<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>apex-technology-services</title>
    <link>https://www.apextech.it</link>
    <description />
    <atom:link href="https://www.apextech.it/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>Why We Need to Use Authenticator Apps</title>
      <link>https://www.apextech.it/why-we-need-to-use-authenticator-apps</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What are Authenticator Apps?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today’s digital world, passwords alone aren’t enough to keep your online accounts safe. We’ve all used a password to log into something before—but passwords can be guessed, stolen, or leaked. Cybercriminals are getting better at stealing login information through phishing, data breaches, and hacking tools. That’s why using an authenticator app is so important—
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           it adds a crucial extra layer of security
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Authenticator apps are a form of
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           two-factor authentication (2FA)
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . After entering your password, you open the app on your phone to get a temporary 6-digit code. This code changes every 30 seconds and is required to complete the login. Even if someone has your password, they can’t access your account without that code.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Unlike text message codes, which can be intercepted or sent to a stolen SIM card, authenticator apps store the code generator directly on your device.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           This makes it much harder for attackers to break in
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           They’re free, easy to use, and work with most major sites like Gmail, Facebook, and Amazon. It’s a small extra step that makes a big difference in protecting your personal info.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With so much personal and financial information stored online—from email and banking to shopping and social media—securing your accounts is more important than ever.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/1200x630wa-a1cfde30.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/google-authenticator-logo.png" alt=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/authenticator.jpg" length="72909" type="image/jpeg" />
      <pubDate>Wed, 20 Aug 2025 18:22:32 GMT</pubDate>
      <guid>https://www.apextech.it/why-we-need-to-use-authenticator-apps</guid>
      <g-custom:tags type="string">Articles,Security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/authenticator.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/authenticator.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Protecting Your PC During A Storm Surge</title>
      <link>https://www.apextech.it/protecting-your-pc-during-a-storm-surge</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Tropical Storm and Hurricane season are upon us here in the Gulf South region.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Here are some things you can do to protect your PCs and equipment when you're out of office during storm surges:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Make sure all PCs are turned
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            OFF
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , not just in sleep mode, before you leave your office to prevent power surge damage
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             If any equipment is on the ground, such as larger tower desktops, surge protectors, and battery backups,
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            move them to higher ground for flood protection
           &#xD;
      &lt;/strong&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             If you bring company laptops out of office to work from home, make sure you
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            plug into surge protectors
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             in your home to prevent power surge damage
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Another thing to note: though your office power may be on,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           internet speed may run slow or be out entirely
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . If you're having trouble connecting to internet once you're back in office, give us a call at
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="tel:225-910-8680"&gt;&#xD;
      
           (225) 910-8680
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            and we'll help you determine if your internet issues are server based or provider based.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Stay safe!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/pexels-photo-32899554.jpeg" length="150315" type="image/jpeg" />
      <pubDate>Wed, 16 Jul 2025 19:20:47 GMT</pubDate>
      <guid>https://www.apextech.it/protecting-your-pc-during-a-storm-surge</guid>
      <g-custom:tags type="string">Articles</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/pexels-photo-32899554.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/pexels-photo-32899554.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Unlocking Efficiency: Why Outsourced IT is the Smart Move for Modern Businesses</title>
      <link>https://www.apextech.it/unlocking-efficiency-why-outsourced-it-is-the-smart-move-for-modern-businesses</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Do You Want to Focus On Productivity, Or Computer Problems?
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In today’s fast-paced digital landscape, technology plays a central role in virtually every business function—from operations and communications to customer engagement and cybersecurity. But managing IT in-house can be costly, complex, and resource-draining—especially for small and mid-sized businesses. That’s where
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           outsourced IT
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            steps in. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Outsourced IT services allow organizations to delegate some or all of their technology needs to third-party providers. These managed service providers (MSPs) deliver expertise, infrastructure, and support at a fraction of the cost of building an in-house IT department. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Let’s dive into the key benefits and considerations of outsourcing your IT.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           The Business Case for Outsourced IT
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           1. Cost Efficiency
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Maintaining a full-time IT staff, keeping hardware updated, and staying compliant with evolving regulations can be expensive. Outsourced IT typically works on a subscription or pay-as-you-go model, allowing businesses to scale services as needed and avoid large upfront capital expenditures. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           2. Access to Top-Tier Talent
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When you outsource IT, you gain access to a wide pool of experts who stay up to date on the latest technologies, trends, and security protocols. This level of expertise is often out of reach for smaller companies hiring locally. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           3. Focus on Core Business
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           By offloading IT tasks, your internal teams can focus on strategic initiatives and customer-facing activities rather than troubleshooting tech issues or managing software updates. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           4. Improved Cybersecurity
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybersecurity is one of the biggest concerns in today’s digital era. Outsourced IT providers implement robust security measures—like firewalls, encryption, endpoint protection, and employee training—to protect sensitive data and minimize risk. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           What Services Can Be Outsourced?
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Outsourced IT can encompass a wide range of services, including: 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Help desk support 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Network and infrastructure management 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Cloud services and migration 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Data backup and disaster recovery 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Cybersecurity solutions 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            IT strategy and consulting 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Compliance and regulatory assistance
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Conclusion: Is Outsourced IT Right for You?
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Whether you’re a startup looking for affordable tech support or an established company aiming to modernize infrastructure,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           outsourced IT can provide the expertise, flexibility, and efficiency you need to stay competitive
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The key is to partner with a provider that understands your business goals and tailors their services accordingly. With the right support, your technology becomes a powerful enabler—not a burden. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Ready to explore the benefits of outsourced IT for your business?
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Let’s connect and find the solution that fits your goals.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/pexels-photo-7640774.jpeg" length="239345" type="image/jpeg" />
      <pubDate>Thu, 10 Jul 2025 18:44:40 GMT</pubDate>
      <guid>https://www.apextech.it/unlocking-efficiency-why-outsourced-it-is-the-smart-move-for-modern-businesses</guid>
      <g-custom:tags type="string">Articles,News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/pexels-photo-7640774.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/pexels-photo-7640774.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Protecting your Small Business from Cyber threats</title>
      <link>https://www.apextech.it/protecting-your-small-business-from-cyber-threats</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How can you protect yourself and your business from growing cyber threats?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ## Employees are Often the Weakest Link in Cybersecurity
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While cybersecurity threats can come from external sources, many cyber attacks are caused by employee mistakes. Unintentional actions, such as clicking on a malicious link or opening an infected email attachment, can easily lead to a security breach. Making sure your employees are aware of the risks involved is the first step in preventing such incidents from occurring.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ## Cybersecurity Threats are Constantly Evolving
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Hackers are always evolving their tactics and techniques to stay one step ahead of security protocols. Cybersecurity is an ever-changing field, and it can be challenging to keep up with the latest trends and threats. Employee awareness training can help your employees stay informed about the latest threats and techniques used by attackers, enabling them to make informed decisions, identify potential threats, and take proactive measures to prevent cyber attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ## A Culture of Security is Key
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Investing in employee awareness training shows your employees that you take cybersecurity seriously. Creating a culture of security within your organization can significantly reduce your risk of cyber attacks. When employees feel empowered with the knowledge and tools to identify and prevent cyber attacks, they are more likely to speak up and report potential threats or suspicious activities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ## Compliance and Legal Requirements
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In addition to protecting your business from cybersecurity threats, employee awareness training can also help you meet compliance and legal requirements. Depending on your industry sector and the nature of your business, you may need to comply with regulatory requirements such as HIPAA, GDPR, or PCI DSS. Failure to comply with these regulations can result in hefty fines and legal penalties.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ## Conclusion
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today's increasingly digital world, small businesses face a growing threat of cyber attacks. To protect your business from these threats, it’s essential to invest in employee awareness training for cybersecurity. At APEX Technologies, we offer managed IT services, including cybersecurity training to help you protect your business from cyber threats. Contact us today to learn more about our services and how we can help your business stay secure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-330771.jpeg" length="528790" type="image/jpeg" />
      <pubDate>Wed, 26 Jun 2024 15:15:27 GMT</pubDate>
      <guid>https://www.apextech.it/protecting-your-small-business-from-cyber-threats</guid>
      <g-custom:tags type="string">Articles,Security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-330771.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-330771.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The State of Ransomware in the U.S. 2024</title>
      <link>https://www.apextech.it/the-state-of-ransomware-in-the-u-s-2024</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Findings from an independent, vendor-agnostic, survey of 855 IT professionals in mid-sized organizations in the United States of America.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           About the survey...
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Sophos commissioned an independent, vendor-agnostic survey of 5,000 IT/cybersecurity leaders in midsized organizations (100-5,000 employees) across 14 countries, including 855 respondents in the U.S. The survey was conducted between January and February 2024, and respondents were asked to respond based on their experiences in the previous 12 months. All financial data points are in U.S. dollars.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Clients of APEX Technologies are protected 24x7 wit real-time monitoring and support from Sophos to provide the highest level of cybersecurity protection available
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://irp.cdn-website.com/3c2a63e3/files/uploaded/sophos-state-of-ransomware-2024-us.pdf" target="_blank"&gt;&#xD;
      
           Click here to view the report.
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity-fc1f3cf7.jpg" length="64839" type="image/jpeg" />
      <pubDate>Fri, 03 May 2024 16:24:40 GMT</pubDate>
      <guid>https://www.apextech.it/the-state-of-ransomware-in-the-u-s-2024</guid>
      <g-custom:tags type="string">Articles,Security,Press Releases,Malicious News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity-fc1f3cf7.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity-fc1f3cf7.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>What are some common signs of phishing emails?</title>
      <link>https://www.apextech.it/what-are-some-common-signs-of-phishing-emails</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What are some common signs of phishing emails?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Phishing emails are cunningly designed to deceive recipients into revealing sensitive information, downloading malware, or taking harmful actions. As a small business owner, it’s crucial to recognize these red flags to protect your organization. Here are some common signs of phishing emails:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Suspicious Sender Address:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Check the sender’s email address carefully. Phishers often use spoofed or similar-looking addresses (e.g., “support@yourcompany.com” vs. “support@yourcompnay.com”).
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Urgent or Threatening Language:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Phishing emails create a sense of urgency. They might claim your account will be suspended, or you’ll face legal consequences unless you act immediately.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Generic Greetings:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Beware of emails that start with generic greetings like “Dear Customer” instead of using your name.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Misspellings and Grammatical Errors:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Phishers often make mistakes in spelling and grammar. Be cautious if an email contains obvious errors.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Unusual Requests for Personal Information:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Legitimate organizations won’t ask you to provide sensitive data (passwords, Social Security numbers) via email.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Unexpected Attachments or Links:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Be wary of attachments or links, especially if you didn’t expect them. Hover over links to see the actual URL before clicking.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Too Good to Be True Offers:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If an email promises huge rewards or prizes for little effort, it’s likely a phishing attempt.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Requests for Money or Gift Cards:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Phishers may impersonate colleagues or executives, asking you to transfer funds or buy gift cards. Always verify such requests through other channels.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Mismatched URLs:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Check the URL in the email. If it doesn’t match the legitimate website, it’s likely a phishing link.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Unusual Email Signature or Lack of One:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Legitimate emails usually have a professional signature. Absence or inconsistency is a red flag.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Remember, education and awareness are your best defenses. Train your employees to recognize these signs and report suspicious emails promptly. Implement robust security measures and stay vigilant to protect your small business from phishing attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg" length="265831" type="image/jpeg" />
      <pubDate>Fri, 03 May 2024 16:19:17 GMT</pubDate>
      <guid>https://www.apextech.it/what-are-some-common-signs-of-phishing-emails</guid>
      <g-custom:tags type="string">Articles,Security,Malicious News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Devastating Effects of Email Phishing on Small Businesses</title>
      <link>https://www.apextech.it/the-devastating-effects-of-email-phishing-on-small-businesses</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Email phishing attacks pose a significant threat to organizations of all sizes, including small businesses. These deceptive tactics not only compromise data security but also have far-reaching consequences that can cripple a business. Let’s delve into the devastating downsides of phishing attacks and their impact on small enterprises.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Direct Financial Losses
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Phishing attacks often lead to serious financial losses. Cybercriminals employ sneaky tactics like stealing credentials or sending fake invoices to deceive unsuspecting employees. In 2019 alone, these types of attacks resulted in an astonishing $1.7 billion in losses for organizations. This money could have been allocated for growth, service improvements, or even those cozy beanbags in the office chillout corner.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Damage to Reputation
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Once attackers compromise your systems, they can send out spam or malicious emails posing as your organization. The fallout? Long-term damage to your business reputation. Trust from customers and partners erodes, and news of the breach spreads rapidly in our hyper-connected world. Even the best PR agents can’t fully mitigate the impact. Announcing a data breach immediately tarnishes your image, leading to a loss of business that reverberates for years.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Operational Disruptions
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Phishing attacks aren’t just a nuisance; they can seriously disrupt operations. Once attackers infiltrate your network, they may install malware or ransomware, causing system outages and other disruptive incidents. Small businesses, with limited resources, find it particularly challenging to recover swiftly from such disruptions.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Legal Consequences
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In some cases, phishing attacks can escalate to legal action against your business. Regulatory bodies and affected parties may hold you accountable for failing to protect sensitive data. Legal battles drain resources, damage credibility, and distract from core business activities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Conclusion
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Small businesses must recognize the gravity of email phishing threats. Vigilance, employee training, and robust security measures are essential to safeguard against these attacks. Remember, prevention is far more cost-effective than dealing with the aftermath of a successful phishing campaign. Remember, as a small business owner, staying informed and proactive is crucial in the fight against cyber threats. Implement strong security practices, educate your team, and remain vigilant to protect your business from the perils of email phishing.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-2036656.jpeg" length="358321" type="image/jpeg" />
      <pubDate>Fri, 03 May 2024 16:15:12 GMT</pubDate>
      <guid>https://www.apextech.it/the-devastating-effects-of-email-phishing-on-small-businesses</guid>
      <g-custom:tags type="string">Articles,Security,Malicious News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-2036656.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-2036656.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How Microsoft SharePoint can benefit small nonprofit agencies</title>
      <link>https://www.apextech.it/how-microsoft-sharepoint-can-benefit-small-nonprofit-agencies</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Benefits of Microsoft SharePoint for Small Nonprofits
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft SharePoint is a powerful platform that can help streamline your organization's workflows and improve collaboration between team members, both of which are crucial for small nonprofits with limited resources. Here are some ways that SharePoint can specifically benefit your agency:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Efficient Document Management: SharePoint allows you to store, manage, and share documents and files in a central location, making it easier for team members to access the information they need, when they need it.
            &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Organized Calendar Sharing: SharePoint's built-in calendar feature enables you to keep track of important deadlines, events, and meetings. It can also help you coordinate schedules with your fellow team members, volunteers, and partners.
            &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Efficient Email Communication: SharePoint allows you to host email distribution lists that can be used for sharing important messages with team members or volunteers. It also integrates seamlessly with Microsoft Outlook, allowing for easy communication between team members. 
             &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Secure Access Controls: SharePoint allows you to control access to sensitive information, ensuring that only authorized team members can view and make changes to certain files and documents. 
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Web-Based Access: SharePoint can be accessed from anywhere with an internet connection, making it easier for remote team members or volunteers to stay connected and collaborate with the team.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            These are just a few of the ways that Microsoft SharePoint can benefit small nonprofits like yours. As an IT services company, we can help your organization implement and optimize SharePoint to help maximize its effectiveness and efficiency.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/nonprofits"&gt;&#xD;
      
           Ready to learn more?
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/microsoft-sharepoint-tutorial-2.jpg" length="221674" type="image/jpeg" />
      <pubDate>Thu, 25 Jan 2024 22:34:35 GMT</pubDate>
      <guid>https://www.apextech.it/how-microsoft-sharepoint-can-benefit-small-nonprofit-agencies</guid>
      <g-custom:tags type="string">Articles,Microsoft</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/microsoft-sharepoint-tutorial-2.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/microsoft-sharepoint-tutorial-2.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>TPM 2.0 Chipset &amp; the Next Wave of Security Upgrades</title>
      <link>https://www.apextech.it/tpm-2-0-chipset-the-next-wave-of-security-upgrades</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What's next in Cybersecurity preparedness? TPM 2.0 Chipset.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    
          A Trusted Platform Module (TPM) 2.0 chip is a hardware component that provides an additional layer of security to a Windows computer by creating a physical barrier that protects the device and user credentials from malware and attackers 123. The chip is either integrated into the PC’s m
          &#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    
          otherboard or added to the CPU 1. TPM 2.0 is an international standard for a secure crypto
          &#xD;
    &lt;span&gt;&#xD;
      
           -
          &#xD;
    &lt;/span&gt;&#xD;
    
          processor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys 2. It is one of the more frustrating Windows 11 hardware requirements, as it is needed for either firmware TPM or a Trusted Platform Module 2.0 (TPM)
         &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/tpm4.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is TPM 2.0?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A Trusted Platform Module (TPM) is a security chip that is integrated into the motherboard of your laptop or desktop computer. TPM creates a secure environment for checking system integrity, authenticating users, and saving keys and passwords. TPM 2.0 was released in 2018 and comes with a set of new features, including the use of various hash algorithms, PINs, and user-defined key management.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Quick overview: What does TPM do?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Most users are familiar with common defenses against malware, rootkits and ransomware. Firewalls, antivirus programs and two-factor authentication are common go-to security measures. A Trusted Platform Module (TPM) is a security chip that provides your system with an extra layer of protection. The TPM chip is physically integrated into laptops and desktop computers and helps with device and user authentication, checking for system integrity and software licenses. Another important feature is the ability to save cryptographic keys, passwords and certificates. TPM creates a secure environment that’s protected from manipulations, meaning that it can check various software and hardware components to ensure their security during bootup. If the chip finds any manipulations, it will sound an alarm. Whereas TPMs used to come as separate security chips, these days they are usually integrated into new computers.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Where does TPM 2.0 come from?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           TPM was developed by the Trusted Computing Group (TCG) and standardized by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) as ISO/IEC 11889:2209 in 2009. The first definitive TPM was released on March 3, 2011, as TPM Version 1.2. TPM 2.0 was released in 2019 as ISO/IEC 11889:2015 with new security features, including updates to the TPM architecture and TPM commands and support routines.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Where is TPM 2.0 located?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Since TPM 2.0 chips function as dedicated processors, they’re integrated directly into the motherboard. Most new laptops and PCs come with factory-integrated TPMs and TPM compatibility. You might also find motherboards that don’t offer a pre-installed TPM 2.0 chip but have a slot for an additional chip.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Does Windows 11 require TPM 2.0?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           TPM 2.0 is a hardware requirement for Windows 11. For many Windows users, this was the first time they had heard about TPM. If your computer doesn’t have a TPM or TPM 2.0 isn’t enabled, you’ll get a notification saying that TPM couldn’t be found or isn’t compatible. A UEFI (Unified Extensible Firmware Interface) with secure boot is also required.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           TPM 2.0 is used in Windows 11 and other versions for the following:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Windows Hello: Biometric access control and identification using fingerprint and/or iris scan, facial recognition with Endorsement Key (EK) and Attestation Identity Key (AIK)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            BitLocker drive encryption: For encrypting logical volumes and thus entire drives
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Virtual smart cards: Similar to physical smart cards, virtual smart cards help with access control for external systems and resources
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            TPM start metrics: With TPM metrics about the Windows bootup state, the integrity of system components and Windows configurations can be checked by measuring start sequences
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            AIK certificates: AIK certificates saved in TPM compare start data that has been collected with metrics about the devices’ state
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Defense against dictionary attacks: Protection from brute force attacks that try to bypass password protection with automated queries of dictionary lists
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Credential guard: Isolates login and user data and protects saved keys using virtualization-based security checks
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What are the advantages of TPM 2.0?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           TPM comes with the following advantages:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Generating and saving cryptographic keys, passwords, and certificates for extra secure encryption methods
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Detecting manipulations in BIOS code using a check value in the Platform Configuration Register (PCR) 17
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            TPM 2.0 has a new algorithm exchange function for simultaneous use of different algorithms
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Verification signatures support PINs and positioning data using biometric or global access controls
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Checking software licenses using digital rights management (DRM)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ensuring platform integrity using configuration metrics that check startup sequences for security and changes
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Authentication of system hardware with RSA cryptosystems
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Endorsement Keys (EK) and Attestation Keys (AIK) use hashing to check the security and integrity of the system
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Optimizing protection from malware, ransomware, brute force attacks and phishing, in combination with firewalls, smart cards, biometric access control and antivirus programs
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Closing thoughts...
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Clearly, the future of cybersecurity is more than just protecting yourself from email scammers and hackers getting your credentials. TPM 2.0 equipped PCs &amp;amp; Laptops provide a new line of defense to secure your hardware and machines lacking this feature, should be addressed immediately. All APEX Technologies customers can receive a free machine inventory report that can show you which machines need to be upgraded for TPM 2.0!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/su-khac-nhau-giua-chip-tpm-1-2-va-chip-tpm-2-0-1.jpg" length="27769" type="image/jpeg" />
      <pubDate>Thu, 11 Jan 2024 18:33:37 GMT</pubDate>
      <guid>https://www.apextech.it/tpm-2-0-chipset-the-next-wave-of-security-upgrades</guid>
      <g-custom:tags type="string">Articles,Security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/su-khac-nhau-giua-chip-tpm-1-2-va-chip-tpm-2-0-1.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/su-khac-nhau-giua-chip-tpm-1-2-va-chip-tpm-2-0-1.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Nonprofit Tech for Good 2023 Report</title>
      <link>https://www.apextech.it/nonprofit-tech-for-good-2023-report</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The biennial Nonprofit Tech for Good Report seeks to gain a better understanding of how nonprofit organizations use
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           technology for digital marketing and fundraising. The 2023 report is based on the survey responses of 1,732 nonprofit professionals that subscribe to or follow Nonprofit Tech for Good on social media.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Survey questions covered website and email communications, online fundraising, social media, and professional development in the nonprofit sector. The survey was promoted online in 2021 and 2022.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="https://irp.cdn-website.com/3c2a63e3/files/uploaded/Nonprofit-Tech-for-Good-Report-Final2-2023.pdf" target="_blank"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Untitled-3423ce08.png" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Untitled-3423ce08.png" length="41318" type="image/png" />
      <pubDate>Wed, 27 Sep 2023 15:09:21 GMT</pubDate>
      <author>jmoreau@apextech.it (Joshua Moreau)</author>
      <guid>https://www.apextech.it/nonprofit-tech-for-good-2023-report</guid>
      <g-custom:tags type="string">Articles</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Untitled-3423ce08.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Untitled-3423ce08.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>New research reveals most-attacked, most-vulnerable assets</title>
      <link>https://www.apextech.it/new-research-reveals-most-attacked-most-vulnerable-assets</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While medical devices are the most susceptible to unpatched CVEs, operational technology assets are the most attacked.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           New research from security company Armis has revealed the riskiest assets introducing threats to global businesses.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.armis.com/newsroom/press/armis-identifies-the-riskiest-assets-introducing-threats-to-global-businesses/" target="_blank"&gt;&#xD;
      
            Armis' research
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            focused on connected assets with the most attack attempts, weaponized Common Vulnerabilities and Exposures (CVEs), and high-risk ratings. Based on data from the Armis Asset Intelligence Engine, it found that internet of medical things (IoMT) assets- connected devices used in medical/healthcare environments - are the most susceptible to unpatched, weaponized CVEs, while operational technology (OT) assets are the most attacked.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IoMT assets most susceptible to unpatched, weaponized CVEs
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Armis researchers identified a significant number of network-connected assets susceptible to unpatched, weaponized CVEs, listing the highest percentage of devices of each type that had these CVEs between August 2022 and July 2023. Unpatched, these assets introduce significant risks to businesses.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           According to Armis, the assets most vulnerable to unpatched, weaponized CVEs are:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Media writers (IoMT), 62%
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Infusion pumps (IoMT), 26%
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            IP cameras (IoT), 26%
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Media players (IoT), 25%
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Switches (IT), 18%
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Engineering workstations (OT), 17%
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Personal smartwatches (IoPT), 16%
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Routers (IT), 15%
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            SCADA servers (OT), 15%
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It is unsurprising to see medical assets topping the list. In January 2022, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.csoonline.com/article/571989/outdated-iot-healthcare-devices-pose-major-security-threats.html" target="_blank"&gt;&#xD;
      
           Cynerios's State of IoMT Device Security report
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            found that more than half (53%) of the internet of things (IoT) and IoMT devices used in US healthcare pose critical cybersecurity risks with significant vulnerabilities that could jeopardize patient safety, data confidentiality, or service availability if exploited. In June this year, it was 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.csoonline.com/article/641569/a-third-of-nhs-trusts-have-no-method-for-tracking-iot-devices.html" target="_blank"&gt;&#xD;
      
           revealed that one-third of the UK's National Health Service
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            (NHS) Trusts have no method for tracking IoT devices, potentially exposing information and services to significant security risks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           OT assets most targeted by attacks
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The top 10 asset types with the highest number of attack attempts are distributed across IT, OT, IoT, IoMT, internet of personal things (IoPT), and building management system (BMS) assets, Armis found. This demonstrates that attackers prioritize potential access to assets rather than their type, reinforcing the need for security teams to account for all physical and virtual assets as part of their security strategy, the firm said.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The top 10 device types with the highest number of attack attempts are:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Engineering workstations (OT)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Imaging workstations (IoMT)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Media players (IoT)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Personal computers (IT)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Virtual machines (IT)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Uninterruptible power supply (UPS) devices (BMS)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Servers (IT)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Media writers (IoMT)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Tablets (IoPT)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Mobile phones (IoPT)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Threat actors intentionally target these assets because they are externally accessible, have an expansive and intricate attack surface, and known weaponized CVEs, said Tom Gol, CTO of research at Armis. "The potential impact of breaching these assets on businesses and their customers is also a critical factor when it comes to why these have the highest number of attack attempts." For example, engineering workstations can be connected to all controllers in a factory, imaging workstations will collect private patient data from hospitals, and UPSs can serve as an access point to critical infrastructure entities, making all of these attractive targets for malicious actors, he added.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many assets have high vulnerability scores, detected threats, unencrypted traffic
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Armis also examined asset types with the most common high-risk factors. Physical devices that take a long time to replace - such as such as servers and programmable logic controllers (PLCs) - often run end-of-life (EOL) or end-of-support (EOS) operating systems. This makes them particularly high risk, especially as EOS assets are no longer actively supported or patched for vulnerabilities/security issues by manufacturers, Armis stated.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Some assets, including personal computers, demonstrate SMBv1 usage, a legacy, unencrypted, and complicated protocol with vulnerabilities that were targeted in the infamous 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.csoonline.com/article/563017/wannacry-explained-a-perfect-ransomware-storm.html" target="_blank"&gt;&#xD;
      
           WannaCry
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            and 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.csoonline.com/article/573049/5-years-after-notpetya-lessons-learned.html" target="_blank"&gt;&#xD;
      
           NotPetya
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            attacks. Armis found that 74% of organizations today still have at least one asset in their network vulnerable to EternalBlue, an SMBv1 vulnerability. Meanwhile, Armis found that 50% of pneumatic tube systems - technical equipment in which cylindrical containers are propelled through a complex network of tubes -have an unsafe software update mechanism.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Read the whole story here
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.csoonline.com/article/651075/new-research-reveals-most-attacked-vulnerable-assets.html" target="_blank"&gt;&#xD;
      
           New research reveals most-attacked, most-vulnerable assets | CSO Online
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity-fc1f3cf7.jpg" length="64839" type="image/jpeg" />
      <pubDate>Tue, 12 Sep 2023 13:56:06 GMT</pubDate>
      <guid>https://www.apextech.it/new-research-reveals-most-attacked-most-vulnerable-assets</guid>
      <g-custom:tags type="string">Articles,Security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity-fc1f3cf7.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity-fc1f3cf7.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>CRIMEWARE TRENDS AND HIGHLIGHTS</title>
      <link>https://www.apextech.it/crimeware-trends-and-highlights</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Turning Tides
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Navigating the Evolving World of Cybercrime
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In the first half of 2023, Arete observed several distinct trends and shifts in the cyber threat landscape. Leveraging the data collected during each incident response engagement, we can see the rise and fall of ransomware variants, notable trends in ransom demands and payments, industries targeted by ransomware attacks, and what may be coming next.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Looking back over the past few years, Arete has seen a pattern of action-reaction developing within cybersecurity. In response to s
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           everal high-profile attacks in the past three years, many organizations invested in security tools, training, and services to reduce risk. To evade these standard security tools and common defense strategies, threat actors shifted their operations to target different types of operating systems with increasingly complex tactics.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The threat landscape continues to evolve with the widespread introduction of AI tools, lower barriers of entry into cybercrime, new vulnerabilities, and the socioeconomic effects of the Russia-Ukraine war.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware operations thriving today are pushing the envelope in development and extortion techniques. Attrition, reorganization, and re-branding within cybercriminal groups have made attribution more challenging than ever.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           However, as threat actors evolve, so do the threat hunters and organizations tracking them. Global law enforcement agencies have carried out several impactful arrests and seizures on multiple high-profile cybercriminal groups in the first half of 2023. We have seen a significant increase in collaboration between law enforcement agencies and civilian cybersecurity organizations, resulting in unprecedented information sharing on indicators and tactics, allowing for more accurate attribution, restoration, and potential disruption of ransomware threat actor activities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="https://irp.cdn-website.com/3c2a63e3/files/uploaded/Turning Tides.pdf" target="_blank"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Turning+Tides.png" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity.jpg" length="71463" type="image/jpeg" />
      <pubDate>Wed, 16 Aug 2023 18:48:13 GMT</pubDate>
      <guid>https://www.apextech.it/crimeware-trends-and-highlights</guid>
      <g-custom:tags type="string">Articles,Security</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>APEX Achieves Microsoft Silver Partner Certification</title>
      <link>https://www.apextech.it/apex-achieves-microsoft-silver-partner-certification</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Another great milestone for APEX Technologies - Microsoft Silver Partner
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           FOR IMMEDIATE RELEASE:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Baton Rouge, LA - APEX Technologies announced today its achievement of the Microsoft Silver Partner certification for its work with managing thousands of Microsoft 365 licenses, Microsoft Teams implementations and multiple petabytes of individual SharePoint projects for its clients.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/ms-silver-partner-logo.jpg" alt=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3184287.jpeg" length="622619" type="image/jpeg" />
      <pubDate>Thu, 03 Aug 2023 16:58:47 GMT</pubDate>
      <guid>https://www.apextech.it/apex-achieves-microsoft-silver-partner-certification</guid>
      <g-custom:tags type="string">Press Releases</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3184287.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-3184287.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>APEX Announces Move to New Office Location</title>
      <link>https://www.apextech.it/apex-announces-move-to-new-office-location</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Company &amp;amp; Team Expansion Dictated Need for Growth
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           BATON ROUGE, LA - APEX Technologies announced today that it is moving its headquarters to new space at 619 Jefferson Hwy. The move was dictated by the company's amazing growth over the past six months and the need to expand into more space for recruiting new staff and showcasing some of the technology solutions they sell. Since October of 2022, the company has grown from serving 17 clients in the Greater Baton Rouge area to over 115 clients across Louisiana, managing just under 2,000 machines and over 5,000 network devices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The new space located at 619 Jefferson Hwy triples the amount of space for APEX and locates the company in the mid-city area making it easier for clients to visit and attend lunch-n-learns and trainings. The company will officially relocate to the new address effective Wednesday, June 14th and was assisted in the site location process with one of its clients, Beau Box Commercial Real Estate &amp;amp; agent Travis Thornton. An open house is being planned for August.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           APEX Technologies
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           619 Jefferson Hwy, Suite 2-G
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Baton Rouge, LA 70806
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-323705.jpeg" length="229347" type="image/jpeg" />
      <pubDate>Wed, 07 Jun 2023 17:27:27 GMT</pubDate>
      <guid>https://www.apextech.it/apex-announces-move-to-new-office-location</guid>
      <g-custom:tags type="string">Press Releases</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-323705.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-323705.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>APEX Becomes Certified Partner with Verkada</title>
      <link>https://www.apextech.it/apex-becomes-certified-partner-with-verkada</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Now providing a full suite of security &amp;amp; monitoring services
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           BATON ROUGE, LA - APEX Technologies is pleased to announce our new Certified Partnership with Verkada, the industry leader in physical security &amp;amp; sensor monitoring. Verkada's platform allows for the connection of all of a client's physical security devices, like access control &amp;amp; video surveillance, to a single cloud-based platform with real-time monitoring. The system doesn't require any on-premise equipment or recording devices, and some camera models offer cellular connectivity for 'always-on' capabilities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            For more information please contact us at sales@apextech.it.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/OIP+%281%29.png" alt=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/OIP+%281%29.png" length="429685" type="image/png" />
      <pubDate>Tue, 14 Mar 2023 17:54:44 GMT</pubDate>
      <guid>https://www.apextech.it/apex-becomes-certified-partner-with-verkada</guid>
      <g-custom:tags type="string">Security,Press Releases</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/OIP+%281%29.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/OIP+%281%29.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>SentinelOne Selected by CISA’s Joint Cyber Defense Collaborative to Strengthen U.S. and International Cybersecurity Capabilities</title>
      <link>https://www.apextech.it/sentinelone-selected-by-cisas-joint-cyber-defense-collaborative-to-strengthen-u-s-and-international-cybersecurity-capabilities</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Initiative will Tap Threat Intelligence of SentinelLabs and Insights from SentinelOne’s Singularity XDR Platform
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           APEX prides itself on creating successful outcomes for our clients by partnering with the top-rated and top-performing solutions providers in the world. SentinelOne is definitely the best. Check out this article released a few weeks ago!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://finance.yahoo.com/news/sentinelone-selected-cisa-joint-cyber-140000090.html?guccounter=1" target="_blank"&gt;&#xD;
      
           SentinelOne Selected by CISA’s Joint Cyber Defense Collaborative to Strengthen U.S. and International Cybersecurity Capabilities (yahoo.com)
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity.jpg" length="71463" type="image/jpeg" />
      <pubDate>Mon, 27 Feb 2023 14:07:56 GMT</pubDate>
      <guid>https://www.apextech.it/sentinelone-selected-by-cisas-joint-cyber-defense-collaborative-to-strengthen-u-s-and-international-cybersecurity-capabilities</guid>
      <g-custom:tags type="string">Articles,Malicious News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>APEX becomes certified Microsoft Surface Managed Partner (DMP)</title>
      <link>https://www.apextech.it/apex-becomes-certified-microsoft-surface-managed-partner-dmp</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Plans include offering devices with cellular, Surface-as-a-Service and ruggedized accessories.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Surface-Canvas-Mode.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           BATON ROUGE, LA - APEX Technologies is pleased to announce that through Microsoft, the company is now a Microsoft Surface Managed Partner (DMP). This exclusive designation provides a wider range of services for APEX clients when their computing needs align with what Surface devices have to offer.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           "Really excited about this new level of partnership with Microsoft that will allow us to dive deeper into our client's needs for tablets, laptops and interactive conference workboards that connect seamlessly into their Microsoft 365 applications. With our connectivity services, we can also equip all Surface devices with instant cellular connectivity to work from anywhere, anytime", says Ned Fasullo, President of APEX Technologies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The company plans to offer trial and test programs for the devices and host several Demo Day events in the near future for clients wanting to see the devices in person.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/1_AErup08vt85dMR3l4ILzLw.jpeg" length="255828" type="image/jpeg" />
      <pubDate>Fri, 03 Feb 2023 21:44:45 GMT</pubDate>
      <guid>https://www.apextech.it/apex-becomes-certified-microsoft-surface-managed-partner-dmp</guid>
      <g-custom:tags type="string">Microsoft,Press Releases</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/1_AErup08vt85dMR3l4ILzLw.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/1_AErup08vt85dMR3l4ILzLw.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>APEX Technologies acquires Sullivan Computer Services of Gonzales</title>
      <link>https://www.apextech.it/apex-technologies-acquires-sullivan-computer-services</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Acquisition will enhance and expand services to both company's clients.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           BATON ROUGE, LA – APEX Technologies has closed an acquisition of Sullivan Computer Services (SCS). The acquisition provides additional technical and sales talent to the APEX team as well as over 60+ new small to medium-sized business clients in Louisiana. Founded by Jason Sullivan in 2006, SCS has offered remote and on-site technology support for clients in education, healthcare, construction, industrial and more.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “Part of the 5-year growth plan for APEX has always included acquisitions of this type”, says Ned Fasullo, President of APEX Technologies. “We could not be more excited about this deal as Jason Sullivan is a well-respected name in technology services here in South Louisiana and has built an impressive client list. We look forward to having Jason on board and to continue serving the SCS clients and offering them even more technology and digital marketing services”.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In his new position, Sullivan will become Director of Sales and lead the 2023 effort of recruiting and managing sales consultants for the New Orleans, Lafayette and Greater Houston markets as the company continues its expansion plans. The company has also recently announced plans to hire additional staff for its office in Baton Rouge to support new service offerings to be announced in early 2023.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-265087.jpeg" length="244329" type="image/jpeg" />
      <pubDate>Tue, 27 Dec 2022 16:17:06 GMT</pubDate>
      <guid>https://www.apextech.it/apex-technologies-acquires-sullivan-computer-services</guid>
      <g-custom:tags type="string">Articles,Press Releases</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-265087.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-265087.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>In-Home Senior Care Powered by Care Daily Artificial Intelligence and Supported Through KORE IoT Connectivity and Managed Services</title>
      <link>https://www.apextech.it/in-home-senior-care-powered-by-care-daily-artificial-intelligence-and-supported-through-kore-iot-connectivity-and-managed-services</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           KORE's comprehensive suite of IoT solutions and services simplify the complexities involved in providing an "aging in place" Connected Health solution that improves the quality of life for seniors
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+Wireless.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ATLANTA, Nov. 29, 2022 /PRNewswire/ -- 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://c212.net/c/link/?t=0&amp;amp;l=en&amp;amp;o=3720521-1&amp;amp;h=2560335490&amp;amp;u=https%3A%2F%2Fwww.korewireless.com%2F%3Futm_source%3Dpress-release%26utm_medium%3Drbspeech%26utm_campaign%3Dmwcla2021%26utm_id%3DPublic%2BRelations&amp;amp;a=KORE" target="_blank"&gt;&#xD;
      
           KORE
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , a global leader in Internet of Things (IoT) solutions and worldwide IoT Connectivity-as-a-Service (CaaS), announces its collaboration with 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://c212.net/c/link/?t=0&amp;amp;l=en&amp;amp;o=3720521-1&amp;amp;h=1589932528&amp;amp;u=http%3A%2F%2Fwww.caredaily.ai%2F&amp;amp;a=Care+Daily" target="_blank"&gt;&#xD;
      
           Care Daily
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , a technology-based, in-home senior care company driven by artificial intelligence (AI) and IoT.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The senior population in the United States is anticipated to grow to 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://c212.net/c/link/?t=0&amp;amp;l=en&amp;amp;o=3720521-1&amp;amp;h=2973162267&amp;amp;u=https%3A%2F%2Fwww.prb.org%2Fresources%2Ffact-sheet-aging-in-the-united-states%2F&amp;amp;a=95+million+by+2060" target="_blank"&gt;&#xD;
      
           95 million by 2060
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , accounting for 23 percent of the nation's population. With the significant growth in the senior demographic comes an aging-in-place movement. An AARP study reported that 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://c212.net/c/link/?t=0&amp;amp;l=en&amp;amp;o=3720521-1&amp;amp;h=1513309660&amp;amp;u=https%3A%2F%2Fwww.aarp.org%2Fhome-family%2Fyour-home%2Finfo-2021%2Fhome-and-community-preferences-survey.html%23%3A%7E%3Atext%3DWhat%2520COVID%252D19%2520hasn%26%2339%3Bt%2Cfor%2520more%2520than%2520a%2520decade.&amp;amp;a=77+percent" target="_blank"&gt;&#xD;
      
           77 percent
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             of aging adults surveyed desire to stay in their home versus aging in a facility. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            For more on this article click here -
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.benzinga.com/pressreleases/22/11/n29886674/in-home-senior-care-powered-by-care-daily-artificial-intelligence-and-supported-through-kore-iot-c" target="_blank"&gt;&#xD;
      
           In-Home Senior Care Powered by Care Daily Artificial Intelligence and Supported Through KORE IoT Connectivity and Managed Services - Kore Group Holdings (NYSE:KORE) - Benzinga
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+Wireless.jpg" length="53748" type="image/jpeg" />
      <pubDate>Mon, 19 Dec 2022 22:29:23 GMT</pubDate>
      <guid>https://www.apextech.it/in-home-senior-care-powered-by-care-daily-artificial-intelligence-and-supported-through-kore-iot-connectivity-and-managed-services</guid>
      <g-custom:tags type="string">Connectivity,Healthcare,IoT</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+Wireless.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+Wireless.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How Wireless Networking is Used by Meraki, Cradlepoint, AOptix, Strix Systems, and Veniam</title>
      <link>https://www.apextech.it/how-wireless-networking-is-used-by-meraki-cradlepoint-aoptix-strix-systems-and-veniam</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The wireless networking market is benefiting from private and public investments in both wireless infrastructure and technology. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/smartphone-4942918_1920-1536x531.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The body content of your post goes here. To edit this text, click on it and delete this default text and start typing your own or paste your own from a different source.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/smartphone-4942918_1920-1536x531.jpg" length="121700" type="image/jpeg" />
      <pubDate>Mon, 19 Dec 2022 22:26:50 GMT</pubDate>
      <guid>https://www.apextech.it/how-wireless-networking-is-used-by-meraki-cradlepoint-aoptix-strix-systems-and-veniam</guid>
      <g-custom:tags type="string">Articles,Connectivity,IoT</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/smartphone-4942918_1920-1536x531.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/smartphone-4942918_1920-1536x531.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Software bill of materials: Managing software cybersecurity risks</title>
      <link>https://www.apextech.it/software-bill-of-materials-managing-software-cybersecurity-risks</link>
      <description>As software-related vulnerabilities continue to grow, companies must manage their software cyber risks to innovate faster and create safer, more secure digital products.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As software-related vulnerabilities continue to grow, companies must manage their software cyber risks to innovate faster and create safer, more secure digital products.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Until recently, most companies were unaware of the “ingredients” or code that make up the software that powers their products and enterprise software. This is an issue because third-party code usage is increasing, and the consumption of open-source software (OSS) will accelerate in the years to come.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Companies leverage OSS because it reduces costs and increases the pace of software development. By layering in code that someone else has already built, developers can decrease their time to market and accelerate the feature sets most desired by their business partners. The challenge is that the code in the OSS repository may have embedded malware, bugs, or other vulnerabilities unbeknownst to the developer. Without a robust vetting process for the code in the OSS repository from which their developers are pulling, companies will remain unaware of threats lurking in their products.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            For more on this article,
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/cybersecurity/software-bill-of-materials-managing-software-cybersecurity-risks?cid=eml-app" target="_blank"&gt;&#xD;
      
           click here
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity.jpg" length="71463" type="image/jpeg" />
      <pubDate>Tue, 08 Nov 2022 20:19:46 GMT</pubDate>
      <guid>https://www.apextech.it/software-bill-of-materials-managing-software-cybersecurity-risks</guid>
      <g-custom:tags type="string">Articles,Malicious News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Background+-+cybersecurity.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Backup best practices for Microsoft Office 365 and cloud-based SaaS applications</title>
      <link>https://www.apextech.it/backup-best-practices-for-microsoft-office-365-and-cloud-based-saas-applications</link>
      <description>Microsoft Office 365 and other cloud-based SaaS applications are a key working component of many business operations, enabling teams to share documents among multiple devices, easily house data in a private or public cloud, and work together in real time. But while Office 365 and similar SaaS apps store your data, if your data is lost, Microsoft does not guarantee that it will restore it. With Office 365 as a prime target for SaaS attacks this year, there is no protection against data deletion, regardless of if it is accidental, intentional or criminal.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft Office 365 and other cloud-based SaaS applications are most effective when data backup best practices support them. Learn how to set up backup best practices here.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://click.linksynergy.com/fs-bin/click?id=dQLmXUhvkMU&amp;amp;offerid=817940.22&amp;amp;type=3&amp;amp;subid=0" target="_blank"&gt;&#xD;
      
           Microsoft Office 365
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            and other cloud-based SaaS applications are a key working component of many business operations, enabling teams to share documents among multiple devices, easily house data in a private or public cloud, and work together in real time. But while Office 365 and similar SaaS apps store your data, if your data is lost, Microsoft does not guarantee that it will restore it. With Office 365 as a 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.techrepublic.com/article/potentially-dangerous-office-365-flaw-discovered/" target="_blank"&gt;&#xD;
      
           prime target
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            for SaaS attacks this year, there is no protection against data deletion, regardless of if it is accidental, intentional or criminal.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            For more on this article click here -
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.techrepublic.com/article/microsoft-office-365-cloud-saas-backup-best-practices/" target="_blank"&gt;&#xD;
      
           Backup Microsoft Office 365 &amp;amp; cloud-based SaaS apps | TechRepublic
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/hp-elite-office-price.jpeg" length="167081" type="image/jpeg" />
      <pubDate>Fri, 07 Oct 2022 19:28:06 GMT</pubDate>
      <guid>https://www.apextech.it/backup-best-practices-for-microsoft-office-365-and-cloud-based-saas-applications</guid>
      <g-custom:tags type="string">Articles,Microsoft</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/hp-elite-office-price.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/hp-elite-office-price.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Microsoft 365 Security Features Protect Business Data from Evolving Threats</title>
      <link>https://www.apextech.it/microsoft-365-security-features-protect-business-data-from-evolving-threats</link>
      <description>A NYC area Microsoft 365 expert and cyber security consultant examines Microsoft 365 security features in a new article on the eMazzanti Technologies website. The informative article first asserts that Microsoft security offerings continually evolve to keep pace with the threat landscape.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A NYC area Microsoft 365 expert and cyber security consultant examines Microsoft 365 security features in a new article on the eMazzanti Technologies website. The informative article first asserts that Microsoft security offerings continually evolve to keep pace with the threat landscape.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The author then explores Microsoft Defender for Endpoint Security, previously called Defender Advanced Threat Protection. He then explains how Microsoft Defender for Identity helps to protect against both outside attacks and insider threats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            For more click here -
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://aithority.com/security/microsoft-365-security-features-protect-business-data-from-evolving-threats/" target="_blank"&gt;&#xD;
      
           Microsoft 365 Security Features Protect Business Data from Evolving Threats (aithority.com)
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R+%281%29.jpg" length="529761" type="image/jpeg" />
      <pubDate>Fri, 07 Oct 2022 19:25:32 GMT</pubDate>
      <guid>https://www.apextech.it/microsoft-365-security-features-protect-business-data-from-evolving-threats</guid>
      <g-custom:tags type="string">Articles,Microsoft</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R+%281%29.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R+%281%29.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Ericsson and KORE to Simplify Global IoT Deployments and Offer Unrivaled IoT Coverage in U.S.</title>
      <link>https://www.apextech.it/ericsson-and-kore-to-simplify-global-iot-deployments-and-offer-unrivaled-iot-coverage-in-u-s</link>
      <description>ATLANTA and STOCKHOLM, Sept. 14, 2022 /PRNewswire/ -- KORE, a global leader in Internet of Things ("IoT") Solutions and worldwide IoT Connectivity-as-a-Service (CaaS), announced today that it has entered into an agreement with Ericsson (NASDAQ: ERIC) to join the Ericsson IoT Accelerator ecosystem. With this relationship, enterprises will be able to take advantage of KORE's IoT connectivity solutions and other managed services while utilizing Ericsson's award-winning global IoT connectivity management platform, IoT Accelerator. This enables global enterprises to seamlessly expand their IoT business in the U.S. market and beyond.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ATLANTA and STOCKHOLM, Sept. 14, 2022 /PRNewswire/ -- KORE, a global leader in Internet of Things ("IoT") Solutions and worldwide IoT Connectivity-as-a-Service (CaaS), announced today that it has entered into an agreement with Ericsson (NASDAQ: ERIC) to join the Ericsson IoT Accelerator ecosystem. With this relationship, enterprises will be able to take advantage of KORE's IoT connectivity solutions and other managed services while utilizing Ericsson's award-winning global IoT connectivity management platform, IoT Accelerator. This enables global enterprises to seamlessly expand their IoT business in the U.S. market and beyond.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://finance.yahoo.com/news/ericsson-kore-simplify-global-iot-120000932.html" target="_blank"&gt;&#xD;
      
           Ericsson and KORE to Simplify Global IoT Deployments and Offer Unrivaled IoT Coverage in U.S. (yahoo.com)
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/1_AErup08vt85dMR3l4ILzLw-5375cd9f.jpeg" length="255828" type="image/jpeg" />
      <pubDate>Fri, 07 Oct 2022 19:23:13 GMT</pubDate>
      <guid>https://www.apextech.it/ericsson-and-kore-to-simplify-global-iot-deployments-and-offer-unrivaled-iot-coverage-in-u-s</guid>
      <g-custom:tags type="string">Articles,Connectivity,IoT</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/1_AErup08vt85dMR3l4ILzLw-5375cd9f.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/1_AErup08vt85dMR3l4ILzLw-5375cd9f.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Majority of Microsoft Teams users send business-critical documents and data on the platform</title>
      <link>https://www.apextech.it/majority-of-microsoft-teams-users-send-business-critical-documents-and-data-on-the-platform</link>
      <description>Hornetsecurity on Thursday reported that 45% of Microsoft Teams users surveyed frequently send out confidential and critical information on the platform and 51% send business-critical documents and data via Teams.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Hornetsecurity on
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.prnewswire.com/news-releases/hornetsecurity-research-reveals-microsoft-teams-security-and-backup-flaws-with-more-than-half-of-users-sharing-business-critical-information-on-the-platform-301643023.html" target="_blank"&gt;&#xD;
      
           Thursday reported
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            that 45% of
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.scmagazine.com/analysis/cloud-security/vulnerability-allows-access-to-credentials-in-microsoft-teams" target="_blank"&gt;&#xD;
      
           Microsoft Teams
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            users surveyed frequently send out confidential and critical information on the platform and 51% send business-critical documents and data via Teams.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The survey also found that 48% of all respondents sent messages on Teams they should not have. Of this group, 88% had been trained on how to use
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.scmagazine.com/perspective/strategy/three-ways-cisos-can-drive-more-meaningful-collaboration" target="_blank"&gt;&#xD;
      
           collaboration
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            solutions. This highlighted the need for increased and improved training on how to use Teams and the risks of sending sensitive data.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Some 70% of respondents also exchange more direct messages with colleagues via user chats in Teams as opposed to group channel conversations, which Hornetsecurity researchers said pointed out the need for security pros to stop overlooking backup and security for user chats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.scmagazine.com/news/application-security/majority-of-microsoft-teams-users-send-business-critical-documents-and-data-on-the-platform" target="_blank"&gt;&#xD;
      
           For more on this article click here.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Technology-Wallpaper-06-4058x2800-1-2048x1413.jpg" length="164332" type="image/jpeg" />
      <pubDate>Fri, 07 Oct 2022 19:20:24 GMT</pubDate>
      <guid>https://www.apextech.it/majority-of-microsoft-teams-users-send-business-critical-documents-and-data-on-the-platform</guid>
      <g-custom:tags type="string">Articles</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Technology-Wallpaper-06-4058x2800-1-2048x1413.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/Technology-Wallpaper-06-4058x2800-1-2048x1413.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Meraki Go Releases New Wi-Fi 6 Access Points for Indoors and Outdoors</title>
      <link>https://www.apextech.it/meraki-go-releases-new-wi-fi-6-access-points-for-indoors-and-outdoors</link>
      <description>Recently, I reviewed the impressive Meraki GO’s GX50 router/firewall. Now the Cisco sub-brand that targets SMBs, has announced two new Wi-Fi 6 wireless access points, one for indoor use and one for locating outdoors.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           RE-POST FROM FORBES MAGAZINE:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Recently, I reviewed the impressive Meraki GO’s GX50 router/firewall. Now the Cisco sub-brand that targets SMBs, has announced two new Wi-Fi 6 wireless access points, one for indoor use and one for locating outdoors. Meraki Go’s mission is to bring enterprise-grade wireless networking to small and medium businesses like cafés, shops, offices and other enterprises that need reliable networking with business-level security. All the Meraki Go products are designed to be easy to set up, even for small businesses that don’t have their own IT department. The new GR12 (indoor) and GR62 (outdoor) wireless access points offer speeds up to three times faster than the previous generation of Meraki Go access points and deliver twice the capacity.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.forbes.com/sites/marksparrow/2022/10/06/meraki-go-releases-new-wi-fi-6-access-points-for-indoors-and-outdoors/?sh=43dc4cb94a79" target="_blank"&gt;&#xD;
      
           Click here for the full article!
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/0x0.jpg" length="24706" type="image/jpeg" />
      <pubDate>Fri, 07 Oct 2022 19:16:04 GMT</pubDate>
      <guid>https://www.apextech.it/meraki-go-releases-new-wi-fi-6-access-points-for-indoors-and-outdoors</guid>
      <g-custom:tags type="string">Articles</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/0x0.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/0x0.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Windows bug: Check if Edge is silently running in the background</title>
      <link>https://www.apextech.it/windows-bug-check-if-edge-is-silently-running-in-the-background</link>
      <description>Microsoft keeps its Windows operating system running relatively smoothly by releasing regular updates. In its monthly Patch Tuesday update, many vulnerabilities get fixed.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This is a subtitle for your new post
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft keeps its Windows operating system running relatively smoothly by releasing regular updates. In its monthly Patch Tuesday update, many 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.komando.com/security-privacy/patch-tuesday-september-2022/856596/" target="_blank"&gt;&#xD;
      
           vulnerabilities get fixed
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . However, in one of the latest updates, Microsoft enabled its Edge browser to launch automatically when your computer starts up. If Edge isn’t your default browser, this is annoying. But simply closing it from the desktop won’t shut it down. Read on to see what you must do to free up some valuable memory and kill the process entirely.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.komando.com/security-privacy/microsoft-edge-startup-glitch/858876/" target="_blank"&gt;&#xD;
      
           For more on this article, click here!
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R.jpg" length="327194" type="image/jpeg" />
      <pubDate>Sun, 02 Oct 2022 23:49:02 GMT</pubDate>
      <guid>https://www.apextech.it/windows-bug-check-if-edge-is-silently-running-in-the-background</guid>
      <g-custom:tags type="string">Articles</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Android Police: How to mass delete emails in Gmail</title>
      <link>https://www.apextech.it/android-police-how-to-mass-delete-emails-in-gmail</link>
      <description>It's not uncommon to see people with hundreds, thousands, or even tens of thousands of emails in their Gmail inbox. Most of those are old or junk emails, which are too tedious to sort through. Gmail has a built-in method to mass delete emails, which is easily done using one of the best Chromebooks.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Clean up your mess of an inbox in no time at all
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It's not uncommon to see people with hundreds, thousands, or even tens of thousands of emails in their Gmail inbox. Most of those are old or junk emails, which are too tedious to sort through. Gmail has a built-in method to mass delete emails, which is easily done using 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.androidpolice.com/best-chromebooks/" target="_blank"&gt;&#xD;
      
           one of the best Chromebooks
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Let's take a look at how to delete a large number of emails in one fell swoop.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.androidpolice.com/how-to-mass-delete-emails-in-gmail/" target="_blank"&gt;&#xD;
      
           For more on this article, click here!
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/digital-map.jpg" length="75943" type="image/jpeg" />
      <pubDate>Sun, 02 Oct 2022 23:45:41 GMT</pubDate>
      <guid>https://www.apextech.it/android-police-how-to-mass-delete-emails-in-gmail</guid>
      <g-custom:tags type="string">Articles</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/digital-map.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/digital-map.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Microsoft announces passwordless auth, SSO for Azure Virtual Desktop</title>
      <link>https://www.apextech.it/microsoft-announces-passwordless-auth-sso-for-azure-virtual-desktop</link>
      <description>Microsoft has announced this week that Azure Virtual Desktop support for passwordless authentication has now entered public preview. Redmond said Azure Active Directory (AD) administrators will also be able to toggle on single sign-on (SSO) after enrolling.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft announces passwordless auth, SSO for Azure Virtual Desktop.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft has announced this week that Azure Virtual Desktop support for passwordless authentication has now entered public preview. Redmond said Azure Active Directory (AD) administrators will also be able to toggle on single sign-on (SSO) after enrolling.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           "Today we're announcing the public preview for enabling an Azure AD-based single sign-on experience and support for passwordless authentication, using Windows Hello and security devices (like FIDO2 keys)," 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://techcommunity.microsoft.com/t5/azure-virtual-desktop-blog/announcing-public-preview-of-sso-and-passwordless-authentication/ba-p/3638244" target="_blank"&gt;&#xD;
      
           said David Bélanger
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , a Senior Program Manager for Azure Virtual Desktop at Microsoft.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R+%285%29.jpg" length="97165" type="image/jpeg" />
      <pubDate>Wed, 28 Sep 2022 22:50:30 GMT</pubDate>
      <guid>https://www.apextech.it/microsoft-announces-passwordless-auth-sso-for-azure-virtual-desktop</guid>
      <g-custom:tags type="string">Articles,Microsoft</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R+%285%29.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R+%285%29.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Android and iOS adware apps downloaded 13 million times — delete these apps now</title>
      <link>https://www.apextech.it/android-and-ios-adware-apps-downloaded-13-million-times-delete-these-apps-now</link>
      <description>Adware and other malicious apps often manage to slip past Google’s defenses and end up on the Play Store, but this time around, some bad apps also managed to bypass Apple’s more stringent security checks and make it onto the App Store.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Almost 100 adware apps were found on both the Play Store and App Store
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Adware and other 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.tomsguide.com/news/these-35-malicious-android-apps-have-infected-millions-delete-them-now" target="_blank"&gt;&#xD;
      
           malicious apps
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            often manage to slip past Google’s defenses and end up on the Play Store, but this time around, some bad apps also managed to bypass Apple’s more stringent security checks and make it onto the App Store. As reported by 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.bleepingcomputer.com/news/security/adware-on-google-play-and-apple-store-installed-13-million-times/" target="_blank"&gt;&#xD;
      
           BleepingComputer
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            and first discovered by HUMAN’s Satori Threat Intelligence team, 75 Android apps and 10 iOS apps were found to be engaging in ad fraud. In total, these adware apps have been installed 13 million times.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.tomsguide.com/news/android-and-ios-adware-apps-downloaded-13-million-times-delete-these-apps-now" target="_blank"&gt;&#xD;
      
           For more on this story, click here!
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R+%286%29.jpg" length="118638" type="image/jpeg" />
      <pubDate>Wed, 28 Sep 2022 22:45:43 GMT</pubDate>
      <guid>https://www.apextech.it/android-and-ios-adware-apps-downloaded-13-million-times-delete-these-apps-now</guid>
      <g-custom:tags type="string">Malicious News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R+%286%29.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/3c2a63e3/dms3rep/multi/R+%286%29.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
