<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>Information and Cyber Security Consulting Blog</title>
    <link>https://siconsultblog.dudaone.com</link>
    <description />
    <atom:link href="https://siconsultblog.dudaone.com/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>How
Can An ELV Design and Security Consultant Help</title>
      <link>https://siconsultblog.dudaone.com/how-can-an-elv-design-and-security-consultant-help</link>
      <description>The script for business owners in the modern world is simply cut out, i.e. they will need to ensure that they are backed with professional assistance 24/7. Especially when markets are firm and rigid in nature like those of KSA, moving on with a fluked or weak approach where would not work to be honest.</description>
      <enclosure url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/How%20Can%20An%20ELV%20Design%20and%20Security%20Consultant%20Help-800x532.jpg" length="84937" type="image/jpeg" />
      <pubDate>Sat, 13 May 2017 09:48:59 GMT</pubDate>
      <author>john.pbtm@gmail.com</author>
      <guid>https://siconsultblog.dudaone.com/how-can-an-elv-design-and-security-consultant-help</guid>
      <g-custom:tags type="string">Security Consultant Help,ELV Design,Security,Consultant,ELV,ELV  Security Design,Security Design,Siconsult</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/How%20Can%20An%20ELV%20Design%20and%20Security%20Consultant%20Help-800x532.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Logic Of ISO 27001 And How Does Information Security Work? </title>
      <link>https://siconsultblog.dudaone.com/logic-of-iso-27001-and-how-does-information-security-work</link>
      <description>If you are working in an IT department of a company, you will second me when I say that data loss or other incidents do not always happen just because a system may have crashed, it is actually the way users (staff members) usually deal with the systems, means wrongly in many cases.</description>
      <enclosure url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Logic%20Of%20ISO%2027001%20And%20How%20Does%20Information%20Security%20Work-960x320.jpg" length="94321" type="image/jpeg" />
      <pubDate>Tue, 09 May 2017 08:14:26 GMT</pubDate>
      <author>john.pbtm@gmail.com</author>
      <guid>https://siconsultblog.dudaone.com/logic-of-iso-27001-and-how-does-information-security-work</guid>
      <g-custom:tags type="string">Information Security Work,Information Security,Security Work,SiConsult,Data,ISO 27001,Cyber Security,data security,Data safety</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Logic%20Of%20ISO%2027001%20And%20How%20Does%20Information%20Security%20Work-960x320.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>What Are The Don’ts Of
Control Room Design?</title>
      <link>https://siconsultblog.dudaone.com/what-are-the-donts-of-control-room-design</link>
      <description>Terrorism, robbery and many other accidents like this are the main concerns due to which we consider security as an important aspect of this era. The design of the control room from where the security matters are watched also holds the key to better protection from such accidents.
It is important for an organization to give importance to the design of the control room. If it is designed well, according to the defined modern norms then the chances to remain safe from many accidents increases a great deal.</description>
      <enclosure url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/CCTV%20Control%20Room%20Design-1200x794.jpg" length="152172" type="image/jpeg" />
      <pubDate>Mon, 01 May 2017 10:18:36 GMT</pubDate>
      <author>john.pbtm@gmail.com</author>
      <guid>https://siconsultblog.dudaone.com/what-are-the-donts-of-control-room-design</guid>
      <g-custom:tags type="string">CCTV Control Room Design,CCTV,Control Room Design,CCTV Room,Control Room,SiConsult,Security,Information Security,Design Control Room</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/CCTV%20Control%20Room%20Design-1200x794.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>What Are The Filtering Types Of Firewall?</title>
      <link>https://siconsultblog.dudaone.com/what-are-the-filtering-types-of-firewall</link>
      <description>Firewalls are performing their operations for a single purpose that is providing protection to a whole network. As networks are of different structures and none of their purposes are common, the different forms and types of firewalls and their dissimilarity of filtration mechanisms are available.</description>
      <enclosure url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Firewall%20Management-490x262.jpg" length="21387" type="image/jpeg" />
      <pubDate>Thu, 13 Apr 2017 07:45:25 GMT</pubDate>
      <author>john.pbtm@gmail.com</author>
      <guid>https://siconsultblog.dudaone.com/what-are-the-filtering-types-of-firewall</guid>
      <g-custom:tags type="string">Firewall Security Management,Firewall Security,Firewall Management,Firewall,Security Management,Types Of Firewall</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Firewall%20Management-490x262.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>2017 Comes With 14 New Threat Trends</title>
      <link>https://siconsultblog.dudaone.com/2017-comes-with-14-new-threat-trends</link>
      <description>A report about the threat prediction released by Intel security has identified 14 threat trends for the year 2017, other things include critical developments made for the safety of cloud technology and the internet of things (IoT), and also the six challenges to be solved that are faced by the cyber safety industry.</description>
      <enclosure url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Managed%20Security%20Services%20UK_eYJ7cNBdRWyTn4bAqqgT-623x410.jpg" length="57537" type="image/jpeg" />
      <pubDate>Mon, 10 Apr 2017 10:53:50 GMT</pubDate>
      <author>john.pbtm@gmail.com</author>
      <guid>https://siconsultblog.dudaone.com/2017-comes-with-14-new-threat-trends</guid>
      <g-custom:tags type="string">Managed Security Services UK,Managed Security,Security Services in UK,SiConsult,Security Services</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Managed%20Security%20Services%20UK_eYJ7cNBdRWyTn4bAqqgT-623x410.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Which Steps Managed Security Services Are Comprised
Of?</title>
      <link>https://siconsultblog.dudaone.com/which-steps-managed-security-services-are-comprised-of</link>
      <description>It is really important for all the multinational and big business firms to opt the Managed Security Services for the better protection of their IT network. The Short form for this service normally everyone is aware about, is MSS’s. In this article, we will put emphasis on the major aspects which are involved in it to ensure the security of any network.</description>
      <enclosure url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Managed%20Security%20Services%20Oman-750x421.jpg" length="37528" type="image/jpeg" />
      <pubDate>Fri, 31 Mar 2017 11:34:05 GMT</pubDate>
      <author>john.pbtm@gmail.com</author>
      <guid>https://siconsultblog.dudaone.com/which-steps-managed-security-services-are-comprised-of</guid>
      <g-custom:tags type="string">Managed Security Services Oman,Managed Security,Security Services in Oman,SiConsult,Information Security,IT Network Security,Security Information Management</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Managed%20Security%20Services%20Oman-750x421.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Information Security! A Step To Better Security
Hygiene</title>
      <link>https://siconsultblog.dudaone.com/information-security-a-step-to-better-security-hygiene</link>
      <description />
      <enclosure url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Information%20Security%20Consulting-852x480.jpg" length="48579" type="image/jpeg" />
      <pubDate>Wed, 22 Mar 2017 15:38:56 GMT</pubDate>
      <author>john.pbtm@gmail.com</author>
      <guid>https://siconsultblog.dudaone.com/information-security-a-step-to-better-security-hygiene</guid>
      <g-custom:tags type="string">Information Security Consulting,Information Security,Security</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Information%20Security%20Consulting-852x480.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Risk Of Cyber Attacks
On Organizations?</title>
      <link>https://siconsultblog.dudaone.com/risk-of-cyber-attacks-on-organizations</link>
      <description>The latest survey shows that those countries which are wealthier at mostly in the sight for cyber-attacks. Because from these countries the chances of becoming rich by commencing these attacks are more than anywhere else.</description>
      <enclosure url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Cyber%20Security%20UK-700x411.jpg" length="104606" type="image/jpeg" />
      <pubDate>Wed, 15 Mar 2017 12:34:37 GMT</pubDate>
      <author>john.pbtm@gmail.com</author>
      <guid>https://siconsultblog.dudaone.com/risk-of-cyber-attacks-on-organizations</guid>
      <g-custom:tags type="string">Cyber Security UK,SiConsult,Cyber Attacks,Cyber Security,Information Security,Cyber</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Cyber%20Security%20UK-700x411.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Proper
Design Of Control Room And Importance Of Lighting</title>
      <link>https://siconsultblog.dudaone.com/proper-design-of-control-room-and-importance-of-lighting</link>
      <description />
      <enclosure url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Control%20Room%20Design-3357x1848.jpg" length="789944" type="image/jpeg" />
      <pubDate>Wed, 08 Mar 2017 07:56:38 GMT</pubDate>
      <author>john.pbtm@gmail.com</author>
      <guid>https://siconsultblog.dudaone.com/proper-design-of-control-room-and-importance-of-lighting</guid>
      <g-custom:tags type="string">Control Room Design,SiConsult,Control Room,CCTV Control Room System,CCTV System</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Control%20Room%20Design-3357x1848.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Why Is Everyone Talking About Patch Management Services?</title>
      <link>https://siconsultblog.dudaone.com/why-is-everyone-talking-about-patch-management-services</link>
      <description>A person who uses a PC is used to with the irregular pop-up messages when he is operating system. In each release Windows has tried to make it less unobtrusive as far as updates go. It gives one numerous alternatives for dealing with updates ranging from letting one know when updates are accessible, downloading updates and letting one know when they are ready to install and the full auto-pilot mode where it downloads and installs the updates without any user interaction.</description>
      <enclosure url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/patch-management-505x376.png" length="13909" type="image/png" />
      <pubDate>Tue, 28 Feb 2017 14:13:05 GMT</pubDate>
      <author>john.pbtm@gmail.com</author>
      <guid>https://siconsultblog.dudaone.com/why-is-everyone-talking-about-patch-management-services</guid>
      <g-custom:tags type="string">Managed Security Services UK,SiConsult,Patch Management,Information Security Services,Cyber Security Consultant,Security System Design</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/patch-management-505x376.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Skills That You Can Learn From Information Security Course</title>
      <link>https://siconsultblog.dudaone.com/skills-that-you-can-learn-from-information-security-course</link>
      <description />
      <enclosure url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Information%20Security%20Dubai_GKH9J8tTKeYwzC076IwJ-777x437.jpg" length="95723" type="image/jpeg" />
      <pubDate>Mon, 27 Feb 2017 12:59:27 GMT</pubDate>
      <author>john.pbtm@gmail.com</author>
      <guid>https://siconsultblog.dudaone.com/skills-that-you-can-learn-from-information-security-course</guid>
      <g-custom:tags type="string">Information Security Dubai,Information Security,Security Services,SiConsult,Cyber Security,Manged Security Services</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/971cd785/dms3rep/multi/Information%20Security%20Dubai_GKH9J8tTKeYwzC076IwJ-777x437.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
  </channel>
</rss>
