<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.smesecurity.com.au/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-10-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1568097524746-ZYZ78HN2GWI18RT0XIHE/pink-dots-lite-liter-LORES.jpg</image:loc>
      <image:title>About SME Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-09-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1567380269761-HD6FRVSCWZWFSBRAK0LC/SME+Security+final+2+transparent+crop.png</image:loc>
      <image:title>Cyber Security Awareness Training</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/blog/2018/6/29/if-you-subscribed-to-a-vpn-because-of-privacy-concerns-you-might-want-to-read-this</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-11-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530249672421-M9G80R51XF3FBOIC9ZWE/image-asset.png</image:loc>
      <image:title>Cyber Security Awareness Training - Can a VPN Hide Your Location from Google?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530249602780-BW9FHCTB6RAQ47LCMT3W/allow+google+to+access+your+location</image:loc>
      <image:title>Cyber Security Awareness Training - Can a VPN Hide Your Location from Google?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530249384560-L08LWFFWXKZX0HMU8ZRV/Pick+a+VPN+location+to+hide+your+true+location</image:loc>
      <image:title>Cyber Security Awareness Training - Can a VPN Hide Your Location from Google?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530249433474-5YSSAY5GI3RS6XLVRO7A/Because+of+my+VPN+settings%2C+the+internet+thinks+I%27m+in+Singapore</image:loc>
      <image:title>Cyber Security Awareness Training - Can a VPN Hide Your Location from Google?</image:title>
      <image:caption>Because of my VPN settings, the internet thinks I'm in Singapore</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530249520486-620IAZB32UE36CFI1JXW/Use+the+Show+Your+Location+button+on+Google+Maps</image:loc>
      <image:title>Cyber Security Awareness Training - Can a VPN Hide Your Location from Google?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/blog/2018/7/10/dynamic-email-aliases-good-for-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/blog/2018/7/25/the-ad-blocker-arms-race-and-why-its-bad-for-your-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1532500851435-CPL5UEKDEHQF2QVKLEB1/Ad-blocker+bypass+software+is+killed+by+uBO%27s+extension</image:loc>
      <image:title>Cyber Security Awareness Training - The Ad-Blocking Arms Race. And Why It’s Bad for Your Business’ Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1532577028983-FJFFKNZ7PW6X91LGUDKN/native+ad-blocking+in+Silo+ensures+that+malware+stays+away</image:loc>
      <image:title>Cyber Security Awareness Training - The Ad-Blocking Arms Race. And Why It’s Bad for Your Business’ Security</image:title>
      <image:caption>The window on the left is boston.com in Silo; on the right boston.com in Chrome.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1532501386035-OYOJNBZDZQYSGHTS4CHX/Somehow+boston.com+gets+around+uBOs+ad-blocker+bypass+blocker</image:loc>
      <image:title>Cyber Security Awareness Training - The Ad-Blocking Arms Race. And Why It’s Bad for Your Business’ Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1532500457713-ODYNFSPVYJDLF1P8DVMI/medicinenet+with+ublock+origin+ad-blocker+failing</image:loc>
      <image:title>Cyber Security Awareness Training - The Ad-Blocking Arms Race. And Why It’s Bad for Your Business’ Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/blog/2018/7/26/the-days-of-the-local-browser-are-numbered-its-time-to-bump-the-browser</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-12-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1532646831709-BXSZD0STXPZBJGFI4882/by+moving+the+end-point+into+the+cloud%2C+customers+and+employees+web+access+becomes+more+secure</image:loc>
      <image:title>Cyber Security Awareness Training - Here’s Why the Days of Conventional Local Browsers Are Numbered</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1532645559411-2RBW1ZSS71IH8MIF46SW/accessing+the+internet+from+a+browser+installed+on+your+device+is+risky+because+of+the+way+in+which+the+web+works</image:loc>
      <image:title>Cyber Security Awareness Training - Here’s Why the Days of Conventional Local Browsers Are Numbered</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1532581080612-L4SC5LRHT9RLDPX3S01D/secure.gif</image:loc>
      <image:title>Cyber Security Awareness Training - Here’s Why the Days of Conventional Local Browsers Are Numbered</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/blog/enabling-secure-open-source-intelligence-gathering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-11-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1540445556029-WBGAQG3NW4HRW2F7XVQ4/the+extent+that+web+code+ingresses+into+the+business+-+local+browser+versus+isolated+browser</image:loc>
      <image:title>Cyber Security Awareness Training - Enabling Secure Open Source Intelligence Gathering</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1540349868994-R7ZKTRWEW5J5VIFF12NJ/The+conflict+between+IT+security+and+OSINT</image:loc>
      <image:title>Cyber Security Awareness Training - Enabling Secure Open Source Intelligence Gathering</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/blog/2019/2/13/hackers-are-using-voicemail-to-hack-into-whatsapp-accounts</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-02-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1550027770770-CJDEKBG5G84LMN29X1DG/whatsapp+account+takeover+scam.jpg</image:loc>
      <image:title>Cyber Security Awareness Training - Scammers are using voicemail to hack into WhatsApp accounts</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/blog/2019/8/22/twitter-is-insecure-by-design-just-dont-tell-the-president</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1566440464061-FW5DCXHNFBPUAFDIZUTA/twitter+security+is+fundamentally+flawed</image:loc>
      <image:title>Cyber Security Awareness Training - Twitter is Insecure by Design - Just Don't Tell the President</image:title>
      <image:caption>Twitter is out-of-step with other leading websites with a flawed implementation of two-factor authentication</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1566439767792-30Q95JGUKPSQX7PCG5NA/SMS+verification+is+mandatory+on+Twitter</image:loc>
      <image:title>Cyber Security Awareness Training - Twitter is Insecure by Design - Just Don't Tell the President</image:title>
      <image:caption>Twitter supports multiple forms of verification methods. YAY.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1566440360832-M5BTEL0FT6QO0FR233XP/Trying+switching+off+SMS+verification+disables+2FA+on+twitter</image:loc>
      <image:title>Cyber Security Awareness Training - Twitter is Insecure by Design - Just Don't Tell the President</image:title>
      <image:caption>If you disable SMS authentication on Twitter you disable 2FA entirely. That’s rubbish.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1566534987592-RDUOSH3UKMG4C8WI138F/Twitter%2Bapp%2Bdoesn%2527t%2Bsupport%2Bsecurity%2Bkeys</image:loc>
      <image:title>Cyber Security Awareness Training - Twitter is Insecure by Design - Just Don't Tell the President</image:title>
      <image:caption>On the Twitter App 2FA=SMS</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/blog/2019/9/20/customer-service-numbers-fastway-couriers-and-amazon-australia</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-09-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1568952419104-85Z3IEWPXG0LNDRWSSHA/Amazon+reports+that+your+item+has+been+delivered+when+it+hasn%27t</image:loc>
      <image:title>Cyber Security Awareness Training - Customer Service Numbers - Fastway Couriers and Amazon Australia</image:title>
      <image:caption>Amazon reports that you’re item has been delivered even if the courier returned it to sender. Now, you’re annoyed.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-09-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1568097336098-VPTD7S3GJMZ33YX0YMWA/pink-dots-lite-liter-LORES.jpg</image:loc>
      <image:title>Contact SME Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/cybersecurity-training</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-01-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530757827018-9L81UIKG62KPWN0FXDWV/p101-720-1-TN.png</image:loc>
      <image:title>On-demand Cybersecurity Training for Australian Small Businesses - Module 1 – An introduction to phishing scams</image:title>
      <image:caption>In this first module, we’ll introduce one of today’s most prevalent cyber security threats – phishing scams. At the end of this module, you will have a basic understanding of phishing scams, how to avoid becoming a victim of this growing form of cybercrime. Duration: 3 minutes</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530757827129-XA9LUMV2J5HK6NZA9AFO/p101-720-2-TN.png</image:loc>
      <image:title>On-demand Cybersecurity Training for Australian Small Businesses - Module 2 – Phishing scams are all about deception</image:title>
      <image:caption>In this module, we’ll dive deeper into the anatomy of a phishing scam, and look at the tricks that scammers use to try and get us to take the bait. At the end of this module, you will know the techniques that scammers use to disguise their messages. Duration: 6 minutes</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530757840904-R6SUF3URBCB9PSIES7Z7/p101-720-3-TN.png</image:loc>
      <image:title>On-demand Cybersecurity Training for Australian Small Businesses - Module 3 – The six tell-tale signs of a scam message</image:title>
      <image:caption>Scam messages have common characteristics which we can use to weed them out. In this module, we’ll look at the six tell-tale signs of a #scam message. At the end of this module, you will know how to spot a scam message and how to avoid falling for a #phishing scam. Duration: 12 minutes</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530757842015-NPWWQZJMUWYUX1KS9D86/p101-720-4-TN.png</image:loc>
      <image:title>On-demand Cybersecurity Training for Australian Small Businesses - Module 4 – Understanding URLs. And knowing what good looks like.</image:title>
      <image:caption>In this module, we’ll look in detail at web addresses and URLs. And see how scammers abuse the flexibility of URLs to try and trick us into thinking that we are dealing with a legitimate organization. Duration: 14 minutes</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530757854500-XW9KEXNVYT9TO7WDZ1X2/p101-720-5-TN.png</image:loc>
      <image:title>On-demand Cybersecurity Training for Australian Small Businesses - Module 5 – Website spoofing. And how to read URLs.</image:title>
      <image:caption>There are many places that we can look for evidence of a scam, but the URL is one of the best. In this module, we’ll focus on the website address and look at how scammers abuse the flexibility of URLs to impersonate safe and legitimate websites. Duration: 12 minutes</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530757855232-ZO6UUVZKNSVRKIWT5X8U/p101-720-6-TN.png</image:loc>
      <image:title>On-demand Cybersecurity Training for Australian Small Businesses - Module 6 – The tell-tale signs of a scam website</image:title>
      <image:caption>Scam websites stick out a mile when you know what to look for. Now, we’ll look at how scammers create phony websites to install damaging viruses, trick us into handing over sensitive data such as account numbers &amp; passwords, and pull off an old-fashioned con-trick. Duration: 15 minutes</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530757861439-LHGTYTH432VTWRIMDNUS/p101-720-7-TN.png</image:loc>
      <image:title>On-demand Cybersecurity Training for Australian Small Businesses - Module 7 – How to spot and avoid dangerous attachments</image:title>
      <image:caption>Scam websites stick out a mile when you know what to look for. Now, we’ll look at how scammers create phony websites to install damaging viruses, trick us into handing over sensitive data such as account numbers &amp; passwords, and pull off an old-fashioned con-trick. Duration: 23 minutes</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/embed-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-10-10</lastmod>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-11-29</lastmod>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2019-10-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1568098377506-ELC65J9VU2P5DORN4QGB/pink-dots-lite-liter-LORES.jpg</image:loc>
      <image:title>Personalised security and privacy action plans for at-risk private individualS</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/home-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-09-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530852776131-7N23LGYSZIPK8DIR353R/cloud+browsing+-+immunity+from+web-borne+malware</image:loc>
      <image:title>Copy of Personalised security and privacy services for those at risk and in the firing line</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530852957217-QNRZYXOREFP42AXB6XLZ/our+best+defence+against+phishing+attacks+is+to+know+what+one+looks+like</image:loc>
      <image:title>Copy of Personalised security and privacy services for those at risk and in the firing line</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1531892035403-IIDSUOSVBWFWG01GLL8N/One-Third+of+Businesses+Lack+a+Cybersecurity+Expert+%284%29.png</image:loc>
      <image:title>Copy of Personalised security and privacy services for those at risk and in the firing line</image:title>
      <image:caption>Source</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1535602206250-YE5E06AIAM8RDHKXT0KH/There+are+only+two+ways+to+ensure+that+malware+won%27t+enter+the+business+from+the+web</image:loc>
      <image:title>Copy of Personalised security and privacy services for those at risk and in the firing line</image:title>
      <image:caption>There are only two ways to ensure that malware won't enter the business from the web</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1568092767160-3PAYX3VLEDB7YU789OOY/pink-dots-lite-liter-LORES.jpg</image:loc>
      <image:title>Copy of Personalised security and privacy services for those at risk and in the firing line</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/isolated-browsing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-11-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1531451725765-X69AXHSLKL4XMN1VMBM3/Enabling+Secure+Client+Transactions+between+your+clients+and+your+online+business</image:loc>
      <image:title>Isolated Browsing: The Best Protection Against Malware – SME Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1531451694393-L2CLBJX4G6FFKA4NATIW/quickly+match+your+clients+security+posture+by+implementing+isolated+browsing</image:loc>
      <image:title>Isolated Browsing: The Best Protection Against Malware – SME Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1531451757128-4QP5I9UV2Y50WSLEWY0W/keeping+personal+browsing+completely+separated+from+business+applications+ensures+device+and+network+integrity</image:loc>
      <image:title>Isolated Browsing: The Best Protection Against Malware – SME Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1531451219774-RHKN81MOEV3FDGFO7XCW/Conventional+web+access+is+risky+because+potentially+dangerous+web+content+is+dowloaded+to+the+device</image:loc>
      <image:title>Isolated Browsing: The Best Protection Against Malware – SME Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1535602439673-2NOXCZI7MQ8EC2PJ4VVD/there+are+only+two+ways+to+ensure+that+malware+never+enters+the+business+from+the+web</image:loc>
      <image:title>Isolated Browsing: The Best Protection Against Malware – SME Security</image:title>
      <image:caption>There are only two ways to ensure that malware never enters the business from the web. Click to start your free trial.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1531451243069-VY96YWUQJKGJ8ANPJNB0/Secure+web+access+is+safe+because+no+potentially+dangerous+web+content+is+ever+returned+to+the+device</image:loc>
      <image:title>Isolated Browsing: The Best Protection Against Malware – SME Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1531451664083-F9V0OVGYXOBEHE4FBOFH/OPENING+UP+WEB+ACCESS+FOR+SPECIAL+USE+GROUPS+800x450+%282%29.png</image:loc>
      <image:title>Isolated Browsing: The Best Protection Against Malware – SME Security</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1530244896859-JN0S3QS26NAG4ZAU2QNH/ib+banner%400%2C33x.png</image:loc>
      <image:title>Isolated Browsing: The Best Protection Against Malware – SME Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/learning</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-10-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1568097690681-COE8VT2C25QIAJWU5ALQ/pink-dots-lite-liter-LORES.jpg</image:loc>
      <image:title>On-demand security and privacy e-learning resources</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/protecting-your-sme-business</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-09-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1534905889731-TNJL40YSWIBULJF25Z6M/with+isolated+browsing+the+premise+is+simple+-+start+your+session+secure+and+nothing+bad+will+happen</image:loc>
      <image:title>Protecting your SME business</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1534827513608-JRJK0LFJU56PRLV43NW0/87%25+of+SMEs+believe+their+business+is+safe+from+cyberattacks+because+they+use+antivirus+software</image:loc>
      <image:title>Protecting your SME business</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1534827240948-7X5A9JCW9CCWVMGMFSK2/isolated+browsing+-+malware+resistant+web+access</image:loc>
      <image:title>Protecting your SME business</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1536198363725-TJEHOL5T3N3P5H8F1T94/there+are+only+2+ways+to+reliably+ensure+that+malware+won%27t+leak+into+the+business+from+the+web+-+isolated+browsing</image:loc>
      <image:title>Protecting your SME business</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1534828771355-LGIM6WTTV18MZ6O9BO0T/inside+small+business+coupon</image:loc>
      <image:title>Protecting your SME business</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1534827118206-37OJB1J88H6UOOLJV6QS/ISB+300x250centre.png</image:loc>
      <image:title>Protecting your SME business</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/secure-web-access</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-11-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1531876486706-TP7FZ9QKPOVZS3K3Z73I/do+we+really+know+how+secure+the+customer+end-point+is_.png</image:loc>
      <image:title>Secure Web Access / Private Browsing for Your Clients’ End-point</image:title>
      <image:caption>Do we really know how secure the customer end-point is?</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1531808484722-WHYYNV8RU4Y8WZ6R40WQ/with+secure+web+access%2C+the+business+can+take+ownership+of+providing+customer+end-point+security</image:loc>
      <image:title>Secure Web Access / Private Browsing for Your Clients’ End-point</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1531957770276-9HAQ3GCIX4JX8IZZCFU4/using+secure+web+access+to+make+safe+inbound+customer+and+outbound+business+web+access</image:loc>
      <image:title>Secure Web Access / Private Browsing for Your Clients’ End-point</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1531808455163-QJJGSQO8X58ZMPFBSTT3/we+cannot+provide+any+guarantees+about+the+security+on+the+customer+end-point</image:loc>
      <image:title>Secure Web Access / Private Browsing for Your Clients’ End-point</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-10-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1568095856410-6HBHW1FETSDFQNOGWZ5W/pink-dots-lite-liter-LORES.jpg</image:loc>
      <image:title>A bespoke program of personalised privacy and security measures</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/signup</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-08-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/55c3f491e4b0744f8070ed12/1535605637279-5FCZK7E214JOJPFGQEW1/There+are+only+two+ways+to+ensure+that+malware+won%27t+enter+the+business.+And+one+of+them+is+useless.</image:loc>
      <image:title>30-day free trial</image:title>
      <image:caption>There are only two ways to ensure that malware won't enter the business. And one of them is useless.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/signup-confirmation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-29</lastmod>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/the-small-print</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-29</lastmod>
  </url>
  <url>
    <loc>https://www.smesecurity.com.au/the-small-print-terms</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-29</lastmod>
  </url>
</urlset>

