<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:media="http://search.yahoo.com/mrss/">
    <channel><title>Consumer Insights</title><description>News, views and insights from the Bitdefender experts</description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/</link><image><url>https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png</url><title>Consumer Insights</title><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/</link></image><generator>Bitdefender Blog</generator><lastBuildDate>Mon, 16 Mar 2026 15:44:23 GMT</lastBuildDate><atom:link href="https://www.bitdefender.com/nuxt/api/en-gb/rss/hotforsecurity/very-small-business/" rel="self" type="application/rss+xml"/><ttl>1800</ttl><item><title>Small business owners lose $95,000 after a “QuickBooks support” callback scam</title><description><![CDATA[A small business owner shared a frightening experience online after scammers drained nearly $95,000 from their company account following what appeared to be a legitimate QuickBooks support call.

The story, shared on Reddit as a warning to others, shows how convincing modern support scams have become and why even cautious business owners can still fall victim.

The couple runs a small business and were simply trying to fix an accounting error. They entered a wrong number for a check, so they con]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/quickbooks-support-callback-scam</link><guid isPermaLink="false">69b7d9652fa53a9f2eef4e41</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Mon, 16 Mar 2026 10:27:17 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/03/Small-business-owners-lose--95-000-after-a--QuickBooks-support--callback-scam.jpg" medium="image"/><content:encoded><![CDATA[A small business owner shared a frightening experience online after scammers drained nearly $95,000 from their company account following what appeared to be a legitimate QuickBooks support call.

The story, shared on Reddit as a warning to others, shows how convincing modern support scams have become and why even cautious business owners can still fall victim.

The couple runs a small business and were simply trying to fix an accounting error. They entered a wrong number for a check, so they con]]></content:encoded></item><item><title>5 practical cybersecurity steps for small financial services businesses</title><description><![CDATA[ If you run an accounting firm, tax practice, bookkeeping service, mortgage brokerage, financial advisory office, or small insurance agency, your business runs on trust. You handle tax returns, payroll data, bank details, loan applications, investment accounts, and insurance policies. 

That makes you extremely valuable, not just to your clients, but to cybercriminals.


Key Statistics Small Financial Firms Should Know

The 2025 Verizon Data Breach Investigations Report shows that in the Financi]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/5-practical-cybersecurity-steps-for-small-financial-services-businesses</link><guid isPermaLink="false">69a829bb2fa53a9f2eef46c0</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Wed, 04 Mar 2026 12:53:51 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/03/5-practical-cybersecurity-steps-for-small-financial-services-businesses.jpg" medium="image"/><content:encoded><![CDATA[ If you run an accounting firm, tax practice, bookkeeping service, mortgage brokerage, financial advisory office, or small insurance agency, your business runs on trust. You handle tax returns, payroll data, bank details, loan applications, investment accounts, and insurance policies. 

That makes you extremely valuable, not just to your clients, but to cybercriminals.


Key Statistics Small Financial Firms Should Know

The 2025 Verizon Data Breach Investigations Report shows that in the Financi]]></content:encoded></item><item><title>How Account Takeovers Hurt Small Hospitality Businesses, And How to Protect Your Bookings</title><description><![CDATA[In hospitality, bookings are your cash flow, your payroll, your rent, your next supplier payment. Whether you run a small hotel, a guesthouse, a few Airbnb apartments, a restaurant, a tour company, or a beauty salon, your business lives inside digital platforms. Reservations arrive through Booking.com or Airbnb, guests message you on Instagram, and confirmations go out by email.

Your calendar, your inbox, and your booking accounts are your front desk.

And if someone takes control of one of tho]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/account-takeovers-in-small-hospitality-businesses</link><guid isPermaLink="false">69a15df72fa53a9f2eef4400</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Fri, 27 Feb 2026 09:17:49 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/How-Account-Takeovers-Hurt-Small-Hospitality-Businesses--And-How-to-Protect-Your-Bookings.jpg" medium="image"/><content:encoded><![CDATA[In hospitality, bookings are your cash flow, your payroll, your rent, your next supplier payment. Whether you run a small hotel, a guesthouse, a few Airbnb apartments, a restaurant, a tour company, or a beauty salon, your business lives inside digital platforms. Reservations arrive through Booking.com or Airbnb, guests message you on Instagram, and confirmations go out by email.

Your calendar, your inbox, and your booking accounts are your front desk.

And if someone takes control of one of tho]]></content:encoded></item><item><title>Why smart people approve bad payments: How handling payments on your phone puts your business at risk</title><description><![CDATA[Bad payments rarely happen when you’re sitting calmly at your desk with a coffee next to you. They happen on the move, in those small in-between moments when you’re trying to be efficient and solve one more thing before the day runs away from you.

Maybe you’re in the car waiting for your child to finish practice, or between meetings. You’re replying to messages while walking the dog because that’s when you finally have ten quiet minutes to clear your inbox.

A message arrives that appears to co]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/why-smart-people-approve-bad-payments-how-handling-payments-on-your-phone-puts-your-business-at-risk-2</link><guid isPermaLink="false">699f41942fa53a9f2eef428f</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Wed, 25 Feb 2026 18:46:23 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/Season-to-pay-Tax--Budget--and-Tax-planning-concept.-Business-woman-wear-glasses-calculating-annual-tax-and-using-mobile-phone.-Calendar-2021-and-personal-income-tax-form-placed-on-home-office-desk.-1294446854_60.jpeg" medium="image"/><content:encoded><![CDATA[Bad payments rarely happen when you’re sitting calmly at your desk with a coffee next to you. They happen on the move, in those small in-between moments when you’re trying to be efficient and solve one more thing before the day runs away from you.

Maybe you’re in the car waiting for your child to finish practice, or between meetings. You’re replying to messages while walking the dog because that’s when you finally have ten quiet minutes to clear your inbox.

A message arrives that appears to co]]></content:encoded></item><item><title>Inbox Security: How Not to Become That Business Whose Emails Go to Spam</title><description><![CDATA[Your business email is like no other tool, it’s a business digital asset. You use it to confirm orders with suppliers, negotiate contracts with partners, send invoices to clients, answer support requests, and receive sensitive documents. At the same time, that same inbox is connected to your marketing platform: you send newsletters, offers, event invitations, product launches, reminders, and follow-ups.

It works like a two-lane highway. One direction brings information in: vendor updates, payme]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/inbox-security-and-sender-reputation-for-small-businesses</link><guid isPermaLink="false">699d62dc2fa53a9f2eef3f21</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Wed, 25 Feb 2026 18:37:13 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/close-up-computer-engineering-writing-programming-code-in-database-on-keyboard-laptop-to-protect-and-blocking-spam-email-from-internet-and-hacker-for-smart-technology-concept-1205835464_3869x2579.jpeg" medium="image"/><content:encoded><![CDATA[Your business email is like no other tool, it’s a business digital asset. You use it to confirm orders with suppliers, negotiate contracts with partners, send invoices to clients, answer support requests, and receive sensitive documents. At the same time, that same inbox is connected to your marketing platform: you send newsletters, offers, event invitations, product launches, reminders, and follow-ups.

It works like a two-lane highway. One direction brings information in: vendor updates, payme]]></content:encoded></item><item><title>No IT Department? How Small Teams Can Safely Manage Bring Your Own Device (BYOD)</title><description><![CDATA[In most very small businesses, Bring Your Own Device is not a formal decision; it’s simply how work happens.

You reply to client emails from your personal phone while waiting in the car. A collaborator logs into your shared drive from their home laptop. Your accountant checks invoices from their own device in the evening. No one calls it BYOD, but if you use personal devices for your business, or those devices can access your business systems, client data, or financial tools, you are already op]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/no-it-department-how-small-teams-can-safely-manage-bring-your-own-device-byod</link><guid isPermaLink="false">699c176a2fa53a9f2eef3e0b</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Mon, 23 Feb 2026 09:04:57 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/No-IT-Department-How-Small-Teams-Can-Safely-Manage-Bring-Your-Own-Device--BYOD-.jpg" medium="image"/><content:encoded><![CDATA[In most very small businesses, Bring Your Own Device is not a formal decision; it’s simply how work happens.

You reply to client emails from your personal phone while waiting in the car. A collaborator logs into your shared drive from their home laptop. Your accountant checks invoices from their own device in the evening. No one calls it BYOD, but if you use personal devices for your business, or those devices can access your business systems, client data, or financial tools, you are already op]]></content:encoded></item><item><title>UK Urges Small Businesses to ‘Lock the Door’ on Cybercrime</title><description><![CDATA[The UK government has launched a new cybersecurity campaign aimed at small and medium-sized businesses urging them to “lock the door” on cyber criminals as digital threats escalate.

The initiative — backed by the National Cyber Security Centre (NCSC) and the Department for Science, Innovation & Technology (DSIT) as the government’s Cyber Essentials scheme — is designed to deliver practical steps businesses can take to protect themselves from common online dangers.

“Appearing across social medi]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/uk-small-businesses-lock-the-door-cyber-criminals-threats-surge</link><guid isPermaLink="false">6996f9d32fa53a9f2eef3d71</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Very Small Business]]></category><dc:creator>Filip TRUȚĂ</dc:creator><pubDate>Thu, 19 Feb 2026 12:01:53 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/header-10.jpg" medium="image"/><content:encoded><![CDATA[The UK government has launched a new cybersecurity campaign aimed at small and medium-sized businesses urging them to “lock the door” on cyber criminals as digital threats escalate.

The initiative — backed by the National Cyber Security Centre (NCSC) and the Department for Science, Innovation & Technology (DSIT) as the government’s Cyber Essentials scheme — is designed to deliver practical steps businesses can take to protect themselves from common online dangers.

“Appearing across social medi]]></content:encoded></item><item><title>8 Off-Season Scams Targeting Tourism Businesses, Cafés, Restaurants, and Rentals</title><description><![CDATA[The off-season doesn’t just mean fewer tourists and empty tables. It also creates more opportunities for scammers.

Low season is often when small business owners adjust rates, renegotiate with suppliers, update listings, push promotions, pause contracts, or plan maintenance. All of that creates more logins, more invoices, more payments, more emails, and more decisions made.

Across tourism, cafés, bars, restaurants, and short-term rentals, the most serious scams usually rely on a few mechanisms]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/8-off-season-scams-targeting-tourism-businesses-cafes-restaurants-and-rentals</link><guid isPermaLink="false">6992ec122fa53a9f2eef3b08</guid><category><![CDATA[Very Small Business]]></category><category><![CDATA[Scam]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Mon, 16 Feb 2026 10:10:35 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/8-Off-Season-Scams-Targeting-Tourism-Businesses--Caf-s--Restaurants--and-Rentals.png" medium="image"/><content:encoded><![CDATA[The off-season doesn’t just mean fewer tourists and empty tables. It also creates more opportunities for scammers.

Low season is often when small business owners adjust rates, renegotiate with suppliers, update listings, push promotions, pause contracts, or plan maintenance. All of that creates more logins, more invoices, more payments, more emails, and more decisions made.

Across tourism, cafés, bars, restaurants, and short-term rentals, the most serious scams usually rely on a few mechanisms]]></content:encoded></item><item><title>“Your Accountant Made a Mistake” Scam: How It Hurts Small Businesses and Accountants  and How to Protect Yourselves</title><description><![CDATA[Few messages trigger faster action from a small business owner than one from their accountant. Because many entrepreneurs don’t handle taxes or filings themselves, don’t feel confident spotting financial mistakes, and are used to acting quickly when asked to fix a problem, those messages carry immediate weight.

For many small business owners, accountants are among the most trusted professionals they work with. When a message appears to come from an accountant, it often bypasses skepticism altog]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/your-accountant-made-a-mistake-scam-how-it-hurts-small-businesses-and-accountants-and-how-to-protect-yourselves</link><guid isPermaLink="false">698ce0032fa53a9f2eef3841</guid><category><![CDATA[Very Small Business]]></category><category><![CDATA[Scam]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Wed, 11 Feb 2026 20:13:11 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/accountant-scam.png" medium="image"/><content:encoded><![CDATA[Few messages trigger faster action from a small business owner than one from their accountant. Because many entrepreneurs don’t handle taxes or filings themselves, don’t feel confident spotting financial mistakes, and are used to acting quickly when asked to fix a problem, those messages carry immediate weight.

For many small business owners, accountants are among the most trusted professionals they work with. When a message appears to come from an accountant, it often bypasses skepticism altog]]></content:encoded></item><item><title>Do You Only Focus on the Money Coming Into Your Business? What About What Could Leave Your Account in Seconds?</title><description><![CDATA[Most small business owners keep a close eye on the money coming in: when invoices are paid, the balance before approving expenses, and estimates around cash flow.

But far fewer founders pay the same attention to how fast money can leave.

In the UK, 43% of businesses reported experiencing a cyber breach or attack in the last 12 months. The picture is similar in the U.S., where 41% of small businesses were victims of a cyberattack, according to a survey referenced by the Small Business Administr]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/do-you-only-focus-on-the-money-coming-into-your-business-what-about-what-could-leave-your-account-in-seconds</link><guid isPermaLink="false">698b42c82fa53a9f2eef376f</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Tue, 10 Feb 2026 14:44:48 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/Do-You-Only-Focus-on-the-Money-Coming-Into-Your-Business-What-About-What-Could-Leave-Your-Account-in-Seconds.png" medium="image"/><content:encoded><![CDATA[Most small business owners keep a close eye on the money coming in: when invoices are paid, the balance before approving expenses, and estimates around cash flow.

But far fewer founders pay the same attention to how fast money can leave.

In the UK, 43% of businesses reported experiencing a cyber breach or attack in the last 12 months. The picture is similar in the U.S., where 41% of small businesses were victims of a cyberattack, according to a survey referenced by the Small Business Administr]]></content:encoded></item><item><title>Review Bombing Attacks: Don’t Pay the Ransom, Protect Your Business From What Might Come Next</title><description><![CDATA[Across the U.S. and beyond restaurant owners are reporting sudden waves of one-star reviews appearing within hours or days, often from accounts with no real connection to the business. This tactic, known as review bombing, is designed to damage a business’s online reputation fast. Fake complaints about food, service, or hygiene can quickly push a restaurant down in search results, scare away customers, and impact revenue almost overnight.

While restaurants are the ones which raised the alarm*, ]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/review-bombing-attacks-dont-pay-the-ransom-protect-your-business-from-what-might-come-next</link><guid isPermaLink="false">6985e6512fa53a9f2eef3431</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Fri, 06 Feb 2026 13:07:05 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/Review-Bombing-Attacks-Don-t-Pay-the-Ransom--Protect-Your-Business-From-What-Might-Come-Next.png" medium="image"/><content:encoded><![CDATA[Across the U.S. and beyond restaurant owners are reporting sudden waves of one-star reviews appearing within hours or days, often from accounts with no real connection to the business. This tactic, known as review bombing, is designed to damage a business’s online reputation fast. Fake complaints about food, service, or hygiene can quickly push a restaurant down in search results, scare away customers, and impact revenue almost overnight.

While restaurants are the ones which raised the alarm*, ]]></content:encoded></item><item><title>UK Small Businesses And Charities Reported Fewer Cyber Attacks in 2025. Why That’s Not Good News</title><description><![CDATA[At first glance, the UK’s latest cybersecurity figures appear reassuring. In 2025, 43% of businesses and 30% of charities reported experiencing a cybersecurity breach or attack in the previous 12 months. In real terms, that amounts to around 612,000 UK businesses and 61,000 charities identifying an incident during the year. This represents a decrease in prevalence among businesses compared to 2024 when 50% of businesses reported a breach or attack, equivalent to roughly 718,000 businesses.

But ]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/uk-small-businesses-and-charities-reported-fewer-cyber-attacks-in-2025-why-thats-not-good-news</link><guid isPermaLink="false">6981d9cc2fa53a9f2eef31a2</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Tue, 03 Feb 2026 11:25:16 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/UK-Small-Businesses-And-Charities-Reported-Fewer-Cyber-Attacks-in-2025.-Why-That-s-Not-Good-News.png" medium="image"/><content:encoded><![CDATA[At first glance, the UK’s latest cybersecurity figures appear reassuring. In 2025, 43% of businesses and 30% of charities reported experiencing a cybersecurity breach or attack in the previous 12 months. In real terms, that amounts to around 612,000 UK businesses and 61,000 charities identifying an incident during the year. This represents a decrease in prevalence among businesses compared to 2024 when 50% of businesses reported a breach or attack, equivalent to roughly 718,000 businesses.

But ]]></content:encoded></item><item><title>As Privacy Laws Tighten, Australian Business Owners Must Be More Careful With Customer Data</title><description><![CDATA[Australian business owners are being asked to take greater responsibility for how they collect and handle customer data, including during face-to-face interactions. Even when information is gathered in person, it rarely stays offline as the details collected are typically entered into digital systems, platforms, or cloud-based tools shortly after.

From early 2026, the Office of the Australian Information Commissioner (OAIC) will begin reviewing privacy policies used by businesses that collect p]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/as-privacy-laws-tighten-australian-business-owners-must-be-more-careful-with-customer-data</link><guid isPermaLink="false">6981d6ef2fa53a9f2eef3182</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Tue, 03 Feb 2026 11:18:40 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/02/As-Privacy-Laws-Tighten--Australian-Business-Owners-Must-Be-More-Careful-With-Customer-Data.png" medium="image"/><content:encoded><![CDATA[Australian business owners are being asked to take greater responsibility for how they collect and handle customer data, including during face-to-face interactions. Even when information is gathered in person, it rarely stays offline as the details collected are typically entered into digital systems, platforms, or cloud-based tools shortly after.

From early 2026, the Office of the Australian Information Commissioner (OAIC) will begin reviewing privacy policies used by businesses that collect p]]></content:encoded></item><item><title>Running a Business During Menopause: How Brain Fog, Fatigue, and Pressure Can Increase Cyber Risk and What You Can Do</title><description><![CDATA[Perimenopause and menopause are biological transitions, and like any transition, they can influence daily life in more ways than we often acknowledge — from how clearly we think and how well we sleep, to how we process information, make decisions, and respond to pressure.

For women running businesses, this phase often unfolds while they are leading teams, managing finances, handling sensitive emails, approving payments, and carrying full responsibility for their work. When focus is stretched or]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/running-a-business-during-menopause-how-brain-fog-fatigue-and-pressure-can-increase-cyber-risk-and-what-you-can-do</link><guid isPermaLink="false">697b5b7f2fa53a9f2eef2e9a</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Thu, 29 Jan 2026 13:14:11 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/01/Running-a-Business-During-Menopause-How-Brain-Fog--Fatigue--and-Pressure-Can-Increase-Cyber-Risk-and-What-You-Can-Do.png" medium="image"/><content:encoded><![CDATA[Perimenopause and menopause are biological transitions, and like any transition, they can influence daily life in more ways than we often acknowledge — from how clearly we think and how well we sleep, to how we process information, make decisions, and respond to pressure.

For women running businesses, this phase often unfolds while they are leading teams, managing finances, handling sensitive emails, approving payments, and carrying full responsibility for their work. When focus is stretched or]]></content:encoded></item><item><title>Business Identity Theft During Tax Season: How to Catch It Early and What to Do</title><description><![CDATA[Tax season is when many cases of business identity theft come to light, as scammers use company data stolen earlier to file fraudulent returns or claim refunds. At the same time, it can also be the moment when attackers try to steal business identities in the first place. During tax season, small business owners are more responsive, more accustomed to sharing documents, and more likely to assume that requests for sensitive information are legitimate and simply part of the filing process, especia]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/business-identity-theft-during-tax-season-how-to-catch-it-early-and-what-to-do</link><guid isPermaLink="false">697354fa2fa53a9f2eef2a05</guid><category><![CDATA[Very Small Business]]></category><dc:creator>Cristina POPOV</dc:creator><pubDate>Fri, 23 Jan 2026 11:11:10 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/01/Business-Identity-Theft-During-Tax-Season-How-to-Catch-It-Early-and-What-to-Do.png" medium="image"/><content:encoded><![CDATA[Tax season is when many cases of business identity theft come to light, as scammers use company data stolen earlier to file fraudulent returns or claim refunds. At the same time, it can also be the moment when attackers try to steal business identities in the first place. During tax season, small business owners are more responsive, more accustomed to sharing documents, and more likely to assume that requests for sensitive information are legitimate and simply part of the filing process, especia]]></content:encoded></item></channel>
        </rss>