2<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Linked 2 Leadership &#124; The Leadership CollaboratoryOn Leadership, Threats and Operational Security &#8211; Linked 2 Leadership | The Leadership Collaboratory</title>
	<atom:link href="https://linked2leadership.com/2016/02/04/on-leadership-threats-and-operational-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://linked2leadership.com</link>
	<description>Linked 2 Leadership Blog is designed to serve professionals interested in Leadership Development, Organizational Health, and Personal &#38; Professional Growth. We provide a safe and fun place to Learn, Grow and Develop Other Leaders.&#8482;</description>
	<lastBuildDate>Mon, 01 Nov 2021 17:18:39 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/linked2leadership.com/wp-content/uploads/2015/11/L2L-Logo-PNG.png?fit=32%2C32&#038;ssl=1</url>
	<title>On Leadership, Threats and Operational Security &#8211; Linked 2 Leadership | The Leadership Collaboratory</title>
	<link>https://linked2leadership.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">83028645</site>		<item>
		<title>On Leadership, Threats and Operational Security</title>
		<link>https://linked2leadership.com/2016/02/04/on-leadership-threats-and-operational-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=on-leadership-threats-and-operational-security</link>
		<comments>https://linked2leadership.com/2016/02/04/on-leadership-threats-and-operational-security/#respond</comments>
		<pubDate>Fri, 05 Feb 2016 02:25:40 +0000</pubDate>
		<dc:creator>Robert Cordray</dc:creator>
				<category><![CDATA[Leadership Development]]></category>
		<category><![CDATA[Organizational Health]]></category>
		<category><![CDATA[Professional Growth]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[small business leadership]]></category>
		<category><![CDATA[small business protection]]></category>
		<category><![CDATA[web protection]]></category>
		<guid isPermaLink="false">https://linked2leadership.com/?p=268</guid>

				<description><![CDATA[A few years ago, a small business in San Diego was hit my malicious cyber attacks over the internet that were launched from local IP addresses. As they were protected as much as they felt they could be, they contacted the national carrier to deal with the denial-of-service component of the problem. Too Small to [&#8230;]]]></description>
			<content:encoded><![CDATA[A few years ago, a small business in San Diego was hit my malicious cyber attacks over the internet that were launched from local IP addresses. As they were protected as much as they felt they could be, they contacted the national carrier to deal with the denial-of-service component of the problem. Too Small to [&#8230;]]]></content:encoded>
	

		<wfw:commentRss>https://linked2leadership.com/2016/02/04/on-leadership-threats-and-operational-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<post-id xmlns="com-wordpress:feed-additions:1">268</post-id>	</item>
	</channel>
</rss>