<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; tkc.io</title>
	<atom:link href="https://tkc.io/category/secutiry/feed/" rel="self" type="application/rss+xml" />
	<link>https://tkc.io</link>
	<description>Managed IT Consulting and Website Development</description>
	<lastBuildDate>Wed, 08 Apr 2026 14:13:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://tkc.io/wp-content/uploads/2022/03/cropped-tkcfav-32x32.png</url>
	<title>Security &#8211; tkc.io</title>
	<link>https://tkc.io</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mac Malware Sites</title>
		<link>https://tkc.io/2026/04/08/mac-malware-sites/</link>
		
		<dc:creator><![CDATA[TKC Admin]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 14:11:56 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">https://tkc.io/?p=8529</guid>

					<description><![CDATA[AppleInsider&#8217;s Andrew Orr has an informative article on a new way to get your Mac infected. This newer variant is trying to catch users off-guard by delivering its payload via Mac Script Editor. Mac users can avoid this technique by recognizing that macOS doesn&#8217;t rely on browser-triggered scripts for maintenance tasks. Websites that claim they [&#8230;]
<p><a href="https://tkc.io/2026/04/08/mac-malware-sites/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>What is a BEC Attack and Why Should You Care?</title>
		<link>https://tkc.io/2023/05/23/what-is-a-bec-attack-and-why-should-you-care/</link>
		
		<dc:creator><![CDATA[TKC Admin]]></dc:creator>
		<pubDate>Tue, 23 May 2023 17:01:56 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://tkc.io/?p=6429</guid>

					<description><![CDATA[BEC stands for Business Email Compromise. And we promise that it&#8217;s the last acronym that we&#8217;ll us in this blog post. Everyday, spam filters deal with an onslaught of emails that are either: a) Definitely fake b) Possibly legitimate That&#8217;s it. There is no &#8220;100% bonafide&#8221; option here. Email is always suspect, when it comes [&#8230;]
<p><a href="https://tkc.io/2023/05/23/what-is-a-bec-attack-and-why-should-you-care/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Beware of Fake Support</title>
		<link>https://tkc.io/2022/05/27/beware-of-fake-support/</link>
		
		<dc:creator><![CDATA[TKC Admin]]></dc:creator>
		<pubDate>Fri, 27 May 2022 13:30:43 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[TKC]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technical support]]></category>
		<guid isPermaLink="false">https://tkc.io/?p=6265</guid>

					<description><![CDATA[CEO scams, phishing emails, fake texts&#8230;the companies that we work with are always on the lookout. But managed service providers can be part of the problem. We&#8217;ve been diligent about letting users know but it pays to reinforce a couple of our rules. These are the things that we&#8217;ll never do. We&#8217;ll never email, message [&#8230;]
<p><a href="https://tkc.io/2022/05/27/beware-of-fake-support/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Cybersecurity: 5 Weaknesses That Hackers Exploit</title>
		<link>https://tkc.io/2021/12/01/cybersecurity-5-weaknesses-that-hackers-exploit/</link>
		
		<dc:creator><![CDATA[TKC Admin]]></dc:creator>
		<pubDate>Wed, 01 Dec 2021 15:39:45 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://tkc.io/?p=5984</guid>

					<description><![CDATA[NOT AS EASY AS &#8220;SET IT AND FORGET IT&#8221; Keeping your business safe isn&#8217;t a one-time thing and it&#8217;s not just a matter of adding firewalls and antivirus software. Cybercriminals take advantage of all sorts of vulnerabilities in your company. Some are digital. Some are human. Ransomware meltdowns have grabbed headlines but a lot of businesses [&#8230;]
<p><a href="https://tkc.io/2021/12/01/cybersecurity-5-weaknesses-that-hackers-exploit/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Remote Users and Security Updates</title>
		<link>https://tkc.io/2020/09/24/remote-users-and-security-updates/</link>
		
		<dc:creator><![CDATA[TKC Admin]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 15:54:20 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Remote Work]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[it support]]></category>
		<category><![CDATA[remote workers]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://tkc.io/?p=5829</guid>

					<description><![CDATA[With everyone settling into work from their home digs, it’s important to make sure that the attitudes surrounding good computer security aren't falling by the wayside.
<p><a href="https://tkc.io/2020/09/24/remote-users-and-security-updates/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>We&#8217;ve Got Some Fancy Masks</title>
		<link>https://tkc.io/2020/04/04/weve-got-some-fancy-masks/</link>
		
		<dc:creator><![CDATA[TKC Admin]]></dc:creator>
		<pubDate>Sat, 04 Apr 2020 18:32:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[TKC]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[it support]]></category>
		<category><![CDATA[remote workers]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://tkc.io/?p=5686</guid>

					<description><![CDATA[Our confinement hasn&#8217;t changed our approach to technical support. We try to do it with a little flair.
<p><a href="https://tkc.io/2020/04/04/weve-got-some-fancy-masks/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Coronavirus IT Update &#8211; Remote Workers and Covid-19</title>
		<link>https://tkc.io/2020/03/16/coronavirus-it-update-coping-with-covid-19/</link>
		
		<dc:creator><![CDATA[TKC Admin]]></dc:creator>
		<pubDate>Mon, 16 Mar 2020 18:14:27 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[TKC]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[it support]]></category>
		<category><![CDATA[remote workers]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://tkc.io/?p=5660</guid>

					<description><![CDATA[Coronavirus: what have learned these first few weeks.
<p><a href="https://tkc.io/2020/03/16/coronavirus-it-update-coping-with-covid-19/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Secure Passwords</title>
		<link>https://tkc.io/2018/06/26/secure-passwords/</link>
		
		<dc:creator><![CDATA[TKC Admin]]></dc:creator>
		<pubDate>Tue, 26 Jun 2018 16:36:23 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://tkc.io/?p=5318</guid>

					<description><![CDATA[Okay. I think we&#8217;re good. If you&#8217;d like to give your passwords are checkup, the cloud password management company Bitwarden has a fun site for you. Of note, the password you enter isn&#8217;t sent to their site. It uses computational analysis in the browser.
<p><a href="https://tkc.io/2018/06/26/secure-passwords/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>What Happened to Our Facebook Page?</title>
		<link>https://tkc.io/2018/03/20/delete-facebook/</link>
		
		<dc:creator><![CDATA[TKC Admin]]></dc:creator>
		<pubDate>Tue, 20 Mar 2018 20:21:24 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[TKC]]></category>
		<category><![CDATA[facebook]]></category>
		<guid isPermaLink="false">https://tkc.io/?p=5284</guid>

					<description><![CDATA[Years ago, we didn&#8217;t have a Facebook page. In 2017, we started an experiment. Basically, we wanted to research the traffic type and influence that Facebook had on our business. As a security driven company, this was risky. The goal was simple: see if, within 12 months, what appreciable change Facebook had (positive or negative). [&#8230;]
<p><a href="https://tkc.io/2018/03/20/delete-facebook/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Smishing: It&#8217;s Phishing for Your Phone.</title>
		<link>https://tkc.io/2017/07/10/smishing-phishing-phone/</link>
		
		<dc:creator><![CDATA[TKC Admin]]></dc:creator>
		<pubDate>Mon, 10 Jul 2017 15:43:37 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://tkc.io/?p=5079</guid>

					<description><![CDATA[Next time you get an SMS, you might want to think twice before clicking a link in it. SMS-based phishing has been on the uptick. It&#8217;s email brethren often hits your spam filter but who&#8217;s filtering your text messages? Smishing often takes the form of an official looking password reset, account notification or security alert. [&#8230;]
<p><a href="https://tkc.io/2017/07/10/smishing-phishing-phone/">Source</a></p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
