<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IronKey.net.nz &#187; ben</title>
	<atom:link href="https://www.ironkey.net.nz/author/ben/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ironkey.net.nz</link>
	<description>Buy Online – IronKey</description>
	<lastBuildDate>Sun, 23 Jun 2019 06:15:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.2</generator>
	<item>
		<title>How Imation powered by IronKey is securing the mobile workforce</title>
		<link>https://www.ironkey.net.nz/2013/02/11/how-imation-powered-by-ironkey-is-securing-the-mobile-workforce/</link>
		<comments>https://www.ironkey.net.nz/2013/02/11/how-imation-powered-by-ironkey-is-securing-the-mobile-workforce/#comments</comments>
		<pubDate>Mon, 11 Feb 2013 23:04:22 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[imation]]></category>
		<category><![CDATA[ironkey]]></category>
		<category><![CDATA[mobile workforce]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=1410</guid>
		<description><![CDATA[<p>Imation have created a video outlining important aspects of mobile security for the workforce which you can watch below. If you have any questons about securing your mobile workforce please make an enquiry.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2013/02/11/how-imation-powered-by-ironkey-is-securing-the-mobile-workforce/">How Imation powered by IronKey is securing the mobile workforce</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Imation have created a video outlining important aspects of mobile security for the workforce which you can watch below.</p>
<p><iframe width="560" height="315" src="http://www.youtube.com/embed/7HWMMyAgdTc?rel=0" frameborder="0" allowfullscreen></iframe></p>
<p><a href="http://www.ironkey.net.nz/make-an-enquiry/">If you have any questons about securing your mobile workforce please make an enquiry</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2013/02/11/how-imation-powered-by-ironkey-is-securing-the-mobile-workforce/">How Imation powered by IronKey is securing the mobile workforce</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2013/02/11/how-imation-powered-by-ironkey-is-securing-the-mobile-workforce/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What&#8217;s the difference between Basic S250 &amp; D250 devices?</title>
		<link>https://www.ironkey.net.nz/2013/02/06/whats-the-difference-between-basic-s250-d250-devices/</link>
		<comments>https://www.ironkey.net.nz/2013/02/06/whats-the-difference-between-basic-s250-d250-devices/#comments</comments>
		<pubDate>Wed, 06 Feb 2013 01:45:05 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[ironkey basic]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=1405</guid>
		<description><![CDATA[<p>We are often asked what the difference between the S250 &#038; D250 devices are. For the technical rundown you can check out our specifications page. Imation describe the differences as: Imation Basic S250 Series: High-performance and extra long-lasting S250 drives are built to stand up to continuous use on the road. Dual-channel SLC flash memory [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2013/02/06/whats-the-difference-between-basic-s250-d250-devices/">What&#8217;s the difference between Basic S250 &#038; D250 devices?</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>We are often asked what the difference between the S250 &#038; D250 devices are. For the technical rundown you can check out our <a href="http://www.ironkey.net.nz/product-information/product-information-ironkey/specifications/">specifications</a> page.</p>
<p>Imation describe the differences as:</p>
<p><strong>Imation Basic S250 Series</strong>: High-performance and extra long-lasting S250 drives are built to stand up to continuous use on the road. Dual-channel SLC flash memory delivers exceptional performance and longevity.<br />
<strong>Imation Basic D250 Series</strong>: D250 drives balance performance and value for users with average data access needs. Same great security as the S250, with dual-channel MLC flash memory for reliable read/write performance.</p>
<p>You can view our full range of <a href="http://www.ironkey.net.nz/products-page/product-category/ironkey-2/basic/">Ironkey Basic devices here</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2013/02/06/whats-the-difference-between-basic-s250-d250-devices/">What&#8217;s the difference between Basic S250 &#038; D250 devices?</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2013/02/06/whats-the-difference-between-basic-s250-d250-devices/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>It&#8217;s 2013. Now Back Up Your Data!</title>
		<link>https://www.ironkey.net.nz/2013/01/21/its-2013-now-back-up-your-data/</link>
		<comments>https://www.ironkey.net.nz/2013/01/21/its-2013-now-back-up-your-data/#comments</comments>
		<pubDate>Mon, 21 Jan 2013 01:07:20 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[imation]]></category>
		<category><![CDATA[ironkey]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=1397</guid>
		<description><![CDATA[<p>Michael J. Miller over at PCMag.com has recommended using Imation Ironkey devices for secure enterprise level backups. &#8220;For backing up smaller amounts of information, a flash drive is an easy solution. (&#8230;) For enterprise flash drives, I like managed encrypted drives, particularly those from Imation&#8217;s Ironkey line.&#8221; You can read the full article over at [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2013/01/21/its-2013-now-back-up-your-data/">It&#8217;s 2013. Now Back Up Your Data!</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Michael J. Miller over at PCMag.com has recommended using Imation Ironkey devices for secure enterprise level backups.</p>
<p>&#8220;For backing up smaller amounts of information, a flash drive is an easy solution. (&#8230;) For enterprise flash drives, I like managed encrypted drives, particularly those from Imation&#8217;s Ironkey line.&#8221;</p>
<p>You can read the full article over at <a href="http://forwardthinking.pcmag.com/none/306473-it-s-2013-now-back-up-your-data" target="_blank">PCMag.com</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2013/01/21/its-2013-now-back-up-your-data/">It&#8217;s 2013. Now Back Up Your Data!</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2013/01/21/its-2013-now-back-up-your-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IronKey Special Ops: Crush Test</title>
		<link>https://www.ironkey.net.nz/2012/12/05/ironkey-special-ops-crush-test/</link>
		<comments>https://www.ironkey.net.nz/2012/12/05/ironkey-special-ops-crush-test/#comments</comments>
		<pubDate>Wed, 05 Dec 2012 03:08:13 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[ironkey crush test]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=1387</guid>
		<description><![CDATA[<p>Ever wondered what would happen if you ran over your IronKey? Probably not, but now you can find out! Check out the video below:</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2012/12/05/ironkey-special-ops-crush-test/">IronKey Special Ops: Crush Test</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Ever wondered what would happen if you ran over your IronKey? Probably not, but now you can find out!</p>
<p>Check out the video below:</p>
<p><iframe width="500" height="375" src="http://www.youtube.com/embed/I0CGOYDE7yc?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2012/12/05/ironkey-special-ops-crush-test/">IronKey Special Ops: Crush Test</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2012/12/05/ironkey-special-ops-crush-test/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IronKey now available to order</title>
		<link>https://www.ironkey.net.nz/2012/11/21/ironkey-now-available-to-order/</link>
		<comments>https://www.ironkey.net.nz/2012/11/21/ironkey-now-available-to-order/#comments</comments>
		<pubDate>Wed, 21 Nov 2012 02:00:25 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[IronKey Enterprise]]></category>
		<category><![CDATA[ironkey personal]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=1363</guid>
		<description><![CDATA[<p>New Shipments of Ironkey are coming direct from the US now. But due to high demand, to avoid unnecessary delays please place your order now – orders will be placed on a first come first served basis, as stock becomes available to us. Please note the devices have been rebranded as D250 &#038; S250. The [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2012/11/21/ironkey-now-available-to-order/">IronKey now available to order</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>New Shipments of Ironkey are coming direct from the US now. But due to high demand, to avoid unnecessary delays please place your order now – orders will be placed on a first come first served basis, as stock becomes available to us.</p>
<p>Please note the devices have been rebranded as D250 &#038; S250.</p>
<p>The D250 replaces the D200 &#038; the S250 replaces the S200. They are the same device otherwise.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2012/11/21/ironkey-now-available-to-order/">IronKey now available to order</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2012/11/21/ironkey-now-available-to-order/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IronKey testimonial</title>
		<link>https://www.ironkey.net.nz/2012/11/05/ironkey-testimonial/</link>
		<comments>https://www.ironkey.net.nz/2012/11/05/ironkey-testimonial/#comments</comments>
		<pubDate>Mon, 05 Nov 2012 00:52:59 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[imation]]></category>
		<category><![CDATA[ironkey]]></category>
		<category><![CDATA[testimonial]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=1357</guid>
		<description><![CDATA[<p>See what Patrick Lindley, IT Security Engineer, CA Dept. of Public Health, has to say about IronKey.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2012/11/05/ironkey-testimonial/">IronKey testimonial</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>See what Patrick Lindley, IT Security Engineer, CA Dept. of Public Health, has to say about IronKey.</p>
<p><iframe width="560" height="315" src="http://www.youtube.com/embed/uuHZDXJmwxs?rel=0" frameborder="0" allowfullscreen></iframe></p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2012/11/05/ironkey-testimonial/">IronKey testimonial</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2012/11/05/ironkey-testimonial/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Great technical review of the IronKey Personal D200</title>
		<link>https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/</link>
		<comments>https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/#comments</comments>
		<pubDate>Wed, 13 Apr 2011 01:45:18 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[D250]]></category>
		<category><![CDATA[ironkey personal]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[IronKey D200 Personal]]></category>
		<category><![CDATA[secure browsing]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=135</guid>
		<description><![CDATA[<p>Top Ten Reviews provides a technical and in-depth review of the IronKey Personal D200, a must-read for the techies among you. Key points: The encryption is hardware-based 256-bit AES validated by the National Institute of Standards and Technology  to meet the Level 3 criteria of FIPS 140-2. AES is the Advanced Encryption Standard adopted by [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/">Great technical review of the IronKey Personal D200</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Top Ten Reviews provides a technical and in-depth review of the <strong><a href="http://www.ironkey.net.nz/products-page/ironkey-personal/d2001/" target="_blank">IronKey Personal D200</a></strong>, a must-read for the techies among you.</p>
<p>Key points:</p>
<ul>
<li>The encryption is <strong>hardware-based 256-bit  AES</strong> validated by the National Institute of Standards and Technology  to  meet the Level 3 criteria of FIPS 140-2. AES is the Advanced Encryption Standard adopted by the U.S. government.</li>
<li>The <strong>IronKey</strong> goes the extra mile past the 256-bit encryption standard by using the FIPS 140-2 Level Three  criteria that make it  difficult to physically  tamper with the IronKey, including features such its rugged  metal casing and sealed internal components.</li>
<li>The system is safe from <strong>malware</strong> or cold-boot attacks because the drive  does not export AES encryption keys to the host PC. If anyone tries a  brute-force attack based on password guesses, after 10 incorrect  passwords all encrypted data is erased.</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/">Great technical review of the IronKey Personal D200</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/04/13/great-technical-review-of-the-ironkey-personal-d200/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hacking attacks: how to protect yourself</title>
		<link>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/</link>
		<comments>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/#comments</comments>
		<pubDate>Fri, 08 Apr 2011 04:50:34 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[privacy]]></category>
		<category><![CDATA[secure web browsing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[phishing]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/?p=132</guid>
		<description><![CDATA[<p>In another warning story, this time from the USA, internet marketing firm Epsilon was the target of a specific attack, allowing customers&#8217; confidential data to be exposed. The theft of the confidential information (in this case, email addresses) can enable hackers to use phishing to trick the customer into revealing further confidential information.  In this [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/">Hacking attacks: how to protect yourself</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>In another warning story, this time from the USA, internet marketing firm <strong>Epsilon</strong> was the target of a specific attack, allowing customers&#8217; confidential data to be exposed.</p>
<p>The theft of the confidential information (in this case, email addresses) can enable hackers to use <strong>phishing</strong> to trick the customer into revealing further confidential information.  In this case, this data could reveal where the customers, then the hacker could sucessfully direct the customer to a a website which looks like a legitimate banking site, but in truth, is not.</p>
<p>Practical steps you can take include checking new emails addresses against previous emails from the bank, warning family members (especially younger ones) about the dangers, and checking links in emails before you click on them.</p>
<p>View the full article <a href="http://www.kidglue.com/2011/04/07/how-does-the-epsilon-hacker-attack-affect-your-family/" target="_blank">here</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/">Hacking attacks: how to protect yourself</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/04/08/hacking-attacks-how-to-protect-yourself/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New IronKey Certification with RDA SecurID Software</title>
		<link>https://www.ironkey.net.nz/2011/02/11/new-ironkey-certification-with-rda-securid-software/</link>
		<comments>https://www.ironkey.net.nz/2011/02/11/new-ironkey-certification-with-rda-securid-software/#comments</comments>
		<pubDate>Fri, 11 Feb 2011 01:47:49 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[ironkey]]></category>
		<category><![CDATA[IronKey Enterprise]]></category>
		<category><![CDATA[RSA SecurID]]></category>
		<category><![CDATA[secure web browsing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[IronKey]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=101</guid>
		<description><![CDATA[<p>IronKey has announced that its Trusted Access for Banking and IronKey Enterprise have achieved updated certified interoperability with RSA SecureID 4.1, software from RSA (the security division of EMC).  This certification allows the IronKey to utilise the RSA SecurID platform with financial malware protection and mobile data encryption solutions. What is the RSA Secured Partner [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/02/11/new-ironkey-certification-with-rda-securid-software/">New IronKey Certification with RDA SecurID Software</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>IronKey has announced that its <strong>Trusted Access for Banking</strong> and <a href="http://www.ironkey.net.au/index.php?cPath=249"><strong>IronKey Enterprise</strong></a> have achieved updated certified interoperability with <strong>RSA SecureID 4.1</strong>, software from RSA (the security division of EMC).  This certification allows the IronKey to utilise the RSA SecurID platform with financial malware protection and mobile data encryption solutions.</p>
<p>What is the <strong>RSA Secured Partner Programme</strong>? A technology alliance of over 1,000 security partners, combining their knowledge and resources in order to develop and maintain the highest level of information security solutions.</p>
<p>Further detail on the Marketwire report is available <a href="http://www.marketwire.com/press-release/IronKey-Achieves-New-Certification-With-RSA-SecurID-Software-Client-NYSE-EMC-1394010.htm">here</a>.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/02/11/new-ironkey-certification-with-rda-securid-software/">New IronKey Certification with RDA SecurID Software</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/02/11/new-ironkey-certification-with-rda-securid-software/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New cybercrime targets for 2011</title>
		<link>https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/</link>
		<comments>https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/#comments</comments>
		<pubDate>Fri, 04 Feb 2011 02:39:24 +0000</pubDate>
		<dc:creator><![CDATA[ben]]></dc:creator>
				<category><![CDATA[paypal]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[PC World]]></category>

		<guid isPermaLink="false">http://www.ironkey.net.nz/site/?p=98</guid>
		<description><![CDATA[<p>PC World reports that the enterprise, rather than the consumer, will be the predicted cybercrime target for 2010. &#8220;As the new decade opens, cybercrime is diverging down a different path as cyber attacks move beyond the financial services industry and malware makes a shift from targeting consumer desktops to employees in the enterprise,&#8221; states the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/">New cybercrime targets for 2011</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.pcworld.com/article/217716/new_year_new_targets_in_cybercrime.html">PC World reports</a> that the <strong>enterprise</strong>, rather than the consumer, will be the predicted cybercrime target for 2010.</p>
<p>&#8220;As the new decade opens, <strong>cybercrime</strong> is diverging down a different path as cyber attacks move beyond the financial services industry and malware makes a shift from targeting <strong>consumer desktops</strong> to employees in the enterprise,&#8221; states the 2011 Cybercrime Trends Report.</p>
<p>What does this mean exactly? The volume of <strong>mobile downloads</strong> is expected to rise in 2011 to 25 billion applications, creating more of an opportunity for mobile devices, used by employees of major organisations with access to huge amounts of confidential data, could mean an easy back door for malware to reach into corporate enterprises.</p>
<p>The post <a rel="nofollow" href="https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/">New cybercrime targets for 2011</a> appeared first on <a rel="nofollow" href="https://www.ironkey.net.nz">IronKey.net.nz</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.ironkey.net.nz/2011/02/04/new-cybercrime-targets-for-2011/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
