<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/one-click-video-ranker/assets/video-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
    xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
        <url>
        <loc>https://jdlgrp.com/network-monitoring/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/5kDzIo4OL48</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/5kDzIo4OL48/default.jpg</video:thumbnail_loc>
                            <video:title>Where Should Law Firms Focus Spending on Cybersecurity?</video:title>
                            <video:description>Law firms are in a unique position when it comes to information security. They regularly handle copious quantities of sensitive data spanning industries. From manufacturing to government agencies, to software providers, to hospitals and beyond, legal operations represent a dangerous attack vector that cybercriminals are eager to exploit. https://arcticwolf.com/blog/where-should-law-firms-focus-spending-on-cybersecurity/</video:description>
                            <video:duration>96</video:duration>
                            <video:publication_date>2020-08-09T03:22:27+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/ssl-vpn-gateway-assessment-service/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/5kDzIo4OL48</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/5kDzIo4OL48/default.jpg</video:thumbnail_loc>
                            <video:title>Where Should Law Firms Focus Spending on Cybersecurity?</video:title>
                            <video:description>Law firms are in a unique position when it comes to information security. They regularly handle copious quantities of sensitive data spanning industries. From manufacturing to government agencies, to software providers, to hospitals and beyond, legal operations represent a dangerous attack vector that cybercriminals are eager to exploit. https://arcticwolf.com/blog/where-should-law-firms-focus-spending-on-cybersecurity/</video:description>
                            <video:duration>96</video:duration>
                            <video:publication_date>2020-07-06T03:44:58+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/small-office-home-office-network-security/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/5kDzIo4OL48</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/5kDzIo4OL48/default.jpg</video:thumbnail_loc>
                            <video:title>Where Should Law Firms Focus Spending on Cybersecurity?</video:title>
                            <video:description>Law firms are in a unique position when it comes to information security. They regularly handle copious quantities of sensitive data spanning industries. From manufacturing to government agencies, to software providers, to hospitals and beyond, legal operations represent a dangerous attack vector that cybercriminals are eager to exploit. https://arcticwolf.com/blog/where-should-law-firms-focus-spending-on-cybersecurity/</video:description>
                            <video:duration>96</video:duration>
                            <video:publication_date>2020-06-08T18:25:18+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/dark-web-scan/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/5kDzIo4OL48</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/5kDzIo4OL48/default.jpg</video:thumbnail_loc>
                            <video:title>Where Should Law Firms Focus Spending on Cybersecurity?</video:title>
                            <video:description>Law firms are in a unique position when it comes to information security. They regularly handle copious quantities of sensitive data spanning industries. From manufacturing to government agencies, to software providers, to hospitals and beyond, legal operations represent a dangerous attack vector that cybercriminals are eager to exploit. https://arcticwolf.com/blog/where-should-law-firms-focus-spending-on-cybersecurity/</video:description>
                            <video:duration>96</video:duration>
                            <video:publication_date>2020-04-19T23:18:39+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/data-breach-cost-calculator/</loc>
        <video:video>
                                                        <video:thumbnail_loc>https://i.ytimg.com/vi/5kDzIo4OL48/default.jpg</video:thumbnail_loc>
                            <video:title>Where Should Law Firms Focus Spending on Cybersecurity?</video:title>
                            <video:description>Law firms are in a unique position when it comes to information security. They regularly handle copious quantities of sensitive data spanning industries. From manufacturing to government agencies, to software providers, to hospitals and beyond, legal operations represent a dangerous attack vector that cybercriminals are eager to exploit. https://arcticwolf.com/blog/where-should-law-firms-focus-spending-on-cybersecurity/</video:description>
                            <video:duration>96</video:duration>
                            <video:publication_date>2020-04-19T04:31:17+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/mtr/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/5kDzIo4OL48</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/5kDzIo4OL48/default.jpg</video:thumbnail_loc>
                            <video:title>Where Should Law Firms Focus Spending on Cybersecurity?</video:title>
                            <video:description>Law firms are in a unique position when it comes to information security. They regularly handle copious quantities of sensitive data spanning industries. From manufacturing to government agencies, to software providers, to hospitals and beyond, legal operations represent a dangerous attack vector that cybercriminals are eager to exploit. https://arcticwolf.com/blog/where-should-law-firms-focus-spending-on-cybersecurity/</video:description>
                            <video:duration>96</video:duration>
                            <video:publication_date>2020-04-18T22:16:03+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/remote-employee-security/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/5kDzIo4OL48</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/5kDzIo4OL48/default.jpg</video:thumbnail_loc>
                            <video:title>Where Should Law Firms Focus Spending on Cybersecurity?</video:title>
                            <video:description>Law firms are in a unique position when it comes to information security. They regularly handle copious quantities of sensitive data spanning industries. From manufacturing to government agencies, to software providers, to hospitals and beyond, legal operations represent a dangerous attack vector that cybercriminals are eager to exploit. https://arcticwolf.com/blog/where-should-law-firms-focus-spending-on-cybersecurity/</video:description>
                            <video:duration>96</video:duration>
                            <video:publication_date>2020-04-17T23:38:17+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/nysba-portal/</loc>
        <video:video>
                            <video:player_loc>https://youtu.be/1Cji-M31fdo</video:player_loc>
                            <video:thumbnail_loc>http://jdlgrp.com/wp-content/uploads/2018/01/causes-of-security-data-breaches.png</video:thumbnail_loc>
                            <video:title>JDL Network Security Assessment and Managed Security Services</video:title>
                            <video:description>JDL Group is dedicated to one task: protecting your information and data. As a managed security service provider, our team is equipped to serve all your IT and computer security needs. We can assess your organization and provide the right security services for you. Data loss prevention, risk assessment, and network infrastructure are just a few of the services we offer.</video:description>
                            <video:duration>97</video:duration>
                            <video:publication_date>2019-05-30T20:49:27+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/rise-sd-wan-2/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/jaNZiFFg-38</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/jaNZiFFg-38/default.jpg</video:thumbnail_loc>
                            <video:title>FortiGate FortiOS 6.0 SD-WAN Demo</video:title>
                            <video:description>Learn more on how the FortiOS 6.0 can provide SD-WAN capabilities on a FortiGate for greater application visibility and application steering to prioritize business application performance.</video:description>
                            <video:duration>452</video:duration>
                            <video:publication_date>2018-12-17T16:01:26+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/protecting-your-law-firm-in-2019-part-1/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/5kDzIo4OL48</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/5kDzIo4OL48/default.jpg</video:thumbnail_loc>
                            <video:title>Where Should Law Firms Focus Spending on Cybersecurity?</video:title>
                            <video:description>Law firms are in a unique position when it comes to information security. They regularly handle copious quantities of sensitive data spanning industries. From manufacturing to government agencies, to software providers, to hospitals and beyond, legal operations represent a dangerous attack vector that cybercriminals are eager to exploit. https://arcticwolf.com/blog/where-should-law-firms-focus-spending-on-cybersecurity/</video:description>
                            <video:duration>96</video:duration>
                            <video:publication_date>2018-09-24T17:49:46+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/5-tips-to-keep-your-mobile-workforce-safe-and-secure/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/caNWd_92UPs</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/caNWd_92UPs/default.jpg</video:thumbnail_loc>
                            <video:title>Snow Storm</video:title>
                            <video:description>Like preparing for a winter storm, cloud security requires proper planning and response. https://arcticwolf.com/blog/weathering-the-cloud-security-storm-this-holiday-season/</video:description>
                            <video:duration>91</video:duration>
                            <video:publication_date>2018-09-04T15:28:45+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/defining-the-eight-most-nefarious-cyber-threats/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/cb9CAkd8i8k</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/cb9CAkd8i8k/default.jpg</video:thumbnail_loc>
                            <video:title>Uber Attack</video:title>
                            <video:description>Bloomberg reported that Uber lost the personal data of 57 million users in a data breach in October 2016.
Two attackers accessed a private GitHub coding site used by Uber software engineers and then used login credentials they obtained there to access data stored on an Amazon Web Services accounts that handled computing tasks for the company. https://arcticwolf.com/uncategorized/recently-revealed-uber-attack-shows-that-multi-cloud-cyberthreats-are-already-coming-for-you/</video:description>
                            <video:duration>84</video:duration>
                            <video:publication_date>2018-08-21T18:54:01+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/prevent-phishing/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/rcD3UVNHT5s</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/rcD3UVNHT5s/default.jpg</video:thumbnail_loc>
                            <video:title>Dont take the bait Top tips to avoid phishing emails</video:title>
                                                        <video:duration>87</video:duration>
                            <video:publication_date>2018-05-08T17:30:41+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/managed-security-services-provider-in-new-jersey/</loc>
        <video:video>
                            <video:player_loc>https://youtu.be/f3tY6pgjzP0</video:player_loc>
                            <video:thumbnail_loc>http://jdlgrp.com/wp-content/uploads/2017/10/cybersecurity-for-law-firms.jpg</video:thumbnail_loc>
                            <video:title>Capital One Data Breach</video:title>
                            <video:description>An unauthorized third-party accessed the information for 106 million people by exploiting a configuration vulnerability.  (Cyware Hacker News) Automated security scans can detect vulnerabilities and breaches.  Contact JDL Group today to learn more about Managed Detection and Response and protect your business.</video:description>
                            <video:duration>31</video:duration>
                            <video:publication_date>2018-04-13T15:32:55+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/atlantas-computer-systems-infected-with-ransomware-hackers-are-demanding-over-50000-in-bitcoin/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/RhjQk4HYnQY</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/RhjQk4HYnQY/default.jpg</video:thumbnail_loc>
                            <video:title>N C  county weighs paying cyber hackers $26K ransom for servers held hostage</video:title>
                            <video:description>Officials in North Carolina's Mecklenburg County were in touch with hackers, believed to be from Iran or Ukraine, and planned to decide Wednesday evening whether to pay them $26,000 to win the release of multiple files held hostage on county servers.

County manager Dena Diorio told reporters it could take &quot;days not hours&quot; to restore the computers and bring full service back, regardless of whether the county pays the ransom. https://www.usatoday.com/story/news/2017/12/06/hackers-shut-down-mecklenburg-county-servers-demand-23-k-ransom/926779001/</video:description>
                            <video:duration>70</video:duration>
                            <video:publication_date>2018-03-27T17:59:46+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/spectre-and-meltdown-vulnerabilities-what-happened-and-how-to-secure-your-computers/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/qIXVch5t6Ts</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/qIXVch5t6Ts/default.jpg</video:thumbnail_loc>
                            <video:title>Damage from the Meltdown and Spectre CPU exploits</video:title>
                            <video:description>The shocking Meltdown and Spectre vulnerabilities, discovered independently by multiple researchers, take advantage of fundamental design flaws in all chips manufactured through December 2017. The result is an extraordinary security risk to the data of any application on an OS supported by the exploited CPU types. https://arcticwolf.com/uncategorized/assessing-the-damage-from-the-meltdown-and-spectre-cpu-exploits/</video:description>
                            <video:duration>82</video:duration>
                            <video:publication_date>2018-02-13T18:16:07+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/risk-assessment-cyber-security/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/om8j66HqaUU</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/om8j66HqaUU/default.jpg</video:thumbnail_loc>
                            <video:title>5 Security Trends and Predictions for 2018</video:title>
                            <video:description>2017 was a banner year for cybercrime. But 2018 is already here, and that means it’s time to set our sights on the year ahead.

Here’s what we expect to see in the next 12 months https://arcticwolf.com/blog/5-security-trends-and-predictions-for-2018/</video:description>
                            <video:duration>31</video:duration>
                            <video:publication_date>2018-01-22T18:34:45+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/responding-to-a-data-breach-best-practices/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/PzKG2co04KA</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/PzKG2co04KA/default.jpg</video:thumbnail_loc>
                            <video:title>99 problems</video:title>
                            <video:description>When it comes to your IT responsibilities, being able to recover data and maintain business continuity is among the most critical. But, there’s tradeoffs to factor in between cost, convenience and the benefit. https://www.infrascale.com/99-problems-automated-orchestration-aint-1/</video:description>
                            <video:duration>106</video:duration>
                            <video:publication_date>2017-10-16T07:00:26+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/life-science/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/2Mv-BPse_4A</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/2Mv-BPse_4A/default.jpg</video:thumbnail_loc>
                            <video:title>The endpoint attack chain simplified</video:title>
                            <video:description>https://news.sophos.com/en-us/2018/05/03/the-endpoint-attack-chain-simplified/ A comprehensive, defense in depth strategy using layers of overlapping protection has proven to be one of the best approaches to cybersecurity. This is why studying the attack chain, or cyber kill chain, to understand the different steps attackers take, is so crucial.</video:description>
                            <video:duration>111</video:duration>
                            <video:publication_date>2017-09-19T09:30:00+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/about-us/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/7jTvBKaVMnA</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/7jTvBKaVMnA/default.jpg</video:thumbnail_loc>
                            <video:title>JDL Group - go for IT</video:title>
                            <video:description>Introducing, the JDL Group. Your one-stop-IT-provider. 

For more information go to, www.JDLGRP.com
or contact jdasilva@jdlgrp.com</video:description>
                            <video:duration>66</video:duration>
                            <video:publication_date>2017-09-06T08:12:09+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/legal-security-compliance/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/5kDzIo4OL48</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/5kDzIo4OL48/default.jpg</video:thumbnail_loc>
                            <video:title>Where Should Law Firms Focus Spending on Cybersecurity?</video:title>
                            <video:description>Law firms are in a unique position when it comes to information security. They regularly handle copious quantities of sensitive data spanning industries. From manufacturing to government agencies, to software providers, to hospitals and beyond, legal operations represent a dangerous attack vector that cybercriminals are eager to exploit. https://arcticwolf.com/blog/where-should-law-firms-focus-spending-on-cybersecurity/</video:description>
                            <video:duration>96</video:duration>
                            <video:publication_date>2017-09-06T08:04:17+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/networking/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/qIXVch5t6Ts</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/qIXVch5t6Ts/default.jpg</video:thumbnail_loc>
                            <video:title>Damage from the Meltdown and Spectre CPU exploits</video:title>
                            <video:description>The shocking Meltdown and Spectre vulnerabilities, discovered independently by multiple researchers, take advantage of fundamental design flaws in all chips manufactured through December 2017. The result is an extraordinary security risk to the data of any application on an OS supported by the exploited CPU types. https://arcticwolf.com/uncategorized/assessing-the-damage-from-the-meltdown-and-spectre-cpu-exploits/</video:description>
                            <video:duration>82</video:duration>
                            <video:publication_date>2017-08-31T09:39:56+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/compliance-security/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/Ki0kuw0Jckw</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/Ki0kuw0Jckw/default.jpg</video:thumbnail_loc>
                            <video:title>The Rising Risks of Cryptocurrency-Mining Malware</video:title>
                            <video:description>Do you own any Bitcoin (BTC)? The world’s most famous cryptocurrency had a banner year in 2017, with prices surging to all-time highs (above $19,700 per BTC) in late december. While it was designed as an alternative currency, BTC has become more akin to gold – i.e., a store of value, although with a more volatile price. https://arcticwolf.com/uncategorized/the-rising-risks-of-cryptocurrency-mining-malware/</video:description>
                            <video:duration>85</video:duration>
                            <video:publication_date>2017-08-30T01:43:57+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/the-s-in-https-is-more-important-than-you-may-think/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/v4hujYR4P1E</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/v4hujYR4P1E/default.jpg</video:thumbnail_loc>
                            <video:title>2017 The State of Internet Security</video:title>
                            <video:description>The third quarter of 2017 had its share of cyber security disasters. The Yahoo breach, which
had previously been reported to have affected 1 billion accounts, now appears to have
affected all 3 billion accounts on the platform. A major credit reporting company, Equifax,
announced it was compromised, exposing the sensitive data of 146 million u.s. citizens.
 This should create a sense
of urgency to finally tackle the problem of insecure software. Yet, conventional wisdom
in security circles has drifted away from prevention in recent years toward detection and
response. https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q3-2017-state-of-the-internet-security-report.pdf?mkt_tok=eyJpIjoiWVRVek4yVmlZV0UyTkRWaCIsInQiOiJ6T2VMOUF5cDB0b0dhRGFPTm5hN25Cb3NvNmMxczltb3hxSzA4bHcxMUhkN3AxTFRpTVVya2N0UEc0UXQ2UGIwZ3dvKzZvZEc0NUNjN0FvZmtGTGM2RDJxQVY1QVF4RHhGdlFYVVpwdStDRDhWWXBkZDlhZktcL1MwajdnSWhXK1YifQ%3D%3D</video:description>
                            <video:duration>69</video:duration>
                            <video:publication_date>2017-01-31T22:34:29+00:00</video:publication_date>
                    </video:video>
    </url>
        <url>
        <loc>https://jdlgrp.com/3-compelling-reasons-why-your-business-should-move-to-the-cloud/</loc>
        <video:video>
                            <video:player_loc>https://www.youtube-nocookie.com/v/SHFH81P2GU4</video:player_loc>
                            <video:thumbnail_loc>https://i.ytimg.com/vi/SHFH81P2GU4/default.jpg</video:thumbnail_loc>
                            <video:title>Cloud Visibility</video:title>
                            <video:description>Cloud adopters need to implement cloud visibility platforms to avoid and mitigate security risks and optimize performance of cloud apps and services. No platform—whether in the data center or in the cloud—is completely safe, but ensuring all cloud traffic is inspected and monitored is your best defense against application disruption or security breaches. https://www.ixiacom.com/company/blog/cloud-user-survey-operational-concerns-dominate</video:description>
                            <video:duration>121</video:duration>
                            <video:publication_date>2017-01-04T22:45:24+00:00</video:publication_date>
                    </video:video>
    </url>
</urlset>

