<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://turtledovecyber.com/</loc></url><url><loc>https://turtledovecyber.com/blog/</loc></url><url><loc>https://turtledovecyber.com/blog/achieve-cyber-essentials-certification-with-our-support/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/beware-the-shadow-within-the-cyber-insider-threat/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/blog-congratulations-to-our-lead-assessor/</loc><lastmod>2025-01-20T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/byod-the-cyber-security-challenges-when-staff-use-their-own-devices/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/charity-cyber-essentials-awareness-fortnight-6th-17th-november-2023/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/chinese-domain-name-scam/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/communication-centred-security-training-integrating-policy-and-awareness/</loc><lastmod>2025-07-09T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/cyber-essentials-has-changed-2/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/cyber-essentials-is-changing-in-april-2026-what-you-need-to-know-about-the-danzell-question-set/</loc><lastmod>2026-03-20T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/cyber-essentials-plus-checklist-what-to-ask-your-msp-or-it-provider-before-ce-certification/</loc><lastmod>2025-06-18T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/cyber-essentials-plus-pre-audit-checklist/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/cyber-essentials-willow-update-2025-complete-guide-to-the-changes/</loc><lastmod>2025-06-04T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/danger-lurking-on-social-media-catfishing-on-linkedin-and-how-to-stay-secure/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/deepfake-threats-in-cyber-security/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/dstls-new-secure-by-design-problem-book-how-industry-can-rise-to-meet-ongoing-challenges-and-the-solutions-we-carry-with-us-already/</loc><lastmod>2025-04-28T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/enhancing-school-cyber-security/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/ensuring-the-skies-stay-open/</loc><lastmod>2025-02-01T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/everything-you-need-to-know-about-cyber-essentials-certification/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/firewall-fundamentals-building-your-first-line-of-cyber-defence/</loc><lastmod>2025-09-11T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/fortify-your-small-business/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/hints-tips-for-your-cyber-essentials-assessment/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/how-iasme-cyber-essentials-can-protect-your-sme/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/iasme-cyber-essentials-configuration-controls/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/innovative-cybersecurity-solutions-for-businesses-in-the-uk/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/keep-your-wits-about-you-while-shopping-online/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/keeping-user-accounts-in-check/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/leveraging-an-electronic-information-security-management-system/</loc><lastmod>2025-02-01T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/navigating-the-shadows-fake-conferences/</loc><lastmod>2024-12-24T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/penetration-testing-guidance-and-qualifications/</loc><lastmod>2025-05-12T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/pentesting-what-do-we-ask-you-when-we-scope-for-a-pentest/</loc><lastmod>2025-07-30T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/protecting-your-nonprofit-after-microsofts-2025-business-premium-license-changes/</loc><lastmod>2025-05-20T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/safeguarding-office-365-html-attachments-combatting-the-latest-phishing-trend/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/sample-post/</loc><lastmod>2024-03-17T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/scammed-by-the-hmrc/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/setting-scope-what-you-need-to-know-about-the-secret-sixth-control-of-cyber-essentials/</loc><lastmod>2025-07-22T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/shadow-ai-the-problem-youve-already-got-and-what-to-do-about-it/</loc><lastmod>2025-08-06T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/smishing-dont-fall-for-the-trap-bolster-cybersecurity-with-cyber-essentials/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/tackling-cyber-crime-in-the-uk-legal-sector/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/telephone-scamming-use-a-safe-phrase/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/the-correct-approach-to-cybersecurity-what-it-means-to-be-a-full-stack-consultancy/</loc><lastmod>2025-08-14T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/the-devastating-impact-of-cyber-attacks-how-iasme-cyber-essentials-certification-offers-protection/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/the-importance-of-keeping-antivirus-software-updated/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/the-importance-of-operating-system-updates-for-increased-cyber-security/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/the-insider-threat-when-your-own-team-becomes-the-weakest-link/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/the-new-cyber-assurance-update-is-a-cybersecurity-roadmap-in-disguise/</loc><lastmod>2025-06-11T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/the-transport-logistics-industry-and-the-indispensable-benefits-of-iasme-cyber-essentials-certification/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/understanding-cyber-essentials-iasme-and-more-strengthening-your-digital-defence/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/understanding-iasme-cyber-essentials-plus/</loc><lastmod>2025-02-01T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/unlocking-cyber-safety/</loc><lastmod>2024-12-18T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/unveiling-the-benefits-of-iasme-cyber-essentials-for-remote-workforces/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/vulnerability-management-for-everyone-why-per-device-scanning-doesnt-have-to-break-the-bank/</loc><lastmod>2025-04-23T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/what-is-cyber-essentials/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/what-to-expect-with-our-cyber-essentials-plus-assessment/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/why-2fa-is-a-pain-in-the-arse/</loc><lastmod>2024-11-13T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/why-organisations-still-need-cyber-essentials-certification-even-if-they-have-iso27001/</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/windows-10-end-of-life-a-cyber-essentials-compliance-guide/</loc><lastmod>2025-08-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/blog/you-are-the-supply-chain-we-are-the-supply-chain-they-are-the-supply-chain/</loc><lastmod>2025-09-25T00:00:00.000Z</lastmod></url><url><loc>https://turtledovecyber.com/contact/</loc></url></urlset>