<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>VirtualDoers</title>
	<atom:link href="https://virtualdoers.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://virtualdoers.com</link>
	<description>AI Infused Cybersecurity Awareness Training</description>
	<lastBuildDate>Wed, 20 Dec 2023 02:03:51 +0000</lastBuildDate>
	<language>en-CA</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://virtualdoers.com/wp-content/uploads/2022/04/modified_logo_only-150x150.ico</url>
	<title>VirtualDoers</title>
	<link>https://virtualdoers.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Password Managers: 10 Ways they Improve Online security</title>
		<link>https://virtualdoers.com/password-managers-common-myths-and-misconceptions/</link>
					<comments>https://virtualdoers.com/password-managers-common-myths-and-misconceptions/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Wed, 20 Dec 2023 02:03:50 +0000</pubDate>
				<category><![CDATA[password]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1799</guid>

					<description><![CDATA[Password managers are secure and efficient tools designed to enhance digital security by simplifying and fortifying the management of passwords. Acting as a centralized repository, they store and encrypt users login credentials for various online accounts, such as websites, applications, and services. Users need to remember only one master password, granting them access to the [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/password-managers-common-myths-and-misconceptions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Effective Cybersecurity for SMB: Why is it Critical?</title>
		<link>https://virtualdoers.com/cybersecurity-for-smb-why-is-it-vital/</link>
					<comments>https://virtualdoers.com/cybersecurity-for-smb-why-is-it-vital/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Fri, 15 Dec 2023 03:19:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1793</guid>

					<description><![CDATA[In today’s digital world, cybersecurity for SMB (Small and Medium Businesses) is vital for small businesses to thrive, or at least survive. Cyber attacks continue to dominate the headlines, with a particular focus on well-known firms. However, research shows that small businesses with fewer than 100 employees are the target of 71% of cyber attacks. This demonstrates that small [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/cybersecurity-for-smb-why-is-it-vital/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Shoulder Surfing Attacks: How to Annihilate Them</title>
		<link>https://virtualdoers.com/shoulder-surfing-attacks-how-to-annihilate-them/</link>
					<comments>https://virtualdoers.com/shoulder-surfing-attacks-how-to-annihilate-them/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Fri, 15 Dec 2023 01:28:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1785</guid>

					<description><![CDATA[A shoulder Surfing Attack is a social engineering technique where an attacker simply looks over someone’s shoulder to get confidential information. It could be as simple as when a person is entering their PIN in an ATM or when a person is entering the username and password to their social media account/Internet Banking etc. A [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/shoulder-surfing-attacks-how-to-annihilate-them/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Unseen Threat: How Shoulder Surfing Puts Your Privacy at Risk</title>
		<link>https://virtualdoers.com/shoulder-surfing-puts-your-privacy-at-risk/</link>
					<comments>https://virtualdoers.com/shoulder-surfing-puts-your-privacy-at-risk/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Tue, 12 Dec 2023 02:54:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1777</guid>

					<description><![CDATA[Shoulder surfing is a form of visual eavesdropping in which an individual observes, or &#8220;surfs,&#8221; the activities of another person, typically with the intent of gathering sensitive or confidential information. This technique involves someone looking over the shoulder of another person, often in crowded or public spaces, to gain unauthorized access to information such as [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/shoulder-surfing-puts-your-privacy-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber-security Awareness: A Powerful Guardian against Breaches</title>
		<link>https://virtualdoers.com/cyber-security-awareness-a-vigilant-guardian/</link>
					<comments>https://virtualdoers.com/cyber-security-awareness-a-vigilant-guardian/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Sat, 09 Dec 2023 01:14:44 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1768</guid>

					<description><![CDATA[In the ever-evolving landscape of digital threats, cyber-security awareness emerges as a beacon of defense, illuminating the path toward a safer online existence. It goes beyond the mere recognition of technical jargon and security protocols; it is a profound understanding of the very essence of risk in our interconnected world. Cyber-security Awareness: The CIA Triad [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/cyber-security-awareness-a-vigilant-guardian/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>10 Tips on Navigating the Aftermath of Ransomware Attack</title>
		<link>https://virtualdoers.com/navigating-the-aftermath-of-ransomware-attack/</link>
					<comments>https://virtualdoers.com/navigating-the-aftermath-of-ransomware-attack/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Thu, 07 Dec 2023 02:48:26 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1761</guid>

					<description><![CDATA[The aftermath of ransomware attacks is a complex and often challenging landscape, encompassing various technical, financial, and human dimensions. Nearly every business relies heavily on technology to keep their operations running smoothly. With the increasing threat of ransomware attacks, however, it’s crucial for businesses to have a well-thought-out plan for business continuity. Ransomware attacks can bring your business [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/navigating-the-aftermath-of-ransomware-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Beware of Christmas phishing: 10 Protection Tips</title>
		<link>https://virtualdoers.com/beware-of-christmas-phishing-10-protection-tips/</link>
					<comments>https://virtualdoers.com/beware-of-christmas-phishing-10-protection-tips/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Wed, 06 Dec 2023 03:15:52 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1752</guid>

					<description><![CDATA[&#8220;Christmas phishing&#8221; refers to a type of phishing attack that specifically leverages the holiday season and Christmas-related themes to deceive individuals and trick them into divulging sensitive information or taking malicious actions. During the festive season, as the joy of Christmas spreads across digital landscapes, it is crucial for individuals to be acutely aware of [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/beware-of-christmas-phishing-10-protection-tips/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ransomware Attacks Understanding its Aggressive Rise</title>
		<link>https://virtualdoers.com/ransomware-attacks-understanding-its-rapid-rise/</link>
					<comments>https://virtualdoers.com/ransomware-attacks-understanding-its-rapid-rise/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Mon, 04 Dec 2023 01:51:03 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1743</guid>

					<description><![CDATA[In the rapidly evolving landscape of cyberspace, one malicious phenomenon has risen to prominence, leaving a trail of disruption and financial turmoil in its wake: ransomware attacks. These insidious threats have become more than just a headline; they&#8217;ve become a pervasive and evolving challenge that demands our attention. In this exploration, we embark on a [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/ransomware-attacks-understanding-its-rapid-rise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Unveiling the Crucial Human Element in Cyber security</title>
		<link>https://virtualdoers.com/human-the-crucial-element-in-cyber-security/</link>
					<comments>https://virtualdoers.com/human-the-crucial-element-in-cyber-security/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Tue, 28 Nov 2023 03:06:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1725</guid>

					<description><![CDATA[In the ever-evolving realm of cybersecurity, where algorithms and firewalls dance with sophisticated threats, it&#8217;s easy to overlook the one variable that remains both unpredictable and indispensable – the human factor. Behind every line of code and security protocol, there&#8217;s a human touch, and therein lies the intricate dance between security professionals and the individuals [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/human-the-crucial-element-in-cyber-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>5 Practical Steps to Enhance Cyber-security from the Boardroom</title>
		<link>https://virtualdoers.com/5-steps-to-enhance-cyber-security-from-boardroom/</link>
					<comments>https://virtualdoers.com/5-steps-to-enhance-cyber-security-from-boardroom/#respond</comments>
		
		<dc:creator><![CDATA[djonon]]></dc:creator>
		<pubDate>Mon, 27 Nov 2023 19:00:58 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://virtualdoers.com/?p=1714</guid>

					<description><![CDATA[In today&#8217;s digital landscape, cyber-security isn&#8217;t just an IT concern; it&#8217;s a strategic imperative that starts at the top. Boardroom involvement is pivotal in steering an organization towards robust cyber-security practices. Furthermore, in the intricate dance between boards and cybersecurity practitioners, collaboration is not just a choice; it&#8217;s a necessity for the digital age. Imagine [&#8230;]]]></description>
		
					<wfw:commentRss>https://virtualdoers.com/5-steps-to-enhance-cyber-security-from-boardroom/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
