<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://iotssa.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://iotssa.com/hello-world/</loc><lastmod>2017-10-31T17:07:53+00:00</lastmod></url><url><loc>https://iotssa.com/podcast-2/</loc><lastmod>2017-11-10T17:19:50+00:00</lastmod></url><url><loc>https://iotssa.com/join/</loc><lastmod>2017-10-04T19:10:28+00:00</lastmod></url><url><loc>https://iotssa.com/best-web-panel-yet-shows-xyz/</loc><lastmod>2017-10-31T17:01:53+00:00</lastmod></url><url><loc>https://iotssa.com/welcome-to-iotssa/</loc><lastmod>2017-11-02T12:52:53+00:00</lastmod></url><url><loc>https://iotssa.com/msp-employee-turnover-exposes-clients-password-security-risks/</loc><lastmod>2018-05-11T19:08:44+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-know-customer-create-data-protection-strategy-zak-karsan-vault-america/</loc><lastmod>2018-05-11T18:51:19+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-ian-thornton-trump-make-clients-hard-cyber-security-target/</loc><lastmod>2018-05-11T18:54:44+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-podcast-patrick-albert-protecting-rogue/</loc><lastmod>2018-05-07T19:17:14+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-ryan-goodman-connect-booster-securing-customers-payment-data/</loc><lastmod>2018-05-11T18:42:15+00:00</lastmod></url><url><loc>https://iotssa.com/ohio-roadshow-filling-fast/</loc><lastmod>2017-12-11T20:11:31+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-stephan-tallent-fortinet-intelligence-sharing-security-fabric/</loc><lastmod>2018-05-11T18:50:11+00:00</lastmod></url><url><loc>https://iotssa.com/iot-cyber-security-channel-2018-beyond/</loc><lastmod>2017-12-15T18:18:28+00:00</lastmod></url><url><loc>https://iotssa.com/happy-holidays/</loc><lastmod>2017-12-22T16:25:04+00:00</lastmod></url><url><loc>https://iotssa.com/iot-channels-superhighway-future/</loc><lastmod>2018-03-21T18:22:13+00:00</lastmod></url><url><loc>https://iotssa.com/sonos-bose-speakers-remotely-hijacked/</loc><lastmod>2018-05-04T18:12:39+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-amy-luby-infogressive-hack-hype-security-layering/</loc><lastmod>2018-05-11T18:36:12+00:00</lastmod></url><url><loc>https://iotssa.com/five-steps-building-valued-cybersecurity-practice/</loc><lastmod>2018-02-27T19:45:52+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-gjeret-stein-ultra-scary-llc-dark-web/</loc><lastmod>2018-05-11T18:25:46+00:00</lastmod></url><url><loc>https://iotssa.com/austin-roadshow-filling-fast/</loc><lastmod>2018-02-27T19:46:59+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-rob-rae-datto-it-channel-massive-force-reckoned/</loc><lastmod>2018-05-11T17:59:23+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-dan-wensley-passportal-eliminate-unintentional-risk-exposure-better-internal-password-hygiene/</loc><lastmod>2018-10-22T17:12:46+00:00</lastmod></url><url><loc>https://iotssa.com/tighten-weakest-link-end-user-education-mandatory/</loc><lastmod>2018-05-04T18:18:09+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-mark-glowacz-mailprotector-raise-bar-email-encryption-security/</loc><lastmod>2018-10-22T17:20:43+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-patrick-albert-auvik-innovation-your-differentiator/</loc><lastmod>2018-10-22T17:20:03+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-infogressive-ceo-justin-kallhoff-msps-target/</loc><lastmod>2018-10-22T17:19:46+00:00</lastmod></url><url><loc>https://iotssa.com/new-jersey-cyber-security-roadshow/</loc><lastmod>2018-03-27T18:50:37+00:00</lastmod></url><url><loc>https://iotssa.com/msps-poised-fail/</loc><lastmod>2018-03-29T14:17:39+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-talent-gap-opportunity-obstacle-channel/</loc><lastmod>2018-05-04T18:02:44+00:00</lastmod></url><url><loc>https://iotssa.com/selling-cyber-security/</loc><lastmod>2018-04-11T16:49:41+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-cyber-insurance-gcg-financial-zach-slade/</loc><lastmod>2018-10-22T17:19:28+00:00</lastmod></url><url><loc>https://iotssa.com/matter-fact-small-businesses-ideal-target-cybercriminals/</loc><lastmod>2018-04-25T14:50:35+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-insurance-friend-foe-channel/</loc><lastmod>2018-05-04T17:57:49+00:00</lastmod></url><url><loc>https://iotssa.com/paper-checks-unsecure-checks/</loc><lastmod>2018-10-22T17:19:13+00:00</lastmod></url><url><loc>https://iotssa.com/digital-transformation-and-the-smb/</loc><lastmod>2018-10-22T17:18:50+00:00</lastmod></url><url><loc>https://iotssa.com/the-most-crucial-cybersecurity-support-comes-after-an-attack/</loc><lastmod>2018-05-16T18:12:26+00:00</lastmod></url><url><loc>https://iotssa.com/why-iot-must-be-part-of-your-customers-data-protection-strategy/</loc><lastmod>2018-05-25T16:36:20+00:00</lastmod></url><url><loc>https://iotssa.com/rich-delaney-delaney-computer-services/</loc><lastmod>2019-01-19T19:14:46+00:00</lastmod></url><url><loc>https://iotssa.com/is-cloud-storage-expensive/</loc><lastmod>2018-10-22T17:18:37+00:00</lastmod></url><url><loc>https://iotssa.com/msp-podcast-rick-rusch-from-secure-erp-inc/</loc><lastmod>2019-01-19T19:10:20+00:00</lastmod></url><url><loc>https://iotssa.com/how-much-cybersecurity-is-enough/</loc><lastmod>2018-06-23T13:41:31+00:00</lastmod></url><url><loc>https://iotssa.com/dattocon-2018-wrap-up-with-rob-rae-from-datto/</loc><lastmod>2018-10-22T17:18:21+00:00</lastmod></url><url><loc>https://iotssa.com/cloud-storage-security-vault-america/</loc><lastmod>2018-10-22T17:18:07+00:00</lastmod></url><url><loc>https://iotssa.com/msps-are-you-secure-dan-wensley-passportal/</loc><lastmod>2018-10-22T17:17:55+00:00</lastmod></url><url><loc>https://iotssa.com/msp-infographics-the-main-managed-it-service-business-insights/</loc><lastmod>2018-07-23T14:06:44+00:00</lastmod></url><url><loc>https://iotssa.com/social-engineering-not-just-a-cybersecurity-buzz-term/</loc><lastmod>2018-07-26T13:47:32+00:00</lastmod></url><url><loc>https://iotssa.com/msp-podcast-guy-baroan-from-baroan-technologies/</loc><lastmod>2019-01-19T19:11:37+00:00</lastmod></url><url><loc>https://iotssa.com/fragmentation-does-wonders-for-hackers-with-patrick-albert-from-auvik/</loc><lastmod>2018-10-22T17:17:16+00:00</lastmod></url><url><loc>https://iotssa.com/the-iot-opportunity-its-all-about-security/</loc><lastmod>2018-08-16T17:41:20+00:00</lastmod></url><url><loc>https://iotssa.com/todays-critical-security-threat-email/</loc><lastmod>2018-10-22T17:17:30+00:00</lastmod></url><url><loc>https://iotssa.com/threat-hunting-as-a-service-with-ken-totura-from-mantix4/</loc><lastmod>2018-10-22T17:17:42+00:00</lastmod></url><url><loc>https://iotssa.com/verticals-compliance-and-cybersecurity/</loc><lastmod>2022-02-23T15:27:51+00:00</lastmod></url><url><loc>https://iotssa.com/effective-it-security-is-a-collaborative-effort/</loc><lastmod>2018-09-06T17:07:30+00:00</lastmod></url><url><loc>https://iotssa.com/nist-cyber-security-framework-mike-semel/</loc><lastmod>2018-10-22T17:09:01+00:00</lastmod></url><url><loc>https://iotssa.com/building-an-msp-business-case-for-dark-web-monitoring/</loc><lastmod>2018-09-21T20:16:30+00:00</lastmod></url><url><loc>https://iotssa.com/bad-guys-only-have-to-be-right-once-with-justin-kallhoff-from-infogressive/</loc><lastmod>2018-10-22T17:08:21+00:00</lastmod></url><url><loc>https://iotssa.com/disaster-recovery-doug-hazelman-cloudberry-lab/</loc><lastmod>2018-10-22T17:07:51+00:00</lastmod></url><url><loc>https://iotssa.com/employees-are-the-1-cause-of-cyber-attacks-with-art-gross-from-secure-now/</loc><lastmod>2019-01-02T20:12:14+00:00</lastmod></url><url><loc>https://iotssa.com/encryption-of-backup-best-practices-for-effectively-securing-your-data/</loc><lastmod>2018-10-10T20:08:24+00:00</lastmod></url><url><loc>https://iotssa.com/iot-threat-opportunity-with-stephan-tallent-from-fortinet/</loc><lastmod>2018-10-22T17:03:43+00:00</lastmod></url><url><loc>https://iotssa.com/it-security-tools-and-accreditations/</loc><lastmod>2018-10-18T19:40:46+00:00</lastmod></url><url><loc>https://iotssa.com/cybercriminals-increasingly-target-municipalities-and-utilities/</loc><lastmod>2018-10-24T13:17:51+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-trends-and-the-smb/</loc><lastmod>2018-10-25T17:13:47+00:00</lastmod></url><url><loc>https://iotssa.com/is-email-dead/</loc><lastmod>2018-12-10T21:05:18+00:00</lastmod></url><url><loc>https://iotssa.com/close-more-cybersecurity-sales-by-calculating-the-cost-of-failure/</loc><lastmod>2018-11-27T16:48:58+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-is-an-organized-behaviour/</loc><lastmod>2018-12-15T18:04:33+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-and-how-managed-security-service-providers-can-leverage/</loc><lastmod>2018-12-28T16:48:28+00:00</lastmod></url><url><loc>https://iotssa.com/the-aftermath-of-a-breach/</loc><lastmod>2018-12-28T19:14:13+00:00</lastmod></url><url><loc>https://iotssa.com/pci-compliance-the-smb/</loc><lastmod>2019-01-11T16:09:22+00:00</lastmod></url><url><loc>https://iotssa.com/financial-services-cybersecurity/</loc><lastmod>2019-03-12T12:29:06+00:00</lastmod></url><url><loc>https://iotssa.com/management-is-key-to-becoming-an-mvp-in-cybersecurity/</loc><lastmod>2019-02-08T15:17:54+00:00</lastmod></url><url><loc>https://iotssa.com/nist-cybersecurity-framework/</loc><lastmod>2019-03-12T12:28:20+00:00</lastmod></url><url><loc>https://iotssa.com/cyber-breach-post-mortem/</loc><lastmod>2019-03-12T12:27:39+00:00</lastmod></url><url><loc>https://iotssa.com/your-customers-are-going-digital-how-partners-can-minimize-challenges/</loc><lastmod>2019-03-05T15:35:14+00:00</lastmod></url><url><loc>https://iotssa.com/explosive-channel-growth-with-rob-rae-datto/</loc><lastmod>2019-03-12T12:26:18+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-maturity-with-chris-johnson-pinpoint-solutions/</loc><lastmod>2019-03-22T17:22:16+00:00</lastmod></url><url><loc>https://iotssa.com/recognizing-the-experts-in-cybersecurity/</loc><lastmod>2019-03-28T19:45:11+00:00</lastmod></url><url><loc>https://iotssa.com/msps-guide-to-secure-data-backup-to-amazon-s3/</loc><lastmod>2019-04-03T14:27:32+00:00</lastmod></url><url><loc>https://iotssa.com/security-expertise-is-the-key-to-emerging-tech-opportunities/</loc><lastmod>2019-04-10T20:08:27+00:00</lastmod></url><url><loc>https://iotssa.com/cobblers-kids-have-no-shoes/</loc><lastmod>2019-04-17T15:36:26+00:00</lastmod></url><url><loc>https://iotssa.com/the-evolving-spear-phishing-threat/</loc><lastmod>2019-04-24T17:22:00+00:00</lastmod></url><url><loc>https://iotssa.com/risk-vulnerabilities/</loc><lastmod>2019-05-08T16:35:06+00:00</lastmod></url><url><loc>https://iotssa.com/your-customers-top-digital-engagement-strategies-and-what-they-mean-for-security/</loc><lastmod>2019-05-17T15:19:57+00:00</lastmod></url><url><loc>https://iotssa.com/protecting-data-in-the-cloud/</loc><lastmod>2019-05-21T18:44:09+00:00</lastmod></url><url><loc>https://iotssa.com/use-gdpr-as-the-compliance-target-for-every-business/</loc><lastmod>2019-05-28T14:49:29+00:00</lastmod></url><url><loc>https://iotssa.com/securing-your-msp-business/</loc><lastmod>2019-05-29T17:36:11+00:00</lastmod></url><url><loc>https://iotssa.com/how-to-configure-your-backup-so-that-ransomware-doesnt-affect-your-data/</loc><lastmod>2019-06-05T17:28:07+00:00</lastmod></url><url><loc>https://iotssa.com/show-me-dont-tell-me/</loc><lastmod>2019-06-13T13:11:06+00:00</lastmod></url><url><loc>https://iotssa.com/three-tips-to-pump-up-cybersecurity-volume-with-your-target-audience/</loc><lastmod>2019-06-23T13:39:06+00:00</lastmod></url><url><loc>https://iotssa.com/secure-connections-expert-panel-breaking-through-the-smb/</loc><lastmod>2019-07-03T17:53:25+00:00</lastmod></url><url><loc>https://iotssa.com/your-clients-are-exposed-on-the-dark-web/</loc><lastmod>2019-07-12T19:14:56+00:00</lastmod></url><url><loc>https://iotssa.com/proactive-asset-management/</loc><lastmod>2019-07-18T15:20:20+00:00</lastmod></url><url><loc>https://iotssa.com/security-is-a-comprehensive-strategy-not-just-a-tool/</loc><lastmod>2019-07-29T18:45:15+00:00</lastmod></url><url><loc>https://iotssa.com/cyber-liability-insurance/</loc><lastmod>2019-07-31T17:05:52+00:00</lastmod></url><url><loc>https://iotssa.com/five-iot-solutions-msps-can-sell-today/</loc><lastmod>2019-09-03T14:56:17+00:00</lastmod></url><url><loc>https://iotssa.com/iot-security-and-artificial-intelligence/</loc><lastmod>2019-09-23T16:14:38+00:00</lastmod></url><url><loc>https://iotssa.com/hurricane-dorian-disaster-recovery/</loc><lastmod>2019-09-23T16:15:47+00:00</lastmod></url><url><loc>https://iotssa.com/cyber-threats-are-also-opportunities/</loc><lastmod>2019-09-23T16:16:27+00:00</lastmod></url><url><loc>https://iotssa.com/cyber-security-compliance-frameworks/</loc><lastmod>2019-09-26T19:40:01+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-checklist/</loc><lastmod>2019-09-30T13:57:40+00:00</lastmod></url><url><loc>https://iotssa.com/current-cybersecurity-landscape/</loc><lastmod>2019-10-01T13:13:36+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-aspiration-to-visionary/</loc><lastmod>2019-10-08T16:13:35+00:00</lastmod></url><url><loc>https://iotssa.com/pre-current-post-cybersecurity-posture/</loc><lastmod>2019-10-17T18:23:52+00:00</lastmod></url><url><loc>https://iotssa.com/protecting-against-pass-the-hash/</loc><lastmod>2019-10-23T18:20:15+00:00</lastmod></url><url><loc>https://iotssa.com/whats-your-teams-cybersecurity-iq/</loc><lastmod>2019-10-31T17:42:18+00:00</lastmod></url><url><loc>https://iotssa.com/the-switch-from-if-to-when/</loc><lastmod>2019-11-01T13:27:38+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-mindset/</loc><lastmod>2021-03-30T21:56:10+00:00</lastmod></url><url><loc>https://iotssa.com/good-cyber-hygiene/</loc><lastmod>2019-11-13T17:55:37+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-realities/</loc><lastmod>2020-09-16T14:06:12+00:00</lastmod></url><url><loc>https://iotssa.com/impact-of-iot-on-msps/</loc><lastmod>2019-11-30T13:20:38+00:00</lastmod></url><url><loc>https://iotssa.com/legally-protect-your-msps-assets-from-cyberattacks/</loc><lastmod>2019-12-02T17:53:06+00:00</lastmod></url><url><loc>https://iotssa.com/iotssa-hires-respected-channel-veteran-robin-miller/</loc><lastmod>2019-12-03T14:34:01+00:00</lastmod></url><url><loc>https://iotssa.com/generating-sales-with-cybersecurity/</loc><lastmod>2019-12-11T16:54:39+00:00</lastmod></url><url><loc>https://iotssa.com/introducing-the-2020-iotssa-advisory-council/</loc><lastmod>2019-12-12T16:46:35+00:00</lastmod></url><url><loc>https://iotssa.com/urgency-is-a-red-flag/</loc><lastmod>2019-12-18T17:54:22+00:00</lastmod></url><url><loc>https://iotssa.com/it-starts-with-a-vulnerability-assessment/</loc><lastmod>2019-12-24T13:50:44+00:00</lastmod></url><url><loc>https://iotssa.com/iotssa-shifted-cybersecurity-into-high-gear-in-2019/</loc><lastmod>2020-01-03T14:48:04+00:00</lastmod></url><url><loc>https://iotssa.com/2020-threat-trends/</loc><lastmod>2020-01-03T15:09:13+00:00</lastmod></url><url><loc>https://iotssa.com/evolution-of-cybersecurity-compliance/</loc><lastmod>2020-01-15T17:01:13+00:00</lastmod></url><url><loc>https://iotssa.com/defensible-defence/</loc><lastmod>2020-01-22T17:07:17+00:00</lastmod></url><url><loc>https://iotssa.com/is-iot-a-real-opportunity-for-msps-in-2020/</loc><lastmod>2020-01-31T15:09:03+00:00</lastmod></url><url><loc>https://iotssa.com/hiring-and-retaining-talent/</loc><lastmod>2020-02-05T17:17:34+00:00</lastmod></url><url><loc>https://iotssa.com/msp-to-iot-practice/</loc><lastmod>2020-02-12T17:27:17+00:00</lastmod></url><url><loc>https://iotssa.com/are-phone-systems-secure/</loc><lastmod>2020-02-19T17:02:44+00:00</lastmod></url><url><loc>https://iotssa.com/the-key-to-cyber-liability-insurance-is-asking-the-right-questions/</loc><lastmod>2020-02-21T14:50:31+00:00</lastmod></url><url><loc>https://iotssa.com/security-is-mandatory/</loc><lastmod>2020-02-26T16:53:37+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-culture/</loc><lastmod>2020-03-04T18:26:38+00:00</lastmod></url><url><loc>https://iotssa.com/turn-on-your-mfa/</loc><lastmod>2020-03-11T15:30:00+00:00</lastmod></url><url><loc>https://iotssa.com/it-is-a-vital-service/</loc><lastmod>2020-03-18T20:02:52+00:00</lastmod></url><url><loc>https://iotssa.com/slow-down/</loc><lastmod>2020-03-19T20:13:22+00:00</lastmod></url><url><loc>https://iotssa.com/iot-cost-recovery-to-profit-center/</loc><lastmod>2020-03-24T15:49:24+00:00</lastmod></url><url><loc>https://iotssa.com/beyond-the-curve/</loc><lastmod>2020-09-16T14:04:40+00:00</lastmod></url><url><loc>https://iotssa.com/no-more-perimeters/</loc><lastmod>2020-03-31T14:13:32+00:00</lastmod></url><url><loc>https://iotssa.com/gut-check-time/</loc><lastmod>2020-04-02T16:43:03+00:00</lastmod></url><url><loc>https://iotssa.com/beyond-the-curve-cyber-stream-series/</loc><lastmod>2020-04-02T17:36:59+00:00</lastmod></url><url><loc>https://iotssa.com/pandemics-are-not-force-majeure/</loc><lastmod>2020-09-16T14:02:48+00:00</lastmod></url><url><loc>https://iotssa.com/navigating-the-cares-act/</loc><lastmod>2020-04-10T13:21:15+00:00</lastmod></url><url><loc>https://iotssa.com/testing-dr-is-business-critical-during-the-covid-19-pandemic/</loc><lastmod>2020-04-13T14:20:31+00:00</lastmod></url><url><loc>https://iotssa.com/msps-align-with-your-clients/</loc><lastmod>2020-04-15T13:29:24+00:00</lastmod></url><url><loc>https://iotssa.com/trends-in-managed-services/</loc><lastmod>2020-04-21T13:39:32+00:00</lastmod></url><url><loc>https://iotssa.com/a-challenge-to-the-good-folks-of-the-it-channel/</loc><lastmod>2020-04-27T16:19:06+00:00</lastmod></url><url><loc>https://iotssa.com/importance-of-log-monitoring/</loc><lastmod>2020-04-29T17:00:37+00:00</lastmod></url><url><loc>https://iotssa.com/robins-weekly-update/</loc><lastmod>2020-04-30T18:27:50+00:00</lastmod></url><url><loc>https://iotssa.com/beyond-the-curve-cyber-stream-series-2/</loc><lastmod>2020-05-04T16:05:13+00:00</lastmod></url><url><loc>https://iotssa.com/covid-clickbait/</loc><lastmod>2020-05-05T16:13:55+00:00</lastmod></url><url><loc>https://iotssa.com/emerging-technology/</loc><lastmod>2020-05-27T19:55:41+00:00</lastmod></url><url><loc>https://iotssa.com/impact-of-a-remote-workforce/</loc><lastmod>2020-05-21T14:02:16+00:00</lastmod></url><url><loc>https://iotssa.com/is-your-msp-prepared-to-support-the-growing-wfh-movement/</loc><lastmod>2020-06-01T16:38:24+00:00</lastmod></url><url><loc>https://iotssa.com/segregating-home-networks/</loc><lastmod>2020-06-03T16:23:24+00:00</lastmod></url><url><loc>https://iotssa.com/restructuring-your-msp/</loc><lastmod>2020-06-10T16:42:38+00:00</lastmod></url><url><loc>https://iotssa.com/triaging-windows-event-failed-logons/</loc><lastmod>2020-06-15T19:36:52+00:00</lastmod></url><url><loc>https://iotssa.com/assessing-the-value-of-customer-data/</loc><lastmod>2020-06-24T16:27:20+00:00</lastmod></url><url><loc>https://iotssa.com/10-cybersecurity-threats-every-business-should-fear/</loc><lastmod>2020-06-25T16:25:19+00:00</lastmod></url><url><loc>https://iotssa.com/patching-the-human-factor/</loc><lastmod>2020-07-01T13:35:30+00:00</lastmod></url><url><loc>https://iotssa.com/evolving-your-stack/</loc><lastmod>2020-07-15T14:01:38+00:00</lastmod></url><url><loc>https://iotssa.com/compliance-n-covid/</loc><lastmod>2020-07-17T11:53:43+00:00</lastmod></url><url><loc>https://iotssa.com/layered-security-is-the-best-way-to-stop-cybercrime/</loc><lastmod>2020-07-21T15:16:05+00:00</lastmod></url><url><loc>https://iotssa.com/scaling-your-stack/</loc><lastmod>2020-07-22T13:59:13+00:00</lastmod></url><url><loc>https://iotssa.com/click-time-protection/</loc><lastmod>2020-07-29T20:05:26+00:00</lastmod></url><url><loc>https://iotssa.com/nominate-an-it-certification-scholar/</loc><lastmod>2020-08-03T17:28:51+00:00</lastmod></url><url><loc>https://iotssa.com/ransomware-canaries/</loc><lastmod>2020-08-06T18:47:42+00:00</lastmod></url><url><loc>https://iotssa.com/covid-response/</loc><lastmod>2020-08-07T13:35:22+00:00</lastmod></url><url><loc>https://iotssa.com/security-stack-visibility/</loc><lastmod>2020-08-12T15:27:13+00:00</lastmod></url><url><loc>https://iotssa.com/marketing-during-a-pandemic/</loc><lastmod>2020-08-19T12:55:59+00:00</lastmod></url><url><loc>https://iotssa.com/go-upstream-with-cybersecurity/</loc><lastmod>2020-08-21T14:27:36+00:00</lastmod></url><url><loc>https://iotssa.com/today-tomorrow-beyond/</loc><lastmod>2020-08-26T15:48:04+00:00</lastmod></url><url><loc>https://iotssa.com/3-easy-security-add-ons-for-msps/</loc><lastmod>2020-08-31T18:19:51+00:00</lastmod></url><url><loc>https://iotssa.com/navigating-supply-chain-strains/</loc><lastmod>2020-09-02T13:29:36+00:00</lastmod></url><url><loc>https://iotssa.com/hybrid-networks/</loc><lastmod>2020-09-09T16:15:56+00:00</lastmod></url><url><loc>https://iotssa.com/zero-trust/</loc><lastmod>2020-09-16T13:27:29+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-7-vital-soft-skills/</loc><lastmod>2020-09-22T15:28:55+00:00</lastmod></url><url><loc>https://iotssa.com/accelerated-change/</loc><lastmod>2020-09-22T17:00:20+00:00</lastmod></url><url><loc>https://iotssa.com/selling-in-uncertain-times/</loc><lastmod>2020-09-24T18:28:28+00:00</lastmod></url><url><loc>https://iotssa.com/theres-no-such-thing-as-no-agreement-necessary/</loc><lastmod>2020-09-29T15:47:51+00:00</lastmod></url><url><loc>https://iotssa.com/managing-threat-response/</loc><lastmod>2020-09-30T18:32:35+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-nightmares/</loc><lastmod>2020-10-01T18:27:39+00:00</lastmod></url><url><loc>https://iotssa.com/adding-services-without-headcount/</loc><lastmod>2020-10-07T15:55:06+00:00</lastmod></url><url><loc>https://iotssa.com/cyber-scholarship-recipients/</loc><lastmod>2020-10-13T17:59:14+00:00</lastmod></url><url><loc>https://iotssa.com/comptia-isao/</loc><lastmod>2020-10-14T17:36:13+00:00</lastmod></url><url><loc>https://iotssa.com/a-crash-course-in-mdr/</loc><lastmod>2020-10-15T14:54:22+00:00</lastmod></url><url><loc>https://iotssa.com/think-about-the-end-at-the-beginning/</loc><lastmod>2020-10-21T16:54:53+00:00</lastmod></url><url><loc>https://iotssa.com/endpoint-security-whats-under-the-hood/</loc><lastmod>2020-10-27T13:30:28+00:00</lastmod></url><url><loc>https://iotssa.com/scalepad-evolves/</loc><lastmod>2020-10-28T15:16:15+00:00</lastmod></url><url><loc>https://iotssa.com/compliance-and-the-smb/</loc><lastmod>2020-11-04T16:30:23+00:00</lastmod></url><url><loc>https://iotssa.com/emerging-security-technologies/</loc><lastmod>2020-11-05T15:15:48+00:00</lastmod></url><url><loc>https://iotssa.com/evolution-of-the-msp/</loc><lastmod>2020-11-11T16:53:24+00:00</lastmod></url><url><loc>https://iotssa.com/msps-prospects-are-brighter-than-ever/</loc><lastmod>2020-11-16T17:42:16+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-shared-responsibility/</loc><lastmod>2020-11-18T17:14:40+00:00</lastmod></url><url><loc>https://iotssa.com/women-in-technology/</loc><lastmod>2020-12-11T12:52:15+00:00</lastmod></url><url><loc>https://iotssa.com/phishing-lures/</loc><lastmod>2020-12-02T18:40:06+00:00</lastmod></url><url><loc>https://iotssa.com/mfa-and-the-smb/</loc><lastmod>2020-12-09T16:34:03+00:00</lastmod></url><url><loc>https://iotssa.com/2021the-year-of-cyber-fitness/</loc><lastmod>2020-12-17T20:25:53+00:00</lastmod></url><url><loc>https://iotssa.com/on-thin-ice/</loc><lastmod>2020-12-23T15:44:24+00:00</lastmod></url><url><loc>https://iotssa.com/secure-the-data/</loc><lastmod>2020-12-30T17:22:24+00:00</lastmod></url><url><loc>https://iotssa.com/the-everywhere-organization/</loc><lastmod>2021-01-06T18:16:55+00:00</lastmod></url><url><loc>https://iotssa.com/women-in-the-it-channel/</loc><lastmod>2021-01-12T17:12:39+00:00</lastmod></url><url><loc>https://iotssa.com/lock-the-front-door/</loc><lastmod>2021-01-14T16:55:43+00:00</lastmod></url><url><loc>https://iotssa.com/partnering-in-cybersecurity/</loc><lastmod>2021-01-27T17:48:17+00:00</lastmod></url><url><loc>https://iotssa.com/scale-your-msp/</loc><lastmod>2021-02-01T15:21:17+00:00</lastmod></url><url><loc>https://iotssa.com/making-deliberate-decisions/</loc><lastmod>2021-02-03T22:18:17+00:00</lastmod></url><url><loc>https://iotssa.com/data-privacy-a-priority/</loc><lastmod>2021-02-05T15:59:42+00:00</lastmod></url><url><loc>https://iotssa.com/reducing-msp-churn/</loc><lastmod>2021-02-09T14:56:14+00:00</lastmod></url><url><loc>https://iotssa.com/having-the-risk-conversation/</loc><lastmod>2021-02-10T16:04:13+00:00</lastmod></url><url><loc>https://iotssa.com/2021-cybersecurity-paradigm-shift/</loc><lastmod>2021-03-14T06:02:27+00:00</lastmod></url><url><loc>https://iotssa.com/marketing-in-a-virtual-world/</loc><lastmod>2021-02-17T16:48:55+00:00</lastmod></url><url><loc>https://iotssa.com/five-signs-youre-about-to-be-attacked/</loc><lastmod>2021-02-18T15:24:43+00:00</lastmod></url><url><loc>https://iotssa.com/distribution-cybersecurity/</loc><lastmod>2021-03-26T16:48:31+00:00</lastmod></url><url><loc>https://iotssa.com/the-move-to-hybrid/</loc><lastmod>2021-03-31T18:51:47+00:00</lastmod></url><url><loc>https://iotssa.com/exchange-drive-by-hack/</loc><lastmod>2021-04-01T23:14:01+00:00</lastmod></url><url><loc>https://iotssa.com/governance-risk-compliance/</loc><lastmod>2021-03-31T18:51:14+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-efficiencies/</loc><lastmod>2021-03-31T18:51:14+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-configuration/</loc><lastmod>2021-03-31T18:50:35+00:00</lastmod></url><url><loc>https://iotssa.com/crypto-mining-and-blockchain/</loc><lastmod>2021-04-06T18:59:02+00:00</lastmod></url><url><loc>https://iotssa.com/zero-trust-architecture/</loc><lastmod>2021-04-06T18:51:42+00:00</lastmod></url><url><loc>https://iotssa.com/iotssa-channel-community/</loc><lastmod>2021-04-06T19:35:28+00:00</lastmod></url><url><loc>https://iotssa.com/it-psychics/</loc><lastmod>2021-04-08T14:48:02+00:00</lastmod></url><url><loc>https://iotssa.com/five-cybersecurity-recommendations/</loc><lastmod>2021-04-13T16:25:48+00:00</lastmod></url><url><loc>https://iotssa.com/malware-to-ransomware/</loc><lastmod>2021-04-15T16:59:46+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-expo-virtual-4-0/</loc><lastmod>2022-08-17T18:46:23+00:00</lastmod></url><url><loc>https://iotssa.com/pandemic-patching/</loc><lastmod>2021-04-21T13:56:18+00:00</lastmod></url><url><loc>https://iotssa.com/buffalo-jumping/</loc><lastmod>2021-04-28T15:34:33+00:00</lastmod></url><url><loc>https://iotssa.com/standing-the-workforce-back-up/</loc><lastmod>2021-05-04T15:51:17+00:00</lastmod></url><url><loc>https://iotssa.com/the-value-of-collaboration/</loc><lastmod>2021-05-06T12:19:03+00:00</lastmod></url><url><loc>https://iotssa.com/iotssa-welcomes-ryan-morris/</loc><lastmod>2021-05-12T10:37:53+00:00</lastmod></url><url><loc>https://iotssa.com/deny-by-default/</loc><lastmod>2021-05-12T15:07:10+00:00</lastmod></url><url><loc>https://iotssa.com/protect-the-data/</loc><lastmod>2021-05-19T18:22:46+00:00</lastmod></url><url><loc>https://iotssa.com/configuration-is-vital/</loc><lastmod>2021-05-26T17:00:00+00:00</lastmod></url><url><loc>https://iotssa.com/infrastructure-to-insurance/</loc><lastmod>2021-06-09T14:50:26+00:00</lastmod></url><url><loc>https://iotssa.com/managing-supply-chain-risk/</loc><lastmod>2021-06-10T12:29:01+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-standard-of-care/</loc><lastmod>2021-06-16T16:12:39+00:00</lastmod></url><url><loc>https://iotssa.com/email-encryption/</loc><lastmod>2021-06-23T13:15:08+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-expo-charlotte/</loc><lastmod>2021-10-04T12:54:27+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-adoption/</loc><lastmod>2021-06-30T21:50:40+00:00</lastmod></url><url><loc>https://iotssa.com/momentum-is-with-the-attackers/</loc><lastmod>2021-07-21T15:40:31+00:00</lastmod></url><url><loc>https://iotssa.com/breaking-down-your-security-stack/</loc><lastmod>2021-08-12T14:07:07+00:00</lastmod></url><url><loc>https://iotssa.com/alert-fatigue/</loc><lastmod>2021-08-18T15:07:07+00:00</lastmod></url><url><loc>https://iotssa.com/password-hygiene/</loc><lastmod>2021-08-25T21:59:37+00:00</lastmod></url><url><loc>https://iotssa.com/the-business-of-cybersecurity/</loc><lastmod>2021-09-01T16:05:31+00:00</lastmod></url><url><loc>https://iotssa.com/hell-fire-is-avoidable/</loc><lastmod>2021-09-08T16:33:42+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-dynamics/</loc><lastmod>2021-09-15T17:13:19+00:00</lastmod></url><url><loc>https://iotssa.com/hardening-the-endpoint/</loc><lastmod>2021-10-06T15:47:43+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-expo-phoenix/</loc><lastmod>2023-08-18T14:27:06+00:00</lastmod></url><url><loc>https://iotssa.com/the-cybersecurity-story/</loc><lastmod>2021-10-20T18:02:12+00:00</lastmod></url><url><loc>https://iotssa.com/security-expo-phoenix/</loc><lastmod>2021-10-26T13:03:19+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-deployment/</loc><lastmod>2021-10-27T14:56:44+00:00</lastmod></url><url><loc>https://iotssa.com/pulling-back-the-curtain/</loc><lastmod>2021-11-03T16:45:39+00:00</lastmod></url><url><loc>https://iotssa.com/protecting-you-against-you/</loc><lastmod>2021-11-10T16:32:21+00:00</lastmod></url><url><loc>https://iotssa.com/controls-vs-redundancy/</loc><lastmod>2021-11-24T13:37:17+00:00</lastmod></url><url><loc>https://iotssa.com/satisfying-regulation/</loc><lastmod>2021-12-01T17:41:58+00:00</lastmod></url><url><loc>https://iotssa.com/assume-everything-is-dirty/</loc><lastmod>2021-12-08T19:38:36+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-expo-phoenix-postponed/</loc><lastmod>2023-08-18T14:29:59+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-responsibilities/</loc><lastmod>2023-08-18T14:29:47+00:00</lastmod></url><url><loc>https://iotssa.com/the-cybersecurity-conversation/</loc><lastmod>2023-08-18T14:29:36+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-expo-austin/</loc><lastmod>2023-08-18T14:29:12+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-talent/</loc><lastmod>2023-08-18T14:28:59+00:00</lastmod></url><url><loc>https://iotssa.com/lean-in-engage/</loc><lastmod>2023-08-18T14:28:46+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-implementation/</loc><lastmod>2023-08-18T14:28:34+00:00</lastmod></url><url><loc>https://iotssa.com/leveraging-vendors/</loc><lastmod>2023-08-18T14:28:22+00:00</lastmod></url><url><loc>https://iotssa.com/iotssa-cybersecurity-expo-austin/</loc><lastmod>2023-08-18T14:28:12+00:00</lastmod></url><url><loc>https://iotssa.com/adoption-of-advanced-cybersecurity/</loc><lastmod>2023-08-18T14:27:57+00:00</lastmod></url><url><loc>https://iotssa.com/cyber-risk-pandemic-to-world-conflict/</loc><lastmod>2023-08-18T14:27:43+00:00</lastmod></url><url><loc>https://iotssa.com/leveraging-cyber-insurance/</loc><lastmod>2023-08-18T14:27:31+00:00</lastmod></url><url><loc>https://iotssa.com/break-the-cybersecurity-cycle/</loc><lastmod>2023-08-18T14:27:19+00:00</lastmod></url><url><loc>https://iotssa.com/allow-all-to-deny-all/</loc><lastmod>2023-08-18T14:26:54+00:00</lastmod></url><url><loc>https://iotssa.com/digital-transformation-security/</loc><lastmod>2023-08-18T14:26:31+00:00</lastmod></url><url><loc>https://iotssa.com/reactive-to-proactive-cybersecurity/</loc><lastmod>2023-08-18T14:26:21+00:00</lastmod></url><url><loc>https://iotssa.com/cyber-incident-planning/</loc><lastmod>2023-08-18T14:26:11+00:00</lastmod></url><url><loc>https://iotssa.com/iotssa-acquired-by-technoplanet/</loc><lastmod>2023-08-17T15:44:41+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-expo-pennsylvania/</loc><lastmod>2023-08-17T15:44:27+00:00</lastmod></url><url><loc>https://iotssa.com/cyber-incident-planning-2/</loc><lastmod>2023-08-17T15:44:15+00:00</lastmod></url><url><loc>https://iotssa.com/cybersecurity-expo-edison-2023/</loc><lastmod>2023-04-03T15:50:13+00:00</lastmod></url><url><loc>https://iotssa.com/iotssa-pre-launch/</loc><lastmod>2023-08-17T15:41:06+00:00</lastmod></url><url><loc>https://iotssa.com/iotssa-pre-launch-2/</loc><lastmod>2023-10-31T19:43:57+00:00</lastmod></url></urlset>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading

Served from: iotssa.com @ 2026-05-01 23:09:33 by W3 Total Cache
-->