<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Software Sources Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/software-sources/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/software-sources/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Fri, 31 Jan 2020 13:05:40 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Software Sources Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/software-sources/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 006 Administrator Accounts &#038; Software Sources</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-006-administrator-accounts/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 06 Dec 2019 13:00:56 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Administrator Accounts]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Software Sources]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1760</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 6. This week we&#8217;re going to talk about administrator accounts and software sources. Administrator Accounts So first of all, administrator accounts. If your staff need to carry out administrator level duties, they need to have an administrator account. They should use this account separately to their normal user account, only when they&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-006-administrator-accounts/">#WeekendWisdom 006 Administrator Accounts &#038; Software Sources</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 6. This week we&#8217;re going to talk about administrator accounts and software sources.<span id="more-1760"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-1760-1" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/12/WeekendWisdom-006-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2019/12/WeekendWisdom-006-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2019/12/WeekendWisdom-006-lo.mp4</a></video></div>
<h2>Administrator Accounts</h2>
<p>So first of all, administrator accounts.</p>
<p>If your staff need to carry out administrator level duties, they need to have an administrator account. They should use this account separately to their normal user account, only when they are carrying out administrator duties. They should not use the administrator level account for things like browsing the internet or checking their email.</p>
<p>This is because, if they get compromised while browsing the internet or checking their email, the bad guys will be able to get a higher level of access with the administrator account.</p>
<p>So separate accounts for administrator duties and normal day-to-day business purposes.</p>
<h2>Software Sources</h2>
<p>Then secondly, software sources.</p>
<p>You should only use official app stores to get your software for your mobile devices and then official vendor sites or vendor download pages for normal applications that you install on PCs and Macs.</p>
<p>This is because, if you are getting your software from any other source, unofficial sites, torrents, etc. you don&#8217;t know if that software has been compromised. Compromised software might compromise your network.</p>
<p>So that&#8217;s it for this week.</p>
<p>Let&#8217;s be careful out there and we&#8217;ll see you again next week.</p>
<p><a href="http://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">www.L2CyberSecurity.com</a></p>
<p><a href="http://www.twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">www.twitter.com/L2Cyber</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-006-administrator-accounts/">#WeekendWisdom 006 Administrator Accounts &#038; Software Sources</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2019/12/WeekendWisdom-006-lo.mp4" length="17806401" type="video/mp4" />

			</item>
	</channel>
</rss>
