<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Security Archives - Tech Trends</title>
	<atom:link href="https://techtrends.tech/tag/data-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://techtrends.tech/tag/data-security/</link>
	<description>Tech Trends</description>
	<lastBuildDate>Fri, 20 Mar 2026 05:01:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Securing Hotel Booking Systems</title>
		<link>https://techtrends.tech/cybersecurity/hotel-phishing-cybersecurity/</link>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 20 Mar 2026 03:45:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Industry Trends]]></category>
		<category><![CDATA[IOT Tech]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Hospitality Tech]]></category>
		<category><![CDATA[Hotel Management Systems]]></category>
		<category><![CDATA[Phishing Attacks]]></category>
		<guid isPermaLink="false">https://techtrends.tech/?p=17103</guid>

					<description><![CDATA[<p>Phishing attacks targeting hotel systems are rising sharply, putting guest data, operations, and brand trust at risk across the hospitality &#8230; <a class="kt-excerpt-readmore" href="https://techtrends.tech/cybersecurity/hotel-phishing-cybersecurity/" aria-label="Securing Hotel Booking Systems">Read More</a></p>
<p>The post <a href="https://techtrends.tech/cybersecurity/hotel-phishing-cybersecurity/">Securing Hotel Booking Systems</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 data-start="451" data-end="600"><em data-start="451" data-end="600">Phishing attacks targeting hotel systems are rising sharply, putting guest data, operations, and brand trust at risk across the hospitality sector.</em></h1>
<p data-start="602" data-end="757"><strong data-start="602" data-end="757">Cybercriminals are exploiting booking platforms and property management systems—forcing hotels to rethink how they defend their digital infrastructure.</strong></p>
<hr data-start="759" data-end="762" />
<h2 data-start="764" data-end="798">A Growing Threat to Hospitality</h2>
<p data-start="800" data-end="994">Hospitality businesses are facing a surge in phishing attacks, with cybercriminals increasingly targeting hotel property management systems (PMS), booking platforms, and internal communications.</p>
<p data-start="996" data-end="1214">According to industry experts, attackers are using increasingly sophisticated methods to trick staff into revealing login credentials or installing malicious software—often by impersonating trusted systems or partners.</p>
<p data-start="1216" data-end="1300">Nicola Longfield, General Manager for Accommodation at Access Hospitality, explains:</p>
<blockquote data-start="1302" data-end="1552">
<p data-start="1304" data-end="1552">“Cybercriminals are actively targeting hotel property management systems, email systems, and booking channels… sending emails that appear to be from legitimate sources designed to trick staff into entering login information or downloading malware.”</p>
</blockquote>
<p data-start="1554" data-end="1646">These attacks are not random—they are highly targeted and tailored to hospitality workflows.</p>
<hr data-start="1648" data-end="1651" />
<h2 data-start="1653" data-end="1689">How Phishing Attacks Are Evolving</h2>
<p data-start="1691" data-end="1816">Unlike traditional phishing attempts, today’s attacks are designed to closely mimic real operational scenarios within hotels.</p>
<h3 data-start="1818" data-end="1845">Common tactics include:</h3>
<ul data-start="1847" data-end="2121">
<li data-start="1847" data-end="1896">
<p data-start="1849" data-end="1896">Fake login pages that replicate hotel systems</p>
</li>
<li data-start="1897" data-end="1949">
<p data-start="1899" data-end="1949">Lookalike domain names designed to deceive staff</p>
</li>
<li data-start="1950" data-end="2005">
<p data-start="1952" data-end="2005">Google Ads used to promote fraudulent login portals</p>
</li>
<li data-start="2006" data-end="2068">
<p data-start="2008" data-end="2068">Emails impersonating booking platforms or internal systems</p>
</li>
<li data-start="2069" data-end="2121">
<p data-start="2071" data-end="2121">Urgent messaging around payments or reservations</p>
</li>
</ul>
<p data-start="2123" data-end="2190">Jan Hejny, CEO at HotelTime, highlights the growing sophistication:</p>
<blockquote data-start="2192" data-end="2310">
<p data-start="2194" data-end="2310">“Phishing attacks are becoming far more targeted and contextual… often mimicking real payment or booking scenarios.”</p>
</blockquote>
<p data-start="2312" data-end="2445">Once attackers gain access, the consequences escalate quickly—ranging from fraudulent guest communications to full system compromise.</p>
<hr data-start="2447" data-end="2450" />
<h2 data-start="2452" data-end="2474">The Business Impact</h2>
<p data-start="2476" data-end="2515">The risks extend far beyond IT systems.</p>
<h3 data-start="2517" data-end="2552">Potential consequences include:</h3>
<ul data-start="2554" data-end="2702">
<li data-start="2554" data-end="2580">
<p data-start="2556" data-end="2580">Compromised guest data</p>
</li>
<li data-start="2581" data-end="2618">
<p data-start="2583" data-end="2618">Fraudulent booking communications</p>
</li>
<li data-start="2619" data-end="2639">
<p data-start="2621" data-end="2639">Financial losses</p>
</li>
<li data-start="2640" data-end="2666">
<p data-start="2642" data-end="2666">Operational disruption</p>
</li>
<li data-start="2667" data-end="2702">
<p data-start="2669" data-end="2702">Long-term damage to brand trust</p>
</li>
</ul>
<p data-start="2704" data-end="2754">As Diego Baldini, CISO of <a href="https://www.theaccessgroup.com/en-gb/hotels/?utm_medium=referral&amp;utm_source=pr&amp;utm_campaign=FY26-P08-HOS-CDP-TOF-Resource-Security">The Access Group</a>, notes:</p>
<blockquote data-start="2756" data-end="2901">
<p data-start="2758" data-end="2901">“These attacks can result in compromised hotel accounts, fraudulent communications sent to guests, and serious reputational or financial harm.”</p>
</blockquote>
<hr data-start="2903" data-end="2906" />
<h2 data-start="2908" data-end="2957">Industry Response: Collaboration and Awareness</h2>
<p data-start="2959" data-end="3092">Major hospitality tech providers—including Guestline, Mews, HotelTime, and Planet—are actively working to combat the rise in attacks.</p>
<p data-start="3094" data-end="3206">Richard Johnson, Chief Information Security Officer at Planet, emphasizes the importance of shared intelligence:</p>
<blockquote data-start="3208" data-end="3360">
<p data-start="3210" data-end="3360">“Fraud is a full-time operation… by sharing intelligence quickly and raising collective awareness, we continually make it harder for them to succeed.”</p>
</blockquote>
<p data-start="3362" data-end="3496">This highlights a broader shift: cybersecurity in hospitality is becoming a <strong data-start="3438" data-end="3467">collective responsibility</strong>, not just an individual one.</p>
<hr data-start="3498" data-end="3501" />
<h2 data-start="3503" data-end="3539">How Hotels Can Protect Themselves</h2>
<p data-start="3541" data-end="3619">Experts point to several immediate actions that can significantly reduce risk.</p>
<h3 data-start="3621" data-end="3667">1. Adopt Phishing-Resistant MFA (Passkeys)</h3>
<p data-start="3669" data-end="3735">Passkey-based authentication is emerging as the <strong data-start="3717" data-end="3734">gold standard</strong>.</p>
<ul data-start="3737" data-end="3961">
<li data-start="3737" data-end="3795">
<p data-start="3739" data-end="3795">Creates a cryptographic link to legitimate login pages</p>
</li>
<li data-start="3796" data-end="3849">
<p data-start="3798" data-end="3849">Prevents credential theft even if phishing occurs</p>
</li>
<li data-start="3850" data-end="3905">
<p data-start="3852" data-end="3905">Eliminates reliance on passwords and one-time codes</p>
</li>
<li data-start="3906" data-end="3961">
<p data-start="3908" data-end="3961">Supports biometric or hardware-based authentication</p>
</li>
</ul>
<hr data-start="3963" data-end="3966" />
<h3 data-start="3968" data-end="4008">2. Train Staff and Reduce Human Risk</h3>
<p data-start="4010" data-end="4056">Human error remains the primary attack vector.</p>
<ul data-start="4058" data-end="4237">
<li data-start="4058" data-end="4091">
<p data-start="4060" data-end="4091">Bookmark official login pages</p>
</li>
<li data-start="4092" data-end="4131">
<p data-start="4094" data-end="4131">Avoid logging in via search engines</p>
</li>
<li data-start="4132" data-end="4182">
<p data-start="4134" data-end="4182">Identify suspicious emails and urgent requests</p>
</li>
<li data-start="4183" data-end="4237">
<p data-start="4185" data-end="4237">Encourage immediate reporting of potential threats</p>
</li>
</ul>
<hr data-start="4239" data-end="4242" />
<h3 data-start="4244" data-end="4277">3. Strengthen Access Controls</h3>
<ul data-start="4279" data-end="4387">
<li data-start="4279" data-end="4311">
<p data-start="4281" data-end="4311">Use strong, unique passwords</p>
</li>
<li data-start="4312" data-end="4343">
<p data-start="4314" data-end="4343">Avoid shared login accounts</p>
</li>
<li data-start="4344" data-end="4387">
<p data-start="4346" data-end="4387">Implement role-based access permissions</p>
</li>
</ul>
<hr data-start="4389" data-end="4392" />
<h3 data-start="4394" data-end="4421">4. Keep Systems Updated</h3>
<ul data-start="4423" data-end="4564">
<li data-start="4423" data-end="4459">
<p data-start="4425" data-end="4459">Apply security patches regularly</p>
</li>
<li data-start="4460" data-end="4507">
<p data-start="4462" data-end="4507">Maintain antivirus and firewall protections</p>
</li>
<li data-start="4508" data-end="4564">
<p data-start="4510" data-end="4564">Back up critical systems and test recovery processes</p>
</li>
</ul>
<hr data-start="4566" data-end="4569" />
<h2 data-start="4571" data-end="4594">Why This Matters Now</h2>
<p data-start="4596" data-end="4730">The rise in phishing attacks reflects a broader reality: hospitality is becoming an increasingly attractive target for cybercriminals.</p>
<p data-start="4732" data-end="4766">Hotels sit at the intersection of:</p>
<ul data-start="4768" data-end="4848">
<li data-start="4768" data-end="4794">
<p data-start="4770" data-end="4794">Financial transactions</p>
</li>
<li data-start="4795" data-end="4812">
<p data-start="4797" data-end="4812">Personal data</p>
</li>
<li data-start="4813" data-end="4848">
<p data-start="4815" data-end="4848">Real-time customer interactions</p>
</li>
</ul>
<p data-start="4850" data-end="4914">This makes them uniquely vulnerable—and highly valuable targets.</p>
<hr data-start="4916" data-end="4919" />
<h2 data-start="4921" data-end="4934">Conclusion</h2>
<p data-start="4936" data-end="5050">As phishing attacks grow more sophisticated, hospitality businesses can no longer rely on basic security measures.</p>
<p data-start="5052" data-end="5191">The shift toward phishing-resistant authentication, staff awareness, and proactive system management is no longer optional—it is essential.</p>
<p data-start="5193" data-end="5316">In an industry built on trust and guest experience, cybersecurity is quickly becoming a core pillar of business resilience.</p>
<p>The post <a href="https://techtrends.tech/cybersecurity/hotel-phishing-cybersecurity/">Securing Hotel Booking Systems</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17103</post-id>	</item>
		<item>
		<title>Infographic: Cybersecurity Tips and Best Practices</title>
		<link>https://techtrends.tech/tech-trends/keeping-your-servers-safe-best-practices-infographic/</link>
		
		<dc:creator><![CDATA[Alice]]></dc:creator>
		<pubDate>Thu, 23 Nov 2017 10:36:39 +0000</pubDate>
				<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Infographic]]></category>
		<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Outsourcing Digital Solutions]]></category>
		<category><![CDATA[Server infrastructure security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://techtrends.tech/?p=5906</guid>

					<description><![CDATA[<p>&#160; Protecting your IT Infrastructure is very serious business these days, so how can we best safeguard against cyber threats? &#8230; <a class="kt-excerpt-readmore" href="https://techtrends.tech/tech-trends/keeping-your-servers-safe-best-practices-infographic/" aria-label="Infographic: Cybersecurity Tips and Best Practices">Read More</a></p>
<p>The post <a href="https://techtrends.tech/tech-trends/keeping-your-servers-safe-best-practices-infographic/">Infographic: Cybersecurity Tips and Best Practices</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><em><strong>Protecting your IT Infrastructure is very serious business these days, so how can we best safeguard against cyber threats?</strong></em></p>
<p>With this in mind, the helpful folks from <a href="http://transcosmos.co.uk">Transcosmos Information Systems</a> put together a few best practice tips to keep your IT infrastructure secure. These include:</p>
<hr /><p><em>A secure password is that it must be at least 8 characters long</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=A%20secure%20password%20is%20that%20it%20must%20be%20at%20least%208%20characters%20long&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Control log-in information and regularly change your passwords</strong></h5>
<p>The rule of thumb for a secure password is that it must be at least 8 characters long, combine uppercase and lowercase letters, and at least one number or special character. And Although it’s a bit of a hassle, it is recommended that you change your passwords regularly to keep them secure, preferably every quarter or so.</p>
<hr /><p><em>Change your passwords every quarter or so </em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Change%20your%20passwords%20every%20quarter%20or%20so%20&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Implement two-factor authentication </strong></h5>
<p>Whenever possible, put in place a system that requires more than one form of authentication to grant users access. This means that in addition to a password, you can, for example connect your mobile phone to the server and get it to send you a unique code that you must enter to verify who you are.</p>
<hr /><p><em>Adding additional layers of security is recommended to keep data safe</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Adding%20additional%20layers%20of%20security%20is%20recommended%20to%20keep%20data%20safe&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Store credentials in a secure way</strong></h5>
<p>The best way to avoid data breaches is securing your credentials securely through password hashing. To hash a password means to transform it into a unique value before storing it in your database. Since this is a one-way algorithm, it’s impossible to turn the hashed password back to its original form.</p>
<hr /><p><em>Always have an encrypted back-up of your data</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Always%20have%20an%20encrypted%20back-up%20of%20your%20data&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Delete users and groups you don’t use</strong></h5>
<p>Regularly check who has access to your servers. Are they still around? Things change and so should your permissions.</p>
<hr /><p><em>Keep your firewall and virus scanning software up-to-date</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Keep%20your%20firewall%20and%20virus%20scanning%20software%20up-to-date&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Constantly scan for viruses </strong></h5>
<p>To catch viruses early before they have a chance to do any significant damage to your system, you should conduct regular scans and diligently update your antivirus software.</p>
<hr /><p><em>VPNs are your friends where it comes to data security</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=VPNs%20are%20your%20friends%20where%20it%20comes%20to%20data%20security&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Update software and operating systems </strong></h5>
<p>Software is a bit like bread, it’s only great when it’s fresh. You must therefore make sure you keep your infrastructure packages and operating systems updates so they’re in tip-top condition. Regular updates fixes bugs and guarantees there are not gaping holes in your system security.</p>
<hr /><p><em>Security software is a bit like bread, it’s only great when it’s fresh</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Security%20software%20is%20a%20bit%20like%20bread%2C%20it%E2%80%99s%20only%20great%20when%20it%E2%80%99s%20fresh&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Fireproof your firewall </strong></h5>
<p>Having a good firewall is a must for securing your server infrastructure. It provides an extra layer of protection to your system’s inbuilt security features, through which you can control all the different pieces of software or services that you need to expose to the network. Less exposure = less for hackers to get their mitts into.</p>
<hr /><p><em>Firewalls provide an extra layer of protection to your system’s inbuilt security features</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Firewalls%20provide%20an%20extra%20layer%20of%20protection%20to%20your%20system%E2%80%99s%20inbuilt%20security%20features&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>SSH key authentication </strong></h5>
<p>SSH cryptographic keys that contain more bits of data than a typical password, making them more difficult to crack and less vulnerable to attacks. It also saves you having to remember your passwords. Win-win!</p>
<hr /><p><em>SSH cryptographic keys that contain more bits of data than a typical password</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=SSH%20cryptographic%20keys%20that%20contain%20more%20bits%20of%20data%20than%20a%20typical%20password&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Use private networks and VPNs </strong></h5>
<p>Virtual Private Network (VPNs) keeps your browsing secure, and your internal communication private.</p>
<hr /><p><em>Virtual Private Networks keeps your browsing secure and your communication private</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Virtual%20Private%20Networks%20keeps%20your%20browsing%20secure%20and%20your%20communication%20private&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Encrypt, encrypt, encrypt …. </strong></h5>
<p>Encryption &#8211; the process of translating sensitive electronic data into unintelligible code – means that only those with authorized access can access and decipher your data. All the cool kids are doing it.</p>
<hr /><p><em>Encryption is the process of translating sensitive electronic data into unintelligible code</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Encryption%20is%20the%20process%20of%20translating%20sensitive%20electronic%20data%20into%20unintelligible%20code&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Install good security software </strong></h5>
<p>It is worth investing in packages from sources you know and trust rather than trying to cut corners, as these might provide a backdoor through which hackers can access your systems.</p>
<hr /><p><em>Find your vulnerable spots before hackers do</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Find%20your%20vulnerable%20spots%20before%20hackers%20do&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Test your vulnerabilities </strong></h5>
<p>Regular network vulnerability scanning can help you identify weaknesses in your server and address issues before hackers get to them.</p>
<hr /><p><em>If you can afford it, hire a professional to help keep your commercial IT systems secure</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=If%20you%20can%20afford%20it%2C%20hire%20a%20professional%20to%20help%20keep%20your%20commercial%20IT%20systems%20secure&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Keep secure and encrypted backups</strong></h5>
<p>Your data may well get lost or corrupted at some point, and if that happens, you definitely want to have a plan B to allow you to quickly get back on track.</p>
<hr /><p><em>SSH keys also mean you don&#039;t have to remember loads of passwords</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=SSH%20keys%20also%20mean%20you%20don%27t%20have%20to%20remember%20loads%20of%20passwords&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Get a Pro to have your back </strong></h5>
<p>In this increasingly complex security landscape, it pays for companies to have an IT expert on their side to keep on top of security.</p>
<p>&nbsp;</p>
<p><a href="http://transcosmos.co.uk/blog/best-practices-secure-servers-it-infrastructure-infographic/"><img decoding="async" src="http://transcosmos.co.uk/wp-content/uploads/2017/07/Best-Practices-to-Secure-IT-Servers-and-Infrastructure-infographic.png" alt="Best-Practices-to-Secure-IT-Servers-and-Infrastructure-infographic" width="800" border="0" /></a></p>
<p>&nbsp;</p>
<p>Header image attribution: <a href="http://blogtrepreneur.com/tech">blogtrepreneur</a></p>
<p>&nbsp;</p>
<blockquote><p><em>Alice Bonasio is a </em><a href="http://techtrends.tech/vr-consultancy/"><em>VR Consultant</em></a><em> and Tech Trends’ Editor in Chief. She also regularly writes for Fast Company, Ars Technica, Quartz, Wired and others. </em><a href="https://www.linkedin.com/in/alicebonasio/"><em>Connect with her on LinkedIn</em></a><em> and follow </em><a href="https://twitter.com/alicebonasio"><em>@alicebonasio</em></a><em> and </em><a href="https://twitter.com/techtrends_tech">@techtrends_tech</a><em> on Twitter.</em></p></blockquote>
<p>The post <a href="https://techtrends.tech/tech-trends/keeping-your-servers-safe-best-practices-infographic/">Infographic: Cybersecurity Tips and Best Practices</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5906</post-id>	</item>
	</channel>
</rss>
