<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Why IT Security Matters to Businesses of all sizes?</title>
	<atom:link href="http://www.itotalmarketing.co.uk/why-it-security-matters-to-businesses-of-all-sizes/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.itotalmarketing.co.uk/why-it-security-matters-to-businesses-of-all-sizes/</link>
	<description>IT Infrastructure Design, IT Security and Local Internet Marketing Company</description>
	<lastBuildDate>Fri, 30 Jan 2015 11:19:45 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.41</generator>
	<item>
		<title>By: marshall</title>
		<link>http://www.itotalmarketing.co.uk/why-it-security-matters-to-businesses-of-all-sizes/#comment-46636</link>
		<dc:creator><![CDATA[marshall]]></dc:creator>
		<pubDate>Mon, 13 May 2013 13:51:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.itotalmarketing.co.uk/?p=546#comment-46636</guid>
		<description><![CDATA[Pay attention to this one-way journey into knowledge. Bookmark ]]></description>
		<content:encoded><![CDATA[<p>Pay attention to this one-way journey into knowledge. Bookmark </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: edward chale</title>
		<link>http://www.itotalmarketing.co.uk/why-it-security-matters-to-businesses-of-all-sizes/#comment-5921</link>
		<dc:creator><![CDATA[edward chale]]></dc:creator>
		<pubDate>Fri, 07 Dec 2012 03:28:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.itotalmarketing.co.uk/?p=546#comment-5921</guid>
		<description><![CDATA[Wonderful post however I was wondering if you could write a litte more on this topic? I&#039;d be very thankful if you could elaborate a little bit further. Cheers!]]></description>
		<content:encoded><![CDATA[<p>Wonderful post however I was wondering if you could write a litte more on this topic? I&#8217;d be very thankful if you could elaborate a little bit further. Cheers!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: uhuru</title>
		<link>http://www.itotalmarketing.co.uk/why-it-security-matters-to-businesses-of-all-sizes/#comment-5861</link>
		<dc:creator><![CDATA[uhuru]]></dc:creator>
		<pubDate>Tue, 04 Dec 2012 09:10:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.itotalmarketing.co.uk/?p=546#comment-5861</guid>
		<description><![CDATA[Hey would you mind sharing which blog platform you&#039;re working with? I&#039;m going to start my own blog in the near future but I&#039;m having a difficult time making a decision between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your layout seems different then most blogs and I&#039;m looking for something unique.                  P.S Sorry for being off-topic but I had to ask!]]></description>
		<content:encoded><![CDATA[<p>Hey would you mind sharing which blog platform you&#8217;re working with? I&#8217;m going to start my own blog in the near future but I&#8217;m having a difficult time making a decision between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your layout seems different then most blogs and I&#8217;m looking for something unique.                  P.S Sorry for being off-topic but I had to ask!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: claudia hammer</title>
		<link>http://www.itotalmarketing.co.uk/why-it-security-matters-to-businesses-of-all-sizes/#comment-5675</link>
		<dc:creator><![CDATA[claudia hammer]]></dc:creator>
		<pubDate>Tue, 27 Nov 2012 15:57:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.itotalmarketing.co.uk/?p=546#comment-5675</guid>
		<description><![CDATA[Security is no longer confined to the organization&#039;s perimeters. For years, user authentication served a vital role in organizations&#039; security policies, securing networking access, protecting user identities and ensuring that users are who they claim to be. But as new business environments like the cloud and the increased use of mobile devices emerge, organizations find they need to quickly adopt new models for authenticating their users to offset potential threats. In this program, Gartner, Vodafone and SafeNet will discuss the emerging authentication models that organizations are adopting; new approaches to user authentication driven by demanding cloud and virtualized environments that are transforming traditional security paradigms; intelligent authentication strategies that can drive value and cost savings; and how you can ensure these implementations will scale as business needs evolve and new environments emerge.]]></description>
		<content:encoded><![CDATA[<p>Security is no longer confined to the organization&#8217;s perimeters. For years, user authentication served a vital role in organizations&#8217; security policies, securing networking access, protecting user identities and ensuring that users are who they claim to be. But as new business environments like the cloud and the increased use of mobile devices emerge, organizations find they need to quickly adopt new models for authenticating their users to offset potential threats. In this program, Gartner, Vodafone and SafeNet will discuss the emerging authentication models that organizations are adopting; new approaches to user authentication driven by demanding cloud and virtualized environments that are transforming traditional security paradigms; intelligent authentication strategies that can drive value and cost savings; and how you can ensure these implementations will scale as business needs evolve and new environments emerge.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Nike air max 95</title>
		<link>http://www.itotalmarketing.co.uk/why-it-security-matters-to-businesses-of-all-sizes/#comment-3489</link>
		<dc:creator><![CDATA[Nike air max 95]]></dc:creator>
		<pubDate>Mon, 08 Oct 2012 02:45:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.itotalmarketing.co.uk/?p=546#comment-3489</guid>
		<description><![CDATA[I&#039;m no longer positive where you are getting your info, but great topic. I must spend a while finding out more or figuring out more. Thanks for excellent information I used to be in search of this information for my mission.]]></description>
		<content:encoded><![CDATA[<p>I&#8217;m no longer positive where you are getting your info, but great topic. I must spend a while finding out more or figuring out more. Thanks for excellent information I used to be in search of this information for my mission.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: silver account</title>
		<link>http://www.itotalmarketing.co.uk/why-it-security-matters-to-businesses-of-all-sizes/#comment-3297</link>
		<dc:creator><![CDATA[silver account]]></dc:creator>
		<pubDate>Mon, 01 Oct 2012 08:00:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.itotalmarketing.co.uk/?p=546#comment-3297</guid>
		<description><![CDATA[Users have long believed that their mobile devices were free from the threat of Trojans or botnets, but new research from the Georgia Institute of Technology warns that this could soon change. In fact, the first wave of mobile security threats is already here.]]></description>
		<content:encoded><![CDATA[<p>Users have long believed that their mobile devices were free from the threat of Trojans or botnets, but new research from the Georgia Institute of Technology warns that this could soon change. In fact, the first wave of mobile security threats is already here.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
