<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.concentricsolvesit.com/blogs/tag/audit/feed" rel="self" type="application/rss+xml"/><title>Concentric IT Solutions - Tech Talk #audit</title><description>Concentric IT Solutions - Tech Talk #audit</description><link>https://www.concentricsolvesit.com/blogs/tag/audit</link><lastBuildDate>Fri, 27 Mar 2026 02:00:32 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Don't Risk It!  Why You Shouldn't Skip Vulnerability Assessments]]></title><link>https://www.concentricsolvesit.com/blogs/post/tech-talk-volume-0032-001</link><description><![CDATA[<img align="left" hspace="5" src="https://www.concentricsolvesit.com/TTT_Blog-Post-Social-Image-Why-You-Shouldnt-Skip-Vulnerability-Assessments-V1.png"/>Cyber threats are a perpetual reality for business owners. Hackers are constantly innovating new ways to exploit vulnerabilities. One of the most crucial elements of cybersecurity is regular vulnerability assessments.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_wWRraNigScilbpu_2Y5r-Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_QX2pkErBRzijgoIt5gGDow" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_jcr9iGvURQy5hGZy2wYhEQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7lJnTD5URquIxLN9nqYnTA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;">Cyber threats are a perpetual reality for business owners. Hackers are constantly innovating. They devise new ways to exploit vulnerabilities in computer systems and networks. </p><p style="text-align:left;"><br/></p><p style="text-align:left;">For businesses of all sizes, a proactive approach to cybersecurity is essential. One of the most crucial elements of this approach is regular vulnerability assessments. A vulnerability assessment is a systematic process. It identifies and prioritizes weaknesses in your IT infrastructure that attackers can exploit. </p><p style="text-align:left;"><br/></p><p style="text-align:left;">Some businesses may be tempted to forego vulnerability assessments. They might think it’s too costly or inconvenient. Small business leaders may also feel it’s just for the “big companies.” But vulnerability assessments are for everyone. No matter the company size. The risks associated with skipping them can be costly.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><a href="https://www.statista.com/statistics/500755/worldwide-common-vulnerabilities-and-exposures/"><b><i>In 2023, there were over 29,000 new IT vulnerabilities discovered</i></b></a><b><i>. That’s the highest count reported to date.</i></b></p><p style="text-align:left;"><b><i><br/></i></b></p><p style="text-align:left;">In this article, we explore the critical role of vulnerability assessments. As well as their benefits and how they help to maintain a robust cybersecurity posture. We’ll also look at the potential consequences of neglecting them.</p><p style="text-align:left;"><br/></p><h2 style="text-align:left;">Why Vulnerability Assessments Matter</h2><p style="text-align:left;"><br/></p><p style="text-align:left;">The internet has become a minefield for businesses. Cybercriminals are constantly on the lookout for vulnerabilities to exploit. Once they do, they typically aim for one or more of the following:</p><p style="text-align:left;"><br/></p><ul><li style="text-align:left;"><span style="color:inherit;">Gain unauthorized access to sensitive data</span></li><li style="text-align:left;"><span style="color:inherit;">Deploy ransomware attacks</span></li><li style="text-align:left;"><span style="color:inherit;">Disrupt critical operations</span></li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;">Here's why vulnerability assessments are crucial in this ever-evolving threat landscape:</p><p style="text-align:left;"><br/></p><ul><li style="text-align:left;"><b>Unseen Weaknesses:</b> Many vulnerabilities remain hidden within complex IT environments. Regular assessments uncover these weaknesses before attackers can exploit them.</li><li style="text-align:left;"><b>Evolving Threats:</b> Experts discover new vulnerabilities all the time. Regular assessments ensure your systems are up to date. And that they're protected from potential security gaps.</li><li style="text-align:left;"><b>Compliance Requirements:</b> Many industries have regulations mandating regular vulnerability assessments. This helps to ensure data security and privacy compliance.</li><li style="text-align:left;"><b>Proactive Approach vs. Reactive Response: </b>Identifying vulnerabilities proactively allows for timely remediation. This significantly reduces the risk of a costly security breach. A reactive approach is where you only address security issues after an attack. This can lead to significant financial losses and disruptions to your business.</li></ul><p style="text-align:left;"><br/></p><h2 style="text-align:left;">The High Cost of Skipping Vulnerability Assessments</h2><p style="text-align:left;"><br/></p><p style="text-align:left;">Some business owners might think vulnerability assessments seem like an unnecessary expense. But the cost of neglecting them can be far greater. Here are some potential consequences of skipping vulnerability assessments:</p><p style="text-align:left;"><br/></p><h3 style="text-align:left;">Data Breaches</h3><p style="text-align:left;">Unidentified vulnerabilities leave your systems exposed. This makes them prime targets for cyberattacks. Just one breach can result in the theft of sensitive data and customer information.</p><p style="text-align:left;"><br/></p><h3 style="text-align:left;">Financial Losses</h3><p style="text-align:left;">Data breaches can lead to hefty fines and legal repercussions. As well as the cost of data recovery and remediation. Business disruptions caused by cyberattacks can also result in lost revenue and productivity.</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><a href="https://www.ibm.com/reports/data-breach">The current average cost of a data breach is $4.45 million</a>. This represents an increase of 15% over the last three years. These costs continue to increase, making cybersecurity a necessity for ongoing business survival.</p><p style="text-align:left;"><br/></p><h3 style="text-align:left;">Reputational Damage</h3><p style="text-align:left;">A security breach can severely damage your company's reputation. It can erode customer trust and potentially impact future business prospects. Both B2B and B2C customers hesitate to do business with a company that has experienced a breach.</p><p style="text-align:left;"><br/></p><h3 style="text-align:left;">Loss of Competitive Advantage</h3><p style="text-align:left;">Cyberattacks can cripple your ability to innovate and compete effectively. This can hinder your long-term growth aspirations. Rather than forward motion on innovation, your company is playing security catch-up.</p><p style="text-align:left;"><br/></p><h2 style="text-align:left;">The Benefits of Regular Vulnerability Assessments</h2><p style="text-align:left;"><br/></p><p style="text-align:left;">Regular vulnerability assessments offer a multitude of benefits for your business:</p><p style="text-align:left;"><br/></p><ul><li style="text-align:left;"><b>Improved Security Posture:</b> Vulnerability assessments identify and address vulnerabilities. This means you significantly reduce the attack surface for potential cyber threats.</li><li style="text-align:left;"><b>Enhanced Compliance:</b> Regular assessments help you stay compliant with relevant industry regulations. As well as data privacy laws your business is subject to.</li><li style="text-align:left;"><b>Peace of Mind:</b> Knowing your network is secure from vulnerabilities gives you peace of mind. It allows you to focus on core business operations.</li><li style="text-align:left;"><b>Reduced Risk of Costly Breaches:</b> Proactive vulnerability management helps prevent costly data breaches. As well as the associated financial repercussions.</li><li style="text-align:left;"><b>Improved Decision-Making:</b> Vulnerability assessments provide valuable insights into your security posture. This enables data-driven decisions about security investments and resource allocation.</li></ul><p style="text-align:left;"><br/></p><h2 style="text-align:left;">The Vulnerability Assessment Process: What to Expect</h2><p style="text-align:left;"><br/></p><p style="text-align:left;">A vulnerability assessment typically involves several key steps:</p><p style="text-align:left;"><br/></p><p style="text-align:left;"><b>1.<span style="font-weight:normal;font-size:7pt;">&nbsp; </span></b><b>Planning and Scoping:</b> Define the scope of the assessment. This includes outlining what systems and applications are part of the evaluation.</p><p style="text-align:left;"><b>2.<span style="font-weight:normal;font-size:7pt;">&nbsp; </span></b><b>Discovery and Identification:</b> Use specialized tools and techniques to scan your IT infrastructure. They will look for known vulnerabilities.</p><p style="text-align:left;"><b>3.<span style="font-weight:normal;font-size:7pt;">&nbsp; </span></b><b>Prioritization and Risk Assessment:</b> Classify vulnerabilities based on severity and potential impact. Focus on critical vulnerabilities that need immediate remediation.</p><p style="text-align:left;"><b>4.<span style="font-weight:normal;font-size:7pt;">&nbsp; </span></b><b>Remediation and Reporting:</b> Develop a plan to address identified vulnerabilities. This should include patching, configuration changes, and security updates. Generate a detailed report that outlines the vulnerabilities found. As well as their risk level, and remediation steps taken.</p><p style="text-align:left;">&nbsp;</p><h2 style="text-align:left;"><span style="font-size:34px;">Investing in Security is Investing in Your Future</span></h2><p style="text-align:left;"><br/></p><p style="text-align:left;">Vulnerability assessments are not a one-time fix. Your business should conduct them regularly to maintain a robust cybersecurity posture. By proactively identifying and addressing vulnerabilities, you can:</p><p style="text-align:left;"><br/></p><ul><li style="text-align:left;">Significantly reduce your risk of cyberattacks</li><li style="text-align:left;">Protect sensitive data</li><li style="text-align:left;">Ensure business continuity</li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;">Remember, cybersecurity is an ongoing process. Vulnerability assessments are a vital tool in your security arsenal. Don't gamble with your organization's future. Invest in vulnerability assessments and safeguard your valuable assets</p><p style="text-align:left;"><br/></p><h2 style="text-align:left;">Contact Us Today to Schedule a Vulnerability Assessment</h2><p style="text-align:left;"><br/></p><p style="text-align:left;">When was the last time your business had any vulnerability testing? No matter your size, we can help. Our vulnerability assessment will look for any weaknesses in your infrastructure. Then, we take the next steps and provide you with actionable recommendations.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Contact us today to schedule a vulnerability assessment for better security.</p><p style="text-align:left;"><br/></p><b><div style="text-align:left;"><b style="color:inherit;"><span style="font-size:11pt;">Article used with permission from </span></b><span style="color:inherit;font-weight:normal;font-size:11pt;"><a href="https://thetechnologypress.com/dont-risk-it-why-you-shouldnt-skip-vulnerability-assessments/" target="_blank"><b>The Technology Press.</b></a></span></div></b></div></div>
</div><div data-element-id="elm_XRdl0pL2R1KLFuae3v3YuQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 Jun 2024 07:46:00 -0700</pubDate></item><item><title><![CDATA[Ransomware and You]]></title><link>https://www.concentricsolvesit.com/blogs/post/Ransomware-and-You</link><description><![CDATA[<img align="left" hspace="5" src="https://www.concentricsolvesit.com/files/Pictures/Fortress_Hackers_LargeRes.jpg"/>Ransomware's effects are expensive and far-reaching. Protect your business.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_sg0A-Tx6Szy-1zgWAMlqug" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_byMrpOHZSp6xBy0gzOpEQw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_pj6IYuqMS2-HLPMJZu0U6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_O0ughjg9THyoWxcPvV8W4Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_O0ughjg9THyoWxcPvV8W4Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Ransomware gangs want to get to know your business</h2></div>
<div data-element-id="elm_HH-F1hGpScaDSnrDExB19w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HH-F1hGpScaDSnrDExB19w"].zpelem-text { color:#FFFFFF ; border-radius:1px; } [data-element-id="elm_HH-F1hGpScaDSnrDExB19w"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#FFFFFF ; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p><span style="background-color:rgb(0, 0, 0);">Ransomware has become a major threat to organizations and businesses worldwide.&nbsp; Ransomware is a type of malicious software that encrypts files on a computer system and demands payment in exchange for the decryption key.&nbsp; The cost of ransomware attacks is staggering, with businesses paying millions of dollars per event to retrieve their data.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">The impact of a ransomware attack can be catastrophic, as it can lead to the loss of critical data, damage to reputation, and financial losses.&nbsp; In some cases, the cost of the ransom is less than the cost of the data that was lost.&nbsp; Moreover, there is no guarantee that paying the ransom will result in a full decryption of the data.&nbsp; Imagine first negotiating with the same criminals who attacked your business, then jumping through the hoops to pay them their ill-gotten gains only to find the decryption key doesn't even work properly.&nbsp; That's a bad day.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Ransomware attacks used to be a single form of extortion - encrypted data requires the key to decrypt.&nbsp; Thus, the exchange was in exchange for the key to get back into your systems and access your data.&nbsp; Today's ransomware attacks are double and triple extortion events that including data exfiltration and even DDOS attacks to bring down your web facing services.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">The best recovery against ransomware's data encryption is to have a comprehensive backup system in place.&nbsp; Backing up your data regularly ensures that you can restore your system to a previous state in case of an attack.&nbsp; It is important to also keep backups offsite and disconnected from the network to prevent them from being encrypted by the ransomware.&nbsp; This is sometimes referred to as an air-gapped backup.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Another important defense against ransomware is to patch information systems against disclosed vulnerabilities.&nbsp; Software vendors frequently release security patches to address vulnerabilities in their products.&nbsp; Failing to apply these patches can leave your system vulnerable to attack.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Furthermore, organizations should have a comprehensive security program that includes training employees on how to identify and avoid phishing emails and other social engineering attacks that are commonly used to spread ransomware.&nbsp; It is important to educate employees on how to recognize suspicious emails and links, and to report them to the appropriate person in the organization.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Ransomware is a significant threat that can have severe consequences for organizations and businesses these days.&nbsp; Backing up your data regularly, patching information systems against disclosed vulnerabilities, and educating employees on how to avoid social engineering attacks are essential measures to mitigate the risk of ransomware.&nbsp; By implementing these measures, organizations can reduce the impact of ransomware attacks and ensure that they are better prepared to recover from them.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p>If you're interested in learning more, please contact us and schedule an appointment.&nbsp; We offer services and solutions that help to prevent ransomware attacks and can dramatically reduce time to containment and recovery if there is an event.</p></div></div>
</div><div data-element-id="elm_MbvxiU3dRQKqgXNlkhGMQw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 27 Apr 2023 13:23:59 -0700</pubDate></item><item><title><![CDATA[Why you should audit your IT systems annually]]></title><link>https://www.concentricsolvesit.com/blogs/post/Why-you-should-audit-IT-annually</link><description><![CDATA[<img align="left" hspace="5" src="https://www.concentricsolvesit.comhttps://images.unsplash.com/photo-1556761175-b413da4baf72?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"/>Is your IT provider auditing your technology annually? They should be.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_EOoF6ZE-QcehAwQif2EZxQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_p0ULqvRWSZ2yk2fkPf2W5Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ICgKyXM0ScyWlC8kfWpwiw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_kPodg8qlSOOWA-rzoW2Z1g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_kPodg8qlSOOWA-rzoW2Z1g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:rgb(36, 172, 228);">Auditing - for more than accounting reasons</span></h2></div>
<div data-element-id="elm_Zx9kM50HTq6K_xA4tWMZ7A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Zx9kM50HTq6K_xA4tWMZ7A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">In most cases, the unfortunate truth about business systems and technology is that they can go out of date very quickly.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">How do you keep up with new technologies and make sure you have a competitive advantage?</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">In this article, we will outline some simple example steps your IT provider should be doing on an annual basis, to keep you informed and your business up to date with the latest IT technologies. </span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">An IT systems audit should be scheduled, conducted and reviewed at least annually.&nbsp; When this takes place very much depends on your business operation.&nbsp; A good rule of thumb is to carry out an audit before quieter times of the year.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">This helps the business to plan any upgrades and projects to coincide with those quieter times which will cause less disruption to the business.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">The following items are examples of some components an audit should include.&nbsp; This is&nbsp;<span style="font-style:italic;text-decoration-line:underline;">not</span>&nbsp;a complete list.&nbsp; Let's get started:</span></p><p><span>&nbsp;</span></p><p><span style="font-size:30px;"><span style="color:rgb(36, 172, 228);">Age of equipment</span></span></p><p><span>&nbsp;</span></p><ul><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">An inventory of all IT equipment should be kept, this should include model numbers, serial numbers, manufacturer and more importantly warranty status.</span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">IT equipment which includes desktops, laptop, servers tend to have an optimal performance life cycle of between 3 - 5 years.&nbsp; </span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">Maintaining an inventory with this information allows the business and IT provider to plan for upgrades.&nbsp; You can easily prioritize which machines should be renewed or upgraded using the inventory list.</span></li></ul><p><span>&nbsp;</span></p><h2><span style="color:rgb(36, 172, 228);">Automation</span></h2><p><span>&nbsp;</span></p><ul><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">The audit should also look to include an overview of manual tasks or problems in the business.</span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">Is there a manual, repetitive task that could be automated?&nbsp; This could be something as easy as duplicate data input by a member of staff.&nbsp; </span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">You might have 2 systems in place that require the same data to be input, why not automate this so data it is entered manually only once?&nbsp; </span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">Automation is becoming more common in the workplace and services such as Microsoft Power Automate and Zapier allow business to work smarter, not harder.</span></li></ul><p><span>&nbsp;</span></p><p><span>&nbsp;</span></p><h2 style="line-height:1.5;"></h2><h2 style="line-height:1.5;"><span style="color:rgb(36, 172, 228);">Disaster Recovery Test</span><span style="font-size:16px;"><p><br></p><ul><li style="text-align:left;">Backups should be tested monthly to ensure files can be successfully restored, but disaster recovery is meant for larger events</li><li style="text-align:left;">More insurance providers are now offering &quot;Cyber Insurance&quot; critical insurance that any business that has been hacked will make a top priority when renewing.</li><li style="text-align:left;">A little known fact about cyber insurance is the need for a disaster recovery plan with answers to questions such as &quot;how long will it take your business to recover&quot;&nbsp; and &quot;when was the last time your disaster recover was tested?&quot; </li><li style="text-align:left;">This highlights the need for at least an annual test of your recovery process and should be included as part of an IT audit.</li></ul><p><br></p><p>&nbsp;</p><p><span style="font-size:18px;">For more information about how we can help your business and provide an independent 3rd party IT audit of your systems and technology, follow the &quot;Get Started Now&quot; link below.</span></p><p><span style="font-size:18px;"><br></span></p></span></h2></div>
</div><div data-element-id="elm_TxBo4naeTyCz8YY-bo8xOQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 12 Jun 2020 23:46:46 -0700</pubDate></item></channel></rss>