<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Life &#187; cyber security</title>
	<atom:link href="https://www.informationlife.net/tag/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.informationlife.net</link>
	<description>The latest Information Lifecycle Management (ILM) updates</description>
	<lastBuildDate>Wed, 30 Mar 2016 11:17:49 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.17</generator>
	<item>
		<title>The Three Biggest Threats to Your Business’ Cyber Security</title>
		<link>https://www.informationlife.net/the-three-biggest-threats-your-business-cyber-security-2/</link>
		<comments>https://www.informationlife.net/the-three-biggest-threats-your-business-cyber-security-2/#comments</comments>
		<pubDate>Sat, 22 Mar 2014 06:09:34 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[cyber security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4965</guid>
		<description><![CDATA[<p>Thanks to Target’s data breach fiasco and the NSA data leaks, data security has been at the forefront of discussion. Here are three of the biggest threats to your company’s cyber security that you should know. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/the-three-biggest-threats-your-business-cyber-security-2/">The Three Biggest Threats to Your Business’ Cyber Security</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Thanks to Target’s data breach fiasco and the NSA data leaks, data security has been at the forefront of discussion. Here are three of the biggest threats to your company’s cyber security that you should know. <a href="http://www.business2community.com/business-intelligence/three-biggest-threats-business-cyber-security-0819952">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/the-three-biggest-threats-your-business-cyber-security-2/">The Three Biggest Threats to Your Business’ Cyber Security</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/the-three-biggest-threats-your-business-cyber-security-2/feed/</wfw:commentRss>
		<slash:comments>15</slash:comments>
		</item>
		<item>
		<title>The Year Ahead In Cyber Security: What You Need To Know</title>
		<link>https://www.informationlife.net/the-year-ahead-in-cyber-security-what-you-need-to-know/</link>
		<comments>https://www.informationlife.net/the-year-ahead-in-cyber-security-what-you-need-to-know/#comments</comments>
		<pubDate>Mon, 23 Dec 2013 08:46:33 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cyber security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4851</guid>
		<description><![CDATA[<p>2013 was a watershed year for cyber security and digital secret-keeping. But what does the average business need to know about keeping others locked out of private affairs or business dealings? More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/the-year-ahead-in-cyber-security-what-you-need-to-know/">The Year Ahead In Cyber Security: What You Need To Know</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>2013 was a watershed year for cyber security and digital secret-keeping. But what does the average business need to know about keeping others locked out of private affairs or business dealings? <a href="http://www.forbes.com/sites/karstenstrauss/2013/12/22/the-year-ahead-in-cyber-security-what-you-need-to-know/">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/the-year-ahead-in-cyber-security-what-you-need-to-know/">The Year Ahead In Cyber Security: What You Need To Know</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/the-year-ahead-in-cyber-security-what-you-need-to-know/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
		</item>
		<item>
		<title>Top 6 Threats to Enterprise Security</title>
		<link>https://www.informationlife.net/top-6-threats-enterprise-security/</link>
		<comments>https://www.informationlife.net/top-6-threats-enterprise-security/#comments</comments>
		<pubDate>Fri, 30 Aug 2013 07:29:46 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4548</guid>
		<description><![CDATA[<p>With “cyber espionage” making headlines, enterprises are buttering their security taking a closer look at threats that can impact their business and ultimately their bottom line. McAfee Labs has analyzed the threats of the past quarter for emerging trends, which center on mobile and overall malware. With BYOD becoming common across many enterprises, threats that...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-6-threats-enterprise-security/">Top 6 Threats to Enterprise Security</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2013/08/Top-6-Threats-to-Enterprise-Security.jpg"><img class="alignleft  wp-image-4550"  src="http://www.informationlife.net/wp-content/uploads/2013/08/Top-6-Threats-to-Enterprise-Security-150x150.jpg" alt="Top 6 Threats to Enterprise Security" width="135" height="135" /></a>With “cyber espionage” making headlines, enterprises are buttering their security taking a closer look at threats that can impact their business and ultimately their bottom line. McAfee Labs has analyzed the threats of the past quarter for emerging trends, which center on mobile and overall malware.</p>
<p>With BYOD becoming common across many enterprises, threats that once considered consumer problems are now becoming issues for the enterprise as well. Targeted Trojans, Mobile Spyware, Ransomware, Phishing, Database Breaches, and Browser-based Threats seem to be the top six threats to enterprise security. <a href="http://www.information-management.com/resource-center/?id=10024811">More&gt;&gt;</a></p>
<p><em>Image courtesy of David Castillo Dominici at <a href="http://www.freedigitalphotos.net/" target="_blank">FreeDigitalPhotos.net</a></em></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-6-threats-enterprise-security/">Top 6 Threats to Enterprise Security</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/top-6-threats-enterprise-security/feed/</wfw:commentRss>
		<slash:comments>9</slash:comments>
		</item>
		<item>
		<title>India has 42 mn cyber crime victims every year</title>
		<link>https://www.informationlife.net/india-42-mn-cyber-crime-victims-every-year/</link>
		<comments>https://www.informationlife.net/india-42-mn-cyber-crime-victims-every-year/#comments</comments>
		<pubDate>Mon, 24 Jun 2013 09:27:29 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cyber security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4168</guid>
		<description><![CDATA[<p>Cyber crimes are reaching an alarming level in India! The &#8216;Internet Security Threat&#8217; released by Norton (Symantec) states India has 42 million cybercrimes every year.  During the last year, 52 per cent of such victims had suffered attacks such as malware, viruses, hacking, scams, fraud and theft. The study reports seven out of 10 adults...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/india-42-mn-cyber-crime-victims-every-year/">India has 42 mn cyber crime victims every year</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Cyber crimes are reaching an alarming level in India! The &#8216;Internet Security Threat&#8217; released by Norton (Symantec) states India has 42 million cybercrimes every year.  During the last year, 52 per cent of such victims had suffered attacks such as malware, viruses, hacking, scams, fraud and theft. The study reports seven out of 10 adults have been victims of different modes of cyber crime in their life time. <a href="http://www.business-standard.com/article/current-affairs/india-has-42-mn-cyber-crime-victims-every-year-113062400097_1.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/india-42-mn-cyber-crime-victims-every-year/">India has 42 mn cyber crime victims every year</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/india-42-mn-cyber-crime-victims-every-year/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>How small businesses can avoid a data security disaster like LinkedIn’s</title>
		<link>https://www.informationlife.net/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins-2/</link>
		<comments>https://www.informationlife.net/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins-2/#comments</comments>
		<pubDate>Mon, 25 Jun 2012 08:12:47 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[password threat]]></category>
		<category><![CDATA[small business]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=1728</guid>
		<description><![CDATA[<p>Small business owners would be wise to change their social networking passwords immediately and repeat the precaution at least once in the next few weeks, says John Sileo, privacy and trust strategist. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins-2/">How small businesses can avoid a data security disaster like LinkedIn’s</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Small business owners would be wise to change their social networking passwords immediately and repeat the precaution at least once in the next few weeks, says John Sileo, privacy and trust strategist. <a href="http://www.washingtonpost.com/business/on-small-business/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins/2012/06/08/gJQAALjwNV_story.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins-2/">How small businesses can avoid a data security disaster like LinkedIn’s</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins-2/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
		</item>
	</channel>
</rss>
