<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Cybersecurity | VirtualDoers</title>
	<atom:link href="https://virtualdoers.com/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://virtualdoers.com</link>
	<description>AI Infused Cybersecurity Awareness Training</description>
	<lastBuildDate>Fri, 15 Dec 2023 03:19:24 +0000</lastBuildDate>
	<language>en-CA</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://virtualdoers.com/wp-content/uploads/2022/04/modified_logo_only-150x150.ico</url>
	<title>Cybersecurity | VirtualDoers</title>
	<link>https://virtualdoers.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Effective Cybersecurity for SMB: Why is it Critical?</title>
		<link>https://virtualdoers.com/cybersecurity-for-smb-why-is-it-vital/</link>
					<comments>https://virtualdoers.com/cybersecurity-for-smb-why-is-it-vital/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Fri, 15 Dec 2023 03:19:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1793</guid>

					<description><![CDATA[In today’s digital world, cybersecurity for SMB (Small and Medium Businesses) is vital for small businesses to thrive, or at least survive. Cyber attacks continue to dominate the headlines, with a particular focus on well-known firms. However, research shows that small businesses with fewer than 100 employees are the target of 71% of cyber attacks. This demonstrates that small [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/cybersecurity-for-smb-why-is-it-vital/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Shoulder Surfing Attacks: How to Annihilate Them</title>
		<link>https://virtualdoers.com/shoulder-surfing-attacks-how-to-annihilate-them/</link>
					<comments>https://virtualdoers.com/shoulder-surfing-attacks-how-to-annihilate-them/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Fri, 15 Dec 2023 01:28:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1785</guid>

					<description><![CDATA[A shoulder Surfing Attack is a social engineering technique where an attacker simply looks over someone’s shoulder to get confidential information. It could be as simple as when a person is entering their PIN in an ATM or when a person is entering the username and password to their social media account/Internet Banking etc. A [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/shoulder-surfing-attacks-how-to-annihilate-them/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Unseen Threat: How Shoulder Surfing Puts Your Privacy at Risk</title>
		<link>https://virtualdoers.com/shoulder-surfing-puts-your-privacy-at-risk/</link>
					<comments>https://virtualdoers.com/shoulder-surfing-puts-your-privacy-at-risk/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Tue, 12 Dec 2023 02:54:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1777</guid>

					<description><![CDATA[Shoulder surfing is a form of visual eavesdropping in which an individual observes, or &#8220;surfs,&#8221; the activities of another person, typically with the intent of gathering sensitive or confidential information. This technique involves someone looking over the shoulder of another person, often in crowded or public spaces, to gain unauthorized access to information such as [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/shoulder-surfing-puts-your-privacy-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber-security Awareness: A Powerful Guardian against Breaches</title>
		<link>https://virtualdoers.com/cyber-security-awareness-a-vigilant-guardian/</link>
					<comments>https://virtualdoers.com/cyber-security-awareness-a-vigilant-guardian/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Sat, 09 Dec 2023 01:14:44 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1768</guid>

					<description><![CDATA[In the ever-evolving landscape of digital threats, cyber-security awareness emerges as a beacon of defense, illuminating the path toward a safer online existence. It goes beyond the mere recognition of technical jargon and security protocols; it is a profound understanding of the very essence of risk in our interconnected world. Cyber-security Awareness: The CIA Triad [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/cyber-security-awareness-a-vigilant-guardian/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Unveiling the Crucial Human Element in Cyber security</title>
		<link>https://virtualdoers.com/human-the-crucial-element-in-cyber-security/</link>
					<comments>https://virtualdoers.com/human-the-crucial-element-in-cyber-security/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Tue, 28 Nov 2023 03:06:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1725</guid>

					<description><![CDATA[In the ever-evolving realm of cybersecurity, where algorithms and firewalls dance with sophisticated threats, it&#8217;s easy to overlook the one variable that remains both unpredictable and indispensable – the human factor. Behind every line of code and security protocol, there&#8217;s a human touch, and therein lies the intricate dance between security professionals and the individuals [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/human-the-crucial-element-in-cyber-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>5 Practical Steps to Enhance Cyber-security from the Boardroom</title>
		<link>https://virtualdoers.com/5-steps-to-enhance-cyber-security-from-boardroom/</link>
					<comments>https://virtualdoers.com/5-steps-to-enhance-cyber-security-from-boardroom/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Mon, 27 Nov 2023 19:00:58 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1714</guid>

					<description><![CDATA[In today&#8217;s digital landscape, cyber-security isn&#8217;t just an IT concern; it&#8217;s a strategic imperative that starts at the top. Boardroom involvement is pivotal in steering an organization towards robust cyber-security practices. Furthermore, in the intricate dance between boards and cybersecurity practitioners, collaboration is not just a choice; it&#8217;s a necessity for the digital age. Imagine [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/5-steps-to-enhance-cyber-security-from-boardroom/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Unrivaled Power of Multi-Factor Authentication</title>
		<link>https://virtualdoers.com/unmatched-power-of-multi-factor-authentication/</link>
					<comments>https://virtualdoers.com/unmatched-power-of-multi-factor-authentication/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Mon, 27 Nov 2023 02:15:44 +0000</pubDate>
				<category><![CDATA[Insider Threats]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1706</guid>

					<description><![CDATA[In an era where cyber threats are ever-evolving, safeguarding your digital assets is not just a choice—it&#8217;s a necessity. One key weapon in the arsenal against unauthorized access is Multi-Factor Authentication (MFA). Let&#8217;s delve into the world of MFA and explore why it&#8217;s your ultimate ally in the fight against cyber adversaries. Understanding Multi-Factor Authentication: [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/unmatched-power-of-multi-factor-authentication/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DNS Water-Torture Attacks on the Rise</title>
		<link>https://virtualdoers.com/dns-water-torture-attacks-on-the-rise/</link>
					<comments>https://virtualdoers.com/dns-water-torture-attacks-on-the-rise/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Mon, 27 Nov 2023 01:11:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1700</guid>

					<description><![CDATA[DNS water-torture attacks rose nearly 353% in daily attacks since the beginning of the year. The top five industries targeted include wired telecom, wireless telecom, data processing hosting, electronic shopping and mail-order companies, and insurance agencies and brokerages. DNS Water Torture Attacks, also known as &#8220;Slow-Read&#8221; attacks or &#8220;Water Torture&#8221; attacks, are a type of [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/dns-water-torture-attacks-on-the-rise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>10 Notable Deepfake incidents that Amazed the Internet</title>
		<link>https://virtualdoers.com/10-notable-deepfake-incidents-in-the-internet/</link>
					<comments>https://virtualdoers.com/10-notable-deepfake-incidents-in-the-internet/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Sun, 26 Nov 2023 03:22:41 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1680</guid>

					<description><![CDATA[In the last few years there have been many notable deepfake incidents that have amazed and amused the internet. The technology behind deepfakes offers many interesting possibilities for various creative sectors, from dubbing and repairing video to solving the uncanny valley effect of CG characters in films and video games, avoiding actors having to repeat [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/10-notable-deepfake-incidents-in-the-internet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
