<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-9.3.2'-->
<?xml-stylesheet type="text/xsl" href="//securestrategy.co.nz/image-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://securestrategy.co.nz/</loc><lastmod>2016-10-18T09:12:30Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/manhattan-407703.jpg</image:loc><image:title>Placeholder Image</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/placeholder-image-2/</loc><lastmod>2016-10-18T09:12:30Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/flower-256776_1280.jpg</image:loc><image:title>Placeholder Image</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/placeholder-image-3/</loc><lastmod>2016-10-18T09:12:31Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/taxi-238478_1280.jpg</image:loc><image:title>Placeholder Image</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/placeholder-image-4/</loc><lastmod>2016-10-18T09:12:31Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/cropped-digital-camera-349873_1280.jpg</image:loc><image:title>Placeholder Image</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/placeholder-image-5/</loc><lastmod>2016-10-18T09:12:31Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/coffee-386878_1280.jpg</image:loc><image:title>Placeholder Image</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/</loc><lastmod>2016-10-25T07:56:31Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/1024px-christchurch_at_night_5862565597.jpg</image:loc><image:title>1024px-christchurch_at_night_5862565597</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/security-review/</loc><lastmod>2016-10-25T08:25:49Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/pexels-photo-40120-2.jpeg</image:loc><image:title>pexels-photo-40120-2</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/external-vulnerability-scan/</loc><lastmod>2016-10-25T10:15:09Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/pexels-photo-90807.jpeg</image:loc><image:title>pexels-photo-90807</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/</loc><lastmod>2016-10-25T10:36:41Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/pexels-photo.jpg</image:loc><image:title>pexels-photo</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/</loc><lastmod>2016-10-25T10:38:40Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/pexels-photo-191830.jpeg</image:loc><image:title>pexels-photo-191830</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/</loc><lastmod>2016-10-25T10:44:12Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/pexels-photo-92904.jpeg</image:loc><image:title>pexels-photo-92904</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/pci-dss-review/</loc><lastmod>2016-10-25T10:46:25Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/money-card-business-credit-card-50987.jpeg</image:loc><image:title>money-card-business-credit-card-50987</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/cybersecurity/the-need-for-a-different-approach/</loc><lastmod>2016-10-25T10:55:15Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/people-coffee-notes-tea.jpg</image:loc><image:title>people-coffee-notes-tea</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/security-awareness-training/</loc><lastmod>2016-10-25T11:17:03Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/people-woman-coffee-meeting.jpg</image:loc><image:title>people-woman-coffee-meeting</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/</loc><lastmod>2016-10-25T11:22:01Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/pexels-photo-2.jpg</image:loc><image:title>pexels-photo-2</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/about/</loc><lastmod>2016-10-25T11:30:05Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/img_0006.jpg</image:loc><image:title>img_0006</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/</loc><lastmod>2016-10-25T11:40:10Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/pexels-photo-3.jpg</image:loc><image:title>pexels-photo-3</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2016/10/26/why-you-need-to-start-using-two-factor-authentication/</loc><lastmod>2016-10-25T12:17:52Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/man-person-apple-iphone-2.jpg</image:loc><image:title>man-person-apple-iphone-2</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2016/10/26/the-easy-way-to-stop-fraud/</loc><lastmod>2016-10-25T12:22:58Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/money-finance-bills-500-2.jpg</image:loc><image:title>money-finance-bills-500-2</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2016/10/26/how-to-really-protect-against-ransomware/</loc><lastmod>2016-10-25T12:31:53Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/pexels-photo-133021.jpeg</image:loc><image:title>pexels-photo-133021</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2016/10/26/lessons-from-the-iphone-hack/</loc><lastmod>2016-10-25T12:41:47Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/hand-apple-iphone-smartphone-2.jpg</image:loc><image:title>hand-apple-iphone-smartphone-2</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/cybersecurity/common-questions/</loc><lastmod>2016-10-27T11:39:56Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/people-office-group-team.jpg</image:loc><image:title>people-office-group-team</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/cybersecurity/why-law-firms-are-a-big-target-for-criminals/</loc><lastmod>2016-10-27T11:41:16Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/pexels-photo-4.jpg</image:loc><image:title>pexels-photo-4</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/contact/</loc><lastmod>2016-10-28T01:28:26Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/img_0034.jpg</image:loc><image:title>img_0034</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/contact/</loc><lastmod>2016-10-28T01:35:11Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/hands-coffee-cup-apple.jpg</image:loc><image:title>hands-coffee-cup-apple</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/</loc><lastmod>2016-10-28T20:25:07Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/pexels-photo-25125.jpg</image:loc><image:title>pexels-photo-25125</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/cs_green_horizontal_16-17/</loc><lastmod>2016-11-09T23:25:38Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/11/cs_green_horizontal_16-17.png</image:loc><image:title>cs_green_horizontal_16-17</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/templates/</loc><lastmod>2017-02-02T02:58:49Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/02/pexels-photo-265045.jpeg</image:loc><image:title>pexels-photo-265045</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/pricing/</loc><lastmod>2017-02-04T01:02:46Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/02/pexels-photo-28456.jpg</image:loc><image:title>pexels-photo-28456</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/cybersecurity/why-law-firms-are-a-big-target-for-criminals/</loc><lastmod>2017-02-17T23:28:48Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2016/10/cis_supporter_license_rgb.jpeg</image:loc><image:title>cis_supporter_license_rgb</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2017/02/21/a-pragmatic-approach-to-cyber-security/</loc><lastmod>2017-02-21T07:43:25Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/02/wolf-wolves-snow-wolf-landscape-89773.jpeg</image:loc><image:title>wolf-wolves-snow-wolf-landscape-89773</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2017/02/21/a-pragmatic-approach-to-cyber-security/</loc><lastmod>2017-02-21T07:43:34Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/02/pexels-photo-270557.jpeg</image:loc><image:title>pexels-photo-270557</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/220px-green_for_danger/</loc><lastmod>2017-02-24T22:31:12Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/02/220px-green_for_danger.jpg</image:loc><image:title>220px-green_for_danger</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/green-for-danger-lobby-cards/</loc><lastmod>2017-02-24T22:34:32Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/02/green-for-danger-lobby-cards.jpg</image:loc><image:title>green-for-danger-lobby-cards</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2017/03/15/avoiding-data-breach-mistakes/</loc><lastmod>2017-03-15T09:32:47Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/03/pexels-photo-105472.jpeg</image:loc><image:title>pexels-photo-105472</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/pexels-photo-236670/</loc><lastmod>2017-04-02T00:21:02Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/04/pexels-photo-236670.jpeg</image:loc><image:title>pexels-photo-236670</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/phishing-awareness-exercise/</loc><lastmod>2017-04-06T07:24:13Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/04/pexels-photo.jpeg</image:loc><image:title>pexels-photo</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/pexels-photo-262272/</loc><lastmod>2018-05-16T11:50:14Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/06/pexels-photo-262272.jpeg</image:loc><image:title>NotPetya - what to do</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2018/05/12/securing-credit-card-payments/</loc><lastmod>2017-07-22T21:45:56Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/07/pexels-photo-9.jpg</image:loc><image:title>pexels-photo-9</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/cis_supporter_license_rgb-2/</loc><lastmod>2017-08-31T08:28:36Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/08/cis_supporter_license_rgb.jpeg</image:loc><image:title>CIS_Supporter_License_RGB</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/cis-logo/</loc><lastmod>2017-08-31T08:34:24Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/08/cis-logo.png</image:loc><image:title>CIS logo</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/pcissc_logo_r_250px/</loc><lastmod>2017-08-31T08:50:22Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/08/pcissc_logo_r_250px.png</image:loc><image:title>pcissc_logo_r_250px</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2017/10/01/what-equifax-did-wrong/</loc><lastmod>2017-10-01T04:06:47Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2017/10/bn-vi810_3ejci_or_20170929132500.jpg</image:loc><image:title>BN-VI810_3eJCI_OR_20170929132500</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/about/</loc><lastmod>2018-03-29T23:04:51Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/03/cissp-logo-2lines.jpg</image:loc><image:title>CISSP-logo-2lines</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/about/</loc><lastmod>2018-04-02T21:25:29Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/04/pcip-logo.png</image:loc><image:title>pcip-logo</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/online-cyber-security-training/</loc><lastmod>2018-05-12T01:36:36Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/05/home-main.jpg</image:loc><image:title>home main</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/favicon-96x96/</loc><lastmod>2018-05-12T02:21:56Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/05/favicon-96x96.png</image:loc><image:title>favicon-96x96</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/incident-response-plan/</loc><lastmod>2018-05-12T08:45:46Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/05/pexels-photo-926987.jpeg</image:loc><image:title>pexels-photo-926987</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2018/05/13/protecting-your-reputation/</loc><lastmod>2018-05-12T22:43:12Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/05/pexels-photo-618613.jpeg</image:loc><image:title>pexels-photo-618613</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2018/05/13/protecting-your-reputation/</loc><lastmod>2018-05-12T22:46:20Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/05/pexels-photo-288477-2.jpeg</image:loc><image:title>pexels-photo-288477-2</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2018/05/13/protecting-your-reputation/</loc><lastmod>2018-05-14T10:26:09Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/05/pexels-photo-313690.jpeg</image:loc><image:title>Protecting your reputation</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2018/05/15/privacy-update-may-2018/</loc><lastmod>2018-05-13T03:13:39Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/05/fullsizeoutput_935.jpeg</image:loc><image:title>fullsizeoutput_935</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2018/05/15/privacy-update-may-2018/</loc><lastmod>2018-05-14T12:13:35Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/05/pexels-photo-860379.jpeg</image:loc><image:title>Privacy Update - May 2018</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2018/05/15/cyber-insurance-check-the-fine-print/</loc><lastmod>2018-05-15T08:47:20Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/05/pexels-photo-530024.jpeg</image:loc><image:title>Cyber Insurance - check the fine print</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2018/05/21/multi-factor-authentication-made-easy/</loc><lastmod>2018-05-21T07:21:13Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/05/pexels-photo-826349.jpeg</image:loc><image:title>Multi-factor authentication made easy</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/secure-strategy-logo_email/</loc><lastmod>2018-05-24T07:21:48Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/05/Secure-Strategy-logo_email.png</image:loc><image:title>Secure-Strategy-logo_email</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/about/</loc><lastmod>2018-06-09T23:30:30Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/06/CCSP-logo-square.png</image:loc><image:title>CCSP-logo-square</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/about/</loc><lastmod>2018-06-09T23:32:02Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/06/CCSP-logo-2lines.png</image:loc><image:title>CCSP-logo-2lines</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/about/</loc><lastmod>2018-06-09T23:49:20Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/06/Secure-Strategy-email-logo.png</image:loc><image:title>Secure Strategy email logo</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/about/</loc><lastmod>2018-06-13T01:08:54Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2018/06/cippe_seal_hi_res.png</image:loc><image:title>cippe_seal_hi_res</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2019/01/28/board-expectations-for-cyber-security/</loc><lastmod>2019-01-28T01:34:47Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/01/pexels-photo-1345085.jpeg</image:loc><image:title>pexels-photo-1345085</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/picture1/</loc><lastmod>2019-02-12T08:45:34Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/02/Picture1.png</image:loc><image:title>Picture1</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/image/</loc><lastmod>2019-02-12T08:48:31Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/02/image.png</image:loc><image:title>image</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/iu-14/</loc><lastmod>2019-02-12T08:55:52Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/02/iu-14.jpeg</image:loc><image:title>iu-14</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2019/02/25/whats-the-real-risk/</loc><lastmod>2019-02-24T08:12:56Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/02/cube-play-colorful-eye-numbers-51361.jpeg</image:loc><image:title>cube-play-colorful-eye-numbers-51361</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/iu-15/</loc><lastmod>2019-05-08T21:48:37Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/05/iu-15-2929370285-1557352116869.jpeg</image:loc><image:title>Tobacco lies</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2019/05/30/communicating-after-a-data-breach/</loc><lastmod>2019-05-30T06:53:30Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/05/antique-communication-connection-207538.jpg</image:loc><image:title>antique-communication-connection-207538</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/adult-data-database-1181316/</loc><lastmod>2019-07-26T10:20:00Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/07/adult-data-database-1181316.jpg</image:loc><image:title>adult-data-database-1181316</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2019/09/03/reasons-for-poor-security/</loc><lastmod>2019-09-02T21:17:33Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/09/brainstorming-business-people-businessman-1289893.jpg</image:loc><image:title>brainstorming-business-people-businessman-1289893</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/2019/09/03/reasons-for-poor-security/</loc><lastmod>2019-09-02T21:18:39Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/09/code-coding-css-92905.jpg</image:loc><image:title>code-coding-css-92905</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/iu-5/</loc><lastmod>2019-09-23T20:24:21Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/09/iu-5.png</image:loc><image:title>iu-5</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/image-2/</loc><lastmod>2019-09-23T20:24:39Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/09/image.png</image:loc><image:title>image</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/about/</loc><lastmod>2019-10-26T08:08:24Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/10/AP-logo-2lines.jpg</image:loc><image:title>AP-logo-2lines</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/new_world-horiz/</loc><lastmod>2019-10-26T08:19:38Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/10/NEW_WORLD-HORIZ.png</image:loc><image:title>NEW_WORLD HORIZ</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/paknsave-logo-horiz-2col/</loc><lastmod>2019-10-26T08:20:45Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/10/PAKnSAVE-Logo-Horiz-2col.png</image:loc><image:title>PAKnSAVE Logo Horiz 2col</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/malley-logo-header1x/</loc><lastmod>2019-10-26T08:23:19Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/10/malley-logo-header@1x.png</image:loc><image:title>malley-logo-header@1x</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/redpath-logo-black/</loc><lastmod>2019-10-26T08:24:50Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/10/redpath-logo-black.png</image:loc><image:title>redpath-logo-black</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/logo/</loc><lastmod>2019-10-26T08:27:46Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2019/10/logo.png</image:loc><image:title>logo</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/person-using-macbook-laptop-3584969-2/</loc><lastmod>2020-03-19T02:20:23Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2020/03/person-using-macbook-laptop-3584969-2.jpg</image:loc><image:title>person-using-macbook-laptop-3584969-2</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/image-3/</loc><lastmod>2020-03-19T02:21:07Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2020/03/image.png</image:loc><image:title>image</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/virtual-it-security-manager/</loc><lastmod>2020-06-10T22:46:49Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2020/06/macbook-pro-beside-papers-669619.jpg</image:loc><image:title>macbook-pro-beside-papers-669619</image:title><image:caption></image:caption></image:image></url><url><loc>https://securestrategy.co.nz/services/virtual-it-security-manager/</loc><lastmod>2020-06-10T22:53:57Z</lastmod><image:image><image:loc>https://securestrategy.co.nz/wp-content/uploads/2020/06/blur-close-up-code-computer-546819-2.jpg</image:loc><image:title>blur-close-up-code-computer-546819-2</image:title><image:caption></image:caption></image:image></url></urlset>
