<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-9.3.2'-->
<?xml-stylesheet type="text/xsl" href="//securestrategy.co.nz/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://securestrategy.co.nz/</loc><lastmod>2016-12-08T19:26:45Z</lastmod></url><url><loc>https://securestrategy.co.nz/about/</loc><lastmod>2019-10-26T08:09:37Z</lastmod></url><url><loc>https://securestrategy.co.nz/contact/</loc><lastmod>2017-04-01T22:35:01Z</lastmod></url><url><loc>https://securestrategy.co.nz/blog/</loc><lastmod>2016-10-18T09:12:29Z</lastmod></url><url><loc>https://securestrategy.co.nz/services/</loc><lastmod>2016-10-28T01:48:52Z</lastmod></url><url><loc>https://securestrategy.co.nz/services/security-review/</loc><lastmod>2017-08-31T08:25:12Z</lastmod></url><url><loc>https://securestrategy.co.nz/services/external-vulnerability-scan/</loc><lastmod>2017-03-06T20:51:36Z</lastmod></url><url><loc>https://securestrategy.co.nz/services/security-awareness-training/</loc><lastmod>2016-10-30T10:24:42Z</lastmod></url><url><loc>https://securestrategy.co.nz/services/pci-dss-review/</loc><lastmod>2017-03-06T02:52:00Z</lastmod></url><url><loc>https://securestrategy.co.nz/cybersecurity/the-need-for-a-different-approach/</loc><lastmod>2016-10-30T10:14:38Z</lastmod></url><url><loc>https://securestrategy.co.nz/2016/10/26/why-you-need-to-start-using-two-factor-authentication/</loc><lastmod>2018-05-14T11:32:23Z</lastmod></url><url><loc>https://securestrategy.co.nz/2016/10/26/the-easy-way-to-stop-fraud/</loc><lastmod>2018-05-14T11:32:10Z</lastmod></url><url><loc>https://securestrategy.co.nz/2016/10/26/how-to-really-protect-against-ransomware/</loc><lastmod>2018-05-14T11:31:55Z</lastmod></url><url><loc>https://securestrategy.co.nz/2016/10/26/lessons-from-the-iphone-hack/</loc><lastmod>2018-05-14T11:31:39Z</lastmod></url><url><loc>https://securestrategy.co.nz/cybersecurity/common-questions/</loc><lastmod>2017-03-06T20:48:13Z</lastmod></url><url><loc>https://securestrategy.co.nz/cybersecurity/why-law-firms-are-a-big-target-for-criminals/</loc><lastmod>2017-02-22T01:02:56Z</lastmod></url><url><loc>https://securestrategy.co.nz/cybersecurity/</loc><lastmod>2016-10-28T01:50:47Z</lastmod></url><url><loc>https://securestrategy.co.nz/privacy-policy/</loc><lastmod>2019-10-01T02:30:51Z</lastmod></url><url><loc>https://securestrategy.co.nz/2017/02/21/a-pragmatic-approach-to-cyber-security/</loc><lastmod>2018-05-14T11:31:24Z</lastmod></url><url><loc>https://securestrategy.co.nz/templates/</loc><lastmod>2017-02-04T19:51:39Z</lastmod></url><url><loc>https://securestrategy.co.nz/pricing/</loc><lastmod>2018-05-16T11:41:57Z</lastmod></url><url><loc>https://securestrategy.co.nz/services/website-security-review/</loc><lastmod>2017-05-02T01:01:28Z</lastmod></url><url><loc>https://securestrategy.co.nz/testimonial/grant-adams-parry-field/</loc><lastmod>2017-03-09T20:46:40Z</lastmod></url><url><loc>https://securestrategy.co.nz/testimonial/mike-baddeley-wired-internet-group/</loc><lastmod>2017-03-09T23:10:12Z</lastmod></url><url><loc>https://securestrategy.co.nz/2017/03/15/avoiding-data-breach-mistakes/</loc><lastmod>2018-05-14T11:31:06Z</lastmod></url><url><loc>https://securestrategy.co.nz/2018/05/15/cyber-insurance-check-the-fine-print/</loc><lastmod>2018-05-16T07:20:55Z</lastmod></url><url><loc>https://securestrategy.co.nz/services/phishing-awareness-exercise/</loc><lastmod>2019-08-12T20:18:52Z</lastmod></url><url><loc>https://securestrategy.co.nz/testimonial/wayne-broekhals-arrow-international/</loc><lastmod>2017-05-21T23:54:08Z</lastmod></url><url><loc>https://securestrategy.co.nz/2017/06/28/notpetya-what-to-do/</loc><lastmod>2018-05-16T11:50:23Z</lastmod></url><url><loc>https://securestrategy.co.nz/2018/05/12/securing-credit-card-payments/</loc><lastmod>2018-05-14T11:30:22Z</lastmod></url><url><loc>https://securestrategy.co.nz/2017/10/01/what-equifax-did-wrong/</loc><lastmod>2018-05-14T11:30:37Z</lastmod></url><url><loc>https://securestrategy.co.nz/services/online-cyber-security-training/</loc><lastmod>2018-05-12T05:00:20Z</lastmod></url><url><loc>https://securestrategy.co.nz/services/incident-response-plan/</loc><lastmod>2018-05-12T08:46:29Z</lastmod></url><url><loc>https://securestrategy.co.nz/2018/05/13/protecting-your-reputation/</loc><lastmod>2018-05-14T10:28:46Z</lastmod></url><url><loc>https://securestrategy.co.nz/2018/05/15/privacy-update-may-2018/</loc><lastmod>2018-05-16T00:23:11Z</lastmod></url><url><loc>https://securestrategy.co.nz/testimonial/pam-brian-white-fox-and-jones/</loc><lastmod>2018-05-17T03:46:44Z</lastmod></url><url><loc>https://securestrategy.co.nz/2018/05/21/multi-factor-authentication-made-easy/</loc><lastmod>2018-05-21T07:23:49Z</lastmod></url><url><loc>https://securestrategy.co.nz/2019/01/28/board-expectations-for-cyber-security/</loc><lastmod>2019-01-28T01:41:03Z</lastmod></url><url><loc>https://securestrategy.co.nz/2019/02/25/whats-the-real-risk/</loc><lastmod>2019-02-24T20:31:45Z</lastmod></url><url><loc>https://securestrategy.co.nz/2019/05/30/communicating-after-a-data-breach/</loc><lastmod>2019-05-30T07:53:45Z</lastmod></url><url><loc>https://securestrategy.co.nz/2019/07/29/whos-got-our-customer-data/</loc><lastmod>2019-07-29T07:19:25Z</lastmod></url><url><loc>https://securestrategy.co.nz/2019/09/03/reasons-for-poor-security/</loc><lastmod>2019-09-02T21:19:00Z</lastmod></url><url><loc>https://securestrategy.co.nz/2020/03/19/securing-your-new-remote-workers/</loc><lastmod>2020-03-19T03:28:23Z</lastmod></url><url><loc>https://securestrategy.co.nz/services/virtual-it-security-manager/</loc><lastmod>2020-06-10T22:58:34Z</lastmod></url></urlset>
