<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" version="2.0">
  <channel>
    <title>Pirum's Tech Ponderings</title>
    <link>https://www.pirumllc.com</link>
    <description />
    <atom:link href="https://www.pirumllc.com/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>Delivering SMS “Smishing” Scams</title>
      <link>https://www.pirumllc.com/2021/10/27/delivering-sms-smishing-scams</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Smishing is high up on the list of words that do not sound as intimidating or threatening as they should. Smashing the word fishing together with the “SM” for short messaging service (aka text), smishing is a cyberscam. Especially with online shopping skyrocketing during the pandemic, delivery smishing has gained traction. Don’t fall victim to
  
  
                    &#xD;
    &lt;a href="/2021/10/27/delivering-sms-smishing-scams/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Delivering SMS “Smishing” Scams"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/10/27/delivering-sms-smishing-scams/"&gt;&#xD;
      
                      
    
    Delivering SMS “Smishing” Scams
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 27 Oct 2021 20:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/10/27/delivering-sms-smishing-scams</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Securing Remote Work with Backups</title>
      <link>https://www.pirumllc.com/2021/10/25/secure-your-remote-work-with-the-right-backups</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Working from home is no longer only for a few employees in special circumstances. The pandemic pushed many businesses to enable remote work. The priority was getting it working and securing access. Now that it’s routine, it’s also time to consider remote work backups. Data backup creates a reliable copy of business data. An accessible,
  
  
                    &#xD;
    &lt;a href="/2021/10/25/secure-your-remote-work-with-the-right-backups/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Securing Remote Work with Backups"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/10/25/secure-your-remote-work-with-the-right-backups/"&gt;&#xD;
      
                      
    
    Securing Remote Work with Backups
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 25 Oct 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/10/25/secure-your-remote-work-with-the-right-backups</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>6 Things to Avoid on You Work Computer</title>
      <link>https://www.pirumllc.com/2021/10/18/what-not-to-do-on-a-work-computer</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Working from home has its advantages but can also blur the line between professional and personal time. Plus, employees may grow more relaxed about what they do on their work computer while remote. This article shares things employees should avoid doing on work computers, whether remote or in the office. What to avoid doing when
  
  
                    &#xD;
    &lt;a href="/2021/10/18/what-not-to-do-on-a-work-computer/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "6 Things to Avoid on You Work Computer"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/10/18/what-not-to-do-on-a-work-computer/"&gt;&#xD;
      
                      
    
    6 Things to Avoid on You Work Computer
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 18 Oct 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/10/18/what-not-to-do-on-a-work-computer</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Is Your Home Smart Enough for Your Devices?</title>
      <link>https://www.pirumllc.com/2021/10/13/is-your-home-smart-enough-for-your-devices</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With the increasing reach of the Internet of Things, more of us have devices in the home to connect online: it’s no longer just connecting a computer to a dial-up modem. In fact, it’s estimated that the average home now has as many as 50 connected devices. All this could require a home network upgrade.
  
  
                    &#xD;
    &lt;a href="/2021/10/13/is-your-home-smart-enough-for-your-devices/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Is Your Home Smart Enough for Your Devices?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/10/13/is-your-home-smart-enough-for-your-devices/"&gt;&#xD;
      
                      
    
    Is Your Home Smart Enough for Your Devices?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 13 Oct 2021 20:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/10/13/is-your-home-smart-enough-for-your-devices</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>How to Free Up IT Resources</title>
      <link>https://www.pirumllc.com/2021/10/11/how-to-free-up-it-resources</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Business success comes from capitalizing on opportunities, except it is harder to do so if you are resource constrained. This article explores ways to free up IT resources to drive productivity and evolution. Your business depends on information technology resources. The right software can help manage expanding workloads and improve collaboration. Enjoy reliable, secure access
  
  
                    &#xD;
    &lt;a href="/2021/10/11/how-to-free-up-it-resources/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "How to Free Up IT Resources"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/10/11/how-to-free-up-it-resources/"&gt;&#xD;
      
                      
    
    How to Free Up IT Resources
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 11 Oct 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/10/11/how-to-free-up-it-resources</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>7 Common Business IT Myths Debunked</title>
      <link>https://www.pirumllc.com/2021/10/06/7-common-business-it-myths-debunked</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    MythBuster programs on television never focus on business misconceptions about IT. Too bad, because believing these myths can be both costly and dangerous to your business. This article debunks seven common business IT myths. Sometimes myths are harmless, but when it comes to business IT myths, not knowing the truth is damaging. Make smarter tech
  
  
                    &#xD;
    &lt;a href="/2021/10/06/7-common-business-it-myths-debunked/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "7 Common Business IT Myths Debunked"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/10/06/7-common-business-it-myths-debunked/"&gt;&#xD;
      
                      
    
    7 Common Business IT Myths Debunked
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 06 Oct 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/10/06/7-common-business-it-myths-debunked</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>What You Need to Know about Security Testing</title>
      <link>https://www.pirumllc.com/2021/09/29/what-you-need-to-know-about-security-testing</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You want to keep your IT in top shape. Your business technology supports both your productivity and profitability. You don’t want to be dealing with downtime. You also want to avoid running afoul of any industry regulations or standards. But how does a business gauge IT fitness? That’s where IT audits, security assessments and penetration
  
  
                    &#xD;
    &lt;a href="/2021/09/29/what-you-need-to-know-about-security-testing/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "What You Need to Know about Security Testing"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/29/what-you-need-to-know-about-security-testing/"&gt;&#xD;
      
                      
    
    What You Need to Know about Security Testing
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 29 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/29/what-you-need-to-know-about-security-testing</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Top Things to Replace in Your Old School Office</title>
      <link>https://www.pirumllc.com/2021/09/27/top-things-to-replace-in-your-old-school-office</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You may be in the “if ain’t broke why fix it” camp. Yet even if some of your outdated office tools and technology aren’t actually broken, they could be crying out for an update (if only you spoke filing cabinet, you’d know!). Here are the top things we see that businesses could upgrade to improve
  
  
                    &#xD;
    &lt;a href="/2021/09/27/top-things-to-replace-in-your-old-school-office/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Top Things to Replace in Your Old School Office"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/27/top-things-to-replace-in-your-old-school-office/"&gt;&#xD;
      
                      
    
    Top Things to Replace in Your Old School Office
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 27 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/27/top-things-to-replace-in-your-old-school-office</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>The Danger of IT Dashes for Small Business</title>
      <link>https://www.pirumllc.com/2021/09/24/the-danger-of-it-dashes-for-small-business</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Few of us would think we could run a marathon, or even a 10-mile race, without training first. Yet the number of people who think they could successfully run a 50-meter dash jumps dramatically, especially if they were being chased by a criminal, cougar, or scary clown. Still, that short sprint would be much easier
  
  
                    &#xD;
    &lt;a href="/2021/09/24/the-danger-of-it-dashes-for-small-business/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "The Danger of IT Dashes for Small Business"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/24/the-danger-of-it-dashes-for-small-business/"&gt;&#xD;
      
                      
    
    The Danger of IT Dashes for Small Business
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 24 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/24/the-danger-of-it-dashes-for-small-business</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Outsourcing to an MSP Custom-size Your Partnership</title>
      <link>https://www.pirumllc.com/2021/09/22/outsourcing-to-an-msp-custom-size-your-partnership</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to business technology, there is no one-size-fits-all answer. Managed service providers (MSPs) know this firsthand. That’s why you’ll find they make it easy to partner with them for different levels of outsourced IT. This article outlines the three tiers of MSP outsourcing typically available. Small and mid-sized businesses share many challenges. They
  
  
                    &#xD;
    &lt;a href="/2021/09/22/outsourcing-to-an-msp-custom-size-your-partnership/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Outsourcing to an MSP Custom-size Your Partnership"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/22/outsourcing-to-an-msp-custom-size-your-partnership/"&gt;&#xD;
      
                      
    
    Outsourcing to an MSP Custom-size Your Partnership
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 22 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/22/outsourcing-to-an-msp-custom-size-your-partnership</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>How Hackers Get Around SMS Two-Factor Authentication</title>
      <link>https://www.pirumllc.com/2021/09/20/how-hackers-get-around-sms-two-factor-authentication</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It’s become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe. With billions of usernames and passwords
  
  
                    &#xD;
    &lt;a href="/2021/09/20/how-hackers-get-around-sms-two-factor-authentication/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "How Hackers Get Around SMS Two-Factor Authentication"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/20/how-hackers-get-around-sms-two-factor-authentication/"&gt;&#xD;
      
                      
    
    How Hackers Get Around SMS Two-Factor Authentication
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 20 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/20/how-hackers-get-around-sms-two-factor-authentication</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>DIY Computer Repair: Don’t Do It</title>
      <link>https://www.pirumllc.com/2021/09/17/559</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Most people like to take a shot at fixing things something themselves. With some things that works out great, but when it comes to do-it-yourself computer repair, it’s probably not worth the effort. This article shares some of the things to consider before trying to do that repair solo. #1 Computers are complicated Computer developers
  
  
                    &#xD;
    &lt;a href="/2021/09/17/559/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "DIY Computer Repair: Don’t Do It"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/17/559/"&gt;&#xD;
      
                      
    
    DIY Computer Repair: Don’t Do It
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 17 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/17/559</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Data Deduplication Best Practices for Hybrid Workforce</title>
      <link>https://www.pirumllc.com/2021/09/15/data-deduplication-best-practices-for-hybrid-workforce</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Data hygiene, from a hybrid workforce perspective, aims at the structuring of information and the elimination of dirty data from your network. It involves the implementation of sound policies to check records for accuracy and the removal of errors. Data hygiene is vital for businesses because if you base your decisions on dirty data, it
  
  
                    &#xD;
    &lt;a href="/2021/09/15/data-deduplication-best-practices-for-hybrid-workforce/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Data Deduplication Best Practices for Hybrid Workforce"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/15/data-deduplication-best-practices-for-hybrid-workforce/"&gt;&#xD;
      
                      
    
    Data Deduplication Best Practices for Hybrid Workforce
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 15 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/15/data-deduplication-best-practices-for-hybrid-workforce</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>The Role Deduplication Plays in a Data Cleansing Strategy</title>
      <link>https://www.pirumllc.com/2021/09/13/the-role-deduplication-plays-in-a-data-cleansing-strategy</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In today’s digital era, where humans produce close to 2.5 quintillion bytes of data every day, dirty data is a concern for businesses irrespective of size and industry.1 This is because any organization that handles duplicate, inaccurate and outdated information will have to deal with consequences such as: Ineffective marketing efforts Most businesses these days
  
  
                    &#xD;
    &lt;a href="/2021/09/13/the-role-deduplication-plays-in-a-data-cleansing-strategy/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "The Role Deduplication Plays in a Data Cleansing Strategy"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/13/the-role-deduplication-plays-in-a-data-cleansing-strategy/"&gt;&#xD;
      
                      
    
    The Role Deduplication Plays in a Data Cleansing Strategy
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 13 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/13/the-role-deduplication-plays-in-a-data-cleansing-strategy</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>5 Security Risk Analysis Myths in the Healthcare Industry</title>
      <link>https://www.pirumllc.com/2021/09/10/5-security-risk-analysis-myths-in-the-healthcare-industry</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The COVID-19 pandemic threw multiple challenges at the healthcare industry. The sector saw a steep increase in demand that led to the collapse of health infrastructures in different parts of the world. What’s more, the industry experienced an unprecedented cybercrime surge. According to a report, the most attacked sector in 2020 was healthcare,1 and experts
  
  
                    &#xD;
    &lt;a href="/2021/09/10/5-security-risk-analysis-myths-in-the-healthcare-industry/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "5 Security Risk Analysis Myths in the Healthcare Industry"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/10/5-security-risk-analysis-myths-in-the-healthcare-industry/"&gt;&#xD;
      
                      
    
    5 Security Risk Analysis Myths in the Healthcare Industry
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 10 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/10/5-security-risk-analysis-myths-in-the-healthcare-industry</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Managed Compliance as a Service May Be the Answer to Healthcare Compliance Challenges</title>
      <link>https://www.pirumllc.com/2021/09/08/managed-compliance-as-a-service-may-be-the-answer-to-healthcare-compliance-challenges</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The healthcare industry has been going through a difficult phase. While the COVID-19 pandemic overwhelmed health infrastructures across the globe, cyberattacks targeting the industry are skyrocketing. In 2020, healthcare was the worst affected industry by cybercrimes.1 Experts suggest that this trend will continue into 2021 and beyond. This is a reminder for organizations to regularly
  
  
                    &#xD;
    &lt;a href="/2021/09/08/managed-compliance-as-a-service-may-be-the-answer-to-healthcare-compliance-challenges/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Managed Compliance as a Service May Be the Answer to Healthcare Compliance Challenges"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/08/managed-compliance-as-a-service-may-be-the-answer-to-healthcare-compliance-challenges/"&gt;&#xD;
      
                      
    
    Managed Compliance as a Service May Be the Answer to Healthcare Compliance Challenges
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 08 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/08/managed-compliance-as-a-service-may-be-the-answer-to-healthcare-compliance-challenges</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Stepping Up Your Cybersecurity With Defense in Depth (DiD)</title>
      <link>https://www.pirumllc.com/2021/09/06/stepping-up-your-cybersecurity-with-defense-in-depth-did</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When the pandemic hit, businesses all over the globe had to shift to remote work almost overnight. Now, with the vaccine rollout in full swing, the hybrid work model is gaining popularity. This allows employees to work from home, the office or split their time between both. According to a report, close to 65% of
  
  
                    &#xD;
    &lt;a href="/2021/09/06/stepping-up-your-cybersecurity-with-defense-in-depth-did/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Stepping Up Your Cybersecurity With Defense in Depth (DiD)"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/06/stepping-up-your-cybersecurity-with-defense-in-depth-did/"&gt;&#xD;
      
                      
    
    Stepping Up Your Cybersecurity With Defense in Depth (DiD)
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 06 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/06/stepping-up-your-cybersecurity-with-defense-in-depth-did</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Defense in Depth (DiD): Think Like a Hacker</title>
      <link>https://www.pirumllc.com/2021/09/03/defense-in-depth-did-think-like-a-hacker</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The current threat landscape is rapidly advancing, with cybercriminals constantly upgrading their toolset to break through security defenses. If you want to outsmart malicious hackers, it’s time to start thinking like them. Fend them off with various layered defense methods. This is what Defense in Depth (DiD) is all about. The National Institute of Standards
  
  
                    &#xD;
    &lt;a href="/2021/09/03/defense-in-depth-did-think-like-a-hacker/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Defense in Depth (DiD): Think Like a Hacker"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/09/03/defense-in-depth-did-think-like-a-hacker/"&gt;&#xD;
      
                      
    
    Defense in Depth (DiD): Think Like a Hacker
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 03 Sep 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/09/03/defense-in-depth-did-think-like-a-hacker</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Windows 11 Is Coming: Should You Upgrade?</title>
      <link>https://www.pirumllc.com/2021/08/31/windows-11-is-coming-should-you-upgrade</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Microsoft’s next version of Windows is being rolled out this year, and businesses  are now wondering if the upgrade is right for their needs. This article looks at the changes and helps you weigh up your options. Windows 11 simplifies Microsoft’s operating system and user interface. The new release is still only at the preview
  
  
                    &#xD;
    &lt;a href="/2021/08/31/windows-11-is-coming-should-you-upgrade/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Windows 11 Is Coming: Should You Upgrade?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/31/windows-11-is-coming-should-you-upgrade/"&gt;&#xD;
      
                      
    
    Windows 11 Is Coming: Should You Upgrade?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Tue, 31 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/31/windows-11-is-coming-should-you-upgrade</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Pushing Send? Know that Email Is Not Secure</title>
      <link>https://www.pirumllc.com/2021/08/30/pushing-send-know-that-email-is-not-secure</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We send an estimated 306 billion emails every day globally, personal and professional. Still, it’s not secure. Any private data, proprietary information or sensitive documents sent are at risk. Sending an email is convenient and quick, but when it comes to confidential data, you’re better off choosing another method of delivery, one that doesn’t have
  
  
                    &#xD;
    &lt;a href="/2021/08/30/pushing-send-know-that-email-is-not-secure/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Pushing Send? Know that Email Is Not Secure"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/30/pushing-send-know-that-email-is-not-secure/"&gt;&#xD;
      
                      
    
    Pushing Send? Know that Email Is Not Secure
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 30 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/30/pushing-send-know-that-email-is-not-secure</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>What Does “Right to Repair” Mean, and Why Does It Matter?</title>
      <link>https://www.pirumllc.com/2021/08/27/what-does-right-to-repair-mean-and-why-does-it-matter</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You may not think of yourself as “handy,” so the thought may not even have crossed your mind to take apart your cell phone or laptop to try and repair it. But did you know that in certain cases it might be illegal for you to even try? There is a debate raging over “right
  
  
                    &#xD;
    &lt;a href="/2021/08/27/what-does-right-to-repair-mean-and-why-does-it-matter/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "What Does “Right to Repair” Mean, and Why Does It Matter?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/27/what-does-right-to-repair-mean-and-why-does-it-matter/"&gt;&#xD;
      
                      
    
    What Does “Right to Repair” Mean, and Why Does It Matter?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 27 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/27/what-does-right-to-repair-mean-and-why-does-it-matter</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Avoid Having Your Emails Flagged As Spam</title>
      <link>https://www.pirumllc.com/2021/08/25/__trashed</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The Monty Python “Spam” sketch makes us laugh, but business emails filtered as spam do not. Your business wants to reach its prospects and customers. This article shares tips to help you ensure customers get your messages. Mail or internet service providers (ISPs) use algorithms, custom configurations, and/or machine learning to filter emails, and this keeps your
  
  
                    &#xD;
    &lt;a href="/2021/08/25/__trashed/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Avoid Having Your Emails Flagged As Spam"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/25/__trashed/"&gt;&#xD;
      
                      
    
    Avoid Having Your Emails Flagged As Spam
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 25 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/25/__trashed</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>A Good Internal IT Person Is Hard to Find</title>
      <link>https://www.pirumllc.com/2021/08/23/a-good-internal-it-person-is-hard-to-find</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Technology is everywhere, yet we don’t always understand it. When things go wrong or get challenging, we turn to IT Services for help, but it’s becoming difficult for businesses to hire internal IT support staff. Here’s why and what to do about it. The IT talent shortage has been an issue for more than a
  
  
                    &#xD;
    &lt;a href="/2021/08/23/a-good-internal-it-person-is-hard-to-find/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "A Good Internal IT Person Is Hard to Find"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/23/a-good-internal-it-person-is-hard-to-find/"&gt;&#xD;
      
                      
    
    A Good Internal IT Person Is Hard to Find
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 23 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/23/a-good-internal-it-person-is-hard-to-find</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Choosing the Right Computer Monitor</title>
      <link>https://www.pirumllc.com/2021/08/20/choosing-the-right-computer-monitor</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your hardware, software, and internet connection shape your computing experience. The last essential piece of the puzzle? The monitor you use. The first thing you need to consider is what you’ll be using the monitor for most. Gamers will have different requirements than those professionals or families viewing photos. Once you’ve determined monitor usage, you’ll
  
  
                    &#xD;
    &lt;a href="/2021/08/20/choosing-the-right-computer-monitor/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Choosing the Right Computer Monitor"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/20/choosing-the-right-computer-monitor/"&gt;&#xD;
      
                      
    
    Choosing the Right Computer Monitor
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 20 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/20/choosing-the-right-computer-monitor</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>4 Reasons Cybersecurity Attack Surfaces Are Expanding</title>
      <link>https://www.pirumllc.com/2021/08/19/4-reasons-cybersecurity-attack-surfaces-are-expanding</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The COVID-19 pandemic impacted individuals and businesses all over the world in one way or another. Almost overnight, it disrupted the way people went about their daily routines and how companies operated. Amidst all the chaos, changes to the cyber landscape increased at an unprecedented pace. Some of the trends that powered these changes and
  
  
                    &#xD;
    &lt;a href="/2021/08/19/4-reasons-cybersecurity-attack-surfaces-are-expanding/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "4 Reasons Cybersecurity Attack Surfaces Are Expanding"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/19/4-reasons-cybersecurity-attack-surfaces-are-expanding/"&gt;&#xD;
      
                      
    
    4 Reasons Cybersecurity Attack Surfaces Are Expanding
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 19 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/19/4-reasons-cybersecurity-attack-surfaces-are-expanding</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why Attacks on Critical Infrastructure Are Dangerous</title>
      <link>https://www.pirumllc.com/2021/08/16/why-attacks-on-critical-infrastructure-are-dangerous</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Critical Infrastructure (CI) comprises physical and cyber assets vital for the smooth functioning of societies and nations across the globe. The sectors that make up critical infrastructure differ from one country to another. For example, the USA considers 16 sectors to be vital as opposed to 13 in the UK. The disruption or damage of
  
  
                    &#xD;
    &lt;a href="/2021/08/16/why-attacks-on-critical-infrastructure-are-dangerous/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Why Attacks on Critical Infrastructure Are Dangerous"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/16/why-attacks-on-critical-infrastructure-are-dangerous/"&gt;&#xD;
      
                      
    
    Why Attacks on Critical Infrastructure Are Dangerous
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 16 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/16/why-attacks-on-critical-infrastructure-are-dangerous</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Recovery Assurance (RA): Is Your Business Data 100% Recoverable?</title>
      <link>https://www.pirumllc.com/2021/08/12/recovery-assurance-ra-is-your-business-data-100-recoverable</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Ever since the start of the COVID-19 pandemic, the concept of Disaster Recovery (DR) has received unprecedented attention. Most businesses have realized the importance of bouncing back quickly from a disruptive event. In 2020, about 80% of SMBs reported having a recovery plan in place.1 But are you sure your business’ data is 100% recoverable?
  
  
                    &#xD;
    &lt;a href="/2021/08/12/recovery-assurance-ra-is-your-business-data-100-recoverable/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Recovery Assurance (RA): Is Your Business Data 100% Recoverable?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/12/recovery-assurance-ra-is-your-business-data-100-recoverable/"&gt;&#xD;
      
                      
    
    Recovery Assurance (RA): Is Your Business Data 100% Recoverable?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 12 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/12/recovery-assurance-ra-is-your-business-data-100-recoverable</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>The Importance of Business Impact Analysis (BIA)</title>
      <link>https://www.pirumllc.com/2021/08/09/the-importance-of-business-impact-analysis-bia</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As the name signifies, a BIA quantifies the impact of a cyber disruption on your business. It doesn’t matter if the disruption happens because of an internet outage or a severe breach — a BIA covers it all. A business impact analysis lays the foundation for a strong business continuity and disaster recovery (BCDR) strategy
  
  
                    &#xD;
    &lt;a href="/2021/08/09/the-importance-of-business-impact-analysis-bia/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "The Importance of Business Impact Analysis (BIA)"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/09/the-importance-of-business-impact-analysis-bia/"&gt;&#xD;
      
                      
    
    The Importance of Business Impact Analysis (BIA)
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 09 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/09/the-importance-of-business-impact-analysis-bia</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>5 Ways to Combine Compliance &amp; Cybersecurity Best Practices to Improve Outcomes</title>
      <link>https://www.pirumllc.com/2021/08/05/5-ways-to-combine-compliance-cybersecurity-best-practices-to-improve-outcomes</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you run a business, compliance and security are two essential factors. Both are equally important for the seamless operation of your business. While compliance helps your business stay within the limits of industry or government regulations, security protects the integrity of your business and sensitive data. It is worth noting that although security is
  
  
                    &#xD;
    &lt;a href="/2021/08/05/5-ways-to-combine-compliance-cybersecurity-best-practices-to-improve-outcomes/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "5 Ways to Combine Compliance &amp;amp; Cybersecurity Best Practices to Improve Outcomes"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/05/5-ways-to-combine-compliance-cybersecurity-best-practices-to-improve-outcomes/"&gt;&#xD;
      
                      
    
    5 Ways to Combine Compliance &amp;amp; Cybersecurity Best Practices to Improve Outcomes
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 05 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/05/5-ways-to-combine-compliance-cybersecurity-best-practices-to-improve-outcomes</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>8 Elements of a Business Impact Analysis (BIA) for Compliance</title>
      <link>https://www.pirumllc.com/2021/08/02/8-elements-of-a-business-impact-analysis-bia-for-compliance</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A compliance program aims at protecting an organization from risk. The purpose of corporate compliance programs is to ensure that a business complies with laws or regulations relevant to it. You could consider a Compliance Program to be a form of internal insurance policy to create evidence of conformity with regulations and instill a culture
  
  
                    &#xD;
    &lt;a href="/2021/08/02/8-elements-of-a-business-impact-analysis-bia-for-compliance/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "8 Elements of a Business Impact Analysis (BIA) for Compliance"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/08/02/8-elements-of-a-business-impact-analysis-bia-for-compliance/"&gt;&#xD;
      
                      
    
    8 Elements of a Business Impact Analysis (BIA) for Compliance
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 02 Aug 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/08/02/8-elements-of-a-business-impact-analysis-bia-for-compliance</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Signs You Aren’t Budgeting Enough for IT</title>
      <link>https://www.pirumllc.com/2021/07/30/signs-you-arent-budgeting-enough-for-it</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Generally, we like to make the argument that nothing about your small business is too small. We do say it a lot in relation to cybersecurity — no size of business is immune. Yet, there is the chance your IT budget is too small. Consider these indicators that you might need to invest more in
  
  
                    &#xD;
    &lt;a href="/2021/07/30/signs-you-arent-budgeting-enough-for-it/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Signs You Aren’t Budgeting Enough for IT"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/30/signs-you-arent-budgeting-enough-for-it/"&gt;&#xD;
      
                      
    
    Signs You Aren’t Budgeting Enough for IT
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 30 Jul 2021 16:42:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/30/signs-you-arent-budgeting-enough-for-it</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>ZTNA Is Possible for Small Businesses</title>
      <link>https://www.pirumllc.com/2021/07/30/ztna-is-possible-for-small-businesses</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you see the letters ZTNA, you may not immediately think cybersecurity, but you should, as those letters stand for zero-trust network access. This article explains what ZTNA is and why it is advisable for securing remote access. Globally, work environments are re-opening to employees. Yet remote work is here to stay. The consulting firm
  
  
                    &#xD;
    &lt;a href="/2021/07/30/ztna-is-possible-for-small-businesses/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "ZTNA Is Possible for Small Businesses"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/30/ztna-is-possible-for-small-businesses/"&gt;&#xD;
      
                      
    
    ZTNA Is Possible for Small Businesses
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 30 Jul 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/30/ztna-is-possible-for-small-businesses</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Everyone Plays a Role in Cybersecurity</title>
      <link>https://www.pirumllc.com/2021/07/26/everyone-plays-a-role-in-cybersecurity</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Hollywood would have us believe that cyberattacks are elaborately planned and use expensive, sophisticated tools developed by James Bond’s tech guru, Q. Yet in real life, most hacks are nothing like that. The cybercriminals often simply fool a human to gain access. Phishing remains a primary way to attack. A scammer sends an email that
  
  
                    &#xD;
    &lt;a href="/2021/07/26/everyone-plays-a-role-in-cybersecurity/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Everyone Plays a Role in Cybersecurity"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/26/everyone-plays-a-role-in-cybersecurity/"&gt;&#xD;
      
                      
    
    Everyone Plays a Role in Cybersecurity
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 26 Jul 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/26/everyone-plays-a-role-in-cybersecurity</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Business Continuity vs. Disaster Recovery: What’s the Difference?</title>
      <link>https://www.pirumllc.com/2021/07/23/business-continuity-vs-disaster-recovery-whats-the-difference</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The risk of cyberattack is still growing globally, and no business is too small to hack or breach. It’s important to plan for business continuity and disaster recovery, and to do so in advance so you’re prepared for the worst. But first, you’ll need to understand the difference between the two. Some use business continuity
  
  
                    &#xD;
    &lt;a href="/2021/07/23/business-continuity-vs-disaster-recovery-whats-the-difference/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Business Continuity vs. Disaster Recovery: What’s the Difference?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/23/business-continuity-vs-disaster-recovery-whats-the-difference/"&gt;&#xD;
      
                      
    
    Business Continuity vs. Disaster Recovery: What’s the Difference?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 23 Jul 2021 11:54:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/23/business-continuity-vs-disaster-recovery-whats-the-difference</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why You Must Comply With Your Cyber Liability Insurance</title>
      <link>https://www.pirumllc.com/2021/07/21/why-you-must-comply-with-your-cyber-liability-insurance</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you think that your cyber insurance claim will be cleared with no questions asked, think again. While reviewing your claim, your cyber insurance provider will assess whether you took “due care” to protect your business from being compromised by a cyberattack. While having a cyber liability insurance policy is non-negotiable today, you cannot be
  
  
                    &#xD;
    &lt;a href="/2021/07/21/why-you-must-comply-with-your-cyber-liability-insurance/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Why You Must Comply With Your Cyber Liability Insurance"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/21/why-you-must-comply-with-your-cyber-liability-insurance/"&gt;&#xD;
      
                      
    
    Why You Must Comply With Your Cyber Liability Insurance
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 21 Jul 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/21/why-you-must-comply-with-your-cyber-liability-insurance</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>The Beginner’s Guide to Cyber Liability Insurance for Business</title>
      <link>https://www.pirumllc.com/2021/07/19/the-beginners-guide-to-cyber-liability-insurance-for-business</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The COVID-19 pandemic has impacted everyone in one way or another. If there is one category that most benefited from the pandemic, it’s cybercriminals. That’s why cybercrime has shot up by almost 300% since the start of the pandemic1 and that’s why you must adopt necessary measures to protect your business from malicious cyber players.
  
  
                    &#xD;
    &lt;a href="/2021/07/19/the-beginners-guide-to-cyber-liability-insurance-for-business/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "The Beginner’s Guide to Cyber Liability Insurance for Business"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/19/the-beginners-guide-to-cyber-liability-insurance-for-business/"&gt;&#xD;
      
                      
    
    The Beginner’s Guide to Cyber Liability Insurance for Business
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 19 Jul 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/19/the-beginners-guide-to-cyber-liability-insurance-for-business</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>6 Uses for Your Old, Extra Computers</title>
      <link>https://www.pirumllc.com/2021/07/16/6-uses-for-your-old-extra-computers</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you’ve upgraded to a new computer, the old one is a bit of an albatross. You paid good money for that desktop or laptop, and you want to continue to see return on investment. Plus, disposing of that technology feels wasteful. It’s not as if a computer is going to compost itself! To help,
  
  
                    &#xD;
    &lt;a href="/2021/07/16/6-uses-for-your-old-extra-computers/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "6 Uses for Your Old, Extra Computers"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/16/6-uses-for-your-old-extra-computers/"&gt;&#xD;
      
                      
    
    6 Uses for Your Old, Extra Computers
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 16 Jul 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/16/6-uses-for-your-old-extra-computers</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Make Hybrid Work Environments Secure</title>
      <link>https://www.pirumllc.com/2021/07/14/make-hybrid-work-environments-secure</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The COVID-19 pandemic caused an unprecedented shift in the way people work. Although most companies relied on a fully remote work model initially, the vaccine rollout has led to the popularization of hybrid work environments. A hybrid work environment has elements of both the traditional on-site work model and the remote work model. Employees can
  
  
                    &#xD;
    &lt;a href="/2021/07/14/make-hybrid-work-environments-secure/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Make Hybrid Work Environments Secure"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/14/make-hybrid-work-environments-secure/"&gt;&#xD;
      
                      
    
    Make Hybrid Work Environments Secure
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 14 Jul 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/14/make-hybrid-work-environments-secure</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>How to Build a Security-First Culture That Empowers Your Hybrid Workforce</title>
      <link>https://www.pirumllc.com/2021/07/12/how-to-build-a-security-first-culture-that-empowers-your-hybrid-workforce</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Tools are only as good as their users. This should be your guiding philosophy as the world shifts to a hybrid work model to deal with the complexities posed by the COVID-19 pandemic. While it’s great to define and implement essential security controls and tools, if it isn’t backed up by workforce buy-in and participation,
  
  
                    &#xD;
    &lt;a href="/2021/07/12/how-to-build-a-security-first-culture-that-empowers-your-hybrid-workforce/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "How to Build a Security-First Culture That Empowers Your Hybrid Workforce"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/12/how-to-build-a-security-first-culture-that-empowers-your-hybrid-workforce/"&gt;&#xD;
      
                      
    
    How to Build a Security-First Culture That Empowers Your Hybrid Workforce
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 12 Jul 2021 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/12/how-to-build-a-security-first-culture-that-empowers-your-hybrid-workforce</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Beware These Social Media Scams</title>
      <link>https://www.pirumllc.com/2021/07/09/beware-these-social-media-scams</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Huntington Volvo? Rowe Subaru? What will your hilarious quiz results be when you enter your fourth-grade teacher’s name and first model of car? You may think it’s silly entertainment … until it isn’t. Many fun social media questionnaires are set up by hackers to steal your identity. It seems like a harmless collection of random
  
  
                    &#xD;
    &lt;a href="/2021/07/09/beware-these-social-media-scams/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Beware These Social Media Scams"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/09/beware-these-social-media-scams/"&gt;&#xD;
      
                      
    
    Beware These Social Media Scams
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 09 Jul 2021 16:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/09/beware-these-social-media-scams</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why Adopt a Comprehensive Backup and BCDR Strategy</title>
      <link>https://www.pirumllc.com/2021/07/08/why-adopt-a-comprehensive-backup-and-bcdr-strategy</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Being a business owner is challenging. You have to deal with multiple problems at once and effectively solve each of those. You also need to have the foresight to arm your business with the right tools and solutions to deal with any issues that might arise later. One such issue that you must always focus
  
  
                    &#xD;
    &lt;a href="/2021/07/08/why-adopt-a-comprehensive-backup-and-bcdr-strategy/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Why Adopt a Comprehensive Backup and BCDR Strategy"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/08/why-adopt-a-comprehensive-backup-and-bcdr-strategy/"&gt;&#xD;
      
                      
    
    Why Adopt a Comprehensive Backup and BCDR Strategy
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 08 Jul 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/08/why-adopt-a-comprehensive-backup-and-bcdr-strategy</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Data Loss Disasters Come in Many Forms</title>
      <link>https://www.pirumllc.com/2021/07/06/data-loss-disasters-come-in-many-forms</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If we’ve learned anything from the COVID-19 pandemic, it’s that we don’t have it all figured out. Not only are we vulnerable as a species, but so are the systems, processes and devices we’ve built. Natural and human-made disasters as well as other contingencies can still cause significant damage and bring businesses to a grinding
  
  
                    &#xD;
    &lt;a href="/2021/07/06/data-loss-disasters-come-in-many-forms/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Data Loss Disasters Come in Many Forms"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/07/06/data-loss-disasters-come-in-many-forms/"&gt;&#xD;
      
                      
    
    Data Loss Disasters Come in Many Forms
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Tue, 06 Jul 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/07/06/data-loss-disasters-come-in-many-forms</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Operational and Data Integrity Risks of IoT for SMBs</title>
      <link>https://www.pirumllc.com/2021/06/28/operational-and-data-integrity-risks-of-iot-for-smbs</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The continued rise in the number of Internet of Things (IoT) connected devices has brought about a host of security challenges for many businesses. As manufacturers compete in a race to bring their IoT devices to market, most fail to include even the most basic security controls necessary to protect the networks these devices connect
  
  
                    &#xD;
    &lt;a href="/2021/06/28/operational-and-data-integrity-risks-of-iot-for-smbs/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Operational and Data Integrity Risks of IoT for SMBs"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/06/28/operational-and-data-integrity-risks-of-iot-for-smbs/"&gt;&#xD;
      
                      
    
    Operational and Data Integrity Risks of IoT for SMBs
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 28 Jun 2021 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/06/28/operational-and-data-integrity-risks-of-iot-for-smbs</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>The next big thing in cloud computing? Shh… It’s confidential – Help Net Security</title>
      <link>https://www.pirumllc.com/2021/06/25/the-next-big-thing-in-cloud-computing-shh-its-confidential-help-net-security-2</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Some are suspicious of cloud services. I’ve heard clients say that they don’t want their data on the cloud because it’s not secure or they don’t want others to be able to see their data or their data is safer on their own server. For most companies, this couldn’t be further from the truth. Many
  
  
                    &#xD;
    &lt;a href="/2021/06/25/the-next-big-thing-in-cloud-computing-shh-its-confidential-help-net-security-2/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "The next big thing in cloud computing? Shh… It’s confidential – Help Net Security"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/06/25/the-next-big-thing-in-cloud-computing-shh-its-confidential-help-net-security-2/"&gt;&#xD;
      
                      
    
    The next big thing in cloud computing? Shh… It’s confidential – Help Net Security
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 25 Jun 2021 21:52:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/06/25/the-next-big-thing-in-cloud-computing-shh-its-confidential-help-net-security-2</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>What to Do If You’re a Ransomware Victim</title>
      <link>https://www.pirumllc.com/2021/06/24/what-to-do-if-youre-a-ransomware-victim</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You’ll know if you’re a victim of ransomware. Often you’re met with a red screen telling you your business files are encrypted. You won’t be able to do anything on the computer, although the cybercriminals will provide helpful instructions for how to pay up. How nice. Here’s what to do instead if you’re the victim
  
  
                    &#xD;
    &lt;a href="/2021/06/24/what-to-do-if-youre-a-ransomware-victim/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "What to Do If You’re a Ransomware Victim"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/06/24/what-to-do-if-youre-a-ransomware-victim/"&gt;&#xD;
      
                      
    
    What to Do If You’re a Ransomware Victim
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 24 Jun 2021 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/06/24/what-to-do-if-youre-a-ransomware-victim</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Backup: Cover Your SaaS</title>
      <link>https://www.pirumllc.com/2021/06/21/backup-cover-your-saas</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Software-as-a-Service (SaaS) applications are more in use than ever before. Almost every company uses either one or the other SaaS application on a daily basis. The global SaaS market size is expected to reach $185.8 billion by 2024 as businesses move online and adapt to cloud for an agile and lean growth model.  However, most companies operate under the misconception that SaaS providers
  
  
                    &#xD;
    &lt;a href="/2021/06/21/backup-cover-your-saas/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Backup: Cover Your SaaS"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/06/21/backup-cover-your-saas/"&gt;&#xD;
      
                      
    
    Backup: Cover Your SaaS
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 21 Jun 2021 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/06/21/backup-cover-your-saas</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Weighing Software-as-a-Service and Managed Service Providers</title>
      <link>https://www.pirumllc.com/2021/06/17/weighing-software-as-a-service-and-managed-service-providers</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are many acronyms in the IT world. Two common ones are SaaS and MSP, which stand for software-as-a-service and managed service provider, respectively. The bigger question is what the differences are between these two and why you would need one or the other. Here’s help. What’s SaaS? Your business may already be relying on
  
  
                    &#xD;
    &lt;a href="/2021/06/17/weighing-software-as-a-service-and-managed-service-providers/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Weighing Software-as-a-Service and Managed Service Providers"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/06/17/weighing-software-as-a-service-and-managed-service-providers/"&gt;&#xD;
      
                      
    
    Weighing Software-as-a-Service and Managed Service Providers
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 17 Jun 2021 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/06/17/weighing-software-as-a-service-and-managed-service-providers</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Top 9 IoT-Related Security Threats Businesses Face</title>
      <link>https://www.pirumllc.com/2021/06/14/top-9-iot-related-security-threats-businesses-face</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The Internet of Things (IoT) is rapidly changing the technology landscape as we know it. Businesses worldwide are leveraging IoT for benefits such as seamless collaboration, access to comprehensive data and the ability to make stronger business decisions based on insights derived from substantial data. Experts estimate the total number of installed IoT-connected devices worldwide
  
  
                    &#xD;
    &lt;a href="/2021/06/14/top-9-iot-related-security-threats-businesses-face/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Top 9 IoT-Related Security Threats Businesses Face"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/06/14/top-9-iot-related-security-threats-businesses-face/"&gt;&#xD;
      
                      
    
    Top 9 IoT-Related Security Threats Businesses Face
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 14 Jun 2021 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/06/14/top-9-iot-related-security-threats-businesses-face</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Business Continuity Plan 101</title>
      <link>https://www.pirumllc.com/2021/06/09/business-continuity-plan-101</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you want your business to remain competitive even during a business disruption, you need to self-reflect. What’s your plan against the unexpected? The truth is, numerous threats can halt your business operations at any time. If your employees cannot quickly pivot to ensure business continuity, you won’t just struggle with competition, but with survival.
  
  
                    &#xD;
    &lt;a href="/2021/06/09/business-continuity-plan-101/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Business Continuity Plan 101"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/06/09/business-continuity-plan-101/"&gt;&#xD;
      
                      
    
    Business Continuity Plan 101
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 09 Jun 2021 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/06/09/business-continuity-plan-101</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Regulations for Securing the Internet of Things</title>
      <link>https://www.pirumllc.com/2021/06/07/regulations-for-securing-the-internet-of-things</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We are living in the era of Digital Transformation and witnessing first-hand the proliferation of assistive technologies such as the Internet of Things (IoT). It is estimated that the global count of IoT devices will reach around 80 billion by 2025 — a figure that will outnumber the human population across the globe tenfold. This
  
  
                    &#xD;
    &lt;a href="/2021/06/07/regulations-for-securing-the-internet-of-things/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Regulations for Securing the Internet of Things"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/06/07/regulations-for-securing-the-internet-of-things/"&gt;&#xD;
      
                      
    
    Regulations for Securing the Internet of Things
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 07 Jun 2021 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/06/07/regulations-for-securing-the-internet-of-things</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Lessons Learned from an Oil Pipeline Ransomware Attack</title>
      <link>https://www.pirumllc.com/2021/06/03/lessons-learned-from-an-oil-pipeline-ransomware-attack</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your business may not be supplying oil to the United States, and you may not even be in the critical infrastructure business, but don’t think that means ransomware can’t happen to you, too. This article shares lessons learned from a headline-grabbing event, and they’re applicable to businesses of all sizes in all industries. First, what
  
  
                    &#xD;
    &lt;a href="/2021/06/03/lessons-learned-from-an-oil-pipeline-ransomware-attack/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Lessons Learned from an Oil Pipeline Ransomware Attack"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/06/03/lessons-learned-from-an-oil-pipeline-ransomware-attack/"&gt;&#xD;
      
                      
    
    Lessons Learned from an Oil Pipeline Ransomware Attack
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 03 Jun 2021 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/06/03/lessons-learned-from-an-oil-pipeline-ransomware-attack</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Top 5 Threats IoT Devices Pose to Data Protection &amp; Privacy</title>
      <link>https://www.pirumllc.com/2021/05/31/top-5-threats-iot-devices-pose-to-data-protection-privacy</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Gartner Inc. predicted that by 2023, CIOs would be responsible for over three times the endpoints they were responsible for in 2018 due to the rapid evolution of IoT trends and technologies. With billions of physical devices worldwide connected to the internet today, this prediction is on its way to coming true. However, the rapid
  
  
                    &#xD;
    &lt;a href="/2021/05/31/top-5-threats-iot-devices-pose-to-data-protection-privacy/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Top 5 Threats IoT Devices Pose to Data Protection &amp;amp; Privacy"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/05/31/top-5-threats-iot-devices-pose-to-data-protection-privacy/"&gt;&#xD;
      
                      
    
    Top 5 Threats IoT Devices Pose to Data Protection &amp;amp; Privacy
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Tue, 01 Jun 2021 03:34:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/05/31/top-5-threats-iot-devices-pose-to-data-protection-privacy</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Doing Business in Microsoft 365? Backup Your Data</title>
      <link>https://www.pirumllc.com/2021/05/29/doing-business-in-microsoft-365-backup-your-data</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Many business tools are moving to the cloud. One popular option is Microsoft 365, formerly known as Office 365. This unified platform consolidates Excel, Word, and PowerPoint with collaboration and communication tools. Added apps and services help streamline operations, too. Simplifying your IT infrastructure can also cut costs and reduce duplication of effort. Still, when
  
  
                    &#xD;
    &lt;a href="/2021/05/29/doing-business-in-microsoft-365-backup-your-data/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Doing Business in Microsoft 365? Backup Your Data"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/05/29/doing-business-in-microsoft-365-backup-your-data/"&gt;&#xD;
      
                      
    
    Doing Business in Microsoft 365? Backup Your Data
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Sat, 29 May 2021 13:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/05/29/doing-business-in-microsoft-365-backup-your-data</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Microsoft 365 Streamlines Business and Reduces Spend</title>
      <link>https://www.pirumllc.com/2021/05/26/microsoft-365-streamlines-business-and-reduces-spend</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When doing business online, you have many options for available software and systems. You might turn to one solution to handle online meetings, another to drive collaboration, and yet another to manage your content and workflow. It can get confusing. Plus, when you are duplicating tools, IT spend can mushroom unnecessarily. Microsoft 365 aims to
  
  
                    &#xD;
    &lt;a href="/2021/05/26/microsoft-365-streamlines-business-and-reduces-spend/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Microsoft 365 Streamlines Business and Reduces Spend"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/05/26/microsoft-365-streamlines-business-and-reduces-spend/"&gt;&#xD;
      
                      
    
    Microsoft 365 Streamlines Business and Reduces Spend
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 26 May 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/05/26/microsoft-365-streamlines-business-and-reduces-spend</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Prioritize Compliance for Your Business</title>
      <link>https://www.pirumllc.com/2021/05/24/prioritize-compliance-for-your-business</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One of the many challenges you probably face as a business owner is dealing with the vague requirements present in HIPAA and PCI-DSS legislation. Due to the unclear regulatory messaging, “assuming” rather than “knowing” can land your organization in hot water with regulators. The Health and Human Services (HSS) Office for Civil Rights receives over
  
  
                    &#xD;
    &lt;a href="/2021/05/24/prioritize-compliance-for-your-business/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Prioritize Compliance for Your Business"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/05/24/prioritize-compliance-for-your-business/"&gt;&#xD;
      
                      
    
    Prioritize Compliance for Your Business
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 24 May 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/05/24/prioritize-compliance-for-your-business</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>What Is Shadow IT, and Why Is It an Issue?</title>
      <link>https://www.pirumllc.com/2021/05/19/what-is-shadow-it-and-why-is-it-an-issue</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    An old-time radio show used to start with the promise “The Shadow knows!” Yet when it comes to shadow IT, the problem is the exact opposite. Shadow IT is the stuff employees download onto a business system that IT doesn’t know about, and it can be a big problem. You may have an IT policy
  
  
                    &#xD;
    &lt;a href="/2021/05/19/what-is-shadow-it-and-why-is-it-an-issue/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "What Is Shadow IT, and Why Is It an Issue?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/05/19/what-is-shadow-it-and-why-is-it-an-issue/"&gt;&#xD;
      
                      
    
    What Is Shadow IT, and Why Is It an Issue?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 19 May 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/05/19/what-is-shadow-it-and-why-is-it-an-issue</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Adopt Zero Trust Security for Your SMB</title>
      <link>https://www.pirumllc.com/2021/05/17/adopt-zero-trust-security-for-your-smb</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With the cyberthreat landscape getting more complicated with every passing minute, cybersecurity deserves more attention than ever before. You can no longer put all your faith and trust in applications, interfaces, networks, devices, traffic and users. Misjudging and misplacing your trust in a devious entity can lead to severe breaches that can damage your business.
  
  
                    &#xD;
    &lt;a href="/2021/05/17/adopt-zero-trust-security-for-your-smb/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Adopt Zero Trust Security for Your SMB"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/05/17/adopt-zero-trust-security-for-your-smb/"&gt;&#xD;
      
                      
    
    Adopt Zero Trust Security for Your SMB
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 17 May 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/05/17/adopt-zero-trust-security-for-your-smb</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Is Your Instagram Account Secure?</title>
      <link>https://www.pirumllc.com/2021/05/15/is-your-instagram-account-secure</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Why would someone want to target your Instagram account? You share what you ate, maybe the books you read, the shoes you bought, or that really cool image of the sky above. How is that going to help a hacker? Read on to learn more. OK. Your obvious love of chicken and waffles isn’t going
  
  
                    &#xD;
    &lt;a href="/2021/05/15/is-your-instagram-account-secure/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Is Your Instagram Account Secure?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/05/15/is-your-instagram-account-secure/"&gt;&#xD;
      
                      
    
    Is Your Instagram Account Secure?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Sat, 15 May 2021 13:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/05/15/is-your-instagram-account-secure</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>What to Do If Your Data Is Included in a Leak</title>
      <link>https://www.pirumllc.com/2021/05/12/what-to-do-if-your-data-is-included-in-a-leak</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Data breaches are now daily occurrences and can happen to any business. The April 2021 leak of 533 million Facebook records was one of the largest known data leaks, but even if you weren’t affected by that one, you may still be at risk. There is no easy way to know if your information has
  
  
                    &#xD;
    &lt;a href="/2021/05/12/what-to-do-if-your-data-is-included-in-a-leak/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "What to Do If Your Data Is Included in a Leak"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/05/12/what-to-do-if-your-data-is-included-in-a-leak/"&gt;&#xD;
      
                      
    
    What to Do If Your Data Is Included in a Leak
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 12 May 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/05/12/what-to-do-if-your-data-is-included-in-a-leak</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>A ‘Compliance First’ Mindset Limits Liabilities for SMBs</title>
      <link>https://www.pirumllc.com/2021/05/10/a-compliance-first-mindset-limits-liabilities-for-smbs</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    By adopting a Compliance First strategy, when choosing solutions and vendors, you will identify those that do not comply with your requirements, eliminate them from your selection process, and then select from the rest. It also means evaluating your current solutions and vendors and replacing those that cannot support your compliance requirements. In simple terms,
  
  
                    &#xD;
    &lt;a href="/2021/05/10/a-compliance-first-mindset-limits-liabilities-for-smbs/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "A ‘Compliance First’ Mindset Limits Liabilities for SMBs"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/05/10/a-compliance-first-mindset-limits-liabilities-for-smbs/"&gt;&#xD;
      
                      
    
    A ‘Compliance First’ Mindset Limits Liabilities for SMBs
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 10 May 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/05/10/a-compliance-first-mindset-limits-liabilities-for-smbs</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>What You Need to Know about Web App Security</title>
      <link>https://www.pirumllc.com/2021/05/05/what-you-need-to-know-about-web-app-security</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There’s an app for that! Even for business purposes, you can bet this is the case. Yet a small business may be using online applications without understanding the risks. Here’s help. Most businesses no longer have all their technology and software solutions on-site. The old cybersecurity perimeter around the IT premises is no longer going
  
  
                    &#xD;
    &lt;a href="/2021/05/05/what-you-need-to-know-about-web-app-security/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "What You Need to Know about Web App Security"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/05/05/what-you-need-to-know-about-web-app-security/"&gt;&#xD;
      
                      
    
    What You Need to Know about Web App Security
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 05 May 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/05/05/what-you-need-to-know-about-web-app-security</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>How Can Cyber Resilience Protect SMBs?</title>
      <link>https://www.pirumllc.com/2021/05/03/how-can-cyber-resilience-protect-smbs</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Small and Medium Businesses (SMBs) usually invest less in cybersecurity, making them easier targets for cybercriminals. Close to 30% of businesses experience a cyberattack at least once per week.1 The need for constant vigilance and defense against hackers has led many SMBs to complicate cybersecurity matters. Though the percentage of businesses that have adopted formal,
  
  
                    &#xD;
    &lt;a href="/2021/05/03/how-can-cyber-resilience-protect-smbs/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "How Can Cyber Resilience Protect SMBs?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/05/03/how-can-cyber-resilience-protect-smbs/"&gt;&#xD;
      
                      
    
    How Can Cyber Resilience Protect SMBs?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 03 May 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/05/03/how-can-cyber-resilience-protect-smbs</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Making Technology Easier for Seniors</title>
      <link>https://www.pirumllc.com/2021/04/28/making-technology-easier-for-seniors</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The pandemic has changed the world. More people have been pushed online in new ways, and for senior citizens this can be particularly challenging. Even registering for a COVID-19 vaccination requires going online in many countries. Plus, social gatherings and other appointments have gone virtual. Don’t add to a seniors’ social distance. Here’s how we
  
  
                    &#xD;
    &lt;a href="/2021/04/28/making-technology-easier-for-seniors/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Making Technology Easier for Seniors"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/04/28/making-technology-easier-for-seniors/"&gt;&#xD;
      
                      
    
    Making Technology Easier for Seniors
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 28 Apr 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/04/28/making-technology-easier-for-seniors</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>The Interim DFARS Rule and What It Means for You</title>
      <link>https://www.pirumllc.com/2021/04/26/the-interim-dfars-rule-and-what-it-means-for-you</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The Cybersecurity Maturity Model Certification (CMMC) was formally made part of the Defense Federal Acquisition Regulation Supplement (DFARS) in January 2020. The decision sent over 300,000 members of the defense industrial base (DIB), mostly small and midsize businesses (SMBs), into a state of frenzy. Most found themselves drowning in all the unnecessary noise surrounding CMMC
  
  
                    &#xD;
    &lt;a href="/2021/04/26/the-interim-dfars-rule-and-what-it-means-for-you/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "The Interim DFARS Rule and What It Means for You"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/04/26/the-interim-dfars-rule-and-what-it-means-for-you/"&gt;&#xD;
      
                      
    
    The Interim DFARS Rule and What It Means for You
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 26 Apr 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/04/26/the-interim-dfars-rule-and-what-it-means-for-you</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>5 Tips to Protect Your Laptop from Physical Damage</title>
      <link>https://www.pirumllc.com/2021/04/21/5-tips-to-protect-your-laptop-from-physical-damage</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A laptop can hold your life. If you’re working from home, it’s essential to your income. For students, it’s where you keep all your notes and essays. Plus, there are the personal photos and videos. And you sometimes use it to stream your TV shows, or to video chat with friends and family. You may
  
  
                    &#xD;
    &lt;a href="/2021/04/21/5-tips-to-protect-your-laptop-from-physical-damage/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "5 Tips to Protect Your Laptop from Physical Damage"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/04/21/5-tips-to-protect-your-laptop-from-physical-damage/"&gt;&#xD;
      
                      
    
    5 Tips to Protect Your Laptop from Physical Damage
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 21 Apr 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/04/21/5-tips-to-protect-your-laptop-from-physical-damage</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Your Biggest Cybersecurity Risk: Your Employees</title>
      <link>https://www.pirumllc.com/2021/04/19/your-biggest-cybersecurity-risk-your-employees</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cybercriminals work round the clock to detect and exploit vulnerabilities in your business’ network for nefarious gains. The only way to counter these hackers is by deploying a robust cybersecurity posture that’s built using comprehensive security solutions. However, while you’re caught up doing this, there is a possibility you may overlook mitigating the weakest link
  
  
                    &#xD;
    &lt;a href="/2021/04/19/your-biggest-cybersecurity-risk-your-employees/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Your Biggest Cybersecurity Risk: Your Employees"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/04/19/your-biggest-cybersecurity-risk-your-employees/"&gt;&#xD;
      
                      
    
    Your Biggest Cybersecurity Risk: Your Employees
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 19 Apr 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/04/19/your-biggest-cybersecurity-risk-your-employees</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>The Value of Virtual Machines for Your Business</title>
      <link>https://www.pirumllc.com/2021/04/14/the-value-of-virtual-machines-for-your-business</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You invest a lot of time researching the best technology for your business. Your Apple computers work well for your needs, plus, the sleek desktops look great in client-visible locations. Yet occasionally, something comes up that you can’t do on an iMac. It doesn’t work on the Mac operating systems (OSs); only on Windows. That’s
  
  
                    &#xD;
    &lt;a href="/2021/04/14/the-value-of-virtual-machines-for-your-business/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "The Value of Virtual Machines for Your Business"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/04/14/the-value-of-virtual-machines-for-your-business/"&gt;&#xD;
      
                      
    
    The Value of Virtual Machines for Your Business
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 14 Apr 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/04/14/the-value-of-virtual-machines-for-your-business</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Getting Ready for New CMMC Requirements Now</title>
      <link>https://www.pirumllc.com/2021/04/12/getting-ready-for-new-cmmc-requirements-now</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Right off the bat, we’re here to tell you that anyone promising you a sure-shot solution to all your CMMC woes is trying to pull a fast one on you. The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive move by the U.S. Department of Defense (DoD) that involves a lot of moving parts that
  
  
                    &#xD;
    &lt;a href="/2021/04/12/getting-ready-for-new-cmmc-requirements-now/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Getting Ready for New CMMC Requirements Now"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/04/12/getting-ready-for-new-cmmc-requirements-now/"&gt;&#xD;
      
                      
    
    Getting Ready for New CMMC Requirements Now
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 12 Apr 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/04/12/getting-ready-for-new-cmmc-requirements-now</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>How to Protect Your Proprietary Information</title>
      <link>https://www.pirumllc.com/2021/04/07/how-to-protect-your-proprietary-information</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Proprietary information makes your business special, whether you’re a tech startup with a smart algorithm or a food manufacturer with a secret sauce. Regardless of industry, business gains competitive advantage from distinct practices or unique data. The last thing you want is someone with ill intent getting their hands on your differentiators. Here’s how to
  
  
                    &#xD;
    &lt;a href="/2021/04/07/how-to-protect-your-proprietary-information/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "How to Protect Your Proprietary Information"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/04/07/how-to-protect-your-proprietary-information/"&gt;&#xD;
      
                      
    
    How to Protect Your Proprietary Information
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 07 Apr 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/04/07/how-to-protect-your-proprietary-information</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Making Security Awareness Second Nature</title>
      <link>https://www.pirumllc.com/2021/04/05/making-security-awareness-second-nature</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your business’ security program must start with your employees and strong security policies rather than entirely depending on your IT team or the latest security solutions. You can significantly reduce the likelihood of a data breach by combining a well-drafted cybersecurity policy with comprehensive security awareness training. It is your responsibility to implement security training
  
  
                    &#xD;
    &lt;a href="/2021/04/05/making-security-awareness-second-nature/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Making Security Awareness Second Nature"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/04/05/making-security-awareness-second-nature/"&gt;&#xD;
      
                      
    
    Making Security Awareness Second Nature
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 05 Apr 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/04/05/making-security-awareness-second-nature</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why Law Firms Need Managed Services</title>
      <link>https://www.pirumllc.com/2021/03/31/why-law-firms-need-managed-services</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The law industry isn’t known for embracing change quickly: tradition can trump a willingness to embrace new technologies. Yet digital technology has become an essential part of many lawyers’ working day. Partnering with a managed service provider (MSP) provides support and enhanced cybersecurity during this evolution. Lawyers rely on technology today to: communicate with colleagues
  
  
                    &#xD;
    &lt;a href="/2021/03/31/why-law-firms-need-managed-services/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Why Law Firms Need Managed Services"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/03/31/why-law-firms-need-managed-services/"&gt;&#xD;
      
                      
    
    Why Law Firms Need Managed Services
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 31 Mar 2021 22:18:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/03/31/why-law-firms-need-managed-services</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Pivoting to the Practice of Virtual Law</title>
      <link>https://www.pirumllc.com/2021/03/29/pivoting-to-the-practice-of-virtual-law</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The law profession has been slow to embrace virtual work. It’s a people-oriented business, and there is great reliance on sensitive files and court documents, yet the pandemic pushed lawyers – and the rest of us – to embrace more digital technology. Sure, lawyers were using mobile devices before. They worked in satellite offices, on-site
  
  
                    &#xD;
    &lt;a href="/2021/03/29/pivoting-to-the-practice-of-virtual-law/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Pivoting to the Practice of Virtual Law"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/03/29/pivoting-to-the-practice-of-virtual-law/"&gt;&#xD;
      
                      
    
    Pivoting to the Practice of Virtual Law
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 29 Mar 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/03/29/pivoting-to-the-practice-of-virtual-law</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>It’s Who You Know: Verifying Identity at Law Firms</title>
      <link>https://www.pirumllc.com/2021/03/25/its-who-you-know-verifying-identity-at-law-firms</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Trusting identity is foundational to a law firm’s work. In a law office, the documents going back and forth contain sensitive information, and contracts, negotiations, or transactions can\’t be shared with the wrong parties. The industry needs to be cautious about validating identities. Legal service providers need to achieve compliance and protect clients and
  
  
                    &#xD;
    &lt;a href="/2021/03/25/its-who-you-know-verifying-identity-at-law-firms/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "It’s Who You Know: Verifying Identity at Law Firms"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/03/25/its-who-you-know-verifying-identity-at-law-firms/"&gt;&#xD;
      
                      
    
    It’s Who You Know: Verifying Identity at Law Firms
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 25 Mar 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/03/25/its-who-you-know-verifying-identity-at-law-firms</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>How to Effectively Manage Supply Chain Risks</title>
      <link>https://www.pirumllc.com/2021/03/22/how-to-effectively-manage-supply-chain-risks</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Digital transformation has made many things easier for businesses, right from inventory management and order processing to managing financials. On the flip side, however, it has also made companies more vulnerable to cyberattacks and data breaches. A breach occurring anywhere in the supply chain could end up seriously disrupting your operations. So, how do
  
  
                    &#xD;
    &lt;a href="/2021/03/22/how-to-effectively-manage-supply-chain-risks/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "How to Effectively Manage Supply Chain Risks"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/03/22/how-to-effectively-manage-supply-chain-risks/"&gt;&#xD;
      
                      
    
    How to Effectively Manage Supply Chain Risks
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 22 Mar 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/03/22/how-to-effectively-manage-supply-chain-risks</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>7 Things Lawyers Gain from Workflow Automation</title>
      <link>https://www.pirumllc.com/2021/03/17/7-things-lawyers-gain-from-workflow-automation</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      There is always information being collected and shared at a law firm. Files go between employees and back and forth among clients, too, and these can contain critical data. One mistake could cost the firm money – and reputation. Workflow automation technology tackles document sharing and data collection to offer several benefits. #1 Improved
  
  
                    &#xD;
    &lt;a href="/2021/03/17/7-things-lawyers-gain-from-workflow-automation/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "7 Things Lawyers Gain from Workflow Automation"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/03/17/7-things-lawyers-gain-from-workflow-automation/"&gt;&#xD;
      
                      
    
    7 Things Lawyers Gain from Workflow Automation
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 17 Mar 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/03/17/7-things-lawyers-gain-from-workflow-automation</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Regulations &amp; Reputations: How Compliant Is Your Supply Chain?</title>
      <link>https://www.pirumllc.com/2021/03/15/regulations-reputations-how-compliant-is-your-supply-chain</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With both technology and tech-related threats evolving faster than ever before, supply chain risks have taken on a new meaning in today’s digital world. While traditional supply chain risk management revolved around factors such as strategy, market reality and performance risks, today it must also focus on cybersecurity controls and data breach risk mitigation. As
  
  
                    &#xD;
    &lt;a href="/2021/03/15/regulations-reputations-how-compliant-is-your-supply-chain/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Regulations &amp;amp; Reputations: How Compliant Is Your Supply Chain?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/03/15/regulations-reputations-how-compliant-is-your-supply-chain/"&gt;&#xD;
      
                      
    
    Regulations &amp;amp; Reputations: How Compliant Is Your Supply Chain?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 15 Mar 2021 11:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/03/15/regulations-reputations-how-compliant-is-your-supply-chain</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Five Tips to Get the Right Printer for You</title>
      <link>https://www.pirumllc.com/2021/03/11/five-tips-to-get-the-right-printer-for-you</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Buying a printer can be overwhelming. There are so many options available from different brands, and buying guides galore. Yet we still often see people with printers that aren’t the best ones for their needs. That said, we’re offering five tips to help you find the right one for you. #1 Identify Your Needs What
  
  
                    &#xD;
    &lt;a href="/2021/03/11/five-tips-to-get-the-right-printer-for-you/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Five Tips to Get the Right Printer for You"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/03/11/five-tips-to-get-the-right-printer-for-you/"&gt;&#xD;
      
                      
    
    Five Tips to Get the Right Printer for You
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 11 Mar 2021 12:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/03/11/five-tips-to-get-the-right-printer-for-you</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Recommended Best Practices for a Secure Supply Chain</title>
      <link>https://www.pirumllc.com/2021/03/08/recommended-best-practices-for-a-secure-supply-chain</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Your business’ cybersecurity posture must prioritize detection, evaluation and mitigation of risks posed by your supply chain. It is vital that your security is upgraded on a regular basis to better prepare for any worst-case scenarios. Having said that, it should come as no surprise that a vulnerable third party that your organization deals
  
  
                    &#xD;
    &lt;a href="/2021/03/08/recommended-best-practices-for-a-secure-supply-chain/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Recommended Best Practices for a Secure Supply Chain"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/03/08/recommended-best-practices-for-a-secure-supply-chain/"&gt;&#xD;
      
                      
    
    Recommended Best Practices for a Secure Supply Chain
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 08 Mar 2021 12:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/03/08/recommended-best-practices-for-a-secure-supply-chain</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Boss Level: Keeping Your Gaming PCs At Their Best</title>
      <link>https://www.pirumllc.com/2021/03/05/boss-level-keeping-your-gaming-pcs-at-their-best</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Video gaming is an entertainment for all ages. The main demographic is 18–34 years, but those 34–54 are another big segment – even larger than the under-18 group – although the youngest group may spend the most hours gaming, especially during a pandemic. Regardless, PC gamers of any age want the most powerful, fastest computer
  
  
                    &#xD;
    &lt;a href="/2021/03/05/boss-level-keeping-your-gaming-pcs-at-their-best/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Boss Level: Keeping Your Gaming PCs At Their Best"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/03/05/boss-level-keeping-your-gaming-pcs-at-their-best/"&gt;&#xD;
      
                      
    
    Boss Level: Keeping Your Gaming PCs At Their Best
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 05 Mar 2021 12:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/03/05/boss-level-keeping-your-gaming-pcs-at-their-best</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Regulations and Standards Governing Your Supply Chain Management Obligations</title>
      <link>https://www.pirumllc.com/2021/03/03/regulations-and-standards-governing-your-supply-chain-management-obligations</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Irrespective of the size of your supply chain, you must ensure that it isn’t the reason your business is non-compliant with the necessary regulations and standards. Yes, it involves a great deal of continued effort, but it’s worth it. If your business is found to be non-compliant due to compliance risks thriving within your
  
  
                    &#xD;
    &lt;a href="/2021/03/03/regulations-and-standards-governing-your-supply-chain-management-obligations/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Regulations and Standards Governing Your Supply Chain Management Obligations"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/03/03/regulations-and-standards-governing-your-supply-chain-management-obligations/"&gt;&#xD;
      
                      
    
    Regulations and Standards Governing Your Supply Chain Management Obligations
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 03 Mar 2021 23:42:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/03/03/regulations-and-standards-governing-your-supply-chain-management-obligations</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Time to Replace Your Laptop Battery?</title>
      <link>https://www.pirumllc.com/2021/02/26/time-to-replace-your-laptop-battery</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your laptop computer may feel like a lifeline. It has everything important on it, both personal and professional! Regrettably, the time does come when you need to replace it. Yet, some computer problems could be solved instead by replacing the laptop battery. Some computers now come with a variation on the car dashboard indicator light.
  
  
                    &#xD;
    &lt;a href="/2021/02/26/time-to-replace-your-laptop-battery/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Time to Replace Your Laptop Battery?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/02/26/time-to-replace-your-laptop-battery/"&gt;&#xD;
      
                      
    
    Time to Replace Your Laptop Battery?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 26 Feb 2021 20:46:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/02/26/time-to-replace-your-laptop-battery</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>E-accounting: Top 3 Considerations for Online Client Meetings</title>
      <link>https://www.pirumllc.com/2021/02/24/e-accounting-top-3-considerations-for-online-client-meetings</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Many businesses were teleconferencing before COVID-19. After all, meeting virtually saves both you and your client time, and busy business owners often don’t want to spend the time to make a trip to your office. The coronavirus has hastened the move to e-accounting, but this approach presents some new problems, which we’ll address in this
  
  
                    &#xD;
    &lt;a href="/2021/02/24/e-accounting-top-3-considerations-for-online-client-meetings/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "E-accounting: Top 3 Considerations for Online Client Meetings"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/02/24/e-accounting-top-3-considerations-for-online-client-meetings/"&gt;&#xD;
      
                      
    
    E-accounting: Top 3 Considerations for Online Client Meetings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 24 Feb 2021 20:39:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/02/24/e-accounting-top-3-considerations-for-online-client-meetings</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>The Dangers Within: Understanding Insider Threats</title>
      <link>https://www.pirumllc.com/2021/02/22/the-dangers-within-understanding-insider-threats</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The year 2020 witnessed an unprecedented onslaught of cybersecurity threats across the world as the global workforce underwent a forced transition to remote working. However, not all cybersecurity threats come from the outside. In a study conducted by Bitglass, 61 percent of businesses surveyed reported at least one insider-related cybersecurity incident in the last year.
  
  
                    &#xD;
    &lt;a href="/2021/02/22/the-dangers-within-understanding-insider-threats/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "The Dangers Within: Understanding Insider Threats"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/02/22/the-dangers-within-understanding-insider-threats/"&gt;&#xD;
      
                      
    
    The Dangers Within: Understanding Insider Threats
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 22 Feb 2021 14:59:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/02/22/the-dangers-within-understanding-insider-threats</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Less Common Cyberattacks for Accountants</title>
      <link>https://www.pirumllc.com/2021/02/19/less-common-cyberattacks-for-accountants</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Check the news any given day and you might see a report about hackers accomplishing a data breach, or of a ransomware attack encrypting all company data until it pays up. These are the well-known types of cyberattack, but there are less common cyberthreats accountants should be aware of, as well. There is almost a
  
  
                    &#xD;
    &lt;a href="/2021/02/19/less-common-cyberattacks-for-accountants/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Less Common Cyberattacks for Accountants"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/02/19/less-common-cyberattacks-for-accountants/"&gt;&#xD;
      
                      
    
    Less Common Cyberattacks for Accountants
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 19 Feb 2021 15:31:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/02/19/less-common-cyberattacks-for-accountants</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>7 Benefits of Cloud Computing for Accountants</title>
      <link>https://www.pirumllc.com/2021/02/17/7-benefits-of-cloud-computing-for-accountants</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The public cloud services market has grown dramatically, and, according to Gartner, migrating to the cloud is a top priority for a third of companies. Analysts predicted the market would reach $266 billion in 2020. Accountants enjoy cloud computing, too. This article rounds up the advantages of available cloud services. Cloud computing can help accountants:
  
  
                    &#xD;
    &lt;a href="/2021/02/17/7-benefits-of-cloud-computing-for-accountants/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "7 Benefits of Cloud Computing for Accountants"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/02/17/7-benefits-of-cloud-computing-for-accountants/"&gt;&#xD;
      
                      
    
    7 Benefits of Cloud Computing for Accountants
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 17 Feb 2021 15:21:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/02/17/7-benefits-of-cloud-computing-for-accountants</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Insider Threats: Spotting Common Indicators and Warning Signs</title>
      <link>https://www.pirumllc.com/2021/02/15/insider-threats-spotting-common-indicators-and-warning-signs</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Data protection regulations require your business to assess all possible threats to the sensitive data your business stores or manages. While most businesses tend to focus most of their attention on external threats, they often overlook insider threats that exist right under their collective noses. Although the market is flooded with cybersecurity solutions that promise
  
  
                    &#xD;
    &lt;a href="/2021/02/15/insider-threats-spotting-common-indicators-and-warning-signs/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Insider Threats: Spotting Common Indicators and Warning Signs"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/02/15/insider-threats-spotting-common-indicators-and-warning-signs/"&gt;&#xD;
      
                      
    
    Insider Threats: Spotting Common Indicators and Warning Signs
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 15 Feb 2021 14:43:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/02/15/insider-threats-spotting-common-indicators-and-warning-signs</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why You Need to Uninstall Adobe Flash Player</title>
      <link>https://www.pirumllc.com/2021/02/11/why-you-need-to-uninstall-adobe-flash-player</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    All good things must come to an end – it’s inevitable with computer software. If you’re using Adobe Flash, the day has arrived. It’s time to uninstall Adobe Flash Player. Adobe stopped supporting Flash Player on December 31, 2020. What does this mean? Adobe is no longer issuing Flash Player updates or security patches. The
  
  
                    &#xD;
    &lt;a href="/2021/02/11/why-you-need-to-uninstall-adobe-flash-player/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Why You Need to Uninstall Adobe Flash Player"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/02/11/why-you-need-to-uninstall-adobe-flash-player/"&gt;&#xD;
      
                      
    
    Why You Need to Uninstall Adobe Flash Player
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 11 Feb 2021 15:12:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/02/11/why-you-need-to-uninstall-adobe-flash-player</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Defense Strategies to Combat Insider Threats</title>
      <link>https://www.pirumllc.com/2021/02/09/defense-strategies-to-combat-insider-threats</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Insider threats are among the most dangerous cyberthreats out there. Yet, organizations of all sizes seem to be either reluctant or negligent when it comes to fighting them. Over 50 percent of organizations don’t have an Insider Risk Response Plan and 40 percent don’t assess how effectively their technologies mitigate insider threats.1 Even though 59
  
  
                    &#xD;
    &lt;a href="/2021/02/09/defense-strategies-to-combat-insider-threats/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Defense Strategies to Combat Insider Threats"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/02/09/defense-strategies-to-combat-insider-threats/"&gt;&#xD;
      
                      
    
    Defense Strategies to Combat Insider Threats
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Tue, 09 Feb 2021 14:42:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/02/09/defense-strategies-to-combat-insider-threats</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Potential Risks That Insider Threats Pose to PII</title>
      <link>https://www.pirumllc.com/2021/02/01/potential-risks-that-insider-threats-pose-to-pii</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Personally Identifiable Information (PII) refers to any information maintained by an agency that can be used to identify or trace a specific individual. In other words, it includes data points, such as social security number, date of birth, mother\’s maiden name, biometric data, tax identification number, race, religion, location data and other information, that can
  
  
                    &#xD;
    &lt;a href="/2021/02/01/potential-risks-that-insider-threats-pose-to-pii/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Potential Risks That Insider Threats Pose to PII"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/02/01/potential-risks-that-insider-threats-pose-to-pii/"&gt;&#xD;
      
                      
    
    Potential Risks That Insider Threats Pose to PII
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 01 Feb 2021 16:25:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/02/01/potential-risks-that-insider-threats-pose-to-pii</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Prevent Data Silos for Business Success</title>
      <link>https://www.pirumllc.com/2021/01/27/prevent-data-silos-for-business-success</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The volume of data in the world was predicted by International Data Group to reach 59 zettabytes this year, and one big problem with the explosion of data created, captured, copied, and consumed in the world is data silos. Fortunately, there are ways to prevent data silos from slowing your business success. Need a better
  
  
                    &#xD;
    &lt;a href="/2021/01/27/prevent-data-silos-for-business-success/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Prevent Data Silos for Business Success"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/01/27/prevent-data-silos-for-business-success/"&gt;&#xD;
      
                      
    
    Prevent Data Silos for Business Success
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 27 Jan 2021 12:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/01/27/prevent-data-silos-for-business-success</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Prioritizing Compliance Commitment Across All Work Environments</title>
      <link>https://www.pirumllc.com/2021/01/25/prioritizing-compliance-commitment-across-all-work-environments</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      A secure and compliant work environment is what data protection regulations worldwide mandate your business to build and maintain. It must be secure enough to mitigate as many risks as possible and be compliant with every single rule/guideline listed in the regulation. The most important aspect to remember is that these regulations take into
  
  
                    &#xD;
    &lt;a href="/2021/01/25/prioritizing-compliance-commitment-across-all-work-environments/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Prioritizing Compliance Commitment Across All Work Environments"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/01/25/prioritizing-compliance-commitment-across-all-work-environments/"&gt;&#xD;
      
                      
    
    Prioritizing Compliance Commitment Across All Work Environments
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 25 Jan 2021 12:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/01/25/prioritizing-compliance-commitment-across-all-work-environments</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Dial up Telehealth Security</title>
      <link>https://www.pirumllc.com/2021/01/21/dial-up-telehealth-security</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The use of telehealth has been growing rapidly over the past decade. Then, the coronavirus pandemic prompted another jump in telehealth offerings. There are many advantages to digital healthcare, but securing this access to physicians and specialists is more challenging. Telehealth services offered through videoconferencing, remote monitoring, electronic consults, and wireless communications: increase connectivity between
  
  
                    &#xD;
    &lt;a href="/2021/01/21/dial-up-telehealth-security/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Dial up Telehealth Security"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/01/21/dial-up-telehealth-security/"&gt;&#xD;
      
                      
    
    Dial up Telehealth Security
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 21 Jan 2021 12:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/01/21/dial-up-telehealth-security</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Securing Your Remote Workers</title>
      <link>https://www.pirumllc.com/2021/01/18/securing-your-remote-workers</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Over the last few years, we have seen several tech companies, such as Buffer, Todoist and Help Scout, to name a few, switch to a fully or partially remote work setup. Most of these companies spent months preparing for the switch by training their employees, setting up remote work policies and ensuring the necessary
  
  
                    &#xD;
    &lt;a href="/2021/01/18/securing-your-remote-workers/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Securing Your Remote Workers"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/01/18/securing-your-remote-workers/"&gt;&#xD;
      
                      
    
    Securing Your Remote Workers
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 18 Jan 2021 12:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/01/18/securing-your-remote-workers</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Is Healthcare Compliance Enough?</title>
      <link>https://www.pirumllc.com/2021/01/13/is-healthcare-compliance-enough</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The healthcare industry is a top target for cybercriminals. Healthcare providers hold patients’ personal and financial data. Plus, they offer a critical service and could be more likely to pay ransom to get systems back up and running. Recognizing the threat, industry regulators have instituted cybersecurity standards. Noncompliance is costly, but the real question is
  
  
                    &#xD;
    &lt;a href="/2021/01/13/is-healthcare-compliance-enough/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Is Healthcare Compliance Enough?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/01/13/is-healthcare-compliance-enough/"&gt;&#xD;
      
                      
    
    Is Healthcare Compliance Enough?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 13 Jan 2021 12:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/01/13/is-healthcare-compliance-enough</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Required Data Security Controls for Compliance</title>
      <link>https://www.pirumllc.com/2021/01/11/required-data-security-controls-for-compliance</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    No data protection regulation anywhere in the world expects your business to have a 100 percent perfect plan for fighting cybersecurity threats. However, your business is definitely expected to install all the necessary checks and balances that make up a resilient defense. These checks and balances are referred to as data security controls or measures.
  
  
                    &#xD;
    &lt;a href="/2021/01/11/required-data-security-controls-for-compliance/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Required Data Security Controls for Compliance"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/01/11/required-data-security-controls-for-compliance/"&gt;&#xD;
      
                      
    
    Required Data Security Controls for Compliance
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 11 Jan 2021 12:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/01/11/required-data-security-controls-for-compliance</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Healthcare Providers Must Prepare for IT Disasters</title>
      <link>https://www.pirumllc.com/2021/01/06/healthcare-providers-must-prepare-for-it-disasters</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Healthcare professionals regularly handle the worst. Whether its broken bones, horrible abscesses, disease, or death, but that doesn’t mean they’re ready for all that can cripple their technology. In 2011, one of the deadliest tornadoes in U.S. history destroyed a large medical center in southwest Missouri. Fortunately, the regional hospital had, only a few weeks
  
  
                    &#xD;
    &lt;a href="/2021/01/06/healthcare-providers-must-prepare-for-it-disasters/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Healthcare Providers Must Prepare for IT Disasters"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/01/06/healthcare-providers-must-prepare-for-it-disasters/"&gt;&#xD;
      
                      
    
    Healthcare Providers Must Prepare for IT Disasters
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 06 Jan 2021 12:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/01/06/healthcare-providers-must-prepare-for-it-disasters</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>New Year, New Risks for IT &amp; Data Security</title>
      <link>https://www.pirumllc.com/2021/01/04/new-year-new-risks-for-it-data-security</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      The COVID-19 pandemic has changed everything about the world as we know it. Just as we started embracing new practices like sanitizing, social distancing and remote working, the pandemic has also forced us to embrace systemic changes in the ways we deal with cyberthreats. In fact, the FBI has reported an increase in cyberattacks
  
  
                    &#xD;
    &lt;a href="/2021/01/04/new-year-new-risks-for-it-data-security/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "New Year, New Risks for IT &amp;amp; Data Security"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/01/04/new-year-new-risks-for-it-data-security/"&gt;&#xD;
      
                      
    
    New Year, New Risks for IT &amp;amp; Data Security
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 04 Jan 2021 12:30:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/01/04/new-year-new-risks-for-it-data-security</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Tech Help for New Year’s Resolutions</title>
      <link>https://www.pirumllc.com/2021/01/01/tech-help-for-new-years-resolutions</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Making New Year’s resolutions is a familiar habit in the Western world. Many people make resolutions relating to their physical or mental health. Fortunately, in our digital world, technology can help make resolutions more attainable. First, a few fun facts about resolutions. Did you know: The habit of making resolutions began about 4,000 years ago?
  
  
                    &#xD;
    &lt;a href="/2021/01/01/tech-help-for-new-years-resolutions/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Tech Help for New Year’s Resolutions"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2021/01/01/tech-help-for-new-years-resolutions/"&gt;&#xD;
      
                      
    
    Tech Help for New Year’s Resolutions
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 01 Jan 2021 18:42:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2021/01/01/tech-help-for-new-years-resolutions</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>That’s So 2010: Why Upgrade Your Office Software</title>
      <link>https://www.pirumllc.com/2020/12/30/thats-so-2010-why-upgrade-your-office-software</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Are you still using Office 2010? It may have served you well over the past decade, but this software reached its end of life in 2020. It’s time to upgrade. Here’s why and what to consider. Software has a typical life span, after which the manufacturer turns its resources to supporting a more recent
  
  
                    &#xD;
    &lt;a href="/2020/12/30/thats-so-2010-why-upgrade-your-office-software/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "That’s So 2010: Why Upgrade Your Office Software"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/12/30/thats-so-2010-why-upgrade-your-office-software/"&gt;&#xD;
      
                      
    
    That’s So 2010: Why Upgrade Your Office Software
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 30 Dec 2020 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/12/30/thats-so-2010-why-upgrade-your-office-software</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Making Ongoing Risk Management an Operational Standard</title>
      <link>https://www.pirumllc.com/2020/12/28/making-ongoing-risk-management-an-operational-standard</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    No business today is 100 percent secure from cyberthreats and more businesses are waking up to this reality now than ever before. It’s no wonder cybersecurity investment in 2020 is pegged to grow by 5.6 percent to reach nearly $43.1 billion in value.1 With cyberattacks surging due to widespread remote work and increased online interactions
  
  
                    &#xD;
    &lt;a href="/2020/12/28/making-ongoing-risk-management-an-operational-standard/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Making Ongoing Risk Management an Operational Standard"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/12/28/making-ongoing-risk-management-an-operational-standard/"&gt;&#xD;
      
                      
    
    Making Ongoing Risk Management an Operational Standard
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 28 Dec 2020 15:28:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/12/28/making-ongoing-risk-management-an-operational-standard</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Is Misconfiguration Making Your SMB Vulnerable?</title>
      <link>https://www.pirumllc.com/2020/12/23/is-misconfiguration-making-your-smb-vulnerable</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Cybersecurity attacks on big-name brands or governments are familiar headlines these days. Millions of access credentials are breached, and millions of dollars are lost to ransomware attack. You may think you’re protected, but a single undetected misconfiguration could mean trouble. If you’ve been paying attention, you know no one is immune from cyberattack. Your
  
  
                    &#xD;
    &lt;a href="/2020/12/23/is-misconfiguration-making-your-smb-vulnerable/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Is Misconfiguration Making Your SMB Vulnerable?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/12/23/is-misconfiguration-making-your-smb-vulnerable/"&gt;&#xD;
      
                      
    
    Is Misconfiguration Making Your SMB Vulnerable?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 23 Dec 2020 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/12/23/is-misconfiguration-making-your-smb-vulnerable</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>First Step to Compliance: A Thorough and Accurate Risk Assessment</title>
      <link>https://www.pirumllc.com/2020/12/21/first-step-to-compliance-a-thorough-and-accurate-risk-assessment</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Complying with data privacy and protection regulations wouldn’t give several business owners sleepless nights if it only meant installing a predefined list of security solutions. Compliance goes way beyond this and for good reason. In principle, regulators, local or international, want businesses to: assess the type of data they store and manage gauge the
  
  
                    &#xD;
    &lt;a href="/2020/12/21/first-step-to-compliance-a-thorough-and-accurate-risk-assessment/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "First Step to Compliance: A Thorough and Accurate Risk Assessment"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/12/21/first-step-to-compliance-a-thorough-and-accurate-risk-assessment/"&gt;&#xD;
      
                      
    
    First Step to Compliance: A Thorough and Accurate Risk Assessment
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 21 Dec 2020 15:20:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/12/21/first-step-to-compliance-a-thorough-and-accurate-risk-assessment</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Ring in the New Year with New IT</title>
      <link>https://www.pirumllc.com/2020/12/16/ring-in-the-new-year-with-new-it</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      For many of us, 2021 can’t come soon enough, and we\’re hoping next year will be a better one. One way to get the best start in the new year? Take the time now to review business technology. There are several areas that you might improve to support 2021 success. First, look at your
  
  
                    &#xD;
    &lt;a href="/2020/12/16/ring-in-the-new-year-with-new-it/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Ring in the New Year with New IT"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/12/16/ring-in-the-new-year-with-new-it/"&gt;&#xD;
      
                      
    
    Ring in the New Year with New IT
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 16 Dec 2020 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/12/16/ring-in-the-new-year-with-new-it</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Security – Do You Know Your Digital Risk?</title>
      <link>https://www.pirumllc.com/2020/12/14/security-do-you-know-your-digital-risk</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Rapid technological advancement and rising global connectivity is reshaping the way the world is functioning. From higher productivity to improved customer satisfaction, technology has played a critical role in the growth of businesses across the world. However, the consequential bad news is that technological advancements have also made organizations increasingly vulnerable to digital risks.
  
  
                    &#xD;
    &lt;a href="/2020/12/14/security-do-you-know-your-digital-risk/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Security – Do You Know Your Digital Risk?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/12/14/security-do-you-know-your-digital-risk/"&gt;&#xD;
      
                      
    
    Security – Do You Know Your Digital Risk?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 14 Dec 2020 15:04:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/12/14/security-do-you-know-your-digital-risk</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why MSP Support Beats a Break-Fix Approach</title>
      <link>https://www.pirumllc.com/2020/12/09/why-msp-support-beats-a-break-fix-approach</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Computers break at challenging times. Always. And there’s no worse time than the holiday season. Your employees want to spend time with family and friends, relaxing and reminiscing. They do not want to wait around for a fix or to find a replacement. That’s one reason a managed service provider (MSP) is a good choice
  
  
                    &#xD;
    &lt;a href="/2020/12/09/why-msp-support-beats-a-break-fix-approach/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Why MSP Support Beats a Break-Fix Approach"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/12/09/why-msp-support-beats-a-break-fix-approach/"&gt;&#xD;
      
                      
    
    Why MSP Support Beats a Break-Fix Approach
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 09 Dec 2020 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/12/09/why-msp-support-beats-a-break-fix-approach</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Fines, Penalties and Violations! Oh My!</title>
      <link>https://www.pirumllc.com/2020/12/07/fines-penalties-and-violations-oh-my</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Global data protection regulations (new or updated) are being enforced aggressively, resulting in a tsunami of hefty fines and penalties handed out to violators. The majority of these violations are a result of the failure to conduct regular risk assessments, which form an integral part of the ‘appropriate measures’ a business must take to
  
  
                    &#xD;
    &lt;a href="/2020/12/07/fines-penalties-and-violations-oh-my/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Fines, Penalties and Violations! Oh My!"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/12/07/fines-penalties-and-violations-oh-my/"&gt;&#xD;
      
                      
    
    Fines, Penalties and Violations! Oh My!
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 07 Dec 2020 15:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/12/07/fines-penalties-and-violations-oh-my</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Data Protection Regulations: The ‘New Normal’ For All Businesses</title>
      <link>https://www.pirumllc.com/2020/11/23/data-protection-regulations-the-new-normal-for-all-businesses</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In today’s global information economy, your business data is the golden goose chased by cybercriminals. Given how this data has an endless life, who can ensure that it isn’t exploited for unsavory gains? Well, governments worldwide have stepped up to the plate. The implementation of General Data Protection Regulation (GDPR) in 2018 by the European
  
  
                    &#xD;
    &lt;a href="/2020/11/23/data-protection-regulations-the-new-normal-for-all-businesses/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Data Protection Regulations: The ‘New Normal’ For All Businesses"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/11/23/data-protection-regulations-the-new-normal-for-all-businesses/"&gt;&#xD;
      
                      
    
    Data Protection Regulations: The ‘New Normal’ For All Businesses
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 23 Nov 2020 13:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/11/23/data-protection-regulations-the-new-normal-for-all-businesses</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>All You Need to Know About Least Privilege</title>
      <link>https://www.pirumllc.com/2020/11/16/all-you-need-to-know-about-least-privilege</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      In IT, the principle of least privilege (PoLP) refers to the concept that any process, program or user must be provided with only the bare minimum privileges (access or permissions) needed to perform a function. For instance, if a user account has been created for accessing database records, it need not have admin rights.
  
  
                    &#xD;
    &lt;a href="/2020/11/16/all-you-need-to-know-about-least-privilege/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "All You Need to Know About Least Privilege"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/11/16/all-you-need-to-know-about-least-privilege/"&gt;&#xD;
      
                      
    
    All You Need to Know About Least Privilege
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 16 Nov 2020 13:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/11/16/all-you-need-to-know-about-least-privilege</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Data Privacy Versus Data Security: A Closer Look</title>
      <link>https://www.pirumllc.com/2020/11/09/data-privacy-versus-data-security-a-closer-look</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      The importance of data privacy and data security has grown exponentially as organizations today collect and store more information than ever before. Having a robust data protection strategy is critical to safeguard confidential information and to ensure smooth functioning of your business.  But before we move on, let’s take a step back to understand
  
  
                    &#xD;
    &lt;a href="/2020/11/09/data-privacy-versus-data-security-a-closer-look/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Data Privacy Versus Data Security: A Closer Look"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/11/09/data-privacy-versus-data-security-a-closer-look/"&gt;&#xD;
      
                      
    
    Data Privacy Versus Data Security: A Closer Look
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 09 Nov 2020 13:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/11/09/data-privacy-versus-data-security-a-closer-look</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why Your Business Needs a Data Security Policy</title>
      <link>https://www.pirumllc.com/2020/11/04/why-your-business-needs-a-data-security-policy</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Today, the competitive business environment is data-driven. Data provides key insights into your customers and business performance that helps you make better decisions and improve processes. However, the sudden influx of employees working remotely exposes your organization’s information to several security threats.According to the FBI, cybersecurity complaints increased from 1,000 to 4,000 complaints daily
  
  
                    &#xD;
    &lt;a href="/2020/11/04/why-your-business-needs-a-data-security-policy/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Why Your Business Needs a Data Security Policy"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/11/04/why-your-business-needs-a-data-security-policy/"&gt;&#xD;
      
                      
    
    Why Your Business Needs a Data Security Policy
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 04 Nov 2020 16:25:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/11/04/why-your-business-needs-a-data-security-policy</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Local Business v. Big Box Computer Repair</title>
      <link>https://www.pirumllc.com/2020/10/29/local-business-v-big-box-computer-repair</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your computer is down for the count. You’ve tried the perennial favorite – turning it off and back on again – but somehow, your tech magic has not worked this time! You need help, and you want it fast. The question is whether to take it to a local computer business or big-box store for
  
  
                    &#xD;
    &lt;a href="/2020/10/29/local-business-v-big-box-computer-repair/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Local Business v. Big Box Computer Repair"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/29/local-business-v-big-box-computer-repair/"&gt;&#xD;
      
                      
    
    Local Business v. Big Box Computer Repair
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 29 Oct 2020 11:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/29/local-business-v-big-box-computer-repair</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Ransomware Equals a Data Breach</title>
      <link>https://www.pirumllc.com/2020/10/26/ransomware-equals-a-data-breach</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    From a data regulator’s perspective, it is the responsibility of your business to keep data safe from cyber threats, inform clients about a breach within a stipulated period and provide necessary documentation as proof of your efforts. Although different regulations have laid down different mandates for breach notifications, the principle remains intact. While there is
  
  
                    &#xD;
    &lt;a href="/2020/10/26/ransomware-equals-a-data-breach/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Ransomware Equals a Data Breach"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/26/ransomware-equals-a-data-breach/"&gt;&#xD;
      
                      
    
    Ransomware Equals a Data Breach
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 26 Oct 2020 11:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/26/ransomware-equals-a-data-breach</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>The Dark Web and Its Impact on Your Business</title>
      <link>https://www.pirumllc.com/2020/10/23/the-dark-web-and-its-impact-on-your-business</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Business owners today know the internet is not only a force for good. Some people exploit the Web for ill intent. They congregate on the Dark Web, and small businesses need to understand the risks. What is the Dark Web? You and your employees spend time daily on the Web. They’re researching clients, checking out
  
  
                    &#xD;
    &lt;a href="/2020/10/23/the-dark-web-and-its-impact-on-your-business/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "The Dark Web and Its Impact on Your Business"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/23/the-dark-web-and-its-impact-on-your-business/"&gt;&#xD;
      
                      
    
    The Dark Web and Its Impact on Your Business
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 23 Oct 2020 23:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/23/the-dark-web-and-its-impact-on-your-business</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why is my Computer Running so SLOW?</title>
      <link>https://www.pirumllc.com/2020/10/23/why-is-my-computer-running-so-slow</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Woah, who slammed on the brakes? Your computer used to speed through startup and let you open almost everything at once, but now it’s struggling to crawl along! Everything takes so much longer or crashes without warning. Something isn’t right. If it’s gotten so bad that you’ve found yourself drooling over the idea of a
  
  
                    &#xD;
    &lt;a href="/2020/10/23/why-is-my-computer-running-so-slow/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Why is my Computer Running so SLOW?"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/23/why-is-my-computer-running-so-slow/"&gt;&#xD;
      
                      
    
    Why is my Computer Running so SLOW?
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 23 Oct 2020 20:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/23/why-is-my-computer-running-so-slow</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>To Backup or To Archive? ’Tis The Question</title>
      <link>https://www.pirumllc.com/2020/10/23/to-backup-or-to-archive-tis-the-question</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      Hamlet worried about whether to be or not. You may be more preoccupied with whether backup or archiving is better for your business. You know you need to secure your data, but how? This article examines the different benefits of both options. Back in the day, businesses kept important information on paper. They stored
  
  
                    &#xD;
    &lt;a href="/2020/10/23/to-backup-or-to-archive-tis-the-question/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "To Backup or To Archive? ’Tis The Question"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/23/to-backup-or-to-archive-tis-the-question/"&gt;&#xD;
      
                      
    
    To Backup or To Archive? ’Tis The Question
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 23 Oct 2020 17:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/23/to-backup-or-to-archive-tis-the-question</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Why You Should Never Use A Free Email Address For Your Business</title>
      <link>https://www.pirumllc.com/2020/10/23/why-you-should-never-use-a-free-email-address-for-your-business</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This newsletter is about setting up your businesses technology properly. You need to look the part when it’s small, and protect it properly when it’s large. Why You Should Never Use A Free Email Address For Your Business The message is clear: email is king. Many clients and customers choose to communicate primarily by email
  
  
                    &#xD;
    &lt;a href="/2020/10/23/why-you-should-never-use-a-free-email-address-for-your-business/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Why You Should Never Use A Free Email Address For Your Business"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/23/why-you-should-never-use-a-free-email-address-for-your-business/"&gt;&#xD;
      
                      
    
    Why You Should Never Use A Free Email Address For Your Business
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 23 Oct 2020 14:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/23/why-you-should-never-use-a-free-email-address-for-your-business</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Steer Clear of Coronavirus Scams</title>
      <link>https://www.pirumllc.com/2020/10/23/steer-clear-of-coronavirus-scams</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      With the world grappling with a health pandemic, scams are shocking. Regrettably, bad actors are everywhere, always looking for opportunities, and they’re seeing one in the coronavirus. This article outlines what you need to watch out for and how to stay cyber safe. The last thing you want to read right now is that
  
  
                    &#xD;
    &lt;a href="/2020/10/23/steer-clear-of-coronavirus-scams/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Steer Clear of Coronavirus Scams"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/23/steer-clear-of-coronavirus-scams/"&gt;&#xD;
      
                      
    
    Steer Clear of Coronavirus Scams
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 23 Oct 2020 11:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/23/steer-clear-of-coronavirus-scams</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Beat the IT Burden</title>
      <link>https://www.pirumllc.com/2020/10/22/beat-the-it-burden</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Technology today allows us to accomplish more tasks faster than ever before.  Paperless documents, remote collaboration and video conferencing have all lowered the costs and increased the speed of everyday business at an extraordinary rate. The benefits of modern IT does however, come at a cost.  Consistent maintenance has become a critical component of almost
  
  
                    &#xD;
    &lt;a href="/2020/10/22/beat-the-it-burden/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Beat the IT Burden"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/22/beat-the-it-burden/"&gt;&#xD;
      
                      
    
    Beat the IT Burden
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 22 Oct 2020 19:03:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/22/beat-the-it-burden</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>6 Never Dos for Your Work Computer</title>
      <link>https://www.pirumllc.com/2020/10/22/6-never-dos-for-your-work-computer</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Nobody likes to be told what they can’t do. Still, there are certain never dos that you should keep in mind when it comes to your work computer. This article captures the top six things you should avoid doing on your work computer. #1 Don’t login to personal sites and services Sure, we’re all guilty
  
  
                    &#xD;
    &lt;a href="/2020/10/22/6-never-dos-for-your-work-computer/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "6 Never Dos for Your Work Computer"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/22/6-never-dos-for-your-work-computer/"&gt;&#xD;
      
                      
    
    6 Never Dos for Your Work Computer
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 22 Oct 2020 11:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/22/6-never-dos-for-your-work-computer</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Ransomware: Cybersecurity’s Biggest Bully Yet</title>
      <link>https://www.pirumllc.com/2020/10/19/ransomware-cybersecuritys-biggest-bully-yet</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Can you imagine logging into your system to access your business data and being unable to do so? Talk about your worst nightmare coming true! Unfortunately, an increasing number of businesses around the world are living this nightmare with countless others coming in the line of fire, including yours. Ransomware is growing rapidly and crippling
  
  
                    &#xD;
    &lt;a href="/2020/10/19/ransomware-cybersecuritys-biggest-bully-yet/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Ransomware: Cybersecurity’s Biggest Bully Yet"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/19/ransomware-cybersecuritys-biggest-bully-yet/"&gt;&#xD;
      
                      
    
    Ransomware: Cybersecurity’s Biggest Bully Yet
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Mon, 19 Oct 2020 11:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/19/ransomware-cybersecuritys-biggest-bully-yet</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>How to Ensure Compliance When Working Remotely</title>
      <link>https://www.pirumllc.com/2020/10/14/how-to-ensure-compliance-when-working-remotely</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                      The ongoing COVID-19 pandemic has presented businesses across the world with many unique challenges when it comes to their day-to-day operations. With every business trying its best to survive in this unprecedented climate, remote working has become a critical factor in keeping operations up and running. However, this adaptation has exposed businesses to a
  
  
                    &#xD;
    &lt;a href="/2020/10/14/how-to-ensure-compliance-when-working-remotely/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "How to Ensure Compliance When Working Remotely"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/14/how-to-ensure-compliance-when-working-remotely/"&gt;&#xD;
      
                      
    
    How to Ensure Compliance When Working Remotely
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 14 Oct 2020 12:00:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/14/how-to-ensure-compliance-when-working-remotely</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>The Dangers of the Inbox</title>
      <link>https://www.pirumllc.com/2020/10/09/the-dangers-of-the-inbox</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Every now and then, an email with a catchy subject line appears in your inbox and you end up clicking on it, either because you’re curious about the subject line or because you assume the sender is trustworthy. Unfortunately, this is how most cyberattacks tend to begin – with a single click. What unfolds next
  
  
                    &#xD;
    &lt;a href="/2020/10/09/the-dangers-of-the-inbox/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "The Dangers of the Inbox"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/10/09/the-dangers-of-the-inbox/"&gt;&#xD;
      
                      
    
    The Dangers of the Inbox
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 09 Oct 2020 21:24:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/10/09/the-dangers-of-the-inbox</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Make an MSP Your Technology Sherpa</title>
      <link>https://www.pirumllc.com/2020/05/21/make-an-msp-your-technology-sherpa</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    They don’t always get credit, but climbers reaching the summit of Mount Everest rely on a Sherpa to guide them. Making information technology decisions can feel like climbing a mountain, but there’s help for that, too. A managed services provider (MSP) can be your technology Sherpa. With so many of us working off-site right now,
  
  
                    &#xD;
    &lt;a href="/2020/05/21/make-an-msp-your-technology-sherpa/"&gt;&#xD;
      
                      
    
    Continue reading 
    
    
                      &#xD;
      &lt;span&gt;&#xD;
        
                        
      
      "Make an MSP Your Technology Sherpa"
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The post 
  
  
                    &#xD;
    &lt;a href="/2020/05/21/make-an-msp-your-technology-sherpa/"&gt;&#xD;
      
                      
    
    Make an MSP Your Technology Sherpa
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
   appeared first on 
  
  
                    &#xD;
    &lt;a href="https://blog.pirumllc.com"&gt;&#xD;
      
                      
    
    Pirum's Tech Ponderings
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 21 May 2020 02:11:00 GMT</pubDate>
      <guid>https://www.pirumllc.com/2020/05/21/make-an-msp-your-technology-sherpa</guid>
      <g-custom:tags type="string" />
    </item>
  </channel>
</rss>
