<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>mtbcommunications.com.au &#187; Phone data</title>
	<atom:link href="http://mtbcommunications.com.au/?feed=rss2&#038;cat=4" rel="self" type="application/rss+xml" />
	<link>http://mtbcommunications.com.au</link>
	<description>Communications products and services</description>
	<lastBuildDate>Tue, 04 Aug 2015 11:36:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.2.19</generator>
	<item>
		<title>5 steps to secure mobile data</title>
		<link>http://mtbcommunications.com.au/?p=211</link>
		<comments>http://mtbcommunications.com.au/?p=211#comments</comments>
		<pubDate>Tue, 24 Apr 2012 07:51:01 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[New Technology]]></category>
		<category><![CDATA[Our Blog]]></category>
		<category><![CDATA[Phone data]]></category>

		<guid isPermaLink="false">http://mtbcommunications.com.au/?p=211</guid>
		<description><![CDATA[Mobile and wireless technology is revolutionizing how businesses use and profit from information. Employees outfitted with mobile devices, such as laptops and PDAs, can access valuable enterprise information when they&#8217;re away from the office, which improves productivity, streamlines operations, and creates new revenue sources. But security is lacking. While mobility is a competitive advantage, it [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><strong><a href="http://mtbcommunications.com.au/wp-content/uploads/2012/04/communications-pic.jpg"><img class="alignleft size-medium wp-image-86" title="communications sidewalk" src="http://mtbcommunications.com.au/wp-content/uploads/2012/04/communications-pic-300x200.jpg" alt="" width="300" height="200" /></a>Mobile and wireless technology is revolutionizing how businesses use and profit from information. Employees outfitted with mobile devices, such as laptops and PDAs, can access valuable enterprise information when they&#8217;re away from the office, which improves productivity, streamlines operations, and creates new revenue sources. But security is lacking.</strong></p>
<p>While mobility is a competitive advantage, it means your data can travel beyond your secure LAN firewall and over public networks. Your security strategy needs to address the managing and securing of pervasive mobile data from end to end: whether it&#8217;s stored on a mobile device, traveling over a wired or wireless network, or being sent back to the enterprise.</p>
<p>For full article go to: <a href="http://www.zdnet.com/news/5-steps-to-secure-mobile-data/298227" target="_blank">http://www.zdnet.com</a><span id="more-211"></span></p>
]]></content:encoded>
			<wfw:commentRss>http://mtbcommunications.com.au/?feed=rss2&#038;p=211</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
