<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Disaster Recovery | Website Cyber Security</title>
	<atom:link href="https://websitecyber.com/category/disaster-recovery/feed/" rel="self" type="application/rss+xml" />
	<link>https://websitecyber.com</link>
	<description>Website Cyber Security</description>
	<lastBuildDate>Fri, 11 Apr 2025 11:51:53 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png</url>
	<title>Disaster Recovery | Website Cyber Security</title>
	<link>https://websitecyber.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cloud Security &#038; Disaster Recovery</title>
		<link>https://websitecyber.com/cloud-security-disaster-recovery/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Fri, 11 Apr 2025 11:51:51 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=50824</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/cloud-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Cloud" decoding="async" /><p>Organizations are leveraging the cloud for its scalability, cost effectiveness, and crucially, its role in strengthening their disaster recovery posture.</p>
The post <a href="https://websitecyber.com/cloud-security-disaster-recovery/">Cloud Security & Disaster Recovery</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Incident Response Plan Template</title>
		<link>https://websitecyber.com/incident-response-plan-template/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Fri, 04 Apr 2025 10:30:37 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=50745</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/business_continuity-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Business Continuity" decoding="async" /><p>Cybersecurity incidents are not a matter of if but when. Preparing for these events is crucial, and an Incident Response Plan is your first line of defense.</p>
The post <a href="https://websitecyber.com/incident-response-plan-template/">Incident Response Plan Template</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>What is a System Security Plan</title>
		<link>https://websitecyber.com/what-is-a-system-security-plan/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Tue, 18 Mar 2025 09:01:22 +0000</pubDate>
				<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=50517</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/threat_defense-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Threat Defense" decoding="async" /><p>To protect sensitive information a robust System Security Plan (SSP) is crucial. But what exactly is an SSP, and how does it safeguard information systems?</p>
The post <a href="https://websitecyber.com/what-is-a-system-security-plan/">What is a System Security Plan</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Cybersecurity Warns of Scammers</title>
		<link>https://websitecyber.com/cybersecurity-warns-of-scammers/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Tue, 04 Feb 2025 10:58:41 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Scams]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=50247</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/scams-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Scams" decoding="async" loading="lazy" /><p>Cybersecurity expert is sounding the alarm about scammers and criminal groups targeting disaster victims and exploiting their financial vulnerability.</p>
The post <a href="https://websitecyber.com/cybersecurity-warns-of-scammers/">Cybersecurity Warns of Scammers</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Desert Tech Ransomware Cyber Attack</title>
		<link>https://websitecyber.com/desert-tech-ransomware-cyber-attack/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 10 Aug 2024 01:11:36 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49442</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/ransomware-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Ransomware" decoding="async" loading="lazy" /><p>Just a month ago, the company's CEO delivered a baffling message regarding a ransomware cyber attack, which was soon removed.</p>
The post <a href="https://websitecyber.com/desert-tech-ransomware-cyber-attack/">Desert Tech Ransomware Cyber Attack</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>CrowdStrike Global Outage</title>
		<link>https://websitecyber.com/crowdstrike-global-outage/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 22 Jul 2024 11:37:05 +0000</pubDate>
				<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49319</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="cyber security" decoding="async" loading="lazy" srcset="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-300x300.png 300w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-270x270.png 270w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-192x192.png 192w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-180x180.png 180w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png 32w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon.png 512w" sizes="auto, (max-width: 150px) 100vw, 150px" /><p>The recent global outage caused by a software update from CrowdStrike. With millions of computers affected and critical operations disrupted.</p>
The post <a href="https://websitecyber.com/crowdstrike-global-outage/">CrowdStrike Global Outage</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Security &#038; Business Resilience</title>
		<link>https://websitecyber.com/security-business-resilience/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 04 Feb 2024 00:15:47 +0000</pubDate>
				<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=48466</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/business_continuity-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Business Continuity" decoding="async" loading="lazy" /><p>Security &#038; Business Resilience How an enterprise can prepare for and recover after an emergency, disaster or pandemic.</p>
The post <a href="https://websitecyber.com/security-business-resilience/">Security & Business Resilience</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>MercyOne Cyber Attack</title>
		<link>https://websitecyber.com/mercyone-cyber-attack/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 15 Oct 2022 02:21:42 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Health Care]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=44693</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/ransomware-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Ransomware" decoding="async" loading="lazy" /><p>MercyOne Central Iowa's region, including Des Moines, struggles with an unspecified cyber attack breach affecting its parent company.</p>
The post <a href="https://websitecyber.com/mercyone-cyber-attack/">MercyOne Cyber Attack</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Operation Aurora Hacking Google</title>
		<link>https://websitecyber.com/operation-aurora-hacking-google/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 08 Oct 2022 04:36:23 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=44495</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/attacks-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Attacks" decoding="async" loading="lazy" /><p>What happens when a country attacks a company? In 2009, Google found out and cybersecurity was never the same again.</p>
The post <a href="https://websitecyber.com/operation-aurora-hacking-google/">Operation Aurora Hacking Google</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Super Rich&#8217;s Secret Doomsday Bunkers</title>
		<link>https://websitecyber.com/super-richs-secret-doomsday-bunkers/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 02 Oct 2022 11:35:04 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=44454</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2022/10/image-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Bunkers" decoding="async" loading="lazy" srcset="https://websitecyber.com/wp-content/uploads/2022/10/image-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2022/10/image-120x120.png 120w" sizes="auto, (max-width: 150px) 100vw, 150px" /><p>Some of the richest people are building bunkers, preparing for a breakdown of civilization that they caused.</p>
The post <a href="https://websitecyber.com/super-richs-secret-doomsday-bunkers/">Super Rich’s Secret Doomsday Bunkers</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Hacking a Samsung for $6 Million</title>
		<link>https://websitecyber.com/hacking-a-samsung-for-6-million/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 07 Aug 2022 04:37:15 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Communications]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Physical]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=43484</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/hacking-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Hacking" decoding="async" loading="lazy" /><p>With the promise of up to $6 million worth of Bitcoin locked on this Samsung Galaxy phone, it was a challenge Kingpin couldn't refuse.</p>
The post <a href="https://websitecyber.com/hacking-a-samsung-for-6-million/">Hacking a Samsung for $6 Million</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Crypto Wallet Hack For $2 Million</title>
		<link>https://websitecyber.com/crypto-wallet-hack-for-2-million/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 07 Aug 2022 04:17:27 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=43481</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/hacking-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Hacking" decoding="async" loading="lazy" /><p>Kingpin was contacted to hack a Trezor One hardware wallet and recover $2 million worth of cryptocurrency (in the form of THETA).</p>
The post <a href="https://websitecyber.com/crypto-wallet-hack-for-2-million/">Crypto Wallet Hack For $2 Million</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Lawsuit Sues China for Six Trillion Dollars in Coronavirus Reparations</title>
		<link>https://websitecyber.com/lawsuit-sues-china-for-six-trillion-dollars-in-coronavirus-reparations/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Fri, 24 Apr 2020 08:50:19 +0000</pubDate>
				<category><![CDATA[Banking]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=42493</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/reviews-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Reviews" decoding="async" loading="lazy" /><p>The true cost of the coronavirus pandemic, the loss of life and the economic devastation, is incalculable.</p>
The post <a href="https://websitecyber.com/lawsuit-sues-china-for-six-trillion-dollars-in-coronavirus-reparations/">Lawsuit Sues China for Six Trillion Dollars in Coronavirus Reparations</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Is a Global Recession Looming?</title>
		<link>https://websitecyber.com/is-a-global-recession-looming/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Fri, 24 Apr 2020 08:28:39 +0000</pubDate>
				<category><![CDATA[Banking]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Health Care]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=42491</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/reviews-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Reviews" decoding="async" loading="lazy" /><p>Millions of jobs could be lost as economies grind to a halt in the midst of efforts to contain the coronavirus pandemic is a global recession looming?</p>
The post <a href="https://websitecyber.com/is-a-global-recession-looming/">Is a Global Recession Looming?</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Coronavirus</title>
		<link>https://websitecyber.com/coronavirus/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 23 Mar 2020 06:02:39 +0000</pubDate>
				<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Health Care]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=41629</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/reviews-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Reviews" decoding="async" loading="lazy" /><p>Wuhan a city more populous than London or New York placed in lock down following the outbreak of the new and deadly coronavirus.</p>
The post <a href="https://websitecyber.com/coronavirus/">Coronavirus</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>How One Ransomware Attack Cost £45m to Fix</title>
		<link>https://websitecyber.com/how-one-ransomware-attack-cost-45m-to-fix/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 16 Mar 2020 13:38:27 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Communications]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=41435</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/ransomware-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Ransomware" decoding="async" loading="lazy" /><p>Ransomware cyber-attacks are targeting large companies and demanding huge payments.</p>
The post <a href="https://websitecyber.com/how-one-ransomware-attack-cost-45m-to-fix/">How One Ransomware Attack Cost £45m to Fix</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Why Hydro Chose to Be Transparent During Cyber Attack</title>
		<link>https://websitecyber.com/why-hydro-chose-to-be-transparent-during-cyber-attack/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 15 Mar 2020 07:28:55 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Executive Decisions]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=41360</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/attacks-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Attacks" decoding="async" loading="lazy" /><p>Hydro was the target of an extensive cyber-attack on March 19, 2019, disrupting operations in several of the company's business areas.</p>
The post <a href="https://websitecyber.com/why-hydro-chose-to-be-transparent-during-cyber-attack/">Why Hydro Chose to Be Transparent During Cyber Attack</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
