<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.igicybersecurity.com/cybersecurity-awareness-month-managing-third-party-cybersecurity-questionnaires</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Survey%20Blog%20CAM%20Copy.png</image:loc><image:caption>SurveyBlogCAMCopy</image:caption><image:title>SurveyBlogCAMCopy</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://blog.igicybersecurity.com/igibulletincybersecurityfireeyesolarwinds</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Fire%20eye%20Blog%20.png</image:loc><image:caption>FireeyeBlog</image:caption><image:title>FireeyeBlog</image:title></image:image><lastmod>2021-03-02</lastmod></url><url><loc>https://blog.igicybersecurity.com/zyklon-malware-and-the-role-of-credentialed-scanning-1</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Office-logo-1.jpg</image:loc><image:caption>Officelogo1</image:caption><image:title>Officelogo1</image:title></image:image><lastmod>2018-01-19</lastmod></url><url><loc>https://blog.igicybersecurity.com/infinite-group-inc.-to-sponsor-new-york-state-cyber-security-conference-june-5-7</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/2018_logo_-_use_this_one.png</image:loc><image:caption>2018logousethisone</image:caption><image:title>2018logousethisone</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MF-15153-MeganBrandow-1398%202.jpg</image:loc><image:caption>MF15153MeganBrandow13982</image:caption><image:title>MF15153MeganBrandow13982</image:title></image:image><lastmod>2018-06-04</lastmod></url><url><loc>https://blog.igicybersecurity.com/why-hipaa-risk-assessments-are-back-in-focus-what-you-need-to-know</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/why-hipaa-risk-assessments-are-back-in-focus-what-you-need-to-know.png</image:loc><image:caption>whyhipaariskassessmentsarebackinfocuswhatyouneedtoknow</image:caption><image:title>whyhipaariskassessmentsarebackinfocuswhatyouneedtoknow</image:title></image:image><lastmod>2025-12-17</lastmod></url><url><loc>https://blog.igicybersecurity.com/cmmc-compliance-what-msps-need-to-know-about-the-final-rule</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-CMMCCompliance-WhatMSPsNeedtoKnowAbouttheFinalRule.png</image:loc><image:caption>IGIBlogCMMCComplianceWhatMSPsNeedtoKnowAbouttheFinalRule</image:caption><image:title>IGIBlogCMMCComplianceWhatMSPsNeedtoKnowAbouttheFinalRule</image:title></image:image><lastmod>2024-11-06</lastmod></url><url><loc>https://blog.igicybersecurity.com/how-penetration-testing-managing-risk-can-help-lower-your-insurance-costs</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-HowPenetrationTesting&amp;ManagingRiskCanHelpLowerYourInsuranceCosts.png</image:loc><image:caption>IGIBlogHowPenetrationTestingManagingRiskCanHelpLowerYourInsuranceCosts</image:caption><image:title>IGIBlogHowPenetrationTestingManagingRiskCanHelpLowerYourInsuranceCosts</image:title></image:image><lastmod>2024-03-20</lastmod></url><url><loc>https://blog.igicybersecurity.com/infinite-group-inc.-offers-free-trials-of-nodeware-cybersecurity-solution</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Violet%20and%20Orange%20Megaphone%20Cheer%20Instagram%20Post%20(1).png</image:loc><image:caption>VioletandOrangeMegaphoneCheerInstagramPost1</image:caption><image:title>VioletandOrangeMegaphoneCheerInstagramPost1</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MF-15153-MeganBrandow-1398%202.jpg</image:loc><image:caption>MF15153MeganBrandow13982</image:caption><image:title>MF15153MeganBrandow13982</image:title></image:image><lastmod>2018-03-20</lastmod></url><url><loc>https://blog.igicybersecurity.com/meet-the-cybersecurity-people-jenny-champeau</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/JennyChampeauCSP3-3.png</image:loc><image:caption>JennyChampeauCSP33</image:caption><image:title>JennyChampeauCSP33</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/KMC08993-2.jpg</image:loc><image:caption>KMC089932</image:caption><image:title>KMC089932</image:title></image:image><lastmod>2022-02-18</lastmod></url><url><loc>https://blog.igicybersecurity.com/nb-dev-test-videos</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/nodeware-logo.svg</image:loc><image:caption>nodewarelogo</image:caption><image:title>nodewarelogo</image:title></image:image><lastmod>2024-01-22</lastmod></url><url><loc>https://blog.igicybersecurity.com/third-party-risk-and-awareness</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-ThirdPartyRiskandAwareness.png</image:loc><image:caption>IGIBlogThirdPartyRiskandAwareness</image:caption><image:title>IGIBlogThirdPartyRiskandAwareness</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/third-party-risk-and-awareness-blog-1.png</image:loc><image:caption>thirdpartyriskandawarenessblog1</image:caption><image:title>thirdpartyriskandawarenessblog1</image:title></image:image><lastmod>2024-08-01</lastmod></url><url><loc>https://blog.igicybersecurity.com/stopping-the-bad-rabbit</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/photo_89539_20170524.jpg</image:loc><image:caption>photo8953920170524</image:caption><image:title>photo8953920170524</image:title></image:image><lastmod>2017-10-25</lastmod></url><url><loc>https://blog.igicybersecurity.com/why-regular-penetration-testing-is-important-6-key-reasons</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/CAM%202023%20-%20Blog%201.png</image:loc><image:caption>CAM2023Blog1</image:caption><image:title>CAM2023Blog1</image:title></image:image><lastmod>2023-10-11</lastmod></url><url><loc>https://blog.igicybersecurity.com/understanding-the-cybersecurity-implications-of-the-california-consumer-privacy-act-ccpa</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/CCPA%20Blog%20(1).png</image:loc><image:caption>CCPABlog1</image:caption><image:title>CCPABlog1</image:title></image:image><lastmod>2019-12-11</lastmod></url><url><loc>https://blog.igicybersecurity.com/the-strong-unitrends</loc><lastmod>2017-07-14</lastmod></url><url><loc>https://blog.igicybersecurity.com/inside-the-mind-of-a-cybersecurity-professional-part-2</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI%20Cyber%20Pro%20Infographic%20v4.jpg</image:loc><image:caption>IGICyberProInfographicv4</image:caption><image:title>IGICyberProInfographicv4</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Budgeting%20Blog%202019%20(2).png</image:loc><image:caption>BudgetingBlog20192</image:caption><image:title>BudgetingBlog20192</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/KMC06898-2.jpg</image:loc><image:caption>KMC068982</image:caption><image:title>KMC068982</image:title></image:image><lastmod>2021-05-06</lastmod></url><url><loc>https://blog.igicybersecurity.com/coronavirus-and-cybersecurity-parallels-and-precautions</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Coronavirus%20Blog.png</image:loc><image:caption>CoronavirusBlog</image:caption><image:title>CoronavirusBlog</image:title></image:image><lastmod>2020-03-11</lastmod></url><url><loc>https://blog.igicybersecurity.com/cybersecurity-best-practices-for-employee-onboarding-and-offboarding</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/cybersecurity-best-practices-for-employee-onboarding-and-offboarding.png</image:loc><image:caption>cybersecuritybestpracticesforemployeeonboardingandoffboarding</image:caption><image:title>cybersecuritybestpracticesforemployeeonboardingandoffboarding</image:title></image:image><lastmod>2025-06-05</lastmod></url><url><loc>https://blog.igicybersecurity.com/cybersecurity-what-are-we-really-protecting</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/cyber%20blog%20graphic.jpg</image:loc><image:caption>cyberbloggraphic</image:caption><image:title>cyberbloggraphic</image:title></image:image><lastmod>2022-06-13</lastmod></url><url><loc>https://blog.igicybersecurity.com/fight-the-phish</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/NCSAM%202021%20-%20Week2.png</image:loc><image:caption>NCSAM2021Week2</image:caption><image:title>NCSAM2021Week2</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/phishing-sample-1-annotated.png</image:loc><image:caption>phishingsample1annotated</image:caption><image:title>phishingsample1annotated</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/phishing-sample-1.png</image:loc><image:caption>phishingsample1</image:caption><image:title>phishingsample1</image:title></image:image><lastmod>2021-10-11</lastmod></url><url><loc>https://blog.igicybersecurity.com</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/comprehensive-penetration-testing-why-automation-alone-isn%E2%80%99t-enough-1.png</image:loc><image:caption>comprehensivepenetrationtestingwhyautomationaloneisntenough1</image:caption><image:title>comprehensivepenetrationtestingwhyautomationaloneisntenough1</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/why-hipaa-risk-assessments-are-back-in-focus-what-you-need-to-know.png</image:loc><image:caption>whyhipaariskassessmentsarebackinfocuswhatyouneedtoknow</image:caption><image:title>whyhipaariskassessmentsarebackinfocuswhatyouneedtoknow</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/how-to-prepare-for-an-owasp-pen-test.png</image:loc><image:caption>howtoprepareforanowasppentest</image:caption><image:title>howtoprepareforanowasppentest</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/what-to-do-before-you-attest-to-cmmc-level-1-compliance.png</image:loc><image:caption>whattodobeforeyouattesttocmmclevel1compliance</image:caption><image:title>whattodobeforeyouattesttocmmclevel1compliance</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/why-cybersecurity-pros-push-back-on-checking-a-box.png</image:loc><image:caption>whycybersecurityprospushbackoncheckingabox</image:caption><image:title>whycybersecurityprospushbackoncheckingabox</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/third-party-penetration-tests-the-key-to-unbiased-security-validation.png</image:loc><image:caption>thirdpartypenetrationteststhekeytounbiasedsecurityvalidation</image:caption><image:title>thirdpartypenetrationteststhekeytounbiasedsecurityvalidation</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/cybersecurity-best-practices-for-employee-onboarding-and-offboarding.png</image:loc><image:caption>cybersecuritybestpracticesforemployeeonboardingandoffboarding</image:caption><image:title>cybersecuritybestpracticesforemployeeonboardingandoffboarding</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/how-to-prepare-for-an-internal-pen-test.png</image:loc><image:caption>howtoprepareforaninternalpentest</image:caption><image:title>howtoprepareforaninternalpentest</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Blog%20Images/how-small-businesses-can-effectively-navigate-cmmc-certification.png</image:loc><image:caption>howsmallbusinessescaneffectivelynavigatecmmccertification</image:caption><image:title>howsmallbusinessescaneffectivelynavigatecmmccertification</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/how-vciso-services-strengthen-your-cybersecurity-program.png</image:loc><image:caption>howvcisoservicesstrengthenyourcybersecurityprogram</image:caption><image:title>howvcisoservicesstrengthenyourcybersecurityprogram</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/why-cybersecurity-due-diligence-matters-for-m&amp;a.png</image:loc><image:caption>whycybersecurityduediligencemattersforma</image:caption><image:title>whycybersecurityduediligencemattersforma</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/how-to-prepare-for-an-external-pen-test.png</image:loc><image:caption>howtoprepareforanexternalpentest</image:caption><image:title>howtoprepareforanexternalpentest</image:title></image:image><lastmod>2025-06-10</lastmod></url><url><loc>https://blog.igicybersecurity.com/baseline-risk-mitigation-taking-steps-towards-insurability</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-BaselineRiskMitigationTakingStepsTowardsInsurability.png</image:loc><image:caption>IGIBlogBaselineRiskMitigationTakingStepsTowardsInsurability</image:caption><image:title>IGIBlogBaselineRiskMitigationTakingStepsTowardsInsurability</image:title></image:image><lastmod>2024-04-23</lastmod></url><url><loc>https://blog.igicybersecurity.com/the-evolution-of-the-msp-how-to-navigate-the-cybersecurity-landscape</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MSP%20Blog.png</image:loc><image:caption>MSPBlog</image:caption><image:title>MSPBlog</image:title></image:image><lastmod>2019-08-29</lastmod></url><url><loc>https://blog.igicybersecurity.com/how-small-businesses-can-navigate-cmmc-certification</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Blog%20Images/how-small-businesses-can-effectively-navigate-cmmc-certification.png</image:loc><image:caption>howsmallbusinessescaneffectivelynavigatecmmccertification</image:caption><image:title>howsmallbusinessescaneffectivelynavigatecmmccertification</image:title></image:image><lastmod>2025-07-23</lastmod></url><url><loc>https://blog.igicybersecurity.com/what-to-do-before-you-attest-to-cmmc-level-1-compliance</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/what-to-do-before-you-attest-to-cmmc-level-1-compliance.png</image:loc><image:caption>whattodobeforeyouattesttocmmclevel1compliance</image:caption><image:title>whattodobeforeyouattesttocmmclevel1compliance</image:title></image:image><lastmod>2025-12-19</lastmod></url><url><loc>https://blog.igicybersecurity.com/the-importance-of-cybersecurity-as-a-business-strategy</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Blog%20Cybersecurity%20Biz%20Strategy%20Copy.png</image:loc><image:caption>BlogCybersecurityBizStrategyCopy</image:caption><image:title>BlogCybersecurityBizStrategyCopy</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://blog.igicybersecurity.com/beware-of-goblins-ghosts-and-cheap-cybersecurity</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/My%20Post%20(1).jpg</image:loc><image:caption>MyPost1</image:caption><image:title>MyPost1</image:title></image:image><lastmod>2019-10-31</lastmod></url><url><loc>https://blog.igicybersecurity.com/cybersecurity-awareness-month-cyber-street-smarts</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/NCSAM%202021%20-%20Week1b.png</image:loc><image:caption>NCSAM2021Week1b</image:caption><image:title>NCSAM2021Week1b</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Paul%20square.jpg</image:loc><image:caption>Paulsquare</image:caption><image:title>Paulsquare</image:title></image:image><lastmod>2021-10-05</lastmod></url><url><loc>https://blog.igicybersecurity.com/why-cybersecurity-due-diligence-matters-in-ma</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/why-cybersecurity-due-diligence-matters-for-m&amp;a.png</image:loc><image:caption>whycybersecurityduediligencemattersforma</image:caption><image:title>whycybersecurityduediligencemattersforma</image:title></image:image><lastmod>2025-05-22</lastmod></url><url><loc>https://blog.igicybersecurity.com/six-tips-for-cybersecurity-success-in-2019</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/cyberattacks.jpg</image:loc><image:caption>cyberattacks</image:caption><image:title>cyberattacks</image:title></image:image><lastmod>2018-11-09</lastmod></url><url><loc>https://blog.igicybersecurity.com/agent-nodeware-wfh-vulnerabilities-threat-cybersecurity</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Agent%20Blog.png</image:loc><image:caption>AgentBlog</image:caption><image:title>AgentBlog</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://blog.igicybersecurity.com/strengthening-insurability-through-continuous-vulnerability-management</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-StrengtheningInsurabilityThroughContinuousVulnerabilityManagement.png</image:loc><image:caption>IGIBlogStrengtheningInsurabilityThroughContinuousVulnerabilityManagement</image:caption><image:title>IGIBlogStrengtheningInsurabilityThroughContinuousVulnerabilityManagement</image:title></image:image><lastmod>2024-05-21</lastmod></url><url><loc>https://blog.igicybersecurity.com/could-the-equifax-breach-have-been-prevented</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MF-15153-MeganBrandow-1398%202.jpg</image:loc><image:caption>MF15153MeganBrandow13982</image:caption><image:title>MF15153MeganBrandow13982</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/equifaxsign.jpg</image:loc><image:caption>equifaxsign</image:caption><image:title>equifaxsign</image:title></image:image><lastmod>2017-10-02</lastmod></url><url><loc>https://blog.igicybersecurity.com/post-covid-19-pandemic-cybersecurity-predictions</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Post%20Covid%20Blog.png</image:loc><image:caption>PostCovidBlog</image:caption><image:title>PostCovidBlog</image:title></image:image><lastmod>2020-04-06</lastmod></url><url><loc>https://blog.igicybersecurity.com/meet-the-cybersecurity-people-freda-briggman</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Meet%20the%20People_Freda.png</image:loc><image:caption>MeetthePeopleFreda</image:caption><image:title>MeetthePeopleFreda</image:title></image:image><lastmod>2022-04-01</lastmod></url><url><loc>https://blog.igicybersecurity.com/wannacry-ransomware-attacks-preparing-next-big-hit</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Imported_Blog_Media/portrait-EdwardNadareski@2x-150x150.jpg</image:loc><image:caption>portraitEdwardNadareski2x150x150</image:caption><image:title>portraitEdwardNadareski2x150x150</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/portrait-EdwardNadareski@2x.jpg</image:loc><image:caption>portraitEdwardNadareski2x</image:caption><image:title>portraitEdwardNadareski2x</image:title></image:image><lastmod>2023-04-21</lastmod></url><url><loc>https://blog.igicybersecurity.com/global-ransomware-strikes-petya-now</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Imported_Blog_Media/Hutchinson-150x150.jpg</image:loc><image:caption>Hutchinson150x150</image:caption><image:title>Hutchinson150x150</image:title></image:image><lastmod>2023-04-21</lastmod></url><url><loc>https://blog.igicybersecurity.com/securing-our-connected-future-in-a-5g-world</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Devices%20CAM%20Copy.png</image:loc><image:caption>DevicesCAMCopy</image:caption><image:title>DevicesCAMCopy</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://blog.igicybersecurity.com/cyber-attacks-imminent-in-pyeongchang-olympic-games</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/PyeongChang2018Logo.jpg</image:loc><image:caption>PyeongChang2018Logo</image:caption><image:title>PyeongChang2018Logo</image:title></image:image><lastmod>2018-02-07</lastmod></url><url><loc>https://blog.igicybersecurity.com/becybersmart-kickstart-a-career-in-cybersecurity</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/NCSAM%202021%20-%20Week3.png</image:loc><image:caption>NCSAM2021Week3</image:caption><image:title>NCSAM2021Week3</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Jim.jpeg</image:loc><image:caption>Jim</image:caption><image:title>Jim</image:title></image:image><lastmod>2021-10-20</lastmod></url><url><loc>https://blog.igicybersecurity.com/the-krack-attack-protecting-your-data</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/about-featured.png</image:loc><image:caption>aboutfeatured</image:caption><image:title>aboutfeatured</image:title></image:image><lastmod>2017-10-18</lastmod></url><url><loc>https://blog.igicybersecurity.com/comprehensive-penetration-testing-why-automation-alone-isnt-enough</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/comprehensive-penetration-testing-why-automation-alone-isn%E2%80%99t-enough-1.png</image:loc><image:caption>comprehensivepenetrationtestingwhyautomationaloneisntenough1</image:caption><image:title>comprehensivepenetrationtestingwhyautomationaloneisntenough1</image:title></image:image><lastmod>2025-03-31</lastmod></url><url><loc>https://blog.igicybersecurity.com/infinite-group-inc.-launches-new-version-of-nodeware-cybersecurity-solution-now-available-as-virtual-machine</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Infinite_Group_Inc_July2017/image/blog%20banner.jpg</image:loc><image:caption>blogbanner</image:caption><image:title>blogbanner</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MF-15153-MeganBrandow-1398%202.jpg</image:loc><image:caption>MF15153MeganBrandow13982</image:caption><image:title>MF15153MeganBrandow13982</image:title></image:image><lastmod>2017-10-10</lastmod></url><url><loc>https://blog.igicybersecurity.com/penetration-tests-and-still-photographs-moving-into-the-future</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/BlogPost%20PenLogic.png</image:loc><image:caption>BlogPostPenLogic</image:caption><image:title>BlogPostPenLogic</image:title></image:image><lastmod>2022-01-26</lastmod></url><url><loc>https://blog.igicybersecurity.com/infinite-group-inc-introduces-nodeware-vulnerability-management-solution</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MF-15153-MeganBrandow-1398%202.jpg</image:loc><image:caption>MF15153MeganBrandow13982</image:caption><image:title>MF15153MeganBrandow13982</image:title></image:image><lastmod>2023-04-21</lastmod></url><url><loc>https://blog.igicybersecurity.com/shortage-of-cybersecurity-pros-leads-to-need-for-outsourced-security-services</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/security%20staffing.png</image:loc><image:caption>securitystaffing</image:caption><image:title>securitystaffing</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/portrait-EdwardNadareski@2x.jpg</image:loc><image:caption>portraitEdwardNadareski2x</image:caption><image:title>portraitEdwardNadareski2x</image:title></image:image><lastmod>2017-07-26</lastmod></url><url><loc>https://blog.igicybersecurity.com/the-roi-of-cybersecurity-investments-part-2</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Risk-Management-730x440.jpg</image:loc><image:caption>RiskManagement730x440</image:caption><image:title>RiskManagement730x440</image:title></image:image><lastmod>2019-04-02</lastmod></url><url><loc>https://blog.igicybersecurity.com/vulnerability-assessment-vs.-penetration-test-cutting-through-the-noise</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-VulnAssessments&amp;PenTests-CuttingThroughTheNoise.png</image:loc><image:caption>IGIBlogVulnAssessmentsPenTestsCuttingThroughTheNoise</image:caption><image:title>IGIBlogVulnAssessmentsPenTestsCuttingThroughTheNoise</image:title></image:image><lastmod>2024-02-23</lastmod></url><url><loc>https://blog.igicybersecurity.com/social-media-phishing-how-attackers-use-popular-platforms-to-target-users</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/LinkedIN%20blog%202.png</image:loc><image:caption>LinkedINblog2</image:caption><image:title>LinkedINblog2</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/LinkedIn%20blog%201.png</image:loc><image:caption>LinkedInblog1</image:caption><image:title>LinkedInblog1</image:title></image:image><lastmod>2019-05-03</lastmod></url><url><loc>https://blog.igicybersecurity.com/3-security-risks-of-generative-ai-and-managing-that-risk</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-3SecurityRisksofGAI.png</image:loc><image:caption>IGIBlog3SecurityRisksofGAI</image:caption><image:title>IGIBlog3SecurityRisksofGAI</image:title></image:image><lastmod>2023-11-28</lastmod></url><url><loc>https://blog.igicybersecurity.com/how-to-prepare-for-an-external-penetration-test</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/how-to-prepare-for-an-external-pen-test.png</image:loc><image:caption>howtoprepareforanexternalpentest</image:caption><image:title>howtoprepareforanexternalpentest</image:title></image:image><lastmod>2025-07-09</lastmod></url><url><loc>https://blog.igicybersecurity.com/why-cybersecurity-pros-push-back-on-checking-a-box</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/why-cybersecurity-pros-push-back-on-checking-a-box.png</image:loc><image:caption>whycybersecurityprospushbackoncheckingabox</image:caption><image:title>whycybersecurityprospushbackoncheckingabox</image:title></image:image><lastmod>2025-05-22</lastmod></url><url><loc>https://blog.igicybersecurity.com/igi-cybersecurity-weighs-in-on-the-national-cybersecurity-strategy</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-NationalCybersecurityStrategy.png</image:loc><image:caption>IGIBlogNationalCybersecurityStrategy</image:caption><image:title>IGIBlogNationalCybersecurityStrategy</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-AndrewHoyen.png</image:loc><image:caption>IGIAndrewHoyen</image:caption><image:title>IGIAndrewHoyen</image:title></image:image><lastmod>2024-04-03</lastmod></url><url><loc>https://blog.igicybersecurity.com/phishing-scams-dont-let-employees-get-hooked</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Imported_Blog_Media/Hutchinson-150x150.jpg</image:loc><image:caption>Hutchinson150x150</image:caption><image:title>Hutchinson150x150</image:title></image:image><lastmod>2023-04-21</lastmod></url><url><loc>https://blog.igicybersecurity.com/achieve-cmmc-2.0-level-2-compliance-and-secure-your-ability-to-participate-in-dod-contracts</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/achieve-cmmc-2.0-level-2-compliance.png</image:loc><image:caption>achievecmmc20level2compliance</image:caption><image:title>achievecmmc20level2compliance</image:title></image:image><lastmod>2025-03-31</lastmod></url><url><loc>https://blog.igicybersecurity.com/tips-on-outsmarting-the-recent-google-gmail-and-calendar-scam</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/google-gmail-app.jpg</image:loc><image:caption>googlegmailapp</image:caption><image:title>googlegmailapp</image:title></image:image><lastmod>2022-12-19</lastmod></url><url><loc>https://blog.igicybersecurity.com/the-kaseya-ransomware-attack-next-steps-for-customers</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/2016%20Profile.jpg</image:loc><image:caption>2016Profile</image:caption><image:title>2016Profile</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/NW%20TW%20Template.png</image:loc><image:caption>NWTWTemplate</image:caption><image:title>NWTWTemplate</image:title></image:image><lastmod>2021-07-12</lastmod></url><url><loc>https://blog.igicybersecurity.com/the-ny-shield-act-is-coming-are-you-ready</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/My%20Post%20(1)-1.png</image:loc><image:caption>MyPost11</image:caption><image:title>MyPost11</image:title></image:image><lastmod>2019-10-16</lastmod></url><url><loc>https://blog.igicybersecurity.com/healthcare-industry-named-target-of-ransomware-attacks</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/CAM%20webinar%20%20(2)-1.png</image:loc><image:caption>CAMwebinar21</image:caption><image:title>CAMwebinar21</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://blog.igicybersecurity.com/inthenews</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-RGB-Teal%20Combo-Lockup%20Logo-2.png</image:loc><image:caption>IGIRGBTealComboLockupLogo2</image:caption><image:title>IGIRGBTealComboLockupLogo2</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MF-15153-MeganBrandow-1398%202.jpg</image:loc><image:caption>MF15153MeganBrandow13982</image:caption><image:title>MF15153MeganBrandow13982</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Screen%20Shot%202021-03-01%20at%201.37.13%20PM.png</image:loc><image:caption>ScreenShot20210301at13713PM</image:caption><image:title>ScreenShot20210301at13713PM</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://blog.igicybersecurity.com/link-by-link-building-a-secure-supply-chain-with-the-nist-csf-2.0</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-Building-a-Secure-Supply-Chain-with-the-NIST-CSF-2.0.png</image:loc><image:caption>IGIBlogBuildingaSecureSupplyChainwiththeNISTCSF20</image:caption><image:title>IGIBlogBuildingaSecureSupplyChainwiththeNISTCSF20</image:title></image:image><lastmod>2024-04-09</lastmod></url><url><loc>https://blog.igicybersecurity.com/when-cyber-attacks-surge-in-times-of-crisis</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Crisis%20Blog.png</image:loc><image:caption>CrisisBlog</image:caption><image:title>CrisisBlog</image:title></image:image><lastmod>2020-03-27</lastmod></url><url><loc>https://blog.igicybersecurity.com/inside-the-mind-of-a-cybersecurity-professional-part-1</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Paul%20square.jpg</image:loc><image:caption>Paulsquare</image:caption><image:title>Paulsquare</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Budgeting%20Blog%202019%20(1).png</image:loc><image:caption>BudgetingBlog20191</image:caption><image:title>BudgetingBlog20191</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI%20Cyber%20Pro%20Infographic%20v3-1.png</image:loc><image:caption>IGICyberProInfographicv31</image:caption><image:title>IGICyberProInfographicv31</image:title></image:image><lastmod>2021-04-27</lastmod></url><url><loc>https://blog.igicybersecurity.com/meltdown-and-spectre-attacks-remind-us-to-be-prepared-with-vulnerability-management</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Spectre_Meltdown_IGI_Nodeware.jpg</image:loc><image:caption>SpectreMeltdownIGINodeware</image:caption><image:title>SpectreMeltdownIGINodeware</image:title></image:image><lastmod>2018-01-05</lastmod></url><url><loc>https://blog.igicybersecurity.com/cyber-liability-insurance-is-evolving-prevention-is-now-key-for-coverage</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-CyberLiabilityInsurance.png</image:loc><image:caption>IGIBlogCyberLiabilityInsurance</image:caption><image:title>IGIBlogCyberLiabilityInsurance</image:title></image:image><lastmod>2022-01-07</lastmod></url><url><loc>https://blog.igicybersecurity.com/third-party-penetration-tests-the-key-to-unbiased-security-validation</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/third-party-penetration-tests-the-key-to-unbiased-security-validation.png</image:loc><image:caption>thirdpartypenetrationteststhekeytounbiasedsecurityvalidation</image:caption><image:title>thirdpartypenetrationteststhekeytounbiasedsecurityvalidation</image:title></image:image><lastmod>2025-05-22</lastmod></url><url><loc>https://blog.igicybersecurity.com/learning-from-the-mgm-breach-how-to-be-cloud-smart</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Cloud%20Blog%20.png</image:loc><image:caption>CloudBlog</image:caption><image:title>CloudBlog</image:title></image:image><lastmod>2020-02-27</lastmod></url><url><loc>https://blog.igicybersecurity.com/the-roi-of-cybersecurity-investments-part-1</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Risk-Management-730x440.jpg</image:loc><image:caption>RiskManagement730x440</image:caption><image:title>RiskManagement730x440</image:title></image:image><lastmod>2019-03-29</lastmod></url><url><loc>https://blog.igicybersecurity.com/vulnerability-assessments-vs-penetration-tests-explained</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-VulnAssessments&amp;PenTests.png</image:loc><image:caption>IGIBlogVulnAssessmentsPenTests</image:caption><image:title>IGIBlogVulnAssessmentsPenTests</image:title></image:image><lastmod>2023-11-07</lastmod></url><url><loc>https://blog.igicybersecurity.com/meet-cybersecurity-people-steve-mihm</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/SteveMihm.jpg</image:loc><image:caption>SteveMihm</image:caption><image:title>SteveMihm</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Meet%20the%20People_Steve%20copy_social.png</image:loc><image:caption>MeetthePeopleStevecopysocial</image:caption><image:title>MeetthePeopleStevecopysocial</image:title></image:image><lastmod>2021-07-14</lastmod></url><url><loc>https://blog.igicybersecurity.com/do-you-need-a-ciso-the-answer-may-surprise-you</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/BlogPost%20TaaS%20copy.png</image:loc><image:caption>BlogPostTaaScopy</image:caption><image:title>BlogPostTaaScopy</image:title></image:image><lastmod>2021-12-06</lastmod></url><url><loc>https://blog.igicybersecurity.com/a-new-years-cybersecurity-resolution-be-proactive</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-CybersecurityResolution.png</image:loc><image:caption>IGIBlogCybersecurityResolution</image:caption><image:title>IGIBlogCybersecurityResolution</image:title></image:image><lastmod>2021-12-22</lastmod></url><url><loc>https://blog.igicybersecurity.com/the-rise-of-the-virtual-ciso</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/The%20Rise%20of%20the%20Virtual%20CISO%20(1).png</image:loc><image:caption>TheRiseoftheVirtualCISO1</image:caption><image:title>TheRiseoftheVirtualCISO1</image:title></image:image><lastmod>2020-09-11</lastmod></url><url><loc>https://blog.igicybersecurity.com/how-to-prepare-for-an-owasp-penetration-test</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/how-to-prepare-for-an-owasp-pen-test.png</image:loc><image:caption>howtoprepareforanowasppentest</image:caption><image:title>howtoprepareforanowasppentest</image:title></image:image><lastmod>2025-08-20</lastmod></url><url><loc>https://blog.igicybersecurity.com/why-cybersecurity-matters-for-your-insurance-coverage</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-WhyCybersecurityMattersforYourInsuranceCoverage.png</image:loc><image:caption>IGIBlogWhyCybersecurityMattersforYourInsuranceCoverage</image:caption><image:title>IGIBlogWhyCybersecurityMattersforYourInsuranceCoverage</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.igicybersecurity.com/how-to-prepare-for-an-internal-penetration-test</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/how-to-prepare-for-an-internal-pen-test.png</image:loc><image:caption>howtoprepareforaninternalpentest</image:caption><image:title>howtoprepareforaninternalpentest</image:title></image:image><lastmod>2025-08-06</lastmod></url><url><loc>https://blog.igicybersecurity.com/bad-surprises-snow-in-april-and-security-breaches</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/nyc-spring-snow-gty-hb-180402_hpEmbed_13x8_992.jpg</image:loc><image:caption>nycspringsnowgtyhb180402hpEmbed13x8992</image:caption><image:title>nycspringsnowgtyhb180402hpEmbed13x8992</image:title></image:image><lastmod>2018-04-06</lastmod></url><url><loc>https://blog.igicybersecurity.com/dev-test-blog</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/nodeware-logo.svg</image:loc><image:caption>nodewarelogo</image:caption><image:title>nodewarelogo</image:title></image:image><lastmod>2024-01-18</lastmod></url><url><loc>https://blog.igicybersecurity.com/the-6-facets-of-highly-effective-cybersecurity-teams-as-told-by-a-military-veteran</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Cybersecurity-Team_1200x500_tcm38-314665.jpg</image:loc><image:caption>CybersecurityTeam1200x500tcm38314665</image:caption><image:title>CybersecurityTeam1200x500tcm38314665</image:title></image:image><lastmod>2019-05-28</lastmod></url><url><loc>https://blog.igicybersecurity.com/download-nist-800-53a-rev4-audit-assessment-checklist-xls</loc><lastmod>2023-06-09</lastmod></url><url><loc>https://blog.igicybersecurity.com/how-vciso-services-strengthen-your-cybersecurity-program</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/how-vciso-services-strengthen-your-cybersecurity-program.png</image:loc><image:caption>howvcisoservicesstrengthenyourcybersecurityprogram</image:caption><image:title>howvcisoservicesstrengthenyourcybersecurityprogram</image:title></image:image><lastmod>2025-05-22</lastmod></url><url><loc>https://blog.igicybersecurity.com/protecting-your-privacy-the-importance-of-the-gdpr-legislation</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/EU-General-Data-Protection-Regulation-2018.png</image:loc><image:caption>EUGeneralDataProtectionRegulation2018</image:caption><image:title>EUGeneralDataProtectionRegulation2018</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://blog.igicybersecurity.com/cybersecurity-people-and-the-training-evolution</loc><lastmod>2023-04-21</lastmod></url><url><loc>https://blog.igicybersecurity.com/cybersecurity-negligence-how-to-change-the-culture-from-within</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Cybersecurity%20Negligence_%20How%20to%20Change%20the%20Culture%20From%20Within%20(2).jpg</image:loc><image:caption>CybersecurityNegligenceHowtoChangetheCultureFromWithin2</image:caption><image:title>CybersecurityNegligenceHowtoChangetheCultureFromWithin2</image:title></image:image><lastmod>2019-11-14</lastmod></url><url><loc>https://blog.igicybersecurity.com/inside-the-mind-of-a-cybersecurity-pro-part-3</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/KMC08993-2.jpg</image:loc><image:caption>KMC089932</image:caption><image:title>KMC089932</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/CyberPro3-WordCloud-Brain%5B1%5D.png</image:loc><image:caption>CyberPro3WordCloudBrain1</image:caption><image:title>CyberPro3WordCloudBrain1</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/My%20Post%20(30).png</image:loc><image:caption>MyPost30</image:caption><image:title>MyPost30</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://blog.igicybersecurity.com/if-i-had-a-limited-cybersecurity-budget-this-is-where-i-would-spend-it</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Budgeting%20Blog%202019.png</image:loc><image:caption>BudgetingBlog2019</image:caption><image:title>BudgetingBlog2019</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://blog.igicybersecurity.com/amazon-prime-day-security-tips-online-shopping</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Imported_Blog_Media/portrait-EdwardNadareski@2x-150x150.jpg</image:loc><image:caption>portraitEdwardNadareski2x150x150</image:caption><image:title>portraitEdwardNadareski2x150x150</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/amazon-prime-day-security-tips-for-online-shopping.jpg</image:loc><image:caption>amazonprimedaysecuritytipsforonlineshopping</image:caption><image:title>amazonprimedaysecuritytipsforonlineshopping</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/portrait-EdwardNadareski@2x.jpg</image:loc><image:caption>portraitEdwardNadareski2x</image:caption><image:title>portraitEdwardNadareski2x</image:title></image:image><lastmod>2023-04-21</lastmod></url><url><loc>https://blog.igicybersecurity.com/cmmc-2.0-myths-debunked-separating-fact-from-fiction</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-CMMC-2.0-Myths-Debunked.png</image:loc><image:caption>IGIBlogCMMC20MythsDebunked</image:caption><image:title>IGIBlogCMMC20MythsDebunked</image:title></image:image><lastmod>2024-05-07</lastmod></url><url><loc>https://blog.igicybersecurity.com/mergers-and-acquisitions-building-a-cybersecurity-strategy</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/M&amp;A.png</image:loc><image:caption>MA</image:caption><image:title>MA</image:title></image:image><lastmod>2019-07-10</lastmod></url><url><loc>https://blog.igicybersecurity.com/choosing-nist-800-53-key-questions-for-understanding-this-critical-framework</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/NIST%20Blog%20-1.png</image:loc><image:caption>NISTBlog1</image:caption><image:title>NISTBlog1</image:title></image:image><lastmod>2019-10-11</lastmod></url><url><loc>https://blog.igicybersecurity.com/origins-and-evolution-of-vulnerability-management</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/VM%20Origins%20Blog%20Copy.jpg</image:loc><image:caption>VMOriginsBlogCopy</image:caption><image:title>VMOriginsBlogCopy</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://blog.igicybersecurity.com/navigating-third-party-risk-management-for-credit-unions</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-Navigating-Third-Party-Risk-Management-for-Credit-Unions.png</image:loc><image:caption>IGIBlogNavigatingThirdPartyRiskManagementforCreditUnions</image:caption><image:title>IGIBlogNavigatingThirdPartyRiskManagementforCreditUnions</image:title></image:image><lastmod>2025-05-22</lastmod></url><url><loc>https://blog.igicybersecurity.com/hiring-the-right-security-team-10-questions-to-ask</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/91261i4514901B0C3E9A60.jpg</image:loc><image:caption>91261i4514901B0C3E9A60</image:caption><image:title>91261i4514901B0C3E9A60</image:title></image:image><lastmod>2018-11-30</lastmod></url><url><loc>https://blog.igicybersecurity.com/enabling-hsts-on-apache2-a-guide</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Imported_Blog_Media/Enterprise-Cybersecurity-Market-1.jpg</image:loc><image:caption>EnterpriseCybersecurityMarket1</image:caption><image:title>EnterpriseCybersecurityMarket1</image:title></image:image><lastmod>2020-04-10</lastmod></url><url><loc>https://blog.igicybersecurity.com/whats-causing-security-breaches-and-what-can-be-done</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Internet%20security%202-1.jpg</image:loc><image:caption>Internetsecurity21</image:caption><image:title>Internetsecurity21</image:title></image:image><lastmod>2018-03-06</lastmod></url><url><loc>https://blog.igicybersecurity.com/how-to-fight-the-phish</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/fight-the-phish-1.png</image:loc><image:caption>fightthephish1</image:caption><image:title>fightthephish1</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/fight-the-phish-2.png</image:loc><image:caption>fightthephish2</image:caption><image:title>fightthephish2</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/CAM%202023%20-%20Blog%202.png</image:loc><image:caption>CAM2023Blog2</image:caption><image:title>CAM2023Blog2</image:title></image:image><lastmod>2023-10-24</lastmod></url><url><loc>https://blog.igicybersecurity.com/inthenews/stuart-talks-security-podcast-youve-been-hired-as-a-ciso-now-what</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MF-15153-MeganBrandow-1398%202.jpg</image:loc><image:caption>MF15153MeganBrandow13982</image:caption><image:title>MF15153MeganBrandow13982</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-RGB-Teal%20Combo-Lockup%20Logo-2.png</image:loc><image:caption>IGIRGBTealComboLockupLogo2</image:caption><image:title>IGIRGBTealComboLockupLogo2</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Screen%20Shot%202021-03-01%20at%201.37.13%20PM.png</image:loc><image:caption>ScreenShot20210301at13713PM</image:caption><image:title>ScreenShot20210301at13713PM</image:title></image:image><lastmod>2021-03-02</lastmod></url><url><loc>https://blog.igicybersecurity.com/cyber-insurance-top-10-ways-to-reduce-risk-and-potentially-your-premium</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-CyberInsuranceTop10Ways.png</image:loc><image:caption>IGIBlogCyberInsuranceTop10Ways</image:caption><image:title>IGIBlogCyberInsuranceTop10Ways</image:title></image:image><lastmod>2024-01-24</lastmod></url><url><loc>https://blog.igicybersecurity.com/becybersmart</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/NCSAM%202021%20-%20Week4.png</image:loc><image:caption>NCSAM2021Week4</image:caption><image:title>NCSAM2021Week4</image:title></image:image><lastmod>2021-10-27</lastmod></url><url><loc>https://blog.igicybersecurity.com/signatures-paper-priceless-signatures-security-valueless</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Imported_Blog_Media/portrait-EdwardNadareski@2x-150x150.jpg</image:loc><image:caption>portraitEdwardNadareski2x150x150</image:caption><image:title>portraitEdwardNadareski2x150x150</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/portrait-EdwardNadareski@2x.jpg</image:loc><image:caption>portraitEdwardNadareski2x</image:caption><image:title>portraitEdwardNadareski2x</image:title></image:image><lastmod>2023-04-21</lastmod></url><url><loc>https://blog.igicybersecurity.com/meet-the-cybersecurity-people-paul-robinson</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Meet%20the%20People%20pr%20social-1.png</image:loc><image:caption>MeetthePeopleprsocial1</image:caption><image:title>MeetthePeopleprsocial1</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Paul%20square.jpg</image:loc><image:caption>Paulsquare</image:caption><image:title>Paulsquare</image:title></image:image><lastmod>2021-04-30</lastmod></url><url><loc>https://blog.igicybersecurity.com/how-ciso-advisory-services-empower-your-cybersecurity-and-cyber-insurance-preparedness</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-HowCISOAdvisoryServicesEmpowerYourCybersecurityAndCyberInsurancePreparedness.png</image:loc><image:caption>IGIBlogHowCISOAdvisoryServicesEmpowerYourCybersecurityAndCyberInsurancePreparedness</image:caption><image:title>IGIBlogHowCISOAdvisoryServicesEmpowerYourCybersecurityAndCyberInsurancePreparedness</image:title></image:image><lastmod>2024-06-04</lastmod></url><url><loc>https://blog.igicybersecurity.com/nodeware-joins-telarus-supplier-team-with-niche-cybersecurity-product</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/TFzP9vBSIGC4neGZeHqp_Telarus%20logo%20-%20white.jpg</image:loc><image:caption>TFzP9vBSIGC4neGZeHqpTelaruslogowhite</image:caption><image:title>TFzP9vBSIGC4neGZeHqpTelaruslogowhite</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MF-15153-MeganBrandow-1398%202.jpg</image:loc><image:caption>MF15153MeganBrandow13982</image:caption><image:title>MF15153MeganBrandow13982</image:title></image:image><lastmod>2017-10-11</lastmod></url><url><loc>https://blog.igicybersecurity.com/what-to-do-if-you-missed-the-nydfs-regulation-deadline</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/nydfs-cybersecurity-regulation-hero-image.jpg</image:loc><image:caption>nydfscybersecurityregulationheroimage</image:caption><image:title>nydfscybersecurityregulationheroimage</image:title></image:image><lastmod>2019-02-27</lastmod></url><url><loc>https://blog.igicybersecurity.com/remote-employees-may-be-your-biggest-cybersecurity-threat</loc><lastmod>2020-03-20</lastmod></url><url><loc>https://blog.igicybersecurity.com/legal-industry-case-study</loc><lastmod>2017-07-14</lastmod></url><url><loc>https://blog.igicybersecurity.com/what-you-need-to-know-about-multi-factor-authentication-fatigue-attacks</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-WhatYouNeedtoKnowAboutMFAFatigueAttacks.png</image:loc><image:caption>IGIBlogWhatYouNeedtoKnowAboutMFAFatigueAttacks</image:caption><image:title>IGIBlogWhatYouNeedtoKnowAboutMFAFatigueAttacks</image:title></image:image><lastmod>2025-05-22</lastmod></url><url><loc>https://blog.igicybersecurity.com/infinite-group-inc.-announces-sponsorship-of-nyslgitda-spring-conference</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/NYSLGITDA%20social%20graphic-1.png</image:loc><image:caption>NYSLGITDAsocialgraphic1</image:caption><image:title>NYSLGITDAsocialgraphic1</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MF-15153-MeganBrandow-1398%202.jpg</image:loc><image:caption>MF15153MeganBrandow13982</image:caption><image:title>MF15153MeganBrandow13982</image:title></image:image><lastmod>2018-05-15</lastmod></url><url><loc>https://blog.igicybersecurity.com/infinite-group-inc.-to-exhibit-at-nysasbos-70th-annual-education-summit-expo</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MF-15153-MeganBrandow-1398%202.jpg</image:loc><image:caption>MF15153MeganBrandow13982</image:caption><image:title>MF15153MeganBrandow13982</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/NYSASBO.jpeg</image:loc><image:caption>NYSASBO</image:caption><image:title>NYSASBO</image:title></image:image><lastmod>2018-06-01</lastmod></url><url><loc>https://blog.igicybersecurity.com/navigating-cmmc-compliance-a-strategic-guide-for-msps</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-Navigating-CMMC-Compliance-A-Strategic-Guide-for-MSPs.png</image:loc><image:caption>IGIBlogNavigatingCMMCComplianceAStrategicGuideforMSPs</image:caption><image:title>IGIBlogNavigatingCMMCComplianceAStrategicGuideforMSPs</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.igicybersecurity.com/hacktivism-does-it-do-more-harm-than-good</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/BlogPost%20Hacktivism.png</image:loc><image:caption>BlogPostHacktivism</image:caption><image:title>BlogPostHacktivism</image:title></image:image><lastmod>2024-04-03</lastmod></url><url><loc>https://blog.igicybersecurity.com/recognizing-our-own-on-veterans-day</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Veterans%20Day.jpg</image:loc><image:caption>VeteransDay</image:caption><image:title>VeteransDay</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/LeeS.jpg</image:loc><image:caption>LeeS</image:caption><image:title>LeeS</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/MF-15153-MeganBrandow-1398%202.jpg</image:loc><image:caption>MF15153MeganBrandow13982</image:caption><image:title>MF15153MeganBrandow13982</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/ErnieS.jpg</image:loc><image:caption>ErnieS</image:caption><image:title>ErnieS</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/TyW2-1.jpg</image:loc><image:caption>TyW21</image:caption><image:title>TyW21</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/ChrisK.jpg</image:loc><image:caption>ChrisK</image:caption><image:title>ChrisK</image:title></image:image><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/Bailey%20Uniform%20Picture.jpg</image:loc><image:caption>BaileyUniformPicture</image:caption><image:title>BaileyUniformPicture</image:title></image:image><lastmod>2019-11-11</lastmod></url><url><loc>https://blog.igicybersecurity.com/cybersecurity-awareness-month-10-ways-to-improve-your-security-in-october</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/10%20Actions%20Blog%20Copy.png</image:loc><image:caption>10ActionsBlogCopy</image:caption><image:title>10ActionsBlogCopy</image:title></image:image><lastmod>2021-03-02</lastmod></url><url><loc>https://blog.igicybersecurity.com/exploring-the-nist-cybersecurity-framework-2.0-enhanced-guidelines-for-managing-modern-cyber-risk</loc><image:image><image:loc>https://3418801.fs1.hubspotusercontent-na1.net/hubfs/3418801/IGI-Blog-NISTCSF2.0.png</image:loc><image:caption>IGIBlogNISTCSF20</image:caption><image:title>IGIBlogNISTCSF20</image:title></image:image><lastmod>2024-03-13</lastmod></url><url><loc>https://blog.igicybersecurity.com/what-social-media-phishing-looks-like-and-how-to-avoid-it</loc><lastmod>2017-10-02</lastmod></url></urlset>