:creator><pubDate>Tue, 15 May 2018 12:46:42 GMT</pubDate></item></channel></rss>