<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.cyberresiliencezone.com/</loc><changefreq>daily</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-blocking/what-is-cyber-resilience</loc><lastmod>2021-09-29T13:37Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/security-awareness-training/cyber-resilience-the-next-big-opportunity-for-msps</loc><lastmod>2021-09-29T13:38Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/endpoints-the-gap-in-msps-backup-solutions-for-smbs</loc><lastmod>2021-09-29T13:37Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/what-msps-should-look-for-in-an-endpoint-backup-solution</loc><lastmod>2021-09-17T16:37Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/assets/carbonite-data-protection-cyber-resilience</loc><lastmod>2021-09-15T21:42Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.cyberresiliencezone.com/assets/cyber-resilience-the-carbonite-webroot-portfolio</loc><lastmod>2021-09-15T21:50Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.cyberresiliencezone.com/assets/carbonite-disaster-recovery-as-a-service</loc><lastmod>2021-09-15T22:06Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.cyberresiliencezone.com/assets/msp-guide-making-money-with-security-awareness-training</loc><lastmod>2021-09-29T14:37Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.cyberresiliencezone.com/assets/five-reasons-to-choose-draas</loc><lastmod>2021-09-29T14:50Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/security-awareness-training/beyond-policies-making-the-case-for-security-awareness-training</loc><lastmod>2021-10-12T16:08Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/security-awareness-training/choosing-a-security-awareness-training-provider-what-msps-should-look-for</loc><lastmod>2021-10-14T17:03Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-blocking/what-is-doh-and-why-do-your-clients-need-it</loc><lastmod>2021-10-19T16:14Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-blocking/how-to-help-smbs-comply-with-nsa-advisory-on-doh</loc><lastmod>2021-10-21T17:35Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/why-epp-is-hybrid-work-s-bff</loc><lastmod>2021-11-02T19:09Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/what-msps-should-look-for-in-an-epp-solution</loc><lastmod>2021-11-09T16:46Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/draas-the-remedy-for-ransomware</loc><lastmod>2021-11-09T17:15Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-restore/msp-checklist-for-choosing-a-draas-provider</loc><lastmod>2021-11-11T20:32Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/all/cyber-resilience-vs-cybersecurity-what-s-the-difference</loc><lastmod>2021-11-18T16:37Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/all/cyber-resilience-in-action-msp-success-stories</loc><lastmod>2021-12-17T00:41Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/saas-backup-an-overlooked-opportunity-for-msps</loc><lastmod>2021-12-17T00:38Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/setting-up-an-saas-backup-practice-what-to-look-for-in-a-provider</loc><lastmod>2021-11-30T15:04Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/security-awareness-training/how-remote-workers-boost-smb-security-risk</loc><lastmod>2021-12-07T16:10Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/security-awareness-training/how-to-teach-remote-workers-to-be-secure</loc><lastmod>2021-12-07T16:33Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/assets/selling-layered-cybersecurity</loc><lastmod>2021-12-15T21:32Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.cyberresiliencezone.com/assets/white-paper-security-tips-for-protecting-your-backup-services</loc><lastmod>2021-12-15T22:07Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.cyberresiliencezone.com/assets/how-secure-is-your-cloud-data</loc><lastmod>2021-12-17T01:10Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.cyberresiliencezone.com/assets/small-and-midsize-businesses-rip-the-target-off-your-backs</loc><lastmod>2021-12-17T18:28Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-blocking/delivering-dns-protection-for-the-mobile-workforce</loc><lastmod>2022-01-10T19:44Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-blocking/delivering-dns-protection-for-guest-wi-fi</loc><lastmod>2022-01-13T17:59Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/assets/top-10-reasons-to-backup-microsoft-365-data</loc><lastmod>2022-01-18T23:02Z</lastmod><changefreq>yearly</changefreq></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/what-is-threat-intelligence</loc><lastmod>2022-01-24T19:08Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/all/shift-to-cloud-creates-opportunities-and-challenges-for-msps</loc><lastmod>2022-01-24T20:25Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/how-msps-can-leverage-threat-intelligence-to-deliver-smb-security</loc><lastmod>2022-01-26T15:55Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/all/cloud-migrations-made-easy-for-msps</loc><lastmod>2022-01-26T20:47Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/all/fighting-ai-with-ai-defeating-ai-cyberattacks</loc><lastmod>2022-01-28T18:56Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/all/choosing-an-ai-powered-cyber-resilience-partner</loc><lastmod>2022-01-31T16:51Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/all/no-weak-points-why-your-clients-need-a-layered-defense</loc><lastmod>2022-02-07T19:39Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/all/selecting-the-right-single-source-cyber-resilience-partner</loc><lastmod>2022-02-08T16:59Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/how-backup-and-restore-powers-cyber-resilience</loc><lastmod>2022-02-15T15:49Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/why-a-single-source-backup-and-recovery-vendor-is-essential</loc><lastmod>2022-02-16T16:24Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/all/biggest-recent-cyber-attacks</loc><lastmod>2022-02-17T16:02Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/why-cyber-security-alone-isn-t-enough-in-2022</loc><lastmod>2022-04-22T16:25Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/the-best-of-both-worlds-boosting-artificial-and-human-threat-intelligence</loc><lastmod>2022-03-02T22:42Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/intelligent-intelligence-the-power-of-single-source-training-and-threat-intelligence</loc><lastmod>2022-04-15T15:12Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/it-starts-with-endpoints-anatomy-of-end-to-end-protection</loc><lastmod>2022-03-09T16:16Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/all/unified-front-pitching-single-vendor-solutions-to-your-clients</loc><lastmod>2022-03-11T03:26Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/selecting-an-mdr-provider-partner</loc><lastmod>2022-03-21T16:19Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/boom-cyber-resilience-by-the-numbers</loc><lastmod>2022-04-25T15:31Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/email-archiving-why-it-matters-for-smbs</loc><lastmod>2022-04-06T02:35Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/demand-generation-how-the-right-cyber-resilience-provider-partner-fuels-msp-growth</loc><lastmod>2022-04-07T03:02Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/8-tips-for-selecting-the-right-email-archiving-solution-for-your-smb-customers</loc><lastmod>2022-06-03T00:13Z</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/selecting-a-server-backup-and-restore-provider-for-your-smb-customers</loc><lastmod>2022-04-12T16:09Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/serve-up-resilience-with-continuous-system-replication</loc><lastmod>2022-04-14T17:09Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/security-awareness-training/there-s-a-bullseye-on-your-company-why-msps-are-cybercrime-targets</loc><lastmod>2022-04-15T17:48Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/security-awareness-training/walking-the-walk-the-importance-of-cyber-resilience-for-msps</loc><lastmod>2022-04-19T16:38Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/all/how-the-right-provider-partner-can-make-your-msp-resilient</loc><lastmod>2022-04-22T15:09Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-detection/what-is-mdr</loc><lastmod>2022-04-26T15:27Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/cyber-resilience/shields-up-helping-your-clients-navigate-cisa-s-advisory</loc><lastmod>2022-04-28T18:43Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/security-awareness-training/how-security-awareness-training-sat-helps-with-today-s-phishing-problems</loc><lastmod>2022-05-03T16:35Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/security-awareness-training/pitching-security-awareness-training-to-reluctant-clients</loc><lastmod>2022-05-06T14:12Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/why-cyber-resilience-is-essential-to-work-from-anywhere</loc><lastmod>2022-05-10T17:34Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-protection/choosing-the-right-wfa-cyber-resilience-solution-provider</loc><lastmod>2022-05-18T02:58Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/it-begins-with-endpoints-protection-and-backup-for-today-s-business-models</loc><lastmod>2022-05-20T16:11Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/choosing-a-single-solution-endpoint-protection-and-backup-provider</loc><lastmod>2022-05-23T14:37Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/cyber-resilience/global-threats-the-world-is-breaking-in</loc><lastmod>2022-05-27T18:48Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/cyber-resilience/choosing-a-resilience-provider-with-global-reach-to-counter-global-threats</loc><lastmod>2022-05-31T15:16Z</lastmod><changefreq>yearly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/cyber-resilience-for-microsoft-based-clients</loc><lastmod>2022-06-02T18:33Z</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/data-backup/how-bunding-in-resilience-helps-you-maximize-microsoft-revenue-opportunities</loc><lastmod>2022-06-03T23:40Z</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-blocking/what-is-protective-dns-service</loc><lastmod>2022-06-14T16:32Z</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/threat-blocking/what-to-look-for-in-a-protective-dns-solution</loc><lastmod>2022-06-16T22:47Z</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/cyber-resilience/no-honor-among-thieves-how-ransomware-is-getting-worse</loc><lastmod>2022-06-17T14:38Z</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/cyber-resilience/best-practices-for-ransomware-protection</loc><lastmod>2022-06-24T19:03Z</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/cyber-resilience/2022-s-biggest-cyberattacks-ytd</loc><lastmod>2022-06-29T17:07Z</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/cyber-resilience/why-full-spectrum-cyber-resilience-remains-your-clients-best-defense-in-2022</loc><lastmod>2022-06-30T20:04Z</lastmod><changefreq>monthly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/cyber-resilience/emerging-threats-insights-from-brightcloud-s-new-threat-report</loc><lastmod>2022-07-27T15:40Z</lastmod><changefreq>hourly</changefreq><priority>1.0</priority></url>
<url><loc>https://www.cyberresiliencezone.com/objectives/cyber-resilience/aligning-defenses-with-emerging-threats</loc><lastmod>2022-07-27T15:55Z</lastmod><changefreq>hourly</changefreq><priority>1.0</priority></url>
</urlset>
