<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>protection Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/protection/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/protection/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Thu, 15 Aug 2024 02:32:18 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>protection Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/protection/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Is Everything Truly Hackable?</title>
		<link>https://www.vertexcybersecurity.com.au/is-everything-truly-hackable/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=is-everything-truly-hackable</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Sat, 22 Feb 2020 22:22:54 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security monitoring]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[ethical hacking sydney]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[twitter]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=817</guid>

					<description><![CDATA[According to NBC News the Saudi-based group OurMine took over Facebook&#8217;s Twitter account on Friday, 7 February then pointed Facebook&#8217;s 13.4 million followers to their own web site. &#8220;We have no bad intentions and only care about the security and privacy of your accounts and network,&#8221; OurMine said on its website. They are the same [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>A Fundamental Business Requirement</title>
		<link>https://www.vertexcybersecurity.com.au/a-fundamental-business-requirement/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-fundamental-business-requirement</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 09 Oct 2019 22:40:22 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach check]]></category>
		<category><![CDATA[ITaudit]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=795</guid>

					<description><![CDATA[IT cyber security auditing services can be a fundamental business requirement. IT auditing provides the insight and knowledge required to stay secure and continuously improve your company’s security.&#160; At Vertex Security, we conduct a comprehensive IT infrastructure and system audit which enables us to prioritise and provide actionable advice, plus ranked security priorities in a [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Strengthen One of Your Weakest Cyber Security Links</title>
		<link>https://www.vertexcybersecurity.com.au/strengthen-one-of-your-weakest-cyber-security-links/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=strengthen-one-of-your-weakest-cyber-security-links</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 17 Sep 2019 23:34:09 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[Business Leaders]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[cybersecurity training]]></category>
		<category><![CDATA[data breach check]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Regulated Cyber Security]]></category>
		<category><![CDATA[security training]]></category>
		<category><![CDATA[training]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=789</guid>

					<description><![CDATA[Unfortunately, human error can still be one of the weakest cyber security links for companies. Innocently opening a phishing attack email can bring a company down by compromising their data. Every company needs to strengthen one of their weakest cyber security links by investing in training. The right cyber security training can make the difference [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Hackers For The Greater Good</title>
		<link>https://www.vertexcybersecurity.com.au/hackers-for-the-greater-good/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hackers-for-the-greater-good</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 17 Sep 2019 22:43:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Regulated Cyber Security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=784</guid>

					<description><![CDATA[We need more hackers for the greater good of company&#8217;s cyber safety. White hat hackers (ethical hackers) help organisations avoid a catastrophic data breach and they know how to think like a black hat hacker. Penetration testing&#160;is a form of ethical hacking. It is the most secure way to test and protect your company from [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>The Vertex Penetration Testing Difference</title>
		<link>https://www.vertexcybersecurity.com.au/the-vertex-penetration-testing-difference/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-vertex-penetration-testing-difference</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 11 Sep 2019 19:28:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data breach check]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=780</guid>

					<description><![CDATA[The Vertex Penetration Testing difference lies in our proven expertise and the human experience we provide. We see ourselves as a partner to our clients not just a report generator. We find 20% more vulnerabilities than all our competitors, and we know that it only takes one sub-par security practice to bring a business to [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>85% of Customers Will Never Do Business With You Again</title>
		<link>https://www.vertexcybersecurity.com.au/85-of-customers-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=85-of-customers-penetration-testing</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 30 Aug 2019 00:06:21 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[data breach check]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=770</guid>

					<description><![CDATA[85% of customers will never do business with you again if your company experiences a cyber security breach. You need to attack the issue before it starts with a penetration test.&#160; Penetration testing is a managed and approved in-depth review of your systems. An authorised individual or team finds the gaps within your IT system [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Work with the Best Penetration Testing Experts in Australia</title>
		<link>https://www.vertexcybersecurity.com.au/expert-penetration-testing-in-australia/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=expert-penetration-testing-in-australia</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Sat, 24 Aug 2019 01:01:18 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data breach check]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Mandatory breach notification]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=765</guid>

					<description><![CDATA[We are penetration testing experts. Recently, our client compared the results of a Vertex Security penetration test to a US cyber security company&#8217;s penetration test. We uncovered 32% more vulnerabilities then the US company did in their report.&#160; Our customers come first. We diligently find every possible threat through our expert penetration testing services. We [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>We are Software and Technology Innovators</title>
		<link>https://www.vertexcybersecurity.com.au/we-are-software-and-technology-innovators/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=we-are-software-and-technology-innovators</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 22 Aug 2019 02:38:04 +0000</pubDate>
				<category><![CDATA[Other]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[Business Leaders]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=754</guid>

					<description><![CDATA[We take cyber security seriously. We only choose to partner and align with software and technology innovators who are accelerating the development of world-leading technology in Australia. By providing only the best possible cyber security services, IT auditing and managed security services we continue to outperform other cyber security options.&#160; According to the EY Global [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>1 in 10 Aussie Businesses Suffered IT Breaches in 2018</title>
		<link>https://www.vertexcybersecurity.com.au/1-in-10-aussie-businesses-suffered-it-breaches-in-2018/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=1-in-10-aussie-businesses-suffered-it-breaches-in-2018</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 21 Aug 2019 23:08:14 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data breach check]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Regulated Cyber Security]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=749</guid>

					<description><![CDATA[According to the Australian Bureau of Statistics, 1 in 10 Australian businesses experienced some kind of cyber security incident or breach during the 2017-18 financial year. The data also shows that almost 18% of businesses weren’t aware they suffered an incident or breach.    Cyber Security is becoming more and more important for both large [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>New Cybersecurity Threats in 2019</title>
		<link>https://www.vertexcybersecurity.com.au/new-cybersecurity-threats-in-2019/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-cybersecurity-threats-in-2019</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 02 Aug 2019 21:13:12 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[mobile plan hacking]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=739</guid>

					<description><![CDATA[Internet of Things (IoT) Device Threats Businesses are now offering more and more devices to their solutions and a lot of these devices don’t have security plans in place. Companies that want to stay safe should implement a process and management for updating all IoT devices.&#160;&#160;&#160; Geopolitical Risks If your business data is stored offshore [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
