<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>maxx-computer</title>
    <link>https://www.maxxcomputers.net</link>
    <description />
    <atom:link href="https://www.maxxcomputers.net/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>Episode 6 Can Ransomware Just Go Away? Unfortunately, No.</title>
      <link>https://www.maxxcomputers.net/episode-6-can-ransomware-just-go-away-unfortunately-no</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Learn From the Experts - Episode 6
            &#xD;
      &lt;br/&gt;&#xD;
      
           Can Ransomware Just Go Away? Unfortunately, No.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In this final episode, we’ll wrap up what we’ve learned and how to move forward. There is no silver bullet nor easy button that will eliminate the threat of a ransomware attack. What we can hope for is that more companies like Gregory Industries step forward to share their story and encourage collective action. There are many steps individuals and businesses can take in order to shore up their systems. We can all do our part in becoming more educated and vigilant of the numerous threats around us. This threat awareness is an effective first step to putting a stake through the heart of ransomware.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png" length="958227" type="image/png" />
      <pubDate>Wed, 18 Oct 2023 03:42:19 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/episode-6-can-ransomware-just-go-away-unfortunately-no</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/b2406be9/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Episode 5 Cybersecurity Experts are in High Demand &amp; Short Supply</title>
      <link>https://www.maxxcomputers.net/episode-5-cybersecurity-experts-are-in-high-demand-short-supply</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Learn From the Experts - Episode 5
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybersecurity Experts are in High Demand &amp;amp; Short Supply
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The irony of the cyber security landscape is that security experts are in high demand, but short supply. Even with colleges and certificate programs churning out new graduates daily, companies would rather hire highly skilled professionals than train new recruits. Not surprisingly, there are not enough skilled folks to go around.
            &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           This episode delves into the simple steps a company can make in lieu of that to mitigate the biggest security vulnerability they face: their employees.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png" length="958227" type="image/png" />
      <pubDate>Wed, 18 Oct 2023 03:39:01 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/episode-5-cybersecurity-experts-are-in-high-demand-short-supply</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/b2406be9/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Episode 4 Crime is a Tax on the Honest We’re All Paying For</title>
      <link>https://www.maxxcomputers.net/episode-4-crime-is-a-tax-on-the-honest-were-all-paying-for</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Learn From the Experts - Episode 4
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Crime is a Tax on the Honest We’re All Paying For
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We are living in an interconnected world, but the laws governing and defining cybercrime have been trailing far behind the sophistication of the attacks. So when an attack does happen businesses are left reeling from the financial and emotional turmoil of having to pay the ransom. And even after payment is made, they have to face the dark reality that their intellectual property is very likely in someone else's hands.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In this episode, we’ll explore these various types of impacts a Ransomware attack can have on SMBs, in addition to hearing about the detrimental impacts of Gregory Industries’ attack.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png" length="958227" type="image/png" />
      <pubDate>Wed, 18 Oct 2023 03:35:05 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/episode-4-crime-is-a-tax-on-the-honest-were-all-paying-for</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/b2406be9/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Episode 3 Everything Is On Some Service, Some Cloud, Somewhere</title>
      <link>https://www.maxxcomputers.net/episode-3-everything-is-on-some-service-some-cloud-somewhere</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Learn From the Experts - Episode 3
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Everything Is On Some Service, Some Cloud, Somewhere
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           No business can function without the aid of third party services or platforms. Third parties are a great force multiplier that have propelled the growth of countless small and mid-size businesses, but they are also a source of great risk.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In this episode, we highlight the inherent vulnerabilities with outsourcing critical services and how bad actors have been targeting managed service providers in order to infiltrate hundreds of thousands of systems simultaneously.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png" length="958227" type="image/png" />
      <pubDate>Wed, 18 Oct 2023 03:31:20 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/episode-3-everything-is-on-some-service-some-cloud-somewhere</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/b2406be9/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Episode 2  This Isn’t Highway Robbery, This is Economic Disruption</title>
      <link>https://www.maxxcomputers.net/episode-2-this-isnt-highway-robbery-this-is-economic-disruption</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Learn From the Experts - Episode 2
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This Isn’t Highway Robbery, This is Economic Disruption
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In this episode we get insight into the anatomy of an attack and its impact on a business which believed its security apparatus was well prepared.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Meet Gregory Industries, a midsized fifth generation business in middle America. In April, 2021 they were the victims of a ransomware attack perpetrated by the group DarkSide. DarkSide represents the growing proliferation of what is known as Ransomware As A Service (RAAS).
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           These services enable malicious actors to outsource the development, distribution and execution of ransomware payloads thus lowering the barrier of entry for more gangs. As a result, the web-ensnaring victims network is expanding dramatically and the number of ransomware gangs is seemingly growing exponentially.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png" length="958227" type="image/png" />
      <pubDate>Wed, 18 Oct 2023 02:47:17 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/episode-2-this-isnt-highway-robbery-this-is-economic-disruption</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/b2406be9/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Learn From the Experts - Episode 1  Have you been Encrypted</title>
      <link>https://www.maxxcomputers.net/learn_fm_the_experts-episode-1_have_you_been_encrypted</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Learn From the Experts - Episode 1
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Have you been Encrypted
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware comes in all shapes and sizes and from multiple sources. This episode will give us an understanding of what a threat vector is and the risks we all face through our simple day-to-day activities in an interconnected world.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Small and midsize businesses oftentimes believe that they are unlikely targets for an attack, but all evidence indicates that could not be further from the truth.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ransomware is now a billion dollar industry and ransomware organizations have recognized that the most effective way into an organization is through its people. Social engineering and human vectors represent the majority of infiltrations. Bad actors have utilized an ever growing and sophisticated arsenal of malicious tools which can be deployed on various devices and ensnare millions of networks. Along with that, these gangs are aware that SMBs usually don't have sufficient defenses or adequate training to thwart an attack, making them a deliciously ripe target.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png" length="958227" type="image/png" />
      <pubDate>Wed, 18 Oct 2023 02:19:18 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/learn_fm_the_experts-episode-1_have_you_been_encrypted</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/b2406be9/dms3rep/multi/Ransomeware_2023-7941d0c5.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How Cybercriminals find their Targets on the Dark Web</title>
      <link>https://www.maxxcomputers.net/how-cybercriminals-find-their-targets-on-the-dark-web</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How Cybercriminals Find their Targets on the Dark Web
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Article by by Kyle Fiehler | Nov 8, 2021 | Business + Partners, Managed Service Providers
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For the average internet user, the dark web is something you only hear about in news broadcasts talking about the latest cyberattacks. But while you won’t find yourself in the dark web by accident, it’s important to know what it is and how you can protect yourself from it. Afterall, the dark web is where most cybercrimes get their start.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The dark web explained
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In short, the dark web is a sort of online club where only the members know the ever-changing location.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Once a criminal learns the location, they anonymously gain access to sell stolen information and buy illicit items like illegally obtained credit cards.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Innovations in the dark web
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The dark web isn’t just a marketplace, though. It’s also a gathering area where criminals can recruit each other to help with their next attack.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In fact, the rising rates of malware and computer viruses can partially be explained by cyber criminals coming together to pool their talent. They’ve created a new model for cybercrime where criminal specialists sell their talents to the highest bidder. Criminals might even loan out new technology with the promise that they get a portion of any stolen funds.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Protecting yourself and your family
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The first step in protecting yourself from criminals in the dark web is to have a plan. The right cybersecurity tools will keep your important financial documents and your most precious memories safe from attack – or even accidental deletion.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           And while cybercriminals are developing new methods and tools, cybersecurity professionals are innovating as well. Strategies for cyber resilience combine the best antivirus protection with state-of-the-art cloud backup services, so you’re protected while also prepared for the worst.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ready to take the first step in protecting you and your family from the dark web?New Paragraph
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Cybercriminals+on+Dark-Web+Image.png" length="307292" type="image/png" />
      <pubDate>Wed, 18 Oct 2023 01:11:46 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/how-cybercriminals-find-their-targets-on-the-dark-web</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Cybercriminals+on+Dark-Web+Image.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/b2406be9/dms3rep/multi/Cybercriminals+on+Dark-Web+Image.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Endpoint Protection - "A Better System"</title>
      <link>https://www.maxxcomputers.net/blog/edpointprotection</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Nationwide Healthcare Services Rests Easier
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           with Webroot Endpoint Protection
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            This is how and why we at Maxx Computers, along with our OpenText partners, provide better protection for our professional &amp;amp; personal clients.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The Webroot Management Console provides a better system status view of all the endpoints.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Endpoint Protection has proven to be significantly more effective in blocking any potential security threats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/c857c444/dms3rep/multi/WEBROOT+OpenText+Securty+Solution+Flyer.png" alt=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Director+of+IT+-+National+Healthcare+Services.png" length="1232985" type="image/png" />
      <pubDate>Tue, 17 Oct 2023 23:58:13 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/blog/edpointprotection</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/c857c444/dms3rep/multi/Director+of+IT+-+National+Healthcare+Services.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/b2406be9/dms3rep/multi/Director+of+IT+-+National+Healthcare+Services.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Webroot Testimonial</title>
      <link>https://www.maxxcomputers.net/webroot-testimonial</link>
      <description>The ease of use, supportability, and measurability of Webroot solutions has allowed the Helion team to work on client issues that really matter.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Webroot Testimonial - Helion Automotive Technologies
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Helion shares the ease of use, supportability, and measurability of Webroot solutions which allowed them to resolve issues that really mattered.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Free Trial: Business and MSP Security
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The Webroot® management console is designed to simplify cybersecurity management for businesses. It
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IS
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            your one-stop admin shop for all your Smarter Cybersecurity® needs, and it integrates with major RMMs.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Enjoy single-pane-of-glass, fully cloud-based control
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Protect endpoints and networks, and educate end users
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Start free trials, run reports, and contact support in one place
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Get hierarchical views from global down to device level
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            For more information on how to get a
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           FREE TRIAL
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            , just fill out and submit the form and we will get back with you. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5380664.jpeg" length="311555" type="image/jpeg" />
      <pubDate>Fri, 05 Nov 2021 21:19:29 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/webroot-testimonial</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-207580.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5380664.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>2021 Webroot BrightCloud Threat Report</title>
      <link>https://www.maxxcomputers.net/10-latest-most-dangerous-virus-malware-threats-in-2021</link>
      <description>10 of the most dangerous virus and malware threats in 2021</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2021 Webroot BrightCloud Threat Report
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5380664.jpeg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As I was searching the internet today, I happened upon an article by Sophie Anderson who is a Cybersecurity researcher and technology journalist. She accurately identifies some of the worst cyber security threats facing us all in 2021. The only drawback I found with her article is in highly recommending Norton, which is a good low-cost anti-virus program however the best protection against today's very sophisticated virus and malware threats is having intelligent "pro-active" technology which is found with
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/webroot"&gt;&#xD;
      
           Webroot
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The following is David Dufour's forward to the 2021 Threat Report. David Dufour is Webroot VP, Software Engineering.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            “Zoom parties.”
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Before 2020 happened, if you’d told me that Zoom parties would become one of the most exciting events on my social calendar, I’d never have believed it. Yet here we are, with much of the world having been in varying states of social restriction or lockdown for over a year.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Although remote work wasn’t a new phenomenon when the COVID-19 pandemic began, little could have prepared us for the explosion in online activity that followed. It wasn’t just that more people started working from home; suddenly, many of us had to move our entire lives online. And as we shifted practical activities like work and school to online modalities, the internet also became our only way to connect with loved ones, see friends’ faces, share in celebration, and mourn loss. Without a doubt, the notion of “normal” wasn’t just put on hold; it was obliterated.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Whenever there’s a major event or hot topic in the news, you can bet there will be opportunists on standby somewhere, poised to exploit it. The pandemic has been no different, with cybercriminals working overtime to take advantage of individuals and businesses as they transitioned to a mostly online lifestyle. New social engineering tactics, phishing campaigns, record-breaking ransomware payouts, and other developments emerged at astonishing rates.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The cybercriminals certainly didn’t sit 2020 out. But neither did we. Cybersecurity analysts and threat researchers the world over have been working tirelessly to discover and neutralize threats as quickly as they appear. Operating systems and web browsers are making effective improvements to their built-in security. Risk awareness training and phishing simulations for employees continue to improve security postures. Nations and companies are working together to break down cybercriminal infrastructure. Like COVID-19 numbers, at least at the time we’re writing this report, many previously virulent online threats are actually trending downward.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The last year certainly tested our fortitude, and its unique circumstances are not yet over. But when challenges come, we adapt. In times that threaten to push us apart, we find new ways to come together. We have proven our resilience and we stand together, ready to face what the future may bring.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5473298.jpeg" length="164735" type="image/jpeg" />
      <pubDate>Fri, 05 Nov 2021 01:37:09 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/10-latest-most-dangerous-virus-malware-threats-in-2021</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5473298.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-5473298.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Important Amazon Privacy Settings</title>
      <link>https://www.maxxcomputers.net/important-amazon-privacy-settings</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Important Amazon Privacy Settings to change - Right Now
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="https://cyberguy.com/privacy/6-important-amazon-privacy-settings-to-change-right-now/?utm_campaign=Oct_31_2021_Weekly_Newsletter&amp;amp;utm_medium=email&amp;amp;utm_source=newsletter" target="_blank"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/c857c444/dms3rep/multi/Get-the-Report-for-6-Important-Amazon-Privacy-Settings.png"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            When it comes to personal security, you can pretty much handle that daily, but what about privacy on the web? What do others know about you without you even knowing it? We follow the CYBERGUY for great insight as to not just new gadgets, but also uncovering both potential, and real threats. We are sharing the CYBERGUY's "6 Important Amazon Privacy Settings to change right now" so you can better understand what people are capable of seeing about you, and for you to do something about it.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What you will learn?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Once you see how much of your privacy is being disregarded by big tech, you’ll want to change defaults in settings to regain some of your privacy.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Amazon will try to dissuade you from turning off voice recordings... why?
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Amazon Wish Lists are not private by default... and
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ANYBODY
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             in the world can see what you have your eye on from the mega online retailer at any time.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Did you know...
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            sidewalk
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             is what Amazon calls its sharing of your internet connection with others so that other Amazon devices can access your WiFi connection without your permission. Learn how and how to
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             "Opt-Out"
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Can you disable Amazon from recording your entire search history? Learn how. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             And, you can also s
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            top Amazon from pushing products on you with personalized ads.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            You probably had no idea that there is a public profile of you on Amazon available... or how to make them private. You can follow , follow Curt's quick steps to further protect yourself, and your loved ones.
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-97077.jpeg" length="277805" type="image/jpeg" />
      <pubDate>Mon, 01 Nov 2021 17:32:52 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/important-amazon-privacy-settings</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/c857c444/dms3rep/multi/theCYBERGUY.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/pexels-photo-97077.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Sharp Surge in Phishing &amp; How to Protect Your Business</title>
      <link>https://www.maxxcomputers.net/sharp-surge-in-phishing-how-to-protect-your-business</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
         Sharp Surge in Phishing and How to Protect Your Business
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Phishing attacks are up, and they mirror users’ WFH (Work From Home) habits.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            There was a meteoric rise in phishing last year, with Netflix and YouTube users experiencing a 646% and 3,000% increase, respectively.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In this episode, host Joe Panettieri and Webroot director of product management Phil Karcher delve into what we know, how "HTTPS" does not automatically equal safety and how MSPs and SMBs (Managed Services Provider and Small- and Mid-Sized Businesses) can stay protected.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Phishing is responsible for a huge number of data breaches, but there are ways to mitigate its success. Learn how in this episode of our Lockdown Lessons podcast series.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Listen to the Below Podcast Now!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
         No single layer can defend you or your clients from all cyber threats. But effective security shouldn’t be complicated. You have a business to grow.
         &#xD;
  &lt;div&gt;&#xD;
    &lt;ul&gt;&#xD;
      &lt;li&gt;&#xD;
        
            Backup endpoints, servers and Microsoft 365 data with enterprise-grade backup.
           &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
            Train your employees or clients to recognize threats with security awareness training.
           &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Block dangerous websites at the network level that expose them to the cyber risks, known and unknown.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
            Protect against malware, phishing and other cyber threats with a layered defense.
           &#xD;
      &lt;/li&gt;&#xD;
      &lt;li&gt;&#xD;
        
            Restore your data easily if the unfortunate happens to get back on your feet quickly.
           &#xD;
      &lt;/li&gt;&#xD;
    &lt;/ul&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Each solution was purpose-built for businesses like yours, making them easy to install, run and manage.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Webroot Real-Time Anti-Phishing Shield is baked into our endpoint security. Help protect your system by implementing it and other Webroot business solutions today. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/c857c444/dms3rep/multi/LockDown+Lessons+Image.jpg" length="27792" type="image/jpeg" />
      <pubDate>Thu, 21 Oct 2021 03:58:21 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/sharp-surge-in-phishing-how-to-protect-your-business</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/c857c444/dms3rep/multi/LockDown+Lessons+Image.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/b2406be9/dms3rep/multi/LockdownLessons.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>COVID-19 CLICKS  How Phishing Capitalized on a Global Crisis</title>
      <link>https://www.maxxcomputers.net/covid-19-clicks-how-phishing-capitalized-on-a-global-crisis</link>
      <description>Phishing is a type of online scam where criminals impersonate legitimate organizations via email, text message, advertisement or other means in order to steal sensitive information. This is usually done by including a link that will appear to take you to the company’s website to fill in your information – but the website is a clever fake and the information you provide goes straight to the crooks behind the scam.</description>
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;span&gt;&#xD;
    
          A Global Review say that 3 in 10 global respondents are certain they’ve clicked a phishing link in the past year. Among Americans, it’s 1 in 3.
         &#xD;
  &lt;/span&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Phishing is a type of online scam where criminals impersonate legitimate organizations via email, text message, advertisement or other means in order to steal sensitive information. This is usually done by including a link that will appear to take you to the company’s website to fill in your information – but the website is a clever fake and the information you provide goes straight to the crooks behind the scam. With the massive increase in remote work due to COVID-19, there has also been an explosion in cybercriminal activity like phishing. Not only is phishing still prevalent, but it continues to be on the rise.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We surveyed 7,000 office workers around the globe on their understanding of phishing, their email and click habits, and how their online lives have changed during the COVID-19 pandemic. We then worked with Dr. Prashanth Rajivan, assistant professor at the University of Washington and expert in human behavior and technology, to get his take on why phishing still works.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Download your free copy of our new report, COVID-19 Clicks: How Phishing Capitalized on a Global Crisis, to see the whole story and get actionable tips for how businesses and individuals can stay resilient against phishing attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg" length="265831" type="image/jpeg" />
      <pubDate>Tue, 21 Sep 2021 18:54:36 GMT</pubDate>
      <guid>https://www.maxxcomputers.net/covid-19-clicks-how-phishing-capitalized-on-a-global-crisis</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/md/pexels/dms3rep/multi/security-protection-anti-virus-software-60504.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Make the most of the season by following these simple guidelines</title>
      <link>https://www.maxxcomputers.net/make-the-most-of-the-season-by-following-these-simple-guidelines</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    The new season is a great reason to make and keep resolutions. Whether it’s eating right or cleaning out the garage, here are some tips for making and keeping resolutions.
  
                    &#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Make a list
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Lists are great ways to stay on track. Write down some big things you want to accomplish and some smaller things, too.
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Check the list regularly
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Don’t forget to check in and see how you’re doing. Just because you don’t achieve the big goals right away doesn’t mean you’re not making progress.
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Reward yourself
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    When you succeed in achieving a goal, be it a big one or a small one, make sure to pat yourself on the back.
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Think positively
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Positive thinking is a major factor in success. So instead of mulling over things that didn’t go quite right, remind yourself of things that did.
  
                    &#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/drinks_afternoon.jpg" length="353428" type="image/jpeg" />
      <pubDate>Tue, 21 Sep 2021 17:28:20 GMT</pubDate>
      <author>WCAdmin@marketamerica.com (Market America WebCenters)</author>
      <guid>https://www.maxxcomputers.net/make-the-most-of-the-season-by-following-these-simple-guidelines</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irt-cdn.multiscreensite.com/c857c444/dmtmpl/dms3rep/multi/drinks_afternoon.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/drinks_afternoon.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Keep in touch with site visitors and boost loyalty</title>
      <link>https://www.maxxcomputers.net/keep-in-touch-with-site-visitors-and-boost-loyalty</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    There are so many good reasons to communicate with site visitors. Tell them about sales and new products or update them with tips and information.
  
                    &#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Here are some reasons to make blogging part of your regular routine.
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
      Blogging is an easy way to engage with site visitors
    
                      &#xD;
      &lt;/b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/p&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Writing a blog post is easy once you get the hang of it. Posts don’t need to be long or complicated. Just write about what you know, and do your best to write well.
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Show customers your personality
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    When you write a blog post, you can really let your personality shine through. This can be a great tool for showing your distinct personality.
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Blogging is a terrific form of communication
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Blogs are a great communication tool. They tend to be longer than social media posts, which gives you plenty of space for sharing insights, handy tips and more.
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    It’s a great way to support and boost SEO
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Search engines like sites that regularly post fresh content, and a blog is a great way of doing this. With relevant metadata for every post so  search engines can find your content.
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Drive traffic to your site
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Every time you add a new post, people who have subscribed to it will have a reason to come back to your site. If the post is a good read, they’ll share it with others, bringing even more traffic!
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Blogging is free
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Maintaining a blog on your site is absolutely free. You can hire bloggers if you like or assign regularly blogging tasks to everyone in your company.
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    A natural way to build your brand
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    A blog is a wonderful way to build your brand’s distinct voice. Write about issues that are related to your industry and your customers.
  
                    &#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/man_walking_street.jpg" length="285531" type="image/jpeg" />
      <pubDate>Tue, 21 Sep 2021 17:28:20 GMT</pubDate>
      <author>WCAdmin@marketamerica.com (Market America WebCenters)</author>
      <guid>https://www.maxxcomputers.net/keep-in-touch-with-site-visitors-and-boost-loyalty</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/man_walking_street.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/man_walking_street.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Tips for writing great posts that increase your site traffic</title>
      <link>https://www.maxxcomputers.net/tips-for-writing-great-posts-that-increase-your-site-traffic</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Write about something you know. If you don’t know much about a specific topic that will interest your readers, invite an expert to write about it.
  
                    &#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irt-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/desktop/photo-1455849318743-b2233052fcff.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Speak to your audience
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    You know your audience better than anyone else, so keep them in mind as you write your blog posts. Write about things they care about. If you have a company Facebook page, look here to find topics to write about
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Take a few moments to plan your post
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Once you have a great idea for a post, write the first draft. Some people like to start with the title and then work on the paragraphs. Other people like to start with subtitles and go from there. Choose the method that works for you.
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Don’t forget to add images
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Be sure to include a few high-quality images in your blog. Images break up the text and make it more readable. They can also convey emotions or ideas that are hard to put into words.
  
                    &#xD;
    &lt;/p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    Edit carefully before posting
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
    Once you’re happy with the text, put it aside for a day or two, and then re-read it. You’ll probably find a few things you want to add, and a couple more that you want to remove. Have a friend or colleague look it over to make sure there are no mistakes. When your post is error-free, set it up in your blog and publish.
  
                    &#xD;
    &lt;/p&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/woman_coffee_street.jpg" length="417830" type="image/jpeg" />
      <pubDate>Tue, 21 Sep 2021 17:28:20 GMT</pubDate>
      <author>WCAdmin@marketamerica.com (Market America WebCenters)</author>
      <guid>https://www.maxxcomputers.net/tips-for-writing-great-posts-that-increase-your-site-traffic</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/woman_coffee_street.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irt-cdn.multiscreensite.com/md/dmtmpl/dms3rep/multi/woman_coffee_street.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
