<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>mtbcommunications.com.au &#187; admin</title>
	<atom:link href="http://mtbcommunications.com.au/?feed=rss2&#038;author=1" rel="self" type="application/rss+xml" />
	<link>http://mtbcommunications.com.au</link>
	<description>Communications products and services</description>
	<lastBuildDate>Tue, 04 Aug 2015 11:36:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.2.22</generator>
	<item>
		<title>Security for Substation Communications</title>
		<link>http://mtbcommunications.com.au/?p=216</link>
		<comments>http://mtbcommunications.com.au/?p=216#comments</comments>
		<pubDate>Tue, 24 Apr 2012 07:55:16 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Our Blog]]></category>

		<guid isPermaLink="false">http://mtbcommunications.com.au/?p=216</guid>
		<description><![CDATA[Until recently the term “security,” when applied to SCADA communication systems, meant only the process of ensuring message integrity in the face of electrical noise and other disturbances to the communications. But, in fact, “security” also has a much broader meaning. Security, in the broader sense, is concerned with anything that threatens to interfere with the integrity [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Until recently the term “security,” when applied to SCADA communication systems, meant only the process of ensuring message integrity in the face of <strong><a title="Sources of Sound in Transformers" href="http://electrical-engineering-portal.com/sources-of-sound-in-transformers">electrical noise</a></strong> and other disturbances to the communications. But, in fact, “security” also has a much broader meaning. Security, in the broader sense, is concerned with anything that threatens to interfere with the integrity of the business.</p>
<p>Our focus here will be to examine issues related more narrowly to <strong><a title="SCADA Security Attacks" href="http://electrical-engineering-portal.com/scada-security-attacks">SCADA security</a></strong>. In an earlier section we discussed the role of the OSI reference model (ISO 7498-1) in defining a<strong><a title="SCADA communication vulnerabilities" href="http://electrical-engineering-portal.com/scada-communication-vulnerabilities">communications</a></strong> architecture. In similar fashion, ISO 7498-2, Information Processing Systems, Open Systems Interconnection, Basic Reference Model – Part 2: Security Architecture, issued in 1989, provides a general description of security services and related mechanisms that fit into the reference model, and it defines the positions within the reference model where they can be provided.</p>
<p>It also provides useful standard definitions for security terms.</p>
<p>For full article go to: <a href="http://electrical-engineering-portal.com/security-for-substation-communications" target="_blank">http://electrical-engineering-portal.com/</a></p>
<p>&nbsp;</p>
<div></div>
]]></content:encoded>
			<wfw:commentRss>http://mtbcommunications.com.au/?feed=rss2&#038;p=216</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>5 steps to secure mobile data</title>
		<link>http://mtbcommunications.com.au/?p=211</link>
		<comments>http://mtbcommunications.com.au/?p=211#comments</comments>
		<pubDate>Tue, 24 Apr 2012 07:51:01 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[New Technology]]></category>
		<category><![CDATA[Our Blog]]></category>
		<category><![CDATA[Phone data]]></category>

		<guid isPermaLink="false">http://mtbcommunications.com.au/?p=211</guid>
		<description><![CDATA[Mobile and wireless technology is revolutionizing how businesses use and profit from information. Employees outfitted with mobile devices, such as laptops and PDAs, can access valuable enterprise information when they&#8217;re away from the office, which improves productivity, streamlines operations, and creates new revenue sources. But security is lacking. While mobility is a competitive advantage, it [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><strong><a href="http://mtbcommunications.com.au/wp-content/uploads/2012/04/communications-pic.jpg"><img class="alignleft size-medium wp-image-86" title="communications sidewalk" src="http://mtbcommunications.com.au/wp-content/uploads/2012/04/communications-pic-300x200.jpg" alt="" width="300" height="200" /></a>Mobile and wireless technology is revolutionizing how businesses use and profit from information. Employees outfitted with mobile devices, such as laptops and PDAs, can access valuable enterprise information when they&#8217;re away from the office, which improves productivity, streamlines operations, and creates new revenue sources. But security is lacking.</strong></p>
<p>While mobility is a competitive advantage, it means your data can travel beyond your secure LAN firewall and over public networks. Your security strategy needs to address the managing and securing of pervasive mobile data from end to end: whether it&#8217;s stored on a mobile device, traveling over a wired or wireless network, or being sent back to the enterprise.</p>
<p>For full article go to: <a href="http://www.zdnet.com/news/5-steps-to-secure-mobile-data/298227" target="_blank">http://www.zdnet.com</a><span id="more-211"></span></p>
]]></content:encoded>
			<wfw:commentRss>http://mtbcommunications.com.au/?feed=rss2&#038;p=211</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Same Same but different</title>
		<link>http://mtbcommunications.com.au/?p=153</link>
		<comments>http://mtbcommunications.com.au/?p=153#comments</comments>
		<pubDate>Mon, 23 Apr 2012 04:40:14 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Our Blog]]></category>

		<guid isPermaLink="false">http://mtbcommunications.com.au/?p=153</guid>
		<description><![CDATA[]]></description>
				<content:encoded><![CDATA[<p><a href="http://mtbcommunications.com.au/wp-content/uploads/2012/04/blackboard-icson.jpg"><img class="alignleft size-thumbnail wp-image-85" title="blackboard icons" src="http://mtbcommunications.com.au/wp-content/uploads/2012/04/blackboard-icson-150x150.jpg" alt="" width="150" height="150" /></a></p>
]]></content:encoded>
			<wfw:commentRss>http://mtbcommunications.com.au/?feed=rss2&#038;p=153</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Big Brother is watching</title>
		<link>http://mtbcommunications.com.au/?p=73</link>
		<comments>http://mtbcommunications.com.au/?p=73#comments</comments>
		<pubDate>Mon, 23 Apr 2012 00:24:10 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[New Technology]]></category>
		<category><![CDATA[Our Blog]]></category>

		<guid isPermaLink="false">http://mtbcommunications.com.au/?p=73</guid>
		<description><![CDATA[]]></description>
				<content:encoded><![CDATA[<p><a href="http://mtbcommunications.com.au/wp-content/uploads/2012/04/MTB_Slider02.jpg"><img class="alignleft size-medium wp-image-68" title="MTB_Slider02" src="http://mtbcommunications.com.au/wp-content/uploads/2012/04/MTB_Slider02-300x204.jpg" alt="" width="300" height="204" /></a></p>
<p><strong><br />
</strong></p>
]]></content:encoded>
			<wfw:commentRss>http://mtbcommunications.com.au/?feed=rss2&#038;p=73</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
