<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CIATEC Staff, Author at CIATEC</title>
	<atom:link href="https://www.ciatec.com/author/ciatec/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ciatec.com/author/ciatec/</link>
	<description>Information Security &#124; Information Technology &#124; Information Assurance &#124; Digital Strategy</description>
	<lastBuildDate>Wed, 08 Aug 2018 06:12:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.ciatec.com/wp-content/uploads/2018/02/cropped-Ciatec-Icon-32x32.png</url>
	<title>CIATEC Staff, Author at CIATEC</title>
	<link>https://www.ciatec.com/author/ciatec/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>WiFi vs LiFi Technology, What Is the Difference?</title>
		<link>https://www.ciatec.com/2018/03/lifi-vs-wifi-what-is-the-difference/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sun, 04 Mar 2018 14:42:54 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[LiFi]]></category>
		<category><![CDATA[WiFi]]></category>
		<guid isPermaLink="false">https://www.cia-tec.com/?p=1341</guid>

					<description><![CDATA[<p>Internet has become one of the best inventions in the modern world. It is even difficult to imagine how life would be in the absence of internet.  Homes, schools, and businesses connect to the Internet today using a variety of different methods. One method, wireless Internet service, provides Internet access to customers without the need for &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/03/lifi-vs-wifi-what-is-the-difference/">WiFi vs LiFi Technology, What Is the Difference?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Internet has become one of the best inventions in the modern world. It is even difficult to imagine how life would be in the absence of internet.  Homes, schools, and businesses connect to the Internet today using a variety of different methods. One method, wireless Internet service, provides Internet access to customers without the need for underground copper, fiber, or other forms of commercial network cabling. WiFi and LiFi both are different technologies that are used to send and receive data wirelessly.</p>
<h3 class="ui_qtext_para"><b>What is WiFi ?</b></h3>
<p class="ui_qtext_para"><strong>WiFi, </strong>the short for &#8220;wireless fidelity,&#8221; is the name of a popular wireless networking technology for wireless local area networking with devices based on the IEEE 802.11 standards. It uses radio waves to provide wireless high-speed Internet and network connections.</p>
<h3 class="ui_qtext_para"><b>What is LiFi ?</b></h3>
<p class="ui_qtext_para"><strong>LiFi, </strong>the short for &#8220;light fidelity&#8221;, is a wireless optical networking technology for wireless communication between devices using light to transmit data. In its present state only LED lamps can be used for the transmission of visible light. It is a safer, greener and cheaper technology as it does not have any radio waves or any other type of waves.</p>
<p>Following poster mentions feature comparison between <strong>WiFi</strong> and <strong>LiFi </strong>technology.</p>
<p><a href="https://www.cia-tec.com/wp-content/uploads/2018/03/WiFi-vs-LiFi-LowRes-1.jpg"><img decoding="async" class="alignnone wp-image-1344 size-full" title="comparison between WiFi and LiFi" src="https://www.ciatec.com/wp-content/uploads/2018/03/WiFi-vs-LiFi-LowRes-1.jpg" alt="comparison between WiFi and LiFi" width="5200" height="17100" srcset="https://www.ciatec.com/wp-content/uploads/2018/03/WiFi-vs-LiFi-LowRes-1.jpg 5200w, https://www.ciatec.com/wp-content/uploads/2018/03/WiFi-vs-LiFi-LowRes-1-91x300.jpg 91w, https://www.ciatec.com/wp-content/uploads/2018/03/WiFi-vs-LiFi-LowRes-1-768x2526.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/03/WiFi-vs-LiFi-LowRes-1-311x1024.jpg 311w" sizes="(max-width: 5200px) 100vw, 5200px" /></a></p>
<h3>To conclude</h3>
<p>After carefully examining the above two technologies, it is quite evident that the new LiFi technology is not the replacement of WiFi technology. Both WiFi and LiFi has its own advantages and limitations. Although LiFi seems to be temptingly faster many people believe that LiFi will just remain as an alternative to WiFi and might not replace it completely.</p>
<p>The post <a href="https://www.ciatec.com/2018/03/lifi-vs-wifi-what-is-the-difference/">WiFi vs LiFi Technology, What Is the Difference?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Blockchain and Cyber Security</title>
		<link>https://www.ciatec.com/2018/02/blockchain-cyber-security/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Mon, 19 Feb 2018 19:56:13 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Blockchain]]></category>
		<guid isPermaLink="false">https://www.cia-tec.com/?p=1152</guid>

					<description><![CDATA[<p>Getting to know BlockChain Blockchain is a term that everybody is hearing about nowadays. It is undeniably a cunning invention. Defined in simple terms, blockchain is an original method to identify who owns what through technology. In this short post, we will tell how blockchain and cyber security relate. “The blockchain is an incorruptible digital &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/02/blockchain-cyber-security/">Blockchain and Cyber Security</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><span style="font-size: 14pt;">Getting to know BlockChain</span></h3>
<p style="text-align: justify;">Blockchain is a term that everybody is hearing about nowadays. It is undeniably a cunning invention. Defined in simple terms, blockchain is an original method to identify who owns what through technology. In this short post, we will tell <strong>how blockchain and cyber security relate</strong>.</p>
<blockquote class=" "><p>“The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value.” <cite>Don &amp; Alex Tapscott, authors Blockchain Revolution (2016)</cite></p></blockquote>
<p>Through this technology, one can keep track of transactions and is able to connect a million of computers across the globe. This is accomplished through adding those machines to a public accessible “ledger”, that until now can not be hacked or corrupted.</p>
<p>Let’s imagine it a database available, and continuously being updated across a network. Every transaction occurring over this database is known as a “block”.</p>
<p>Prohibiting individuals from controlling the data available, would limit chances of failure. Some of the main advantages of using blockchain are transparency, and decentralization.</p>
<h3><span style="font-size: 14pt;">Blockchain to Enhance Security</span></h3>
<p>So how would blockchain and cyber security relate? We all rely on our web identifications and passwords, and are very cautious of any information thefts. Ensuring a secure identity is very crucial for any online interaction.</p>
<p>With Blockchain, security is enhanced through the encryption technology.</p>
<p>Technically speaking, blockchain uses a public key (users address), a private key (like passwords), and a paperwallet that allows individuals to protect their keys.</p>
<p>Blockchain technology is an innovation in cyber security, however the complications of the technology are to be taken into consideration and may hinder development in its application.</p>
<p>The post <a href="https://www.ciatec.com/2018/02/blockchain-cyber-security/">Blockchain and Cyber Security</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meet CIATEC</title>
		<link>https://www.ciatec.com/2018/02/about-ciatec/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 14 Feb 2018 14:02:04 +0000</pubDate>
				<category><![CDATA[Digital Strategy]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Service Management]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.cia-tec.com/?p=1042</guid>

					<description><![CDATA[<p>First things first, CIATEC is not in any way related to or associated with the US Central Intelligence Agency, as the name might suggest, however our team share the intelligence part and planning to become an agency at some point in time. Why CIATEC? CIA TEC name was inspired by two main fields of interest, &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/02/about-ciatec/">Meet CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>First things first, CIATEC is not in any way related to or associated with the US Central Intelligence Agency, as the name might suggest, however our team share the intelligence part and planning to become an agency at some point in time.</p>
<h3>Why CIATEC?</h3>
<p>CIA TEC name was inspired by two main fields of interest, information security field represented by CIA triad (<strong>C</strong>onfidentially, <strong>I</strong>ntegrity and <strong>A</strong>vailability) and information technology being the wide umbrella covering several topics underneath it, with emphasis on IT Service Management (ITSM), IT Security and Digital Strategy.</p>
<h3>Work in Progress<img loading="lazy" decoding="async" class="size-thumbnail wp-image-1696 alignright" src="https://www.cia-tec.com/wp-content/uploads/2018/03/Citatec-Work-in-Progress-150x150.png" alt="" width="150" height="150" srcset="https://www.ciatec.com/wp-content/uploads/2018/03/Citatec-Work-in-Progress-150x150.png 150w, https://www.ciatec.com/wp-content/uploads/2018/03/Citatec-Work-in-Progress-300x300.png 300w, https://www.ciatec.com/wp-content/uploads/2018/03/Citatec-Work-in-Progress.png 512w" sizes="(max-width: 150px) 100vw, 150px" /></h3>
<p>CIATEC is still a new born that is being nourished by an ambitious small team of beautiful minds with solid background in digital and information technology, systems management, network management, information security, IT security and IT operations management.</p>
<p>We believe that there is always a room for improvement. We invite you to share with us any suggestions or comments about CIATEC <a href="/contact" target="_blank" rel="noopener">here</a> or through our social media channels:</p>
<a href="http://www.facebook.com/AskCiatec" target="_blank" class="shortc-button small blue "><span class="fab fa-facebook-f" aria-hidden="true"></span> Facebook</a> <a href="http://www.twitter.com/AskCiatec" target="_blank" class="shortc-button small blue "><span class="fab fa-twitter" aria-hidden="true"></span> Twitter</a>
<p>&nbsp;</p>
<p><span style="font-size: 22px; font-weight: bold;">Locations</span></p>
<p>While the vast majority of our posts, tips and advice applies on any country or environment, we are focused on the Middle East region particularly in Saudi Arabia, United Arab Emirates, and Lebanon.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1223" src="https://www.cia-tec.com/wp-content/uploads/2018/02/Ciatec-Map.gif" alt="CIATEC MAP" width="853" height="681" /></p>
<h2>Browse Topics</h2>
<h2>
		<div class="tags-shortcode"><a href="https://www.ciatec.com/tag/ai/" class="tag-cloud-link tag-link-226 tag-link-position-1" style="font-size: 8pt;" aria-label="AI (1 item)">AI</a>
<a href="https://www.ciatec.com/tag/apple-2/" class="tag-cloud-link tag-link-198 tag-link-position-2" style="font-size: 8pt;" aria-label="apple (1 item)">apple</a>
<a href="https://www.ciatec.com/tag/awareness/" class="tag-cloud-link tag-link-132 tag-link-position-3" style="font-size: 11.876923076923pt;" aria-label="Awareness (2 items)">Awareness</a>
<a href="https://www.ciatec.com/tag/backup/" class="tag-cloud-link tag-link-88 tag-link-position-4" style="font-size: 8pt;" aria-label="Backup (1 item)">Backup</a>
<a href="https://www.ciatec.com/tag/banking/" class="tag-cloud-link tag-link-123 tag-link-position-5" style="font-size: 8pt;" aria-label="Banking (1 item)">Banking</a>
<a href="https://www.ciatec.com/tag/banking-security/" class="tag-cloud-link tag-link-125 tag-link-position-6" style="font-size: 8pt;" aria-label="Banking Security (1 item)">Banking Security</a>
<a href="https://www.ciatec.com/tag/blockchain/" class="tag-cloud-link tag-link-42 tag-link-position-7" style="font-size: 8pt;" aria-label="Blockchain (1 item)">Blockchain</a>
<a href="https://www.ciatec.com/tag/careem/" class="tag-cloud-link tag-link-38 tag-link-position-8" style="font-size: 11.876923076923pt;" aria-label="Careem (2 items)">Careem</a>
<a href="https://www.ciatec.com/tag/change-management/" class="tag-cloud-link tag-link-101 tag-link-position-9" style="font-size: 8pt;" aria-label="Change Management (1 item)">Change Management</a>
<a href="https://www.ciatec.com/tag/customer-experience/" class="tag-cloud-link tag-link-227 tag-link-position-10" style="font-size: 8pt;" aria-label="Customer Experience (1 item)">Customer Experience</a>
<a href="https://www.ciatec.com/tag/cx/" class="tag-cloud-link tag-link-228 tag-link-position-11" style="font-size: 8pt;" aria-label="CX (1 item)">CX</a>
<a href="https://www.ciatec.com/tag/cyber-security-awareness/" class="tag-cloud-link tag-link-203 tag-link-position-12" style="font-size: 8pt;" aria-label="Cyber Security Awareness (1 item)">Cyber Security Awareness</a>
<a href="https://www.ciatec.com/tag/defence-in-depth/" class="tag-cloud-link tag-link-83 tag-link-position-13" style="font-size: 8pt;" aria-label="Defence in Depth (1 item)">Defence in Depth</a>
<a href="https://www.ciatec.com/tag/defense-in-depth/" class="tag-cloud-link tag-link-82 tag-link-position-14" style="font-size: 8pt;" aria-label="Defense in Depth (1 item)">Defense in Depth</a>
<a href="https://www.ciatec.com/tag/digital-marketing/" class="tag-cloud-link tag-link-26 tag-link-position-15" style="font-size: 8pt;" aria-label="Digital Marketing (1 item)">Digital Marketing</a>
<a href="https://www.ciatec.com/tag/disaster-recovery-plan/" class="tag-cloud-link tag-link-62 tag-link-position-16" style="font-size: 8pt;" aria-label="Disaster Recovery Plan (1 item)">Disaster Recovery Plan</a>
<a href="https://www.ciatec.com/tag/dr/" class="tag-cloud-link tag-link-63 tag-link-position-17" style="font-size: 8pt;" aria-label="DR (1 item)">DR</a>
<a href="https://www.ciatec.com/tag/dubai/" class="tag-cloud-link tag-link-225 tag-link-position-18" style="font-size: 11.876923076923pt;" aria-label="Dubai (2 items)">Dubai</a>
<a href="https://www.ciatec.com/tag/ecommerce/" class="tag-cloud-link tag-link-133 tag-link-position-19" style="font-size: 8pt;" aria-label="Ecommerce (1 item)">Ecommerce</a>
<a href="https://www.ciatec.com/tag/employees-security-assessment/" class="tag-cloud-link tag-link-265 tag-link-position-20" style="font-size: 8pt;" aria-label="Employees security assessment (1 item)">Employees security assessment</a>
<a href="https://www.ciatec.com/tag/facebook/" class="tag-cloud-link tag-link-122 tag-link-position-21" style="font-size: 8pt;" aria-label="Facebook (1 item)">Facebook</a>
<a href="https://www.ciatec.com/tag/finance/" class="tag-cloud-link tag-link-124 tag-link-position-22" style="font-size: 8pt;" aria-label="Finance (1 item)">Finance</a>
<a href="https://www.ciatec.com/tag/fraud-warning/" class="tag-cloud-link tag-link-271 tag-link-position-23" style="font-size: 8pt;" aria-label="Fraud Warning (1 item)">Fraud Warning</a>
<a href="https://www.ciatec.com/tag/gdpr/" class="tag-cloud-link tag-link-163 tag-link-position-24" style="font-size: 8pt;" aria-label="GDPR (1 item)">GDPR</a>
<a href="https://www.ciatec.com/tag/google/" class="tag-cloud-link tag-link-75 tag-link-position-25" style="font-size: 8pt;" aria-label="Google (1 item)">Google</a>
<a href="https://www.ciatec.com/tag/hard-disk/" class="tag-cloud-link tag-link-92 tag-link-position-26" style="font-size: 8pt;" aria-label="Hard Disk (1 item)">Hard Disk</a>
<a href="https://www.ciatec.com/tag/information-security-awareness/" class="tag-cloud-link tag-link-204 tag-link-position-27" style="font-size: 14.461538461538pt;" aria-label="Information Security Awareness (3 items)">Information Security Awareness</a>
<a href="https://www.ciatec.com/tag/information-security-in-banking/" class="tag-cloud-link tag-link-126 tag-link-position-28" style="font-size: 11.876923076923pt;" aria-label="Information Security in Banking (2 items)">Information Security in Banking</a>
<a href="https://www.ciatec.com/tag/information-security-management-system/" class="tag-cloud-link tag-link-153 tag-link-position-29" style="font-size: 8pt;" aria-label="Information Security Management System (1 item)">Information Security Management System</a>
<a href="https://www.ciatec.com/tag/inofmration-security-training-for-employees/" class="tag-cloud-link tag-link-266 tag-link-position-30" style="font-size: 8pt;" aria-label="Inofmration security training for employees (1 item)">Inofmration security training for employees</a>
<a href="https://www.ciatec.com/tag/internet/" class="tag-cloud-link tag-link-175 tag-link-position-31" style="font-size: 8pt;" aria-label="Internet (1 item)">Internet</a>
<a href="https://www.ciatec.com/tag/internet-history/" class="tag-cloud-link tag-link-195 tag-link-position-32" style="font-size: 8pt;" aria-label="Internet History (1 item)">Internet History</a>
<a href="https://www.ciatec.com/tag/internet-of-things/" class="tag-cloud-link tag-link-108 tag-link-position-33" style="font-size: 8pt;" aria-label="Internet of Things (1 item)">Internet of Things</a>
<a href="https://www.ciatec.com/tag/internet-usage/" class="tag-cloud-link tag-link-79 tag-link-position-34" style="font-size: 8pt;" aria-label="Internet Usage (1 item)">Internet Usage</a>
<a href="https://www.ciatec.com/tag/iot/" class="tag-cloud-link tag-link-109 tag-link-position-35" style="font-size: 8pt;" aria-label="IoT (1 item)">IoT</a>
<a href="https://www.ciatec.com/tag/isms/" class="tag-cloud-link tag-link-152 tag-link-position-36" style="font-size: 8pt;" aria-label="ISMS (1 item)">ISMS</a>
<a href="https://www.ciatec.com/tag/iso/" class="tag-cloud-link tag-link-117 tag-link-position-37" style="font-size: 11.876923076923pt;" aria-label="ISO (2 items)">ISO</a>
<a href="https://www.ciatec.com/tag/iso-27001/" class="tag-cloud-link tag-link-151 tag-link-position-38" style="font-size: 8pt;" aria-label="ISO 27001 (1 item)">ISO 27001</a>
<a href="https://www.ciatec.com/tag/iso-audit/" class="tag-cloud-link tag-link-239 tag-link-position-39" style="font-size: 8pt;" aria-label="ISO Audit (1 item)">ISO Audit</a>
<a href="https://www.ciatec.com/tag/iso-training/" class="tag-cloud-link tag-link-238 tag-link-position-40" style="font-size: 8pt;" aria-label="ISO Training (1 item)">ISO Training</a>
<a href="https://www.ciatec.com/tag/itil/" class="tag-cloud-link tag-link-29 tag-link-position-41" style="font-size: 11.876923076923pt;" aria-label="ITIL (2 items)">ITIL</a>
<a href="https://www.ciatec.com/tag/it-operations/" class="tag-cloud-link tag-link-107 tag-link-position-42" style="font-size: 8pt;" aria-label="IT Operations (1 item)">IT Operations</a>
<a href="https://www.ciatec.com/tag/itsm/" class="tag-cloud-link tag-link-85 tag-link-position-43" style="font-size: 11.876923076923pt;" aria-label="ITSM (2 items)">ITSM</a>
<a href="https://www.ciatec.com/tag/layered-security/" class="tag-cloud-link tag-link-84 tag-link-position-44" style="font-size: 8pt;" aria-label="layered security (1 item)">layered security</a>
<a href="https://www.ciatec.com/tag/lebanon/" class="tag-cloud-link tag-link-24 tag-link-position-45" style="font-size: 11.876923076923pt;" aria-label="Lebanon (2 items)">Lebanon</a>
<a href="https://www.ciatec.com/tag/lifi/" class="tag-cloud-link tag-link-74 tag-link-position-46" style="font-size: 8pt;" aria-label="LiFi (1 item)">LiFi</a>
<a href="https://www.ciatec.com/tag/middle-east/" class="tag-cloud-link tag-link-80 tag-link-position-47" style="font-size: 8pt;" aria-label="Middle East (1 item)">Middle East</a>
<a href="https://www.ciatec.com/tag/mobile-device-security/" class="tag-cloud-link tag-link-260 tag-link-position-48" style="font-size: 8pt;" aria-label="Mobile Device Security (1 item)">Mobile Device Security</a>
<a href="https://www.ciatec.com/tag/mobile-device-security-tips/" class="tag-cloud-link tag-link-261 tag-link-position-49" style="font-size: 8pt;" aria-label="Mobile Device Security Tips (1 item)">Mobile Device Security Tips</a>
<a href="https://www.ciatec.com/tag/mobile-security/" class="tag-cloud-link tag-link-262 tag-link-position-50" style="font-size: 8pt;" aria-label="Mobile Security (1 item)">Mobile Security</a>
<a href="https://www.ciatec.com/tag/online-business/" class="tag-cloud-link tag-link-102 tag-link-position-51" style="font-size: 8pt;" aria-label="online business (1 item)">online business</a>
<a href="https://www.ciatec.com/tag/partners/" class="tag-cloud-link tag-link-237 tag-link-position-52" style="font-size: 8pt;" aria-label="Partners (1 item)">Partners</a>
<a href="https://www.ciatec.com/tag/pecb/" class="tag-cloud-link tag-link-236 tag-link-position-53" style="font-size: 8pt;" aria-label="PECB (1 item)">PECB</a>
<a href="https://www.ciatec.com/tag/phishing/" class="tag-cloud-link tag-link-28 tag-link-position-54" style="font-size: 14.461538461538pt;" aria-label="Phishing (3 items)">Phishing</a>
<a href="https://www.ciatec.com/tag/phishing-awareness/" class="tag-cloud-link tag-link-206 tag-link-position-55" style="font-size: 11.876923076923pt;" aria-label="Phishing Awareness (2 items)">Phishing Awareness</a>
<a href="https://www.ciatec.com/tag/phishing-simulation/" class="tag-cloud-link tag-link-254 tag-link-position-56" style="font-size: 8pt;" aria-label="Phishing Simulation (1 item)">Phishing Simulation</a>
<a href="https://www.ciatec.com/tag/phishing-training/" class="tag-cloud-link tag-link-252 tag-link-position-57" style="font-size: 8pt;" aria-label="Phishing training (1 item)">Phishing training</a>
<a href="https://www.ciatec.com/tag/phishing-training-for-employees/" class="tag-cloud-link tag-link-253 tag-link-position-58" style="font-size: 8pt;" aria-label="Phishing training for employees (1 item)">Phishing training for employees</a>
<a href="https://www.ciatec.com/tag/phishmark/" class="tag-cloud-link tag-link-251 tag-link-position-59" style="font-size: 8pt;" aria-label="Phishmark (1 item)">Phishmark</a>
<a href="https://www.ciatec.com/tag/privacy/" class="tag-cloud-link tag-link-197 tag-link-position-60" style="font-size: 14.461538461538pt;" aria-label="Privacy (3 items)">Privacy</a>
<a href="https://www.ciatec.com/tag/quiz/" class="tag-cloud-link tag-link-263 tag-link-position-61" style="font-size: 8pt;" aria-label="Quiz (1 item)">Quiz</a>
<a href="https://www.ciatec.com/tag/saudi-arabia/" class="tag-cloud-link tag-link-37 tag-link-position-62" style="font-size: 11.876923076923pt;" aria-label="Saudi Arabia (2 items)">Saudi Arabia</a>
<a href="https://www.ciatec.com/tag/scam/" class="tag-cloud-link tag-link-131 tag-link-position-63" style="font-size: 8pt;" aria-label="Scam (1 item)">Scam</a>
<a href="https://www.ciatec.com/tag/search-engines/" class="tag-cloud-link tag-link-179 tag-link-position-64" style="font-size: 8pt;" aria-label="Search Engines (1 item)">Search Engines</a>
<a href="https://www.ciatec.com/tag/security-awareness/" class="tag-cloud-link tag-link-205 tag-link-position-65" style="font-size: 8pt;" aria-label="Security Awareness (1 item)">Security Awareness</a>
<a href="https://www.ciatec.com/tag/security-awareness-assessment/" class="tag-cloud-link tag-link-264 tag-link-position-66" style="font-size: 8pt;" aria-label="security awareness assessment (1 item)">security awareness assessment</a>
<a href="https://www.ciatec.com/tag/security-awareness-training/" class="tag-cloud-link tag-link-207 tag-link-position-67" style="font-size: 8pt;" aria-label="Security Awareness Training (1 item)">Security Awareness Training</a>
<a href="https://www.ciatec.com/tag/security-breach/" class="tag-cloud-link tag-link-155 tag-link-position-68" style="font-size: 8pt;" aria-label="Security Breach (1 item)">Security Breach</a>
<a href="https://www.ciatec.com/tag/sem/" class="tag-cloud-link tag-link-160 tag-link-position-69" style="font-size: 8pt;" aria-label="SEM (1 item)">SEM</a>
<a href="https://www.ciatec.com/tag/seo/" class="tag-cloud-link tag-link-159 tag-link-position-70" style="font-size: 11.876923076923pt;" aria-label="SEO (2 items)">SEO</a>
<a href="https://www.ciatec.com/tag/service-desk/" class="tag-cloud-link tag-link-30 tag-link-position-71" style="font-size: 8pt;" aria-label="Service Desk (1 item)">Service Desk</a>
<a href="https://www.ciatec.com/tag/smb/" class="tag-cloud-link tag-link-86 tag-link-position-72" style="font-size: 8pt;" aria-label="SMB (1 item)">SMB</a>
<a href="https://www.ciatec.com/tag/social-media/" class="tag-cloud-link tag-link-76 tag-link-position-73" style="font-size: 11.876923076923pt;" aria-label="Social Media (2 items)">Social Media</a>
<a href="https://www.ciatec.com/tag/ssl/" class="tag-cloud-link tag-link-276 tag-link-position-74" style="font-size: 8pt;" aria-label="SSL (1 item)">SSL</a>
<a href="https://www.ciatec.com/tag/ssl-certificate/" class="tag-cloud-link tag-link-277 tag-link-position-75" style="font-size: 8pt;" aria-label="SSL Certificate (1 item)">SSL Certificate</a>
<a href="https://www.ciatec.com/tag/statistics/" class="tag-cloud-link tag-link-78 tag-link-position-76" style="font-size: 18.338461538462pt;" aria-label="Statistics (5 items)">Statistics</a>
<a href="https://www.ciatec.com/tag/strategy/" class="tag-cloud-link tag-link-162 tag-link-position-77" style="font-size: 8pt;" aria-label="Strategy (1 item)">Strategy</a>
<a href="https://www.ciatec.com/tag/successful-online-business/" class="tag-cloud-link tag-link-103 tag-link-position-78" style="font-size: 8pt;" aria-label="Successful Online Business (1 item)">Successful Online Business</a>
<a href="https://www.ciatec.com/tag/tech-history/" class="tag-cloud-link tag-link-196 tag-link-position-79" style="font-size: 8pt;" aria-label="Tech History (1 item)">Tech History</a>
<a href="https://www.ciatec.com/tag/tech-news/" class="tag-cloud-link tag-link-111 tag-link-position-80" style="font-size: 22pt;" aria-label="Tech News (8 items)">Tech News</a>
<a href="https://www.ciatec.com/tag/trends/" class="tag-cloud-link tag-link-77 tag-link-position-81" style="font-size: 8pt;" aria-label="Trends (1 item)">Trends</a>
<a href="https://www.ciatec.com/tag/uae/" class="tag-cloud-link tag-link-230 tag-link-position-82" style="font-size: 11.876923076923pt;" aria-label="UAE (2 items)">UAE</a>
<a href="https://www.ciatec.com/tag/uber/" class="tag-cloud-link tag-link-110 tag-link-position-83" style="font-size: 8pt;" aria-label="Uber (1 item)">Uber</a>
<a href="https://www.ciatec.com/tag/ux/" class="tag-cloud-link tag-link-229 tag-link-position-84" style="font-size: 8pt;" aria-label="UX (1 item)">UX</a>
<a href="https://www.ciatec.com/tag/vdi/" class="tag-cloud-link tag-link-90 tag-link-position-85" style="font-size: 11.876923076923pt;" aria-label="VDI (2 items)">VDI</a>
<a href="https://www.ciatec.com/tag/virtual-desktop-infrastructure/" class="tag-cloud-link tag-link-89 tag-link-position-86" style="font-size: 8pt;" aria-label="Virtual Desktop Infrastructure (1 item)">Virtual Desktop Infrastructure</a>
<a href="https://www.ciatec.com/tag/wd-hard-disks-colors/" class="tag-cloud-link tag-link-106 tag-link-position-87" style="font-size: 8pt;" aria-label="WD Hard Disks Colors (1 item)">WD Hard Disks Colors</a>
<a href="https://www.ciatec.com/tag/website-security/" class="tag-cloud-link tag-link-278 tag-link-position-88" style="font-size: 8pt;" aria-label="Website Security (1 item)">Website Security</a>
<a href="https://www.ciatec.com/tag/wifi/" class="tag-cloud-link tag-link-73 tag-link-position-89" style="font-size: 8pt;" aria-label="WiFi (1 item)">WiFi</a>
		</div><!-- .tags-shortcode /-->
	</h2>
<p>The post <a href="https://www.ciatec.com/2018/02/about-ciatec/">Meet CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
