<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.consolidated-it.com/the-canadian-guide-to-better-cybersecurity</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/The%20Canadian%20Guide%20to%20Better%20Cybersecurity.png</image:loc><image:caption>TheCanadianGuidetoBetterCybersecurity</image:caption><image:title>TheCanadianGuidetoBetterCybersecurity</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-02-21</lastmod></url><url><loc>https://blog.consolidated-it.com/10-best-practices-for-change-management</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/The%20Basics%20of%20Change%20Management.png</image:loc><image:caption>TheBasicsofChangeManagement</image:caption><image:title>TheBasicsofChangeManagement</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-06-04</lastmod></url><url><loc>https://blog.consolidated-it.com/how-telemetry-works-and-its-unique-challenges-in-canadian-environments</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/How%20Telemetry%20Works.jpg</image:loc><image:caption>HowTelemetryWorks</image:caption><image:title>HowTelemetryWorks</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-02-21</lastmod></url><url><loc>https://blog.consolidated-it.com/the-basics-of-network-security</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/The%20Basics%20of%20Network%20Security.png</image:loc><image:caption>TheBasicsofNetworkSecurity</image:caption><image:title>TheBasicsofNetworkSecurity</image:title></image:image><lastmod>2019-12-05</lastmod></url><url><loc>https://blog.consolidated-it.com/the-biggest-challenges-with-cyber-breaches</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Biggest%20Challenges%20with%20Cyber%20Breaches.png</image:loc><image:caption>BiggestChallengeswithCyberBreaches</image:caption><image:title>BiggestChallengeswithCyberBreaches</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-12-05</lastmod></url><url><loc>https://blog.consolidated-it.com/tips-for-preventing-spam</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Why%20is%20spam%20dangerous.png</image:loc><image:caption>Whyisspamdangerous</image:caption><image:title>Whyisspamdangerous</image:title></image:image><lastmod>2019-06-04</lastmod></url><url><loc>https://blog.consolidated-it.com/what-is-the-best-way-to-choose-an-it-services-consultant-in-canada</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/What%20is%20the%20best%20way%20to%20choose%20an%20IT%20Services%20Consultant%20in%20Canada.png</image:loc><image:caption>WhatisthebestwaytochooseanITServicesConsultantinCanada</image:caption><image:title>WhatisthebestwaytochooseanITServicesConsultantinCanada</image:title></image:image><lastmod>2019-10-17</lastmod></url><url><loc>https://blog.consolidated-it.com/how-to-protect-your-privacy-online</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/How%20to%20Protect%20Your%20Privacy%20Online.png</image:loc><image:caption>HowtoProtectYourPrivacyOnline</image:caption><image:title>HowtoProtectYourPrivacyOnline</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-04-30</lastmod></url><url><loc>https://blog.consolidated-it.com/tools-for-risk-management</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Tools%20for%20Risk%20Management.png</image:loc><image:caption>ToolsforRiskManagement</image:caption><image:title>ToolsforRiskManagement</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-04-17</lastmod></url><url><loc>https://blog.consolidated-it.com/it-outsourcing-vs-insourcing-pros-and-cons</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/IT%20Outsourcing%20vs%20Insourcing%20Pros%20and%20Cons.png</image:loc><image:caption>ITOutsourcingvsInsourcingProsandCons</image:caption><image:title>ITOutsourcingvsInsourcingProsandCons</image:title></image:image><lastmod>2019-10-26</lastmod></url><url><loc>https://blog.consolidated-it.com/what-canadian-businesses-should-know-about-ransomware</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/How%20do%20you%20know%20if%20you%20have%20ransomware.png</image:loc><image:caption>Howdoyouknowifyouhaveransomware</image:caption><image:title>Howdoyouknowifyouhaveransomware</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-12-05</lastmod></url><url><loc>https://blog.consolidated-it.com/why-you-should-worry-about-thumb-drives</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/How%20to%20Reduce%20the%20Risk%20of%20USB%20Drive%20Social%20Engineering%20Attacks.png</image:loc><image:caption>HowtoReducetheRiskofUSBDriveSocialEngineeringAttacks</image:caption><image:title>HowtoReducetheRiskofUSBDriveSocialEngineeringAttacks</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-09-19</lastmod></url><url><loc>https://blog.consolidated-it.com/an-introduction-to-total-cost-of-ownership-tco</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/An%20Introduction%20to%20Total%20Cost%20of%20Ownership.png</image:loc><image:caption>AnIntroductiontoTotalCostofOwnership</image:caption><image:title>AnIntroductiontoTotalCostofOwnership</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-10-25</lastmod></url><url><loc>https://blog.consolidated-it.com/when-errors-mean-danger-top-25-most-dangerous-software-errors</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/When%20Errors%20Mean%20Danger%20-%20Top%2025%20Most%20Dangerous%20Software%20Errors.png</image:loc><image:caption>WhenErrorsMeanDangerTop25MostDangerousSoftwareErrors</image:caption><image:title>WhenErrorsMeanDangerTop25MostDangerousSoftwareErrors</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-11-23</lastmod></url><url><loc>https://blog.consolidated-it.com/what-are-managed-it-services</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/What%20are%20managed%20IT%20services.png</image:loc><image:caption>WhataremanagedITservices</image:caption><image:title>WhataremanagedITservices</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-09-27</lastmod></url><url><loc>https://blog.consolidated-it.com/basics-of-cloud-computing</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Basics%20of%20Cloud%20Computing.png</image:loc><image:caption>BasicsofCloudComputing</image:caption><image:title>BasicsofCloudComputing</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-12-05</lastmod></url><url><loc>https://blog.consolidated-it.com/how-should-canadian-businesses-write-it-systems-assessment-documents</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/What%20is%20a%20systems%20assessment%20document.jpg</image:loc><image:caption>Whatisasystemsassessmentdocument</image:caption><image:title>Whatisasystemsassessmentdocument</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-02-21</lastmod></url><url><loc>https://blog.consolidated-it.com/introduction-to-it-change-management-for-canadians</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Introduction%20to%20IT%20Change%20Management.jpg</image:loc><image:caption>IntroductiontoITChangeManagement</image:caption><image:title>IntroductiontoITChangeManagement</image:title></image:image><lastmod>2019-02-21</lastmod></url><url><loc>https://blog.consolidated-it.com/top-10-safe-email-practices</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Top%2010%20Safe%20Email%20Practices.png</image:loc><image:caption>Top10SafeEmailPractices</image:caption><image:title>Top10SafeEmailPractices</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-05-01</lastmod></url><url><loc>https://blog.consolidated-it.com/spyware-can-be-used-to-follow-canadians</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Spyware%20can%20be%20used%20to%20Follow%20Canadians.png</image:loc><image:caption>SpywarecanbeusedtoFollowCanadians</image:caption><image:title>SpywarecanbeusedtoFollowCanadians</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-06-04</lastmod></url><url><loc>https://blog.consolidated-it.com/what-is-security-awareness</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/What%20is%20security%20awareness.png</image:loc><image:caption>Whatissecurityawareness</image:caption><image:title>Whatissecurityawareness</image:title></image:image><lastmod>2019-02-21</lastmod></url><url><loc>https://blog.consolidated-it.com/remote-workers-mean-cybersecurity-issues</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Remote%20Workers%20Mean%20Cybersecurity%20Issues.png</image:loc><image:caption>RemoteWorkersMeanCybersecurityIssues</image:caption><image:title>RemoteWorkersMeanCybersecurityIssues</image:title></image:image><lastmod>2019-12-06</lastmod></url><url><loc>https://blog.consolidated-it.com/how-to-prevent-the-desjardins-security-breach</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/How%20to%20Prevent%20the%20Desjardins%20Security%20Breach%20-%20Image%20Copyright%20CBC.png</image:loc><image:caption>HowtoPreventtheDesjardinsSecurityBreachImageCopyrightCBC</image:caption><image:title>HowtoPreventtheDesjardinsSecurityBreachImageCopyrightCBC</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Data%20Structures.png</image:loc><image:caption>DataStructures</image:caption><image:title>DataStructures</image:title></image:image><lastmod>2019-10-25</lastmod></url><url><loc>https://blog.consolidated-it.com/quick-tips-about-data-security</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Quick%20Tips%20About%20Data%20Security.png</image:loc><image:caption>QuickTipsAboutDataSecurity</image:caption><image:title>QuickTipsAboutDataSecurity</image:title></image:image><lastmod>2019-03-07</lastmod></url><url><loc>https://blog.consolidated-it.com/top-10-benefits-of-cloud-computing</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Top%2010%20Benefits%20of%20Cloud%20Computing.png</image:loc><image:caption>Top10BenefitsofCloudComputing</image:caption><image:title>Top10BenefitsofCloudComputing</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-07-10</lastmod></url><url><loc>https://blog.consolidated-it.com/common-myths-about-cloud-computing</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Common%20Myths%20About%20Cloud%20Computing.png</image:loc><image:caption>CommonMythsAboutCloudComputing</image:caption><image:title>CommonMythsAboutCloudComputing</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-03-07</lastmod></url><url><loc>https://blog.consolidated-it.com/the-organizational-structure-of-cybercrime</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/The%20Organizational%20Structure%20of%20Cybercrime.png</image:loc><image:caption>TheOrganizationalStructureofCybercrime</image:caption><image:title>TheOrganizationalStructureofCybercrime</image:title></image:image><lastmod>2019-10-26</lastmod></url><url><loc>https://blog.consolidated-it.com/how-to-reduce-it-costs</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/How%20to%20Reduce%20IT%20Costs.png</image:loc><image:caption>HowtoReduceITCosts</image:caption><image:title>HowtoReduceITCosts</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-10-17</lastmod></url><url><loc>https://blog.consolidated-it.com/the-basics-of-childrens-online-privacy-protection-laws</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/The%20Basics%20of%20Children's%20Online%20Privacy%20Protection%20Laws.png</image:loc><image:caption>TheBasicsofChildrensOnlinePrivacyProtectionLaws</image:caption><image:title>TheBasicsofChildrensOnlinePrivacyProtectionLaws</image:title></image:image><lastmod>2019-06-03</lastmod></url><url><loc>https://blog.consolidated-it.com/city-of-ottawa-becomes-a-victim-of-cybercrime</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/City%20of%20Ottawa.png</image:loc><image:caption>CityofOttawa</image:caption><image:title>CityofOttawa</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-05-16</lastmod></url><url><loc>https://blog.consolidated-it.com/malware-mitigation-and-recovery-strategies</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Malware%20Mitigation%20and%20Recovery%20Strategies.png</image:loc><image:caption>MalwareMitigationandRecoveryStrategies</image:caption><image:title>MalwareMitigationandRecoveryStrategies</image:title></image:image><lastmod>2019-04-12</lastmod></url><url><loc>https://blog.consolidated-it.com/common-myths-about-cybercriminals</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Common%20Myths%20About%20Cyber%20Attackers.png</image:loc><image:caption>CommonMythsAboutCyberAttackers</image:caption><image:title>CommonMythsAboutCyberAttackers</image:title></image:image><lastmod>2019-12-05</lastmod></url><url><loc>https://blog.consolidated-it.com/iphone-cable-chargers-are-vulnerable-to-cyber-threats</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/iPhone%20Charging%20Cable%20Hijack%20is%20the%20Future%20of%20Cyber%20Threats.png</image:loc><image:caption>iPhoneChargingCableHijackistheFutureofCyberThreats</image:caption><image:title>iPhoneChargingCableHijackistheFutureofCyberThreats</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2023-11-27</lastmod></url><url><loc>https://blog.consolidated-it.com/why-you-need-sender-policy-framework-spf-for-your-email</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Why%20You%20Need%20a%20Sender%20Policy%20Framework%20SPF%20Record.jpg</image:loc><image:caption>WhyYouNeedaSenderPolicyFrameworkSPFRecord</image:caption><image:title>WhyYouNeedaSenderPolicyFrameworkSPFRecord</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-11-25</lastmod></url><url><loc>https://blog.consolidated-it.com</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Why%20You%20Should%20Care%20about%20Cryptocurrency%20Mining.png</image:loc><image:caption>WhyYouShouldCareaboutCryptocurrencyMining</image:caption><image:title>WhyYouShouldCareaboutCryptocurrencyMining</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Basics%20of%20Cloud%20Computing.png</image:loc><image:caption>BasicsofCloudComputing</image:caption><image:title>BasicsofCloudComputing</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/On%20Premise%20vs%20Cloud%20Storage.png</image:loc><image:caption>OnPremisevsCloudStorage</image:caption><image:title>OnPremisevsCloudStorage</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Remote%20Workers%20Mean%20Cybersecurity%20Issues.png</image:loc><image:caption>RemoteWorkersMeanCybersecurityIssues</image:caption><image:title>RemoteWorkersMeanCybersecurityIssues</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Risks%20of%20Cloud%20Computing.png</image:loc><image:caption>RisksofCloudComputing</image:caption><image:title>RisksofCloudComputing</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/When%20Errors%20Mean%20Danger%20-%20Top%2025%20Most%20Dangerous%20Software%20Errors.png</image:loc><image:caption>WhenErrorsMeanDangerTop25MostDangerousSoftwareErrors</image:caption><image:title>WhenErrorsMeanDangerTop25MostDangerousSoftwareErrors</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/An%20Introduction%20to%20Total%20Cost%20of%20Ownership.png</image:loc><image:caption>AnIntroductiontoTotalCostofOwnership</image:caption><image:title>AnIntroductiontoTotalCostofOwnership</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Why%20You%20Need%20a%20Sender%20Policy%20Framework%20SPF%20Record.jpg</image:loc><image:caption>WhyYouNeedaSenderPolicyFrameworkSPFRecord</image:caption><image:title>WhyYouNeedaSenderPolicyFrameworkSPFRecord</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/iPhone%20Charging%20Cable%20Hijack%20is%20the%20Future%20of%20Cyber%20Threats.png</image:loc><image:caption>iPhoneChargingCableHijackistheFutureofCyberThreats</image:caption><image:title>iPhoneChargingCableHijackistheFutureofCyberThreats</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/The%20Organizational%20Structure%20of%20Cybercrime.png</image:loc><image:caption>TheOrganizationalStructureofCybercrime</image:caption><image:title>TheOrganizationalStructureofCybercrime</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/How%20to%20Reduce%20IT%20Costs.png</image:loc><image:caption>HowtoReduceITCosts</image:caption><image:title>HowtoReduceITCosts</image:title></image:image><lastmod>2023-08-29</lastmod></url><url><loc>https://blog.consolidated-it.com/why-you-should-care-about-cryptocurrency-mining</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Why%20You%20Should%20Care%20about%20Cryptocurrency%20Mining.png</image:loc><image:caption>WhyYouShouldCareaboutCryptocurrencyMining</image:caption><image:title>WhyYouShouldCareaboutCryptocurrencyMining</image:title></image:image><lastmod>2019-11-23</lastmod></url><url><loc>https://blog.consolidated-it.com/the-canadian-small-business-guide-to-understanding-spyware</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/The%20Basics%20of%20Spyware.jpg</image:loc><image:caption>TheBasicsofSpyware</image:caption><image:title>TheBasicsofSpyware</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-12-05</lastmod></url><url><loc>https://blog.consolidated-it.com/10-best-practices-to-prevent-being-hacked</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/10%20Best%20Practices%20to%20Prevent%20Being%20Hacked.png</image:loc><image:caption>10BestPracticestoPreventBeingHacked</image:caption><image:title>10BestPracticestoPreventBeingHacked</image:title></image:image><lastmod>2019-06-24</lastmod></url><url><loc>https://blog.consolidated-it.com/the-philosophy-of-it-management</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/The%20Philosophy%20of%20IT%20Management.png</image:loc><image:caption>ThePhilosophyofITManagement</image:caption><image:title>ThePhilosophyofITManagement</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-12-06</lastmod></url><url><loc>https://blog.consolidated-it.com/when-to-use-cloud-computing</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/When%20to%20Use%20Cloud%20Computing.png</image:loc><image:caption>WhentoUseCloudComputing</image:caption><image:title>WhentoUseCloudComputing</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-04-06</lastmod></url><url><loc>https://blog.consolidated-it.com/what-is-bloatware-and-how-does-it-impact-canadians</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/What%20is%20bloatware.png</image:loc><image:caption>Whatisbloatware</image:caption><image:title>Whatisbloatware</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-02-21</lastmod></url><url><loc>https://blog.consolidated-it.com/it-disaster-recovery-for-canadian-businesses</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Business%20Continuity%20and%20Disaster%20Recovery.jpg</image:loc><image:caption>BusinessContinuityandDisasterRecovery</image:caption><image:title>BusinessContinuityandDisasterRecovery</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-09-20</lastmod></url><url><loc>https://blog.consolidated-it.com/an-introduction-to-it-security-management</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/An%20Introduction%20to%20IT%20Security%20Management.png</image:loc><image:caption>AnIntroductiontoITSecurityManagement</image:caption><image:title>AnIntroductiontoITSecurityManagement</image:title></image:image><lastmod>2019-10-31</lastmod></url><url><loc>https://blog.consolidated-it.com/what-are-examples-of-spear-phishing-attacks-used-in-canada</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/02_01_slide_nature.jpg</image:loc><image:caption>0201slidenature</image:caption><image:title>0201slidenature</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-12-05</lastmod></url><url><loc>https://blog.consolidated-it.com/how-does-risk-management-work</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/How%20does%20risk%20management%20work.png</image:loc><image:caption>Howdoesriskmanagementwork</image:caption><image:title>Howdoesriskmanagementwork</image:title></image:image><lastmod>2019-04-16</lastmod></url><url><loc>https://blog.consolidated-it.com/what-is-spam-and-how-to-reduce-it</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/What%20is%20Spam%20and%20What%20to%20do%20About%20It.png</image:loc><image:caption>WhatisSpamandWhattodoAboutIt</image:caption><image:title>WhatisSpamandWhattodoAboutIt</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-02-21</lastmod></url><url><loc>https://blog.consolidated-it.com/10-benefits-of-outsourcing-it-services</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/10%20Benefits%20of%20Outsourcing%20IT%20Services.png</image:loc><image:caption>10BenefitsofOutsourcingITServices</image:caption><image:title>10BenefitsofOutsourcingITServices</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><lastmod>2019-02-27</lastmod></url><url><loc>https://blog.consolidated-it.com/top-5-questions-to-ask-your-it-consultant</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/The%205%20Most%20Important%20Questions%20to%20Ask%20Your%20IT%20Consultant.png</image:loc><image:caption>The5MostImportantQuestionstoAskYourITConsultant</image:caption><image:title>The5MostImportantQuestionstoAskYourITConsultant</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-06-15</lastmod></url><url><loc>https://blog.consolidated-it.com/on-premise-vs-cloud-storage</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/On%20Premise%20vs%20Cloud%20Storage.png</image:loc><image:caption>OnPremisevsCloudStorage</image:caption><image:title>OnPremisevsCloudStorage</image:title></image:image><lastmod>2019-10-15</lastmod></url><url><loc>https://blog.consolidated-it.com/risks-of-cloud-computing</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Risks%20of%20Cloud%20Computing.png</image:loc><image:caption>RisksofCloudComputing</image:caption><image:title>RisksofCloudComputing</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><lastmod>2019-10-25</lastmod></url><url><loc>https://blog.consolidated-it.com/tips-for-creating-a-security-awareness-campaign</loc><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/logo.png</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/leaf.png</image:loc><image:caption>leaf</image:caption><image:title>leaf</image:title></image:image><image:image><image:loc>https://4833001.fs1.hubspotusercontent-na1.net/hubfs/4833001/Tips%20for%20Creating%20an%20In-House%20Security%20Awareness%20Campaign.png</image:loc><image:caption>TipsforCreatinganInHouseSecurityAwarenessCampaign</image:caption><image:title>TipsforCreatinganInHouseSecurityAwarenessCampaign</image:title></image:image><lastmod>2019-12-05</lastmod></url></urlset>