<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//itsynergy.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://itsynergy.com/blog/</loc>
		<lastmod>2026-04-20T14:33:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/microsoft-reverses-course-on-sbsc-program/</loc>
		<lastmod>2010-05-10T06:27:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/vars-see-holes-in-google-ceos-privacy-anonymity-stance/</loc>
		<lastmod>2010-08-12T04:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/microsoft-partners-ozzies-shoes-will-be-tough-to-fill/</loc>
		<lastmod>2010-10-18T05:51:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/microsoft-partners-not-feeling-the-tablet-love/</loc>
		<lastmod>2011-05-03T06:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/windows-7-os-seen-as-driver-of-greater-customer-satisfaction-for-it-firm/</loc>
		<lastmod>2011-05-04T06:30:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/microsoft-tries-to-head-off-google-at-netbook-pass/</loc>
		<lastmod>2011-11-09T06:29:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/microsoft-partners-yawn-in-chromes-general-direction/</loc>
		<lastmod>2012-01-03T06:31:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/the-top-10-microsoft-partner-mvps-2/</loc>
		<lastmod>2012-07-20T06:38:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/welcome-new-blog/</loc>
		<lastmod>2014-02-07T17:25:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/vital-signs-a-midyear-channel-review/</loc>
		<lastmod>2014-02-09T04:09:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/vendors-path-hackers/</loc>
		<lastmod>2014-02-10T16:18:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/a-day-of-giving-back/</loc>
		<lastmod>2014-02-16T15:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2015/02/3-e1423714906208.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2015/02/2-e1423714893778.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2015/02/1-e1423714921122.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/mismatch-industry-cios/</loc>
		<lastmod>2014-02-19T16:00:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/new-worm-exploits-issue-linksys-home-routers/</loc>
		<lastmod>2014-02-19T16:01:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/internet-things-part-1/</loc>
		<lastmod>2014-03-15T15:57:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/itsynergy-announces-amanda-larson-as-technology-advisor/</loc>
		<lastmod>2014-03-17T03:29:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/urgent-alert-microsoft-announces-zero-day-word-exploit/</loc>
		<lastmod>2014-03-25T15:55:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/internet-things-part-2/</loc>
		<lastmod>2014-03-26T15:52:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/moving-data-cloud-hope-trust-provider/</loc>
		<lastmod>2014-03-31T15:50:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/widely-reported-internet-security-flaw-need-know/</loc>
		<lastmod>2014-04-09T15:47:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/keep-prying-eyes-away-data-cloud/</loc>
		<lastmod>2014-04-10T15:46:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/latest-internet-explorer-security-flaw/</loc>
		<lastmod>2014-04-29T15:43:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/update-internet-explorer-security-flaw-fixed/</loc>
		<lastmod>2014-05-01T15:40:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/an-interesting-statistic-in-the-net-neutrality-debate/</loc>
		<lastmod>2014-05-19T12:23:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/excellent-password-checker/</loc>
		<lastmod>2014-06-03T12:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/itsynergy-announces-sam-adkins-as-technology-advisor-2/</loc>
		<lastmod>2014-07-11T03:27:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/the-effect-of-technology-adoption-on-your-bottom-line/</loc>
		<lastmod>2014-07-27T19:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/widely-reported-mass-theft-of-email-accounts/</loc>
		<lastmod>2014-08-06T19:07:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/microsoft-patches-new-zero-day-vulnerability-but-not-for-xp/</loc>
		<lastmod>2014-11-13T18:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/select-build/</loc>
		<lastmod>2015-01-30T11:39:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/law-firm-overcomes-challenges-of-it-environment-improves-clientele-relations/</loc>
		<lastmod>2015-01-31T12:19:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/law-firm-streamlines-negotiations-with-new-operating-system-and-desktop-tools/</loc>
		<lastmod>2015-02-01T11:07:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/network-infrastructure-practice/</loc>
		<lastmod>2015-02-02T11:28:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/law-firm-continues-pursuit-to-tech-up-on-productivity-and-reliability/</loc>
		<lastmod>2015-02-03T11:30:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/os-seen-as-driver-of-greater-customer-satisfaction-and-efficiency-for-it-firm/</loc>
		<lastmod>2015-02-04T11:31:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/infrastructure-optimization-model-boosts-company-revenue-opportunities/</loc>
		<lastmod>2015-02-05T11:37:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/fnf-construction-inc/</loc>
		<lastmod>2015-02-06T11:38:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/island-kinetics/</loc>
		<lastmod>2015-02-07T11:39:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/law-firm-increases-total-email-capacity-using-small-business-server/</loc>
		<lastmod>2015-02-10T09:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/new-os-delivers-greater-speed-and-security-for-medical-services-firm/</loc>
		<lastmod>2015-02-11T11:47:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/gain-a-competitive-advantage-in-an-uncomfortable-way/</loc>
		<lastmod>2015-08-24T17:52:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/claim-your-identity-before-the-bad-guys-do/</loc>
		<lastmod>2015-08-24T18:45:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/are-you-ready-for-a-major-meltdown/</loc>
		<lastmod>2015-09-02T15:00:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/technology-friction-is-causing-you-to-leak-money/</loc>
		<lastmod>2015-09-22T17:37:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/why-some-it-problems-never-die/</loc>
		<lastmod>2015-10-06T20:31:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/are-your-employees-suffering-in-silence/</loc>
		<lastmod>2015-10-28T20:26:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/amazon-announces-two-factor-authentication/</loc>
		<lastmod>2016-03-09T23:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/get-account-irs-gov-bad-guys/</loc>
		<lastmod>2016-03-25T18:00:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/cybersecurity-expert-launches-webinars-for-non-technical-biz-employees/</loc>
		<lastmod>2016-06-29T00:48:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/dnc-hack-alarm/</loc>
		<lastmod>2016-08-18T22:41:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/cyber-monday-threats-install-security-updates-now/</loc>
		<lastmod>2016-11-28T20:11:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/free-webinar-december-8-part-ongoing-hacking-human-seriex/</loc>
		<lastmod>2016-11-29T20:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/hacking-human-video-series-learn-importance-physical-security/</loc>
		<lastmod>2017-01-28T22:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/passwords/</loc>
		<lastmod>2017-02-09T03:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/wp-contentuploads201703march-9-avoiding-income-tax-fraud-webinar-pdf/</loc>
		<lastmod>2017-03-08T01:21:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/hacking-human-video-series-password-management/</loc>
		<lastmod>2017-03-11T01:04:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/10-technology-strategies-separate-top-bottom-performers-smb-space/</loc>
		<lastmod>2017-03-20T16:28:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/social-engineering-attacks-rise/</loc>
		<lastmod>2017-04-14T02:38:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/webinar-to-provide-tips-for-using-and-caring-laptops/</loc>
		<lastmod>2017-05-03T23:04:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/wanna-cry-read-news-last-days/</loc>
		<lastmod>2017-05-16T00:30:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/webinar-to-provide-tips-for-controlling-shareable-data/</loc>
		<lastmod>2017-05-25T16:24:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/free-july-13-hacking-human-webinar-provide-tips-combating-spam/</loc>
		<lastmod>2017-06-28T00:22:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/free-august-10-hacking-human-webinar-provide-tips-protecting-privacy-online/</loc>
		<lastmod>2017-07-26T16:28:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/top-3-business-challenges-solved-office-365/</loc>
		<lastmod>2017-08-07T15:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/10-business-changing-365-features-need-know/</loc>
		<lastmod>2017-09-01T15:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/free-september-14-hacking-human-webinar-provide-tips-avoiding-air-gap-attacks/</loc>
		<lastmod>2017-09-04T18:49:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/super-hero-leverage-365-full-roi-create-new-business-advantages/</loc>
		<lastmod>2017-09-18T15:00:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/protect-cell-phone-hackers/</loc>
		<lastmod>2017-11-02T20:04:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/beware-atm-fraudsters/</loc>
		<lastmod>2017-12-07T17:25:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/learn-need-vpn/</loc>
		<lastmod>2018-01-09T17:25:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/the-two-types-of-single-it-issues-that-haunt-your-company/</loc>
		<lastmod>2018-01-18T21:37:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/manage-annoying-it-stress-in-two-steps/</loc>
		<lastmod>2018-01-18T22:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/the-latest-phishing-scams/</loc>
		<lastmod>2018-01-22T18:32:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/the-cost-of-ignoring-pesky-it-issues/</loc>
		<lastmod>2018-01-23T19:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/solve-nagging-it-headaches/</loc>
		<lastmod>2018-01-23T19:46:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/how-safe-are-file-sharing-services/</loc>
		<lastmod>2018-02-27T20:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/how-safe-are-file-sharing-services-2/</loc>
		<lastmod>2018-02-27T20:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/avoid-the-dangers-of-social-media/</loc>
		<lastmod>2018-04-06T02:58:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/3-dangerous-signs-your-it-provider-isnt-being-transparent/</loc>
		<lastmod>2018-04-25T17:19:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/michael-cocanower-of-itsynergy-earns-ethical-hacker-certification/</loc>
		<lastmod>2018-05-08T20:54:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/avert-hackers-with-digital-spring-cleaning/</loc>
		<lastmod>2018-05-08T21:09:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/what-to-do-if-your-business-is-hacked/</loc>
		<lastmod>2018-05-29T20:40:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/take-advice-from-microsoft-when-selecting-an-it-partner/</loc>
		<lastmod>2018-06-06T14:04:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/3-ways-financial-institutions-can-safeguard-against-the-secs-safeguards-rule/</loc>
		<lastmod>2018-06-29T14:19:51+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/06/3-Ways-Financial-Institutions-Can-Safeguard-Against-the-SEC%E2%80%99s-Safeguards-Rule-300x285.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/part-2-what-it-security-level-is-acceptable-for-financial-firms/</loc>
		<lastmod>2018-06-29T14:24:22+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/06/SEC-Safeguards-Rule-Part-2-What-IT-Security-Level-Is-Acceptable-for-Financial-Firms-2-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/06/SEC-Safeguards-Rule-Part-2-What-IT-Security-Level-Is-Acceptable-for-Financial-Firms-300x225.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/part-3-software-and-tools-to-keep-financial-services-compliant/</loc>
		<lastmod>2018-06-29T14:28:52+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/06/SEC-Safeguards-Rule-Part-3-sm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/06/SEC-Safeguards-Rule-Part-2-What-IT-Security-Level-Is-Acceptable-for-Financial-Firms-300x225.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/encryption-101-how-to-protect-sensitive-data/</loc>
		<lastmod>2018-07-03T21:42:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/5-steps-to-hipaa-compliance-for-phoenix-doctors-to-take-now/</loc>
		<lastmod>2018-07-05T18:09:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/how-to-increase-patient-satisfaction-with-better-technology/</loc>
		<lastmod>2018-07-05T18:10:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/4-benefits-of-good-it-that-help-phoenix-doctors-grow-their-practice/</loc>
		<lastmod>2018-07-05T18:13:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/risky-business/</loc>
		<lastmod>2018-07-05T18:56:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/keep-your-cool-if-you-suspect-business-has-been-hacked/</loc>
		<lastmod>2018-07-11T19:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/claim-your-online-identity-before-hackers-do/</loc>
		<lastmod>2018-07-27T17:02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/kick-not-secure-to-the-curb-4-steps-to-ssl/</loc>
		<lastmod>2018-08-06T14:58:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/phoenix-tech-ceo-shares-insights-on-first-def-con-experience/</loc>
		<lastmod>2018-08-24T16:25:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/super-cyber-you-8-week-cybersecurity/</loc>
		<lastmod>2018-09-05T20:34:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/be-more-vigilant-about-personal-cybersecurity/</loc>
		<lastmod>2018-10-11T14:48:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/partners-speak-out-on-ceo-switch-at-datto/</loc>
		<lastmod>2018-10-29T19:49:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/are-you-ready-for-arizonas-new-cybersecurity-laws/</loc>
		<lastmod>2018-11-07T16:17:55+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/12/10HVO-itSynergy-MoB-CTA-AZ-Ebook-Data-Laws-FINAL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/howard-stern-interview-beware-of-cyber-monday-scams/</loc>
		<lastmod>2018-11-23T17:03:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/4-scary-signs-your-iphone-has-a-virus-shefinds-article/</loc>
		<lastmod>2018-11-25T16:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/what-to-include-your-2019-business-planning/</loc>
		<lastmod>2018-11-26T16:24:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/money-talk-interview-on-arizonas-new-cybersecurity-laws/</loc>
		<lastmod>2018-11-27T16:21:03+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/12/10HVO-itSynergy-MoB-CTA-AZ-Ebook-Data-Laws-FINAL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/1-lesson-from-our-top-8-blog-posts-of-2018/</loc>
		<lastmod>2018-11-30T13:54:30+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/11/end-of-year-Top-8-blog-1-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/11/10HVO-itSynergy-MoB-CTA-AZ-Ebook-Data-Laws-FINAL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/risk-informed-decision-making-whats-your-ridm-it-loss-tolerance/</loc>
		<lastmod>2019-01-07T17:57:36+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/01/Risk-Management-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/12/10HVO-itSynergy-MoB-CTA-AZ-Ebook-Data-Laws-FINAL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/ocie-audits-how-it-experts-can-help-ccos-stay-compliant/</loc>
		<lastmod>2019-01-25T17:13:26+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/01/13BC2-IT-Compliance-1-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/12/10HVO-itSynergy-MoB-CTA-AZ-Ebook-Data-Laws-FINAL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/hackers-have-windows-7-windows-server-2008-end-of-life-plans-what-are-yours/</loc>
		<lastmod>2019-04-17T14:02:44+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/04/Microsoft-Windows-Server-2008-End-of-Life-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/why-risk-informed-decision-making-matters-and-how-to-get-started/</loc>
		<lastmod>2019-05-31T17:16:30+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/05/Risk-Informed-Decision-Making-Guide-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/you-dont-deserve-bad-it-support/</loc>
		<lastmod>2019-06-28T20:33:12+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/06/18BC-Man-unhappy-with-poor-IT-support-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/how-to-ensure-a-stress-free-microsoft-end-of-life-migration/</loc>
		<lastmod>2019-08-05T19:26:03+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/08/Microsoft-end-of-life-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/my-key-security-takeaways-from-2019s-largest-hacker-conference/</loc>
		<lastmod>2019-08-27T16:30:53+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/08/cybersecurity-screen-technology-business-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/uncover-the-real-costs-of-the-cloud-learn-how-to-manage-migrations/</loc>
		<lastmod>2019-10-01T02:38:20+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/10/Cloud_Computing_Costs-1-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/10/21BC-MOB-art-1024x528.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/2-ways-to-improve-your-business-security-after-arizona-data-breaches/</loc>
		<lastmod>2019-10-30T19:26:23+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/10/SEC-Safeguards-Rule-Part-3-sm-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/10/Net-Tech-23BC1-Video-Shot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/risk-from-your-it-vendors-understating-3rd-party-vulnerabilities/</loc>
		<lastmod>2019-12-06T16:10:28+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/12/24BC-Video-Play.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/your-2020-cybersecurity-strategy-5-factors-to-focus-on/</loc>
		<lastmod>2020-01-02T13:53:19+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/01/blog-ftrd-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/kolbe-corporation-less-time-putting-out-fires-more-time-on-revenue-generation/</loc>
		<lastmod>2020-01-10T20:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/how-to-create-a-transparent-it-partnership-and-why-it-matters/</loc>
		<lastmod>2020-02-11T17:01:13+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/02/IT-Synergy-Data-Transparency.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/02/27BC-Video-Play.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/are-you-prepared-for-disaster-5-action-items-for-successful-backups/</loc>
		<lastmod>2020-03-17T15:05:47+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/03/Server-Backup-Strategies-sm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/03/ITS-DisasterRecovery.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/what-you-need-to-know-about-encryption-5-tips-for-rias/</loc>
		<lastmod>2020-04-06T14:28:09+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/04/Examining-IT-Auditing-Topics.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/uncertain-times-call-for-expert-guidance-5-reasons-to-revisit-your-it-plan/</loc>
		<lastmod>2020-04-23T17:31:12+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/04/Decision-Business-Cloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/rias-technology-is-changing-your-industry-are-you-ready/</loc>
		<lastmod>2020-05-04T16:42:16+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/05/Technology-is-Changing-Your-Industry-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/why-its-time-for-rias-to-select-a-cybersecurity-standard/</loc>
		<lastmod>2020-06-17T22:36:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/06/Man-with-baseketball-resize.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/06/ITS-Cyber-Standard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/recession-proof-your-it-one-step-at-a-time/</loc>
		<lastmod>2020-06-22T17:45:05+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/06/budget-forecasting-presentation-resize.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/06/ITS-Recession-Proof.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/notes-from-the-fbi-cybersecurity-measures-you-should-take-today/</loc>
		<lastmod>2020-07-21T15:29:19+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/07/IT-hacker-resized.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/07/IT-4-cyber-takeaways.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/why-registered-investment-advisors-need-an-incident-response-plan/</loc>
		<lastmod>2020-08-14T15:38:34+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/08/timing-is-everything-resized.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/cocanower-expands-ability-to-serve-clients-with-iaccp-designation/</loc>
		<lastmod>2020-08-17T16:14:24+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/08/Cocanower-ITS-headshot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/why-its-time-to-eliminate-your-on-premise-servers-using-sharepoint/</loc>
		<lastmod>2020-09-02T19:22:13+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/09/group-people-cloud-technology-resized.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/ocie-and-covid-protecting-your-business-while-advising-from-home/</loc>
		<lastmod>2020-10-02T16:27:11+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/10/man-working-from-home-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/what-changes-and-whats-here-to-stay-6-long-term-takeaways/</loc>
		<lastmod>2020-10-05T23:59:08+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/10/I-am-here-to-stay-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/hackers-are-targeting-you-its-time-to-fight-back/</loc>
		<lastmod>2020-10-19T17:49:38+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/10/two-businesspeople-boxing-near-window-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/guide-for-rias-who-want-to-avoid-cyberattacks-and-simplify-compliance/</loc>
		<lastmod>2020-11-07T04:27:05+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/12/advisor-sitting-table-smiling-man-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/registered-investment-advisors-you-arent-ready-for-2021/</loc>
		<lastmod>2020-12-03T18:21:18+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/12/sleeping-puppy-on-plaid-blanket-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/best-of-2020/</loc>
		<lastmod>2020-12-04T23:01:29+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/12/young-man-having-zoom-video-sm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/12/I-am-here-to-stay-sm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/12/read-our-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/12/IT-4-cyber-takeaways.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/12/ITS-Recession-Proof.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/12/ITS-DisasterRecovery.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/12/read-our-blog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/12/ITS-Life-Hack-My-M365.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/it-solutions-for-5-mistakes-holding-back-your-business/</loc>
		<lastmod>2020-12-21T22:40:05+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/12/woman-working-on-computer-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/how-certified-ethical-hackers-protect-your-business/</loc>
		<lastmod>2021-01-29T15:31:28+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/01/man-in-tuxedo-behind-hat-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/think-cookie-cutter-it-support-wont-hurt-your-business-read-this/</loc>
		<lastmod>2021-02-03T18:37:01+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/02/Christmas-homemad-gingerbread-dough-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/can-your-rias-it-solutions-fight-off-cybercriminals/</loc>
		<lastmod>2021-03-02T16:59:53+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/03/ready-to-fight-for-success.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/can-your-rias-it-solutions-fight-off-cybercriminals-2/</loc>
		<lastmod>2021-03-02T16:59:53+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/03/ready-to-fight-for-success.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/youre-40-protected-heres-what-your-information-security-is-missing/</loc>
		<lastmod>2021-03-29T16:56:11+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/03/information-security-puzzle-sm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/03/ITS-Zero-Trust-Video.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/the-answers-to-your-next-it-compliance-test/</loc>
		<lastmod>2021-03-30T19:48:16+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/03/IT-Compliance-checklist-sm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/for-more-secure-it-plan-a-tech-spring-cleaning-today/</loc>
		<lastmod>2021-05-03T14:37:27+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/05/secure-IT-clean-computer-jpg.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/ripping-off-the-band-aid-it-solutions-post-pandemic/</loc>
		<lastmod>2021-05-04T16:56:23+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/05/no-band-aid-for-IT-solutions-and-information-security-jpg.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/4-questions-your-it-consultant-should-answer-re-the-internet-of-things/</loc>
		<lastmod>2021-05-28T20:36:26+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/05/IoT-opens-many-portals-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/how-managed-service-providers-can-help-you-navigate-to-the-cloud/</loc>
		<lastmod>2021-05-28T20:40:29+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/05/bull-clouds-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/how-to-balance-efficiency-and-security-with-your-managed-services-provider/</loc>
		<lastmod>2021-07-01T17:52:48+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/07/Balance-security-productivity-managed-services-provider-sm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/07/Password-Risks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/how-to-balance-efficiency-and-security-with-your-managed-services-provider-2/</loc>
		<lastmod>2021-07-01T17:52:48+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/07/Balance-security-productivity-managed-services-provider-sm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/07/Password-Risks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/technology-spending-lessons-for-better-return-on-investment-for-rias/</loc>
		<lastmod>2021-07-02T16:43:49+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/07/Technology-that-delivers-a-strong-return-on-investment-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/the-cyber-game-changed-is-your-denver-or-phoenix-it-services-team-ready/</loc>
		<lastmod>2021-09-23T14:08:23+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/09/Phoenix-IT-Services-man-using-tablet-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/denver-and-phoenix-it-consulting-tips-protect-revenues-and-your-reputation/</loc>
		<lastmod>2021-10-05T15:05:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/10/Phoenix-IT-Consulting-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/phoenix-it-services-incomplete-without-this/</loc>
		<lastmod>2021-10-12T21:56:38+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/10/qtq80-sB12aD.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/straight-talk-about-phoenix-it-services-cyberthreats-and-budgeting/</loc>
		<lastmod>2021-10-29T19:15:57+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/10/Phoenix-IT-services-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/the-it-services-challenge-for-rias-can-you-score-100-on-this-quiz/</loc>
		<lastmod>2021-11-01T06:28:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/10/strategic-IT-services-better-RIA-technology-sm.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/do-your-employees-get-the-same-level-of-it-support-as-these-retirees/</loc>
		<lastmod>2021-11-01T07:21:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/10/strategic-IT-support-better-decisions-sm.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/7-reasons-it-services-are-the-gift-that-benefits-your-business/</loc>
		<lastmod>2021-12-07T23:05:11+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/12/man-holding-present-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/8-business-trends-youll-see-2022-it-consulting-tips-on-how-to-adjust/</loc>
		<lastmod>2021-12-08T19:30:46+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/12/IT-consulting-tech-business-trends-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/end-user-it-audit-improve-employee-productivity-and-efficiency/</loc>
		<lastmod>2021-12-21T11:48:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/save-your-firm-750000-with-this-simple-it-support-tip/</loc>
		<lastmod>2022-01-05T18:44:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/12/IT-Support-Compliance-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/the-5-cs-of-cybersecurity-for-2022/</loc>
		<lastmod>2022-01-08T00:19:09+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/01/Keeping-your-organization-cybersecure-this-year-rs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/3-ways-it-consulting-and-it-support-give-your-business-an-edge-in-2022/</loc>
		<lastmod>2022-01-24T18:20:23+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/01/itSynergy-3-ways.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/your-phoenix-it-services-partner-should-do-more-than-manage-paperwork/</loc>
		<lastmod>2022-01-31T18:36:51+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/01/woman-needs-phoenix-IT-services-sm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/01/ITS-Cyber-Experts-Graphic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/your-phoenix-it-services-partner-should-do-more-than-manage-paperwork-2/</loc>
		<lastmod>2022-01-31T18:36:51+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/01/woman-needs-phoenix-IT-services-sm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/01/ITS-Cyber-Experts-Graphic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/knights-in-cyber-armor-your-data-loss-prevention-strategy/</loc>
		<lastmod>2022-02-02T18:02:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/07/hacker-using-laptop-resized.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/07/Building-a-castle-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/knights-in-cyber-armor-your-data-loss-prevention-strategy/</loc>
		<lastmod>2022-02-02T18:02:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/07/hacker-using-laptop-resized.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/07/Building-a-castle-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/meet-your-new-network-security-champion-nist-vs-cis/</loc>
		<lastmod>2022-02-22T20:29:32+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/02/network-security-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/02/ITS-Cyber-Experts-Graphic-1-1024x683-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/yep-you-can-save-on-it-consulting-and-support-heres-how/</loc>
		<lastmod>2022-03-02T00:06:28+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/03/bigstock-Television-Streaming-Tv-Broad-409178740-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/it-outsource-company-case-study/</loc>
		<lastmod>2022-03-28T08:01:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2020/05/IT-Director-Duties-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/bet-on-the-right-cybersecurity-services-to-get-cyber-insurance/</loc>
		<lastmod>2022-04-01T15:41:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/03/Cybersecurity-services-scaled-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/how-co-managed-phoenix-it-support-drives-value-for-your-business/</loc>
		<lastmod>2022-04-05T19:03:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/03/Phoenix-IT-Support-scaled-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/removing-technology-friction-from-your-day/</loc>
		<lastmod>2022-04-18T05:21:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2015/09/it-services-outsourcing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/it-management-best-practices-hackers-dont-want-you-to-know/</loc>
		<lastmod>2022-05-05T04:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/04/IT-Management-Best-Practices-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/05/ITS-Rapid-Security-Assessment.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/the-simple-reputation-protecting-it-security-solution-rias-need/</loc>
		<lastmod>2022-05-06T05:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/04/IT-security-training-geotagged-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/5-simple-it-security-tips-for-rias-prepping-for-sec-exams/</loc>
		<lastmod>2022-05-24T18:49:46+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/05/IT-security-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/stop-haphazard-spending-get-an-it-management-plan/</loc>
		<lastmod>2022-05-24T22:49:41+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/05/IT-Management-plan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/05/ITS-Rapid-Security-Assessment_4-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/05/My-project-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/your-complete-guide-to-finding-phoenix-it-services/</loc>
		<lastmod>2022-09-23T07:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/09/IT-Synergy-scaled-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/cybersecurity-services-keep-you-out-of-rigged-games-with-criminals/</loc>
		<lastmod>2022-10-17T07:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2022/10/bigstock-Playing-poker-in-a-casino-hold-407131004-scaled-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/5-steps-to-finding-an-it-management-provider-you-can-trust/</loc>
		<lastmod>2022-12-22T07:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2023/01/bigstock-An-Employee-Of-A-Tourist-Car-R-443658503-scaled-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/5-causes-of-business-stress-it-management-defeats/</loc>
		<lastmod>2023-01-19T16:27:22+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2023/01/bigstock-First-Person-Top-View-Photo-Of-429472235-1-scaled-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/ria-compliance-requirements-faq-your-guide-to-it-compliance/</loc>
		<lastmod>2023-04-19T19:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2023/04/RIA-compliance-graphic-sm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2023/04/give-us-IT-problems-1-scaled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/how-ridm-keeps-your-managed-it-services-spend-in-check/</loc>
		<lastmod>2023-06-19T18:31:01+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2023/06/businesspeople-following-RIDM-1-scaled-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/what-is-a-vcio-and-why-do-you-need-one/</loc>
		<lastmod>2023-10-24T10:57:47+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2023/10/What-Is-A-vCIO-And-Why-Do-You-Need-One-Img.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/what-you-need-to-know-about-technology-planning/</loc>
		<lastmod>2023-10-24T10:58:28+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2023/10/TPM_October-Blog-Posts-2.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/conduct-an-environmental-scan-of-your-existing-and-desired-technology/</loc>
		<lastmod>2023-12-08T06:41:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/why-you-should-outsource-your-it-services/</loc>
		<lastmod>2023-12-08T06:41:31+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/09/qtq80-74Bhah.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/address-your-long-term-business-strategy-with-it-consulting/</loc>
		<lastmod>2023-12-08T06:41:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/5-cybersecurity-misconceptions-that-need-to-be-debunked/</loc>
		<lastmod>2023-12-08T06:41:49+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/03/handwriting-text-myths-and-facts.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/whats-the-holdup-the-top-it-solution-mistakes-we-heard-from-rias-in-2020/</loc>
		<lastmod>2023-12-08T06:42:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2021/01/stressed-and-worried-businessman-sm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/3-ways-to-be-a-better-it-client/</loc>
		<lastmod>2023-12-08T06:56:31+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2023/08/3-Ways-To-Be-A-Better-IT-Client-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/5-things-you-should-know-about-your-current-or-next-it-support-company/</loc>
		<lastmod>2023-12-08T06:57:20+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2023/08/5-Things-You-Should-Know-About-Your-Current-Or-Next-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/why-are-default-cybersecurity-settings-dangerous/</loc>
		<lastmod>2024-01-18T06:33:04+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/01/cybersecurity-setting-dangerous.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/stop-giving-away-your-personal-data/</loc>
		<lastmod>2024-01-18T06:43:44+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/01/Personal-data-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/itsynergy-how-it-support-companies-in-phoenix-protects-your-data-expert-insights/</loc>
		<lastmod>2024-01-18T07:03:56+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/01/IT-Support-Companies-In-Phoenix.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2023/11/itSynergy-How-IT-Support-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/holiday-scams-safeguarding-your-festive-celebrations-from-fraudsters/</loc>
		<lastmod>2024-01-18T07:07:49+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/01/holiday-scam.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/giving-devices-as-gifts-follow-these-security-tips-for-parents-guardians/</loc>
		<lastmod>2024-01-18T07:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/01/giving-divices-as-gift.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/new-year-new-cybersecurity-resolutions/</loc>
		<lastmod>2024-01-18T07:20:46+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/01/new-year-cybersecurity-resolutions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/your-guide-to-it-budgeting-in-2024/</loc>
		<lastmod>2024-01-18T07:25:41+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/01/it-budgeting-2024.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/glendale-managed-it-services-the-key-to-unlocking-your-business-potential/</loc>
		<lastmod>2024-02-03T08:52:58+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/02/Managed-IT-Services.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/it-support-company-your-guide-to-finding-the-best-provider/</loc>
		<lastmod>2024-02-03T09:01:57+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/02/Area-Targeted-Blogpost.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/outsourced-managed-it-services-in-phoenix-az-your-guide-to-professional-tech-solutions/</loc>
		<lastmod>2024-02-07T12:38:10+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/01/Outsourced-IT-Services.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/itsynergy-providing-top-notch-outsourced-it-support-in-peoria-az/</loc>
		<lastmod>2024-02-12T18:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/02/Area-Targeted-Blogposts-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/staying-updated-on-emerging-authentication-technologies-the-future-of-password-based-authentication/</loc>
		<lastmod>2024-02-16T06:57:52+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/02/1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/5-business-technology-trends-to-track-in-2024/</loc>
		<lastmod>2024-02-16T12:40:23+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/02/2024-01-19-TPM_February-Blog-Post-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/watch-out-for-these-valentines-day-cyber-scams/</loc>
		<lastmod>2024-02-16T12:40:30+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/02/2024-01-19-TPM_February-Blog-Post-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/encrypting-emails-made-easy-a-beginners-tutorial-on-encrypting-outlook-emails/</loc>
		<lastmod>2024-02-19T15:33:43+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/02/IT-Support-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/ransomware-a-billion-dollar-threat-to-the-business-world/</loc>
		<lastmod>2024-03-20T10:06:37+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/03/2024-02-29-TPM_March-Blog-Post-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/how-to-protect-your-business-against-ransomware/</loc>
		<lastmod>2024-03-20T10:10:13+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/03/2024-02-29-TPM_March-Blog-Post-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/outsourced-it-support-in-phoenix-az-benefits-and-providers/</loc>
		<lastmod>2024-03-21T13:55:50+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/03/ITSynergy-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/cybersecurity-essentials-protect-your-business-with-managed-it-services/</loc>
		<lastmod>2024-03-21T17:21:19+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/03/IT-Synergy-Evergreen-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/the-importance-of-password-managers-in-keeping-your-credentials-secure/</loc>
		<lastmod>2024-03-26T10:44:20+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/03/IT-Synergy-Evergreen2-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/paradise-valley-managed-it-services-by-itsynergy/</loc>
		<lastmod>2024-04-01T12:48:20+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/03/IT-Synergy-2-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/itsynergys-it-services-for-small-businesses-in-tempe-az/</loc>
		<lastmod>2024-04-01T12:51:04+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/03/IT-Synergy-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/what-ai-text-generators-can-do-for-small-businesses/</loc>
		<lastmod>2024-04-18T21:25:48+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/04/2024-03-25-TPM_April-Blog-Post-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/why-small-businesses-need-to-be-careful-with-ai/</loc>
		<lastmod>2024-04-18T21:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/04/2024-03-25-TPM_April-Blog-Post-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/managed-it-services-in-scottsdale-by-itsynergy-it-solutions-for-your-business-technology/</loc>
		<lastmod>2024-04-19T07:33:08+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/04/Managed-IT-Services-Scottsdale-Arizona-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/itsynergys-outsourced-it-support-services-in-phoenix-az/</loc>
		<lastmod>2024-04-19T07:39:38+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/04/Outsourced-IT-Support-Services-Phoenix-Arizona-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/itsynergy-phoenixs-premier-managed-it-services/</loc>
		<lastmod>2024-04-19T07:46:54+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/04/Managed-IT-Services-Phoenix-Arizona-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/creating-secure-passwords-tips-and-techniques-for-stronger-authentication/</loc>
		<lastmod>2024-04-29T14:47:01+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/04/Creating-Secure-Passwords-Tips-and-Techniques-for-Stronger-Authentication.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/data-security-in-microsoft-365-tips-to-protect-your-information/</loc>
		<lastmod>2024-04-29T15:02:34+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/04/Data-Security-in-Microsoft-365-Tips-to-Protect-Your-Information.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/the-importance-of-updating-your-dmarc-policy-for-enhanced-email-security/</loc>
		<lastmod>2024-06-20T14:44:39+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/06/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/passwords-our-primary-defense-against-cyber-threats-a-new-era-of-cybersecurity/</loc>
		<lastmod>2024-06-20T14:52:42+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/06/image-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/preparing-for-a-cyber-safe-vacation/</loc>
		<lastmod>2024-06-20T14:56:38+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/05/TPM-May-2024-Blog-1-Image-1920-x-1080-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/is-your-business-at-risk-for-cyber-fraud/</loc>
		<lastmod>2024-06-20T15:05:53+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/05/TPM-May-2024-Blog-2-Image-1920-x-1080-1a.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/searching-for-a-reliable-it-company-in-peoria-explore-itsynergy/</loc>
		<lastmod>2024-06-25T14:30:31+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/06/Searching-for-a-Reliable-IT-Company-in-Peoria-Explore-itSynergy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/finding-the-best-local-it-support-for-your-business-in-scottsdale/</loc>
		<lastmod>2024-06-25T14:30:40+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/06/Finding-the-Best-Local-IT-Support-for-Your-Business-in-Scottsdale-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/boost-your-smartphone-security-why-the-fbi-advises-regular-reboots-matter/</loc>
		<lastmod>2024-07-11T14:11:40+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/07/Boost-Your-Smartphone-Security-Why-The-FBI-Advices-Regular-Reboots-Matter.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/dont-copy-paste-this-dangerous-text/</loc>
		<lastmod>2024-07-11T14:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/07/Dont-Copy-Paste-This-Dangerous-Text.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/preparing-for-a-cyber-safe-school-year-essential-it-and-cybersecurity-tips-for-students-and-parents/</loc>
		<lastmod>2024-08-09T04:09:36+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/08/Preparing-for-a-Cyber-Safe-School-Year-Essential-IT-and-Cybersecurity-Tips-for-Students-and-Parents.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/lessons-to-learn-from-the-crowdstrike-outage/</loc>
		<lastmod>2024-08-27T19:08:24+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/08/Lessons-to-Learn-from-the-CrowdStrike-Outage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/ready-for-anything-strengthening-your-it-infrastructure-for-year-end-demands/</loc>
		<lastmod>2024-09-13T11:58:25+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/09/2024-08-30-TPM-September-Blog-Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/maximize-your-it-budget-start-planning-now/</loc>
		<lastmod>2024-09-13T12:12:49+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/09/2024-08-30-TPM-September-Blog-Image-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/trick-or-treat-how-hackers-use-social-engineering-to-gain-access/</loc>
		<lastmod>2024-10-16T14:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/10/image-8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/cybersecurity-horror-stories-real-life-attacks-that-could-have-been-prevented/</loc>
		<lastmod>2024-10-16T14:02:18+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/10/TPM-October-2024-Blog-Image-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/beware-of-holiday-cyber-scams-in-2024/</loc>
		<lastmod>2024-11-20T09:25:29+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/11/Blog-Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/safeguarding-your-remote-workforce-during-the-holiday-season/</loc>
		<lastmod>2024-11-20T09:38:04+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/11/Blog-Image-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/top-cyber-threats-to-watch-out-for-in-2025/</loc>
		<lastmod>2024-12-17T11:52:53+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/12/Blog-post-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/6-new-years-resolutions-to-strengthen-your-workplace-cybersecurity/</loc>
		<lastmod>2024-12-17T11:54:20+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2024/12/Blog-post-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/compliance-and-it-are-merging-aligning-data-security-with-regulatory-and-operational-goals-for-efficiency/</loc>
		<lastmod>2025-02-10T13:32:15+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/02/Compliance-and-IT-are-merging-aligning-data-security-with-regulatory-and-operational-goals-for-efficiency-img.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/the-ultimate-diy-guide-to-navigating-and-complying-with-the-secs-new-cybersecurity-regulations/</loc>
		<lastmod>2025-02-10T13:35:52+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/02/The-Ultimate-DIY-Guide-to-Navigating-and-Complying-with-the-SECs-New-Cybersecurity-Regulations-img.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/rias-guide-to-sec-regulation-s-p-compliance/</loc>
		<lastmod>2025-02-11T05:14:14+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/02/RIAs-Guide-to-SEC-Regulation-S-P-Compliance-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/comprehensive-guide-to-creating-a-disaster-recovery-plan-for-rias/</loc>
		<lastmod>2025-02-11T05:19:01+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/02/Comprehensive-Guide-to-Creating-a-Disaster-Recovery-Plan-for-RIAs-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/how-rias-can-proactively-prepare-for-a-cybersecurity-assessment-with-a-mock-audit/</loc>
		<lastmod>2025-02-11T05:23:30+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/02/How-RIAs-Can-Proactively-Prepare-for-a-Cybersecurity-Assessment-with-a-Mock-Audit-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/how-to-protect-your-business-from-shadow-it-risk/</loc>
		<lastmod>2025-02-22T10:49:37+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/01/How-to-Protect-Your-Business-from-Shadow-IT-Risk.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/cybersecurity-for-remote-teams-tips-to-keep-your-business-safe/</loc>
		<lastmod>2025-02-22T19:35:58+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/01/Cybersecurity-for-Remote-Teams-Tips-to-Keep-Your-Business-Safe.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/romance-scams-in-the-digital-age-how-cybercriminals-exploit-valentines-day/</loc>
		<lastmod>2025-02-23T13:48:27+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/02/Blog-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/emerging-ransomware-tactics-what-you-should-know-in-2025/</loc>
		<lastmod>2025-02-23T14:10:04+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/02/Blog-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/spring-cleaning-for-your-digital-workspace-organizing-files-and-streamlining-tools/</loc>
		<lastmod>2025-03-15T11:17:42+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/03/Blog-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/the-hidden-dangers-of-free-wi-fi-staying-secure-while-traveling/</loc>
		<lastmod>2025-03-15T12:11:55+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/03/TPM-March-2025-Blog-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/earth-day-and-it-reducing-your-digital-carbon-footprint/</loc>
		<lastmod>2025-04-15T09:46:03+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/04/TPM-Blog-Image_April-2025-Image1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/protecting-your-personal-devices-cybersecurity-tips-for-home-and-beyond/</loc>
		<lastmod>2025-04-15T21:59:38+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/04/TPM-Blog-Image_April-2025-Image2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/national-password-day-are-your-passwords-strong-enough/</loc>
		<lastmod>2025-05-16T01:31:36+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/05/TPM-May-Blog-Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/graduation-season-protecting-young-adults-from-cyber-threats/</loc>
		<lastmod>2025-05-16T02:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/05/TPM-May-Blog-Image-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/free-download-sample-ria-cybersecurity-policy/</loc>
		<lastmod>2025-06-11T07:14:51+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/02/RIA-Cybersecurity-Policy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/how-ria-cybersecurity-builds-client-trust/</loc>
		<lastmod>2025-07-02T18:40:23+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/06/June-2025-Blog-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/why-rias-must-rethink-cyber-risk-assessments/</loc>
		<lastmod>2025-07-02T18:40:54+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/06/June-2025-Blog-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/managing-ai-in-financial-services-ensuring-compliance-with-ai-usage-policies-in-your-ria/</loc>
		<lastmod>2025-08-21T18:22:02+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/08/itSynergy-August-Blog-Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/strategies-to-ensure-your-vendors-meet-the-72-hour-notification-requirement-in-reg-s-p/</loc>
		<lastmod>2025-08-21T18:22:20+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/08/itSynergy-August-Blog-Image-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/tabletop-exercises-the-secret-weapon-in-ria-cybersecurity-readiness/</loc>
		<lastmod>2025-11-10T02:13:35+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/09/ItSynergy-September-Blog-Image-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/is-your-vendor-chain-reg-s-p-ready-5-cybersecurity-steps-every-ria-must-take/</loc>
		<lastmod>2025-11-10T02:13:45+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/09/ItSynergy-September-Blog-Image-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/automating-incident-response-how-to-respond-faster-and-more-effectively-during-a-breach/</loc>
		<lastmod>2025-11-11T19:01:14+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/10/2025-11-07-ItSynergy-October-Blog-Image-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/the-key-elements-of-an-effective-incident-response-plan-for-rias/</loc>
		<lastmod>2025-11-11T19:20:48+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/10/2025-11-07-ItSynergy-October-Blog-Image-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/itsynergy-announces-acquisition-of-itegria/</loc>
		<lastmod>2025-12-22T12:47:22+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2025/12/2025-12-22-itSynergy-Blog-Image-itegrea-acquisition-Version-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/new-compliance-suite-created-for-and-by-ccos-of-ria-firms/</loc>
		<lastmod>2026-03-20T13:38:31+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2019/02/14BC1-OCIE-Compliance-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2018/12/10HVO-itSynergy-MoB-CTA-AZ-Ebook-Data-Laws-FINAL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/reg-s-p-compliance-key-steps-for-rias-to-meet-the-30-day-notification-requirement/</loc>
		<lastmod>2026-03-30T19:18:08+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2026/03/2026-03-26-itSynergy-Blog-Post-1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/vendor-relationship-management-strengthening-cybersecurity-practices-in-the-ria-industry/</loc>
		<lastmod>2026-03-30T19:23:25+00:00</lastmod>
		<image:image>
			<image:loc>https://itsynergy.com/wp-content/uploads/2026/03/2026-03-26-itSynergy-Blog-Post-2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://itsynergy.com/ria-cybersecurity-risk-assessment-regulatory-expectations/</loc>
		<lastmod>2026-04-20T14:32:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/executive-cybersecurity-oversight-rias/</loc>
		<lastmod>2026-04-20T14:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/ria-cybersecurity-risk-assessment-frequency/</loc>
		<lastmod>2026-04-20T14:32:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/ria-cybersecurity-roadmap-risk-assessment/</loc>
		<lastmod>2026-04-20T14:32:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/generic-cybersecurity-assessments-vs-ria-focused/</loc>
		<lastmod>2026-04-20T14:33:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/vendor-cybersecurity-risk-management-rias/</loc>
		<lastmod>2026-04-20T14:33:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/sec-cybersecurity-exams-rias/</loc>
		<lastmod>2026-04-20T14:33:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/ria-cybersecurity-policies/</loc>
		<lastmod>2026-04-20T14:33:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/ria-incident-response-planning/</loc>
		<lastmod>2026-04-20T14:33:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://itsynergy.com/cybersecurity-training-rias/</loc>
		<lastmod>2026-04-20T14:33:40+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->