<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Life &#187; password threat</title>
	<atom:link href="https://www.informationlife.net/tag/password-threat/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.informationlife.net</link>
	<description>The latest Information Lifecycle Management (ILM) updates</description>
	<lastBuildDate>Wed, 30 Mar 2016 11:17:49 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.17</generator>
	<item>
		<title>Data leaks, employee error, BYOD top list of security threats</title>
		<link>https://www.informationlife.net/data-leaks-employee-error-byod-top-list-security-threats/</link>
		<comments>https://www.informationlife.net/data-leaks-employee-error-byod-top-list-security-threats/#comments</comments>
		<pubDate>Wed, 04 Jul 2012 03:23:23 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[password threat]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=2023</guid>
		<description><![CDATA[<p>In the next 12 months, data leaks and employee-related issues top the list of hot-button IT issues most likely to challenge an organization&#8217;s network security. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/data-leaks-employee-error-byod-top-list-security-threats/">Data leaks, employee error, BYOD top list of security threats</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>In the next 12 months, data leaks and employee-related issues top the list of hot-button IT issues most likely to challenge an organization&#8217;s network security. <a href="http://www.marketwatch.com/story/isaca-issues-cobit-5-for-information-security-2012-06-25">More&gt;&gt;</a><strong></strong></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/data-leaks-employee-error-byod-top-list-security-threats/">Data leaks, employee error, BYOD top list of security threats</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/data-leaks-employee-error-byod-top-list-security-threats/feed/</wfw:commentRss>
		<slash:comments>10</slash:comments>
		</item>
		<item>
		<title>How small businesses can avoid a data security disaster like LinkedIn’s</title>
		<link>https://www.informationlife.net/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins-2/</link>
		<comments>https://www.informationlife.net/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins-2/#comments</comments>
		<pubDate>Mon, 25 Jun 2012 08:12:47 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[password threat]]></category>
		<category><![CDATA[small business]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=1728</guid>
		<description><![CDATA[<p>Small business owners would be wise to change their social networking passwords immediately and repeat the precaution at least once in the next few weeks, says John Sileo, privacy and trust strategist. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins-2/">How small businesses can avoid a data security disaster like LinkedIn’s</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Small business owners would be wise to change their social networking passwords immediately and repeat the precaution at least once in the next few weeks, says John Sileo, privacy and trust strategist. <a href="http://www.washingtonpost.com/business/on-small-business/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins/2012/06/08/gJQAALjwNV_story.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins-2/">How small businesses can avoid a data security disaster like LinkedIn’s</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/how-small-businesses-can-avoid-a-data-security-disaster-like-linkedins-2/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
		</item>
	</channel>
</rss>
