<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/kb-tickets/new</loc><image:image><image:loc>https://241923185.fs1.hubspotusercontent-na2.net/hubfs/241923185/Main%20logo.png</image:loc><image:caption>Mainlogo</image:caption><image:title>Mainlogo</image:title></image:image><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-do-i-assess-my-risk-of-a-cyber-attack</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-privileged-account-management-pam</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-managed-threat-response-mtr</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-the-security-features-of-the-microsoft-e5-license</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-the-security-features-of-the-microsoft-business-standard-license</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-does-data-protection-law-expect-organisations-to-do-with-regards-to-cyber-security</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-pci-dss-compliance</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-the-nist-standards</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/do-i-legally-have-to-have-an-incident-management-plan</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-entraid</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-data-loss-prevention-dlp</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/do-i-legally-need-to-have-a-data-protection-officer-dpo</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-secure-development-standards</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-dbs-checks</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-to-do-security-assurance-on-my-supply-chain</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-the-security-features-of-the-microsoft-business-premium-license</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/why-do-i-need-an-access-control-policy</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-malware</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-can-i-see-if-my-data-is-exposed-on-the-dark-web</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-the-principle-of-least-privilege</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-the-purpose-of-data-classification</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-phishing-attack</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-security-considerations-apply-to-remote-working</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-cyber-essentials</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-incident-management-and-response</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-happens-when-software-goes-out-of-support</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-should-i-do-if-i-get-a-data-breach</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-do-i-keep-my-email-safe-from-cyber-threats</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/is-a-mac-more-secure-than-a-windows-based-device</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-long-does-it-take-to-implement-iso-27001</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-the-best-password-policy</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-ethical-hacking</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-the-recovery-point-objective-rpo</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-the-security-features-of-the-microsoft-e3-license-</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-role-based-access-rbac</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/are-uk-company-directors-personally-liable-for-a-data-breach</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-multi-factor-authentication-mfa</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-penetration-testing</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-the-purpose-of-an-acceptable-use-policy-aup</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-the-security-features-included-in-the-microsoft-business-basic-license</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-microsoft-intune-and-what-are-the-key-security-features</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/kb-search-results</loc><image:image><image:loc>https://241923185.fs1.hubspotusercontent-na2.net/hubfs/241923185/Main%20logo.png</image:loc><image:caption>Mainlogo</image:caption><image:title>Mainlogo</image:title></image:image><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-recovery-time-objective-rto</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-defence-in-depth</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-social-engineering</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/is-security-awareness-training-mandatory-for-all-staff</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-to-create-a-disaster-recovery-plan-drp</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-involvement-in-managing-my-iso-27001-certification</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-virtual-private-network-vpn</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-cyber-security-laws-are-relevant-to-uk-organisations</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-does-azure-keep-data-safe</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/can-i-get-help-with-a-data-breach</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-brute-force-attack</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-needed-to-undertake-an-iso-27001-internal-audit</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-firewall</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-the-reporting-requirements-in-the-event-of-a-data-breach-in-the-uk-and-eu</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-hipaa-compliance</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-password-management-tools-used-for</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/why-do-i-have-to-complete-security-questionnaires</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-non-disclosure-agreement-nda</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-ciso</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-to-secure-a-wireless-network</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-man-in-the-middle-mitm-attack</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-dora</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-identity-and-access-management-iam</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/why-is-cyber-security-important</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-do-i-anonymise-personal-data</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-is-security-implemented-in-the-development-life-cycle</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-do-secure-my-website</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-ransomware</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-endpoint-protection</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-the-best-certification-cyber-essentials-or-iso-27001</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-secure-operations-centre-soc</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-the-risk-of-a-cyber-attack-in-the-uk</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-do-i-protect-my-backups</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-needed-to-protect-my-network-from-a-cyber-attack</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-an-insider-threat</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-do-i-get-cyber-security-insurance</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-to-create-a-good-business-continuity-plan-bcp</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-zero-trust-security-strategy</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-togaf</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-do-i-ensure-that-my-data-is-secure-in-the-cloud</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-the-purpose-of-an-information-security-policy</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre</loc><image:image><image:loc>https://241923185.fs1.hubspotusercontent-na2.net/hubfs/241923185/Main%20logo.png</image:loc><image:caption>Mainlogo</image:caption><image:title>Mainlogo</image:title></image:image><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-iso-27001</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-the-benefits-of-a-password-management-solution</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-does-aws-keep-data-safe</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-the-basic-security-requirements-when-onboarding-new-staff</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/how-do-i-implement-threat-detection</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-gdpr</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-the-dark-web</loc><lastmod>2025-02-18</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-zero-day-attack</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-are-encryption-keys-</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-good-source-of-cyber-security-news</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-a-good-cyber-resilience-strategy</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-vulnerability-management</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/should-i-encrypt-my-workstations</loc><lastmod>2025-02-19</lastmod></url><url><loc>https://241923185.hs-sites-na2.com/en/knowledge-centre/what-is-soc-2.0</loc><lastmod>2025-02-18</lastmod></url></urlset>