<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Business Continuity | Website Cyber Security</title>
	<atom:link href="https://websitecyber.com/tag/business-continuity/feed/" rel="self" type="application/rss+xml" />
	<link>https://websitecyber.com</link>
	<description>Website Cyber Security</description>
	<lastBuildDate>Fri, 11 Apr 2025 12:39:07 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png</url>
	<title>Business Continuity | Website Cyber Security</title>
	<link>https://websitecyber.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Blue Team and Database Security</title>
		<link>https://websitecyber.com/blue-team-and-database-security/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Fri, 11 Apr 2025 12:39:05 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[Patch Management]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=50830</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="cyber security" decoding="async" srcset="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-300x300.png 300w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-270x270.png 270w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-192x192.png 192w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-180x180.png 180w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png 32w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon.png 512w" sizes="(max-width: 150px) 100vw, 150px" /><p>Databases are the lifeblood of most organizations protecting these assets falls on the shoulders of the Blue Team, the internal cybersecurity defenders.</p>
The post <a href="https://websitecyber.com/blue-team-and-database-security/">Blue Team and Database Security</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Incident Response Plan Template</title>
		<link>https://websitecyber.com/incident-response-plan-template/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Fri, 04 Apr 2025 10:30:37 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=50745</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/business_continuity-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Business Continuity" decoding="async" /><p>Cybersecurity incidents are not a matter of if but when. Preparing for these events is crucial, and an Incident Response Plan is your first line of defense.</p>
The post <a href="https://websitecyber.com/incident-response-plan-template/">Incident Response Plan Template</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Principles of Cybersecurity</title>
		<link>https://websitecyber.com/principles-of-cybersecurity/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Tue, 18 Mar 2025 09:20:51 +0000</pubDate>
				<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=50519</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="cyber security" decoding="async" srcset="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-300x300.png 300w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-270x270.png 270w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-192x192.png 192w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-180x180.png 180w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png 32w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon.png 512w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cybersecurity is a fundamental necessity. From individuals managing personal data to organizations safeguarding sensitive information.</p>
The post <a href="https://websitecyber.com/principles-of-cybersecurity/">Principles of Cybersecurity</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>What is a System Security Plan</title>
		<link>https://websitecyber.com/what-is-a-system-security-plan/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Tue, 18 Mar 2025 09:01:22 +0000</pubDate>
				<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=50517</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/threat_defense-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Threat Defense" decoding="async" loading="lazy" /><p>To protect sensitive information a robust System Security Plan (SSP) is crucial. But what exactly is an SSP, and how does it safeguard information systems?</p>
The post <a href="https://websitecyber.com/what-is-a-system-security-plan/">What is a System Security Plan</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Desert Tech Ransomware Cyber Attack</title>
		<link>https://websitecyber.com/desert-tech-ransomware-cyber-attack/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 10 Aug 2024 01:11:36 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49442</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/ransomware-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Ransomware" decoding="async" loading="lazy" /><p>Just a month ago, the company's CEO delivered a baffling message regarding a ransomware cyber attack, which was soon removed.</p>
The post <a href="https://websitecyber.com/desert-tech-ransomware-cyber-attack/">Desert Tech Ransomware Cyber Attack</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>CrowdStrike Global Outage</title>
		<link>https://websitecyber.com/crowdstrike-global-outage/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 22 Jul 2024 11:37:05 +0000</pubDate>
				<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49319</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="cyber security" decoding="async" loading="lazy" srcset="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-300x300.png 300w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-270x270.png 270w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-192x192.png 192w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-180x180.png 180w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png 32w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon.png 512w" sizes="auto, (max-width: 150px) 100vw, 150px" /><p>The recent global outage caused by a software update from CrowdStrike. With millions of computers affected and critical operations disrupted.</p>
The post <a href="https://websitecyber.com/crowdstrike-global-outage/">CrowdStrike Global Outage</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Scam Warnings CrowdStrike IT Outage</title>
		<link>https://websitecyber.com/scam-warnings-crowdstrike-it-outage/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 22 Jul 2024 10:28:50 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Scams]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49308</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/scams-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Scams" decoding="async" loading="lazy" /><p>CrowdStrike, a well-known cybersecurity company, raised alarms not only about cybersecurity but also about a concerning trend the customer support scam.</p>
The post <a href="https://websitecyber.com/scam-warnings-crowdstrike-it-outage/">Scam Warnings CrowdStrike IT Outage</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Global Tech Chaos Major Outage</title>
		<link>https://websitecyber.com/global-tech-chaos-major-outage/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Fri, 19 Jul 2024 10:13:06 +0000</pubDate>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Communications]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Health Care]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Manufacturing]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Retail]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49243</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/applications-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Applications" decoding="async" loading="lazy" /><p>A widespread tech outage has brought some of the world's largest and most influential companies to their knees by US cybersecurity firm CrowdStrike</p>
The post <a href="https://websitecyber.com/global-tech-chaos-major-outage/">Global Tech Chaos Major Outage</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>CentroMed Systems Back Online</title>
		<link>https://websitecyber.com/centromed-systems-back-online/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Thu, 04 Jul 2024 06:45:16 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Health Care]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49126</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/health_care-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Health Care" decoding="async" loading="lazy" /><p>CentroMed has announced the restoration of its systems following a data breach that began on April 30. Which impacted patient records and sensitive information.</p>
The post <a href="https://websitecyber.com/centromed-systems-back-online/">CentroMed Systems Back Online</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>CSO Online</title>
		<link>https://websitecyber.com/cso-online/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 17 Jun 2024 07:41:11 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Darknet]]></category>
		<category><![CDATA[Executive Decisions]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=48943</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/executive_decisions-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Executive Decisions" decoding="async" loading="lazy" /><p>CSO serves enterprise security decision-makers with the critical information they need to stay ahead of evolving threats and defend against cyberattacks.</p>
The post <a href="https://websitecyber.com/cso-online/">CSO Online</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Attack Cripples America</title>
		<link>https://websitecyber.com/cyber-attack-cripples-america/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 02 Mar 2024 00:29:07 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Threats]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Communications]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=48591</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/attacks-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Attacks" decoding="async" loading="lazy" /><p>The United States is facing a major cyber attack threat that has the potential to cripple the nation. Experts are warning that something big is coming.</p>
The post <a href="https://websitecyber.com/cyber-attack-cripples-america/">Cyber Attack Cripples America</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Security &#038; Business Resilience</title>
		<link>https://websitecyber.com/security-business-resilience/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 04 Feb 2024 00:15:47 +0000</pubDate>
				<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=48466</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/business_continuity-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Business Continuity" decoding="async" loading="lazy" /><p>Security &#038; Business Resilience How an enterprise can prepare for and recover after an emergency, disaster or pandemic.</p>
The post <a href="https://websitecyber.com/security-business-resilience/">Security & Business Resilience</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>$50m Fines Cyber Data Breaches</title>
		<link>https://websitecyber.com/50m-fines-cyber-data-breaches/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 22 Oct 2022 04:16:13 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=44774</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/attacks-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Attacks" decoding="async" loading="lazy" /><p>New cyber security legislation which would slam the country’s biggest companies with massive fines of up to $50 million.</p>
The post <a href="https://websitecyber.com/50m-fines-cyber-data-breaches/">$50m Fines Cyber Data Breaches</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Operation Aurora Hacking Google</title>
		<link>https://websitecyber.com/operation-aurora-hacking-google/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 08 Oct 2022 04:36:23 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=44495</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/attacks-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Attacks" decoding="async" loading="lazy" /><p>What happens when a country attacks a company? In 2009, Google found out and cybersecurity was never the same again.</p>
The post <a href="https://websitecyber.com/operation-aurora-hacking-google/">Operation Aurora Hacking Google</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Australians Ready For Cyber Attacks</title>
		<link>https://websitecyber.com/australians-ready-for-cyber-attacks/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 03 Oct 2022 01:55:26 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Communications]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Small Business]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=44473</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/attacks-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Attacks" decoding="async" loading="lazy" /><p>Millions of Australians are at risk after telecommunications company Optus was hacked. The question now is now are companies prepared for more cyber attacks?</p>
The post <a href="https://websitecyber.com/australians-ready-for-cyber-attacks/">Australians Ready For Cyber Attacks</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Super Rich&#8217;s Secret Doomsday Bunkers</title>
		<link>https://websitecyber.com/super-richs-secret-doomsday-bunkers/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 02 Oct 2022 11:35:04 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=44454</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2022/10/image-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Bunkers" decoding="async" loading="lazy" srcset="https://websitecyber.com/wp-content/uploads/2022/10/image-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2022/10/image-120x120.png 120w" sizes="auto, (max-width: 150px) 100vw, 150px" /><p>Some of the richest people are building bunkers, preparing for a breakdown of civilization that they caused.</p>
The post <a href="https://websitecyber.com/super-richs-secret-doomsday-bunkers/">Super Rich’s Secret Doomsday Bunkers</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>The Booming Ransomware Industry</title>
		<link>https://websitecyber.com/the-booming-ransomware-industry/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 01 Aug 2022 15:24:53 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Threats]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Darknet]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=43464</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/ransomware-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Ransomware" decoding="async" loading="lazy" /><p>The number of businesses falling victim to ransomware attacks each year is snowballing. That's because hackers have realized how lucrative these attacks are.</p>
The post <a href="https://websitecyber.com/the-booming-ransomware-industry/">The Booming Ransomware Industry</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Is a Global Recession Looming?</title>
		<link>https://websitecyber.com/is-a-global-recession-looming/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Fri, 24 Apr 2020 08:28:39 +0000</pubDate>
				<category><![CDATA[Banking]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Health Care]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=42491</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/reviews-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Reviews" decoding="async" loading="lazy" /><p>Millions of jobs could be lost as economies grind to a halt in the midst of efforts to contain the coronavirus pandemic is a global recession looming?</p>
The post <a href="https://websitecyber.com/is-a-global-recession-looming/">Is a Global Recession Looming?</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>The Third Industrial Revolution</title>
		<link>https://websitecyber.com/the-third-industrial-revolution/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 29 Mar 2020 23:33:05 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Digital Transformation]]></category>
		<category><![CDATA[Executive Decisions]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=41780</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/skills_and_training-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Skills and Training" decoding="async" loading="lazy" /><p>Is this the Third Industrial Revolution with the exhaustion of natural resources, declining productivity, slow growth and rising unemployment.</p>
The post <a href="https://websitecyber.com/the-third-industrial-revolution/">The Third Industrial Revolution</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>What You Can Learn from The Hydro Ransomware Attack</title>
		<link>https://websitecyber.com/what-you-can-learn-from-the-hydro-ransomware-attack/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 16 Mar 2020 13:51:19 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Communications]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Executive Decisions]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Manufacturing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=41437</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/ransomware-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Ransomware" decoding="async" loading="lazy" /><p>One of the world's biggest aluminium producers just fell victim to a ransomware attack. You can learn from the attack &#038; protect yourself.</p>
The post <a href="https://websitecyber.com/what-you-can-learn-from-the-hydro-ransomware-attack/">What You Can Learn from The Hydro Ransomware Attack</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
